Samsung Android: System User Activity Start Vulnerability

Samsung’s Android devices face a critical vulnerability allowing arbitrary activity execution as the system user. This report details the flaw and its security implications. Download now to understand the risk.
What Are Supply Chain Attacks and Why Should I Care?

Cybercriminals are targeting the weakest links in software and hardware supply chains. This whitepaper explains how supply chain attacks work, why they’re a growing threat, and how to mitigate risks. Download now to protect your organization.
Mobile App Security & Privacy: Transformational Assessment for NHS

Data privacy and security are crucial in healthcare. This report examines the NHS’s mobile security landscape, identifying risks and solutions for improved protection. Download now for key findings on securing health apps.
DEFInit: An Analysis of Exposed Android Init Routines

Discover the hidden risks lurking in Android’s initialization routines with Academic DEFInit: An Analysis of Exposed Android Init Routines. This in-depth research paper explores security vulnerabilities within Android’s init system, shedding light on potential exploitation pathways. Ideal for cybersecurity professionals and researchers, this analysis provides valuable insights into securing Android-based systems against emerging threats. Download now to stay ahead in mobile security.
(Un)protected Broadcasts in Android 9 and 10

Broadcast mechanisms in Android can be a double-edged sword. This research uncovers security flaws in unprotected broadcasts within Android 9 and 10, highlighting potential exploitation risks. Download now for a detailed analysis.
NIST SP 1800-21: Mobile Application Single Sign-On

The NIST Special Publication 1800-21 Cybersecurity Practice Guide provides a comprehensive framework for secure mobile app single sign-on (SSO) implementation. Learn how to enhance authentication security in enterprise environments. Download now for expert guidance.
DHS Automated Vetting Process for Mobile Apps Could Cut Costs

Manual security testing is time-consuming and expensive. Learn how the Department of Homeland Security’s automated vetting process streamlines mobile app security, reducing costs while improving efficiency. Read the full report now.
Automating NIAP Requirements Testing for Mobile Apps

Ensuring the security of IT products is critical for national security. This DHS report examines NIAP’s role in testing and certifying secure technology. Download now for insights into federal cybersecurity standards.
Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware

Pre-installed apps on Android devices often come with privileged access, making them potential security risks. This study introduces FIRMSCOPE, an automated tool that scans Android firmware to detect privilege-escalation vulnerabilities. Analyzing over 330,000 apps across 2,000 firmware images, the research uncovers critical security flaws that allow unauthorized access to sensitive user data, device controls, and system functions.