3 min read
Android Hacking: The libwebp Vulnerability (zero-day/zero-click)
Welcome back, my aspiring cyberwarriors! In recent days, a new and severe vulnerability has been found among the Android ecosystem that...
8,054 views
3 min read
Android Hacking, Part 4: A Compendium of Android Remote Administration Trojans (RATS)
Welcome back, my aspiring cyberwarriors! In light of the recent revelations regarding Israel's NSO group and their cellphone malware...
18,646 views
5 min read
Metasploit Basics, Part 13: Exploiting Android Mobile Devices (Updated)
Welcome back, my budding hackers! The growth of the mobile device market has been dramatic over the past 10 years. From its birth in 2007...
70,329 views
3 min read
Android Hacking, Part 2: How to Embed a Backdoor into an Android APK
Welcome back, my fledgling hackers! Mobile devices--smartphones and tablets--are proliferating around the world and slowly overtaking...
46,248 views
3 min read
Digital Forensics, Part 10: Mobile Forensics (Android)
Over the past decade or so, the growth of the mobile market has been the fastest growing segment of the IT industry. We now have portable...
4,253 views
3 min read
Android Hacking, Part 1: Android Basics
Welcome back, my rookie hackers! Before we delve into this much anticipated section on "Hacking Android", we first need to understand a...
9,902 views
4 min read
Android Hacking: Setting Up an Android Hacking Lab
Each and every day, the world is turning to and adopting the smartphone platform as the digital device of choice. People are not only...
18,699 views
5 min read
How to Spy on Anyone's Smartphone
Our smartphones are the reservoirs of our life. They contain so much personal and business information that anyone who can get into our...
29,978 views