We’re surrounded by intelligent things: smartphones, self-driving vehicles, smart homes, and even smart cities. Millions of sensors generate, process, and transmit countless amounts of data to make our lives easier, safer, and more comfortable. However,...
Healthcare organizations use mobile devices to facilitate communication among doctors, patients, and staff, provide remote services, remotely monitor patients’ health, work with documents, etc. Transferring bureaucratic activities to a smartphone is a...
Mobile applications often process sensitive data, which is the key target of many cybercriminals. When working with such data, developers must do their best to ensure its protection. One way to improve the security of a mobile app is to perform mobile...
Lines of code are the bricks that applications are made of. Using these bricks, developers build different functions, operations, and designs, which are then united into a solid solution. But writing thousands of lines of code isn’t an easy task.
Android is considered one of the most frequently attacked platforms. While it isn’t possible to implement quantum encryption in every app, you should consider applying some level of data ciphering. There are dozens of ways to encrypt data, from simple...
Each quality assurance (QA) specialist has their own set of favorite testing methodologies and tools they use for testing cloud applications, mobile apps, and other types of software. In this article, we focus on two tools that our QA professionals...
Virtual reality (VR) video is a popular trend in the virtual reality industry. Unlike ordinary videos, virtual reality videos totally immerse viewers in an artificial environment by rendering 3D images. Many people confuse virtual reality videos with...
Smartphones and tablets are no longer only suitable for home and personal use. Many companies have realized the benefits of allowing their employees to use personal mobile devices for work, contributing to the Bring Your Own Device (BYOD) trend.
One of the most noticeable recent trends in web development is the single-page application, or SPA for short. This concept swept like a hurricane through an industry longing for new and exciting ways to make user experiences slicker.
In today’s world, where we constantly use phones and handheld devices, mobile data encryption is extremely important. Unauthorized access to application content or network traffic can lead to leaks of private information and losses, both for individual...
When developing a mobile app, there are no better cyber security guidelines to follow then OWASP Mobile Top 10 Security Risks. In the modern cyber security industry, you would be hard pressed to find people who didn't hear about The Open Web...
Nowadays, it is hard to imagine life without mobile devices. We use them everywhere to facilitate our lifestyle. They help us to communicate with each other, have fun, and even make purchases. We use them at home and at work. These devices accompany us...
Protection of the sensitive date stored on the mobile devices is a hot topic. There are a huge number of apps that provide access to the corporate (confidential) data, banking and payment tools, social networks and many other web-services, where user...
Often companies developing ParentalControl or DLP solutions require access to private data from software, installed on Android devices. For example, messages from Skype/KIK/Viber, etc., or even an access to a browsing history are both good examples of...
If you don’t want to install a number of programs for building your Android project, this article is for you. You will need only JDK, the Android SDK platform tools and minimum Android platform in order to build apk from command line.
Reverse engineering is the direct opposite of building or engineering an application: you break things down bit by bit to see how they actually work. Developers incorporate reverse engineering techniques to solve tasks from investigating bugs in code to...
In this article, I will tell you about the process of my research and the results I’ve obtained. I will describe PackageAnalyzer program created as a supplemental tool that displays various data on applications installed in the system. The following is...
Some types of applications require that the end users can not be able to remove or at least stop the application. For example, all types of Parental Controls, Data Leak Prevention, and applications with similar concepts should work on devices regardless...
You have an Android Device and you are familiar with Linux-based operating systems. Maybe, you like SSH or telnet to communicate with the device; you want to setup your device as a router to connect home PC to the Internet. However, you will be...
This article describes the protocol of data exchange that is the modification of the well-known OBEX protocol used in the GSM Samsung phones from the SHP family. The described modification of this protocol lets you write data to the phone and also get...
 

Let's talk

4000 chars left
Attach a file
Browse
By clicking Send you give consent to processing your data

Book an Exploratory Call

Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.

Book time slot

Contact Us

P: +1 202-780-9339
E: [email protected]

8 The Green, Suite #7106, Dover, DE 19901
United States

D-U-N-S number: 117063762

btnUp