
Information Security of Mobile Applications
An overview of main mobile information security issues, with some suggestions on how to deal with them

An overview of main mobile information security issues, with some suggestions on how to deal with them

A sample Android app implementing Android KeyStore and its alternatives for previous versions

The method of accessing third-party app private data like skype messages on Android - with sample code

Get a brief overview of the 3 most widespread web app vulnerabilities: security Misconfiguration; broken session and authentication problems; and Cros...

This article describes a way to create Android applications which cannot be removed or stopped by users; only admin who knows a special password can d...

This article describes how to root android device using ADB. Learn how android root exploit works and get to know main principles of android rooting.

Provide blocking of access and hiding of the system registry keys depending on the context of user in the current application.

This article describes the method how to remove all hooks from the system, which were set by means of splicing method

The article is devoted to the development of the library that implements the Diffie – Hellman cryptographic algorithm of key exchange.

The task was to implement the system for protection against unauthorized data exchange via the Clipboard
Tell us about
your project
...And our team will:
Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.