We know it, you know it: things go by at warp speed in the mobile world. Everything – from the hottest smartphone models, the latest operating systems, to the freshest apps – becomes prehistoric and replaced with something faster/stronger/flashier/shinier almost as soon as it launches.
Thank you for being one of the earliest students of the Mobile Application Security and Penetration Testing v2! First and foremost, we want to congratulate the select few of you for blazing through the certification. And, to those who are yet to take the exams, don’t stop – your eMAPT is already on the horizon!
‘Tis the season once again to get into the holiday spirit, and eLearnSecurity decided to fly by and drop off early presents for everyone – naughty and nice, old school hackers and script kiddies alike.
On September 1st 2016, we did something we haven’t done in a long time. We announced that a new eLearnSecurity training course was on its way, but this time, we wanted you guys – the eLS community – to guess what it’s going to be.
Apple’s App Store has been compromised and millions of affected iPad and iPhone users are at risk. A vulnerability named XcodeGhost has been reported which functions by adding malicious code to mobile applications that have been built with an infected version of Xcode – Apple’s development environment for iOS.
Following our blogpost last week about Brute Force vulnerabilitythat affects over 600 million smartphones, we asked IT Security Researcher, Francesco Stillavato, about his thoughts on common security mistakes that mobile application developers make and how to fix them.
Security is a very important feature and should not be taken for granted when developing mobile apps.
Organizations are not placing enough security measures to protect their data against mobile threats, such as malware infections. We've asked eLearnSecurity IT Security expert, Francesco Stillavato, for his thoughts on how to protect your mobile device and prevent it from hackers.