3 min readANDROID HACKINGAndroid Hacking: The libwebp Vulnerability (zero-day/zero-click)Welcome back, my aspiring cyberwarriors! In recent days, a new and severe vulnerability has been found among the Android ecosystem that...
3 min readANDROID HACKINGAndroid Hacking, Part 4: A Compendium of Android Remote Administration Trojans (RATS)Welcome back, my aspiring cyberwarriors! In light of the recent revelations regarding Israel's NSO group and their cellphone malware...
5 min readMETASPLOITMetasploit Basics, Part 13: Exploiting Android Mobile Devices (Updated)Welcome back, my budding hackers! The growth of the mobile device market has been dramatic over the past 10 years. From its birth in 2007...
3 min readANDROID HACKINGAndroid Hacking, Part 2: How to Embed a Backdoor into an Android APKWelcome back, my fledgling hackers! Mobile devices--smartphones and tablets--are proliferating around the world and slowly overtaking...
3 min readDIGITAL FORENSICSDigital Forensics, Part 10: Mobile Forensics (Android)Over the past decade or so, the growth of the mobile market has been the fastest growing segment of the IT industry. We now have portable...
3 min readANDROID HACKINGAndroid Hacking, Part 1: Android BasicsWelcome back, my rookie hackers! Before we delve into this much anticipated section on "Hacking Android", we first need to understand a...
4 min readANDROID HACKINGAndroid Hacking: Setting Up an Android Hacking LabEach and every day, the world is turning to and adopting the smartphone platform as the digital device of choice. People are not only...
5 min readHACK TO SPYHow to Spy on Anyone's SmartphoneOur smartphones are the reservoirs of our life. They contain so much personal and business information that anyone who can get into our...