What Are Supply Chain Attacks and Why Should I Care?

Cybercriminals are targeting the weakest links in software and hardware supply chains. This whitepaper explains how supply chain attacks work, why they’re a growing threat, and how to mitigate risks. Download now to protect your organization.

DEFInit: An Analysis of Exposed Android Init Routines

Discover the hidden risks lurking in Android’s initialization routines with Academic DEFInit: An Analysis of Exposed Android Init Routines. This in-depth research paper explores security vulnerabilities within Android’s init system, shedding light on potential exploitation pathways. Ideal for cybersecurity professionals and researchers, this analysis provides valuable insights into securing Android-based systems against emerging threats. Download now to stay ahead in mobile security.

(Un)protected Broadcasts in Android 9 and 10

Broadcast mechanisms in Android can be a double-edged sword. This research uncovers security flaws in unprotected broadcasts within Android 9 and 10, highlighting potential exploitation risks. Download now for a detailed analysis.

NIST SP 1800-21: Mobile Application Single Sign-On

The NIST Special Publication 1800-21 Cybersecurity Practice Guide provides a comprehensive framework for secure mobile app single sign-on (SSO) implementation. Learn how to enhance authentication security in enterprise environments. Download now for expert guidance.

Automating NIAP Requirements Testing for Mobile Apps

Ensuring the security of IT products is critical for national security. This DHS report examines NIAP’s role in testing and certifying secure technology. Download now for insights into federal cybersecurity standards.

Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware

Pre-installed apps on Android devices often come with privileged access, making them potential security risks. This study introduces FIRMSCOPE, an automated tool that scans Android firmware to detect privilege-escalation vulnerabilities. Analyzing over 330,000 apps across 2,000 firmware images, the research uncovers critical security flaws that allow unauthorized access to sensitive user data, device controls, and system functions.