NIST SP 1800-21: Mobile Application Single Sign-On

The NIST Special Publication 1800-21 Cybersecurity Practice Guide provides a comprehensive framework for secure mobile app single sign-on (SSO) implementation. Learn how to enhance authentication security in enterprise environments. Download now for expert guidance.
DHS Automated Vetting Process for Mobile Apps Could Cut Costs

Manual security testing is time-consuming and expensive. Learn how the Department of Homeland Security’s automated vetting process streamlines mobile app security, reducing costs while improving efficiency. Read the full report now.
Automating NIAP Requirements Testing for Mobile Apps

Ensuring the security of IT products is critical for national security. This DHS report examines NIAP’s role in testing and certifying secure technology. Download now for insights into federal cybersecurity standards.
Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware

Pre-installed apps on Android devices often come with privileged access, making them potential security risks. This study introduces FIRMSCOPE, an automated tool that scans Android firmware to detect privilege-escalation vulnerabilities. Analyzing over 330,000 apps across 2,000 firmware images, the research uncovers critical security flaws that allow unauthorized access to sensitive user data, device controls, and system functions.
NIST SP 800-163r1: Vetting the Security of Mobile Applications

Ensuring mobile app security is essential for organizations. The National Institute of Standards and Technology (NIST) 800-163r1 Special Publication outlines a standardized approach to evaluating and improving mobile application security. Download now for a detailed security vetting framework.
Resilient & Scalable Cloned App Detection Using Forced Execution & Compression Trees

Cloned apps pose major security threats. This research introduces a scalable detection method using forced execution and compression trees to identify clones efficiently. A must-read for cybersecurity professionals combating app fraud and malware. Download now to learn more.
A Longitudinal Study of Android Inter-App Vulnerabilities

Inter-app vulnerabilities are a persistent security risk. This study tracks their evolution over time, revealing trends and risks that impact millions of Android users. Essential for security researchers and developers looking to strengthen app defenses. Download now to stay ahead of emerging threats.
An Evaluation of Android Carrier Devices: Security & Performance

How secure are carrier-branded Android devices? This evaluation examines vulnerabilities, performance metrics, and carrier-specific risks. Download now for a comprehensive security analysis.
Kryptowire Discovers Mobile Phone Firmware that Transmitts PII Without User Consent

Unauthorized data collection is a growing concern. This investigation by Quokka (formerly Kryptowire) reveals mobile firmware that secretly transmitted personal data without user knowledge. Download now to learn about these privacy risks and how to mitigate them.