Xiaomi and WPS Vulnerabilities: File Overwrite Risks Alert

In the digital realm, security is paramount, especially when it comes to the applications we use daily. Recently, concerns have surfaced regarding vulnerabilities in popular Android applications available on the Google Play ...
2024 OWASP Mobile Top Ten Risks

2024 OWASP Mobile Top Ten Risks

What is OWASP MASVS? In case you didn't notice, the OWASP Mobile Top 10 List was just updated, for the first time since 2016! This is important for developers since this list ...
2024 OWASP Mobile Top Ten Risks

2024 OWASP Mobile Top Ten Risks

In case you didn't notice, the OWASP Mobile Top 10 List was just updated, for the first time since 2016! This is important for developers since this list represents the list of ...

Alert: Pixel Phones’ Exploited Android Zero-Day Flaw Patched

In the realm of smartphone security, the recent spotlight has fallen on Google Pixel devices, where two zero-day vulnerabilities have been unearthed and promptly addressed by Google. As per recent reports, the ...
Blog: Why Hackers Love Phones - Keep your Eye on the Device

Blog: Why Hackers Love Phones – Keep your Eye on the Device

This is the third article in a guest blog series from Intellyx. Catch up on the first article here and the second one here. Maintaining a corporate cybersecurity posture means locking down its ...
app, sideloading, MDM, Apple, IoS, SEC SIM swap X account

SEC’s X Breach Highlights Need for Better Defense Against SIM Swap Attacks

The ease with which fraudsters applied the SIM swap attack on the SEC indicates the issue should be a top concern for all organizations ...
Security Boulevard
How Your Mobile Apps Leak Sensitive Data?

How Your Mobile Apps Leak Sensitive Data?

Do you know there are 2.9 million applications on the Google Play Store, which indicates that the Android market is growing quickly? Although there are many benefits and opportunities associated with it, ...

Breaking Bitlocker

It was only a matter of time before someone did this. Bitlocker is Microsoft’s technique for encrypting a desktop, laptop, or other MS Windows device. We encrypt the device to protect the ...
network Organizations Still Don’t Get Mobile app Security

Applying Zero-Trust to Voice Networks and the 5G Core

Zero-trust architecture is rapidly becoming the go-to approach for security and IT leaders to secure voice, mobile and 5G networks and applications ...
Security Boulevard
Revealing the Limitations of Apple DeviceCheck and Apple App Attest

Revealing the Limitations of Apple DeviceCheck and Apple App Attest

This overview outlines the history and use of Apple DeviceCheck including the DeviceCheck App Attest feature. It will highlight how this security solution is used and highlight some limitations. We also compare ...

Application Security Check Up