aleph_tav_technologies_androidapps_backdoor

Protect Your Android Apps from Backdoor

The Android operating system influences OS security controls to protect user data, system resources, device integrity against malware, and provides application isolation. Android devices which contains firmware is vulnerable through a debugging feature left inside the bootloader acts as a backdoor and bypasses the authentication procedures. A backdoor is a security risk because there are […]

Aleph Tav Technologies IoT security

Breaking the IoT security paranoia: Hardening the ZigBee Residential Mode

The Internet of Things Exploit Research Series: ZigBee – Part 1 The problem with skeptical views of IoT adoption is that they induce delusions of a rapidly approaching Orwellian dystopia of sorts. Misgivings are understandable, what with the barrage of criticism from the academia and frenzied media accounts of connected car hacks and ‘Creepware’ webcams […]

Aleph Tav Technologies IoT Security Assessment

IoT Data security – the core mission of risk assessment for connected devices

Investing in an IoT system is a risk that needs to be bolstered by a systemic readiness review and attack-based status monitoring strategy.   The Internet of Things is driving transformations in major operational models by connecting assets, people, products and services, creating the possibility to make real-time decisions and deliver personalized outcomes. The technology […]