aleph_tav_technologies_androidapps_backdoor

Protect Your Android Apps from Backdoor

The Android operating system influences OS security controls to protect user data, system resources, device integrity against malware, and provides application isolation. Android devices which contains firmware is vulnerable through a debugging feature left inside the bootloader acts as a backdoor and bypasses the authentication procedures. A backdoor is a security risk because there are […]

Aleph-Tav-Technologies_ApSec_Vulnerabilities_HTTPVerbTampering3

HTTP verb tampering is a serious threat, oft-ignored

Application Security Threat Research Series – Part 2: HTTP Verb Tampering Anybody with a flourishing business goes paranoid every now and then that a begrudging party might unleash an attack with the motive of bringing down the reputation of their brand. While it isn’t always easy to stop meddlers, many companies fail to pay attention […]

Aleph Tav Technologies Android Application Vulnerabilities

8 Signs your Android app is about to be hacked.

Developing Android apps that make the cut as secure, reliable and robust is a goal that is getting increasingly dodgy, thanks to the myriad ways in which hackers are exploiting inherent platform vulnerabilities, code loopholes and API bugs. The Android development community is faced with new challenges as devices are perked up with futuristic technologies, […]

Aleph Tav Technologies IoT security

Breaking the IoT security paranoia: Hardening the ZigBee Residential Mode

The Internet of Things Exploit Research Series: ZigBee – Part 1 The problem with skeptical views of IoT adoption is that they induce delusions of a rapidly approaching Orwellian dystopia of sorts. Misgivings are understandable, what with the barrage of criticism from the academia and frenzied media accounts of connected car hacks and ‘Creepware’ webcams […]

Malware in developer tools is an insidious threat

Malware in Developer Tools: Wolf in Sheep’s Clothing?

Imagine having to cook food with contaminated ingredients. How would you like worm-infested potatoes, meat infected with tapeworm, and claim to have cooked a healthy meal? Mapping the analogy to app development, how safe would it be if the very tools we use for building apps and other software are themselves corrupt with malware? For now, we […]

Aleph tav Technologies - Protect against ransomware

Ransomware – Is it the new blackmail?

Imagine you have to leave your home on account of an emergency. There’s no one but your faithful nanny to take care of your house and your baby in your absence. You place your trust in your nanny and leave for the emergency only to return and find yourself locked out of your house with […]

Ethical Hacking - Aleph Tav Technologies

Ethical Hacking- The Perfect Reality Check

A few months ago, a team of hackers namely Charlie Miller and Chris Valasek wrought havoc by infiltrating into the entertainment system of a Jeep Cherokee. While they were at it, everything in the automobile was under their control including the brakes and the steering. The driver in question was doomed as his fate lay […]