All Ruby on Rails Node JS Android iOS React Native Frontend
 We present last part of the series of blog posts dedicated to security analysis tools for Android apps. The tools discussed in the series were suggested by the OWASP Mobile Testing Guide (MSTG). In the previous parts we discussed JAADAS, Androbugs, Drozer and QARK. This chapter will focus on MobSF, which is also suggested by MSTG. The main goal of the overview is to find the best tool that will be also easiest to integrate with existing CI/CD stacks.  
Read more
CreateML is a phenomenal tool introduced at WWDC 2018 by Apple, and it has already created quite a hype. In this blog post, we’ll discover not only why it happened but we will also learn how to use the tool. Let’s start!
Read more

Keeping your code clean

Keeping your code clean - this is something that doesn’t always go hand in hand with programming, especially in a larger team where people can have different experience and code style preferences. You may ask "clean code - is it that important?". Believe me, it is.
Read more
This article is part of a series: Android Security Analysis Tools, part one - JAADAS Android Security Analysis Tools, part two - DIVA app and AndroBugs Android Security Analysis Tools, part three - Drozer and QARK   Welcome to the third part of the blog posts series dedicated to security analysis tools for Android apps. The series focuses on the tools suggested by the OWASP Mobile Security Testing Guide (MSTG). In the first part we discussed the problem of security analysis and looked at the JAADAS framework. The second blogpost  was dedicated to an overview of the AndroBugs framework and the DIVA app as a benchmark for security testing on Android. In this chapter, we will focus on two tools - Drozer and QARK.
Read more
This article is part of a series: Android Security Analysis Tools, part one - JAADAS Android Security Analysis Tools, part two - DIVA app and AndroBugs Android Security Analysis Tools, part three - Drozer and QARK   In the previous article, we began our exploration of security testing in Android applications. We started by discussing the testing problem and analyzing the first testing tools suggested by OWASP Mobile Testing Guide (MSTG). In this chapter, we will focus on the next tool for static security analysis suggested by MSTG - AndroBugs.
Read more
Introduction Nowadays, the Bluetooth technology is widely used for general mobile phone and wireless IoT solutions, this last one thanks to the implementation of the Bluetooth Low Energy (BLE) standard suitable for battery-powered IoT sensors.
Read more
Log entries are very important in a developer’s life. We use it to display useful information, errors, workflows or even to debug something. Logs are very helpful during the development process, but should we leave them in a production app? Exposing information about the app Every information that we log can be a potential source of security issues! 
Read more
Introduction The most important question when we create a new Android application from scratch is which architecture should we choose. Developers can choose between MVC, MVP, MVI and MVVM (among others). These architectural patterns are popular for Android development. For years, developers had to implement from scratch, by themselves, the application skeleton without any SDK support. After many years, at the annual Google I/O event, in May 2017, Google presented the Architecture Guide, in which object lifecycle is the most important functionality to support from the point of view of Android OS. During that I/O, Google presented some examples of Android Architecture Blueprints.
Read more
Introduction Nowadays, IoT sensors are almost everywhere and they can sense information that may affect privacy or reveal information that wasn’t intended if it leaks. Particularly, Wireless Sensor Networks(later called WSN) are used extensively in many applications related with health monitoring, environmental monitoring, military purposes and home automation. Security of the privacy rights and the system from malicious attacks is vital when talking about this kind of applications because of the information they sense, plus the combined computational power. Unfortunately, since individually they are not wealthy regarding computational power and battery life, WSNs are not able to deal with traditionals cryptography algorithms to secure data transmission. That’s why other methods and algorithms must be designed and used for IoT systems.
Read more
One of the most important things in mobile development is secure communication, especially between the app and its backend server. Currently, the most common architecture of web services is REST based on HTTP. The best protection method for this model of communication is the TLS/SSL standard. It can be combined with the HTTP protocol to create an encrypted variant called HTTPs. HTTPs ensures safe, encrypted communication channels between client apps and the backend server. Moreover, implementing this security feature is very simple on Android. You just need to watch out for some common pitfalls.
Read more
Newer
Need a successful project?
Estimate project or contact us