
Security Testing for iOS Healthcare Application
Read a story about iOS app vulnerability testing: research tools, detected critical risks, and recommendations
LIVE Webinar
AI for Secure Software Development: From Architecture to Code Review
LIVE ON
November 6, 2025
9 AM PST | 7 PM EET


Read a story about iOS app vulnerability testing: research tools, detected critical risks, and recommendations

An R&D provider case study about the long-term work with a Fortune 500 vendor building a virtualization platform

In this article, I will describe how to use the Android tools for building the .apk file using the command line

Article describes a small tool (sources included) to get various data on applications installed on Android device

This article describes a way to create Android applications which cannot be removed or stopped by users; only admin who knows a special password can d...

This article describes how to root android device using ADB. Learn how android root exploit works and get to know main principles of android rooting.

This article describes the protocol of data exchange that is the modification of the well-known OBEX protocol used in the GSM Samsung phones from the...

Article is devoted to the basic principles of the development of java service for Android device.

I described how to read the the attachments from the emails from your Windows Mobile device.

In this article we will review some aspects of using data types and ways of using them during marshalling data to and from unmanaged code.
Tell us about
your project
...And our team will:
Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.