Find the information you're looking for in our library
of blogs, news, videos, whitepapers and more.
Find the information you're looking for in our library of blogs, news, videos, whitepapers and more.
Highlighting the top Quokka content
The App Security Gaps Created by BYOD and the 4 Steps to Address Them
As the prevalence of BYOD has grown, so have mobile threats. This guide offers practical advice on how to cost effectively address the security and privacy risks of BYOD, without diminishing the benefits and convenience.
Read MoreDefense in Depth: How MAST and Pen Testing Work Together
In this on-demand webinar with Trustwave, a premier penetration testing provider, we delve into the complementary roles of Manual Penetration Testing (Pen Testing) and Mobile Application Security Testing (MAST) in fortifying mobile app security.
Watch NowUnder the Promise of Early Success, CISA Expands its Beta Mobile App Vetting Service
CISA is proud to expand access to the Mobile App Vetting (MAV) service. CISA granted MAV an Authorization to Operate on February 8th, 2023, acknowledging the service’s key role in combating a growing risk of mobile app vulnerabilities threatening Federal Civilian Executive Branch (FCEB) agencies. Moreover, it is available at no cost to the user.
Learn MoreBlog
Keep up to date with the latest industry news in cybersecurity's ever-evolving landscape.
See All Blog PostsAddressing OWASP Mobile Top 10 2024 Requirements
Discover how security professionals can address the OWASP Mobile Top 10 vulnerabilities of 2024 with Quokka’s innovative, privacy-first Q-mast (Mobile Application Security Testing) solution.
Read MoreAt the Core: A Summary of Gartner’s “A Guidance Framework for Building an Application Security Program”
In this comprehensive summary, we dissect Gartner's framework and highlight key points to fortify your digital assets and instill a proactive security posture within your organization.
Read MoreMobile Apps: How to Manage Their Access to Your Data
Mobile apps often have permissions that allow them to take advantage of already existing user data. But there has been a trend in apps requesting excessive permissions that oftentimes do not relate to their intended functionality.
Read MoreIn the News
Stay up to date on the latest press releases, news stories and media highlights from Quokka.
Read More NewsUncovering Security Vulnerabilities in Prepaid Android Smartphones, Quokka’s R&D Team Exposes Systemic Weaknesses
August 14, 2023
The research and development team at Quokka discovered multiple security vulnerabilities in prepaid Android Smartphones, including instances of arbitrary command execution in privileged processes.
Read MoreQuokka’s Q-Scout Solution Revolutionizes Device Management with Industry’s First Personal Device Management Solution
June 7, 2023
Mobile security solution transforms BYOD in an enterprise ecosystem, prioritizing the privacy of company and personal data.
Read MoreDisrupt Tech the Authorized Distributor of Quokka
May 30, 2023
Disrupt Tech Co., Ltd is now an authorized distributor of Quokka’s products Q-MAST, Q-Vest, Q-Scout and Firmware Analysis and announces the recent establishment of Quokka’s Q-MAST to Advanced Info Service Public Company Limited (“AIS”), the leading Mobile, Fiber Network and Digital Service Provider in Thailand with more than 40 million subscribers.
Read MoreEvents
See Quokka at these upcoming events and learn about the latest in mobile security.
See More EventsLeadership Dinner at RSA with infosec.live & Procyon
May 8, 2024
Quokka, infosec.live, and Procyon are hosting an exclusive, invite-only evening at RSA 2024. Request a seat to enjoy fine dining and open discussions on the globalized app landscape.
RSA Conference 2024
May 6-9, 2024
We’ll be in San Francisco for the annual RSAC event. Meet with us to learn about the evolving mobile security ecosystem.
BFSI IT SUMMIT INDONESIA
May 16, 2024
The BFSI IT Summit is a learning and networking platform that aims to delve deeply into the Banking and Financial Service industry’s looming challenges and identify best practises for overcoming them.
Webinars
Videos and content where you can learn about the latest threats, trends and issues in cybersecurity. Join us from wherever you are.
View More WebinarsDefense in Depth: How MAST and Pen Testing Work Together
In this on-demand webinar with Trustwave, a premier penetration testing provider, we delve into the complementary roles of Manual Penetration Testing (Pen Testing) and Mobile Application Security Testing (MAST) in fortifying mobile app security.
Watch NowQ-Scout 101 | The Next Revolution in BYOD & Mobile Security
Discover how Q-Scout is redefining mobile device security in BYOD settings, ensuring robust protection without compromising user privacy.
Watch NowProtecting The Mobile Ecosystem - Part 2
In this follow-up webinar with infosec.live, Quokka's Ilya Dreytser shares insights on app collusion and unknown app risks.
Watch NowWhitepapers
Insights and helpful assets for exploring cybersecurity and digital security.
Read More WhitepapersThe App Security Gaps Created by BYOD and the 4 Steps to Address Them
As the prevalence of BYOD has grown, so have mobile threats. This guide offers practical advice on how to cost effectively address the security and privacy risks of BYOD, without diminishing the benefits and convenience.
Read MoreZero Trust Architecture: Mobile App and Device Security for Federal Agencies
Federal agencies are being mandated to deploy a Zero Trust model by 2024 however many overlook the importance of mobile application security. This whitepaper outlines how to avoid this pitfall and exponentially reduce your threat landscape.
Read MoreWhat Is Vulnerability Management?
Vulnerability Management is a constant state of identifying, evaluating, and remediating security vulnerabilities. Our whitepaper analyzes the importance of maintaining a proactive security posture and reducing the attack surface before a cyber criminal makes your organization their next target.
Read MoreDatasheets
An in-depth description of Quokka solutions.
Detecting and Measuring Misconfigured Manifest in Android Apps
This paper presents ManiScope, a tool to automatically detect misconfigurations of manifest files when given an Android APK. When implemented ManiScope identified misconfigured pre-installed apps with various security implications including app defrauding, message spoofing, and more.
Download101 Commands Technical Paper
We deeply examine an instance of an engineering app that allows external entities to invoke its “custom” commands that will execute in the privileged context of the engineering app.
DownloadBootlooped - Assorted AOSP Attack Technical Paper
We examine some attack surfaces accessible to unprivileged third-party apps to determine how common functionality can be abused to affect the overall state of Android systems.
DownloadUse Cases
Detailed overview of how Quokka solutions solve real-world pain points.
Q-MAST Solution Spotlight: Federal Agency
When security, privacy, and discretion are key, federal agencies lean on Q-MAST to establish trust.
Read MoreQ-MAST Solution Spotlight: Banking
Global financial institutions trust Q-MAST to keep mobile apps safe, secure and compliant.
Read MoreQ-MAST Solution Spotlight: Medical Schools
Learn why some of the nation's leading medical schools choose Q-MAST for mobile application vetting and security.
Read MoreNewsletter
Subscribe today for news, updates, and insights for your work and live anywhere world.