aleph_tav_technologies_androidapps_backdoor

Protect Your Android Apps from Backdoor

The Android operating system influences OS security controls to protect user data, system resources, device integrity against malware, and provides application isolation. Android devices which contains firmware is vulnerable through a debugging feature left inside the bootloader acts as a backdoor and bypasses the authentication procedures. A backdoor is a security risk because there are […]

Aleph-Tav-Technologies_ApSec_Vulnerabilities_HTTPVerbTampering3

HTTP verb tampering is a serious threat, oft-ignored

Application Security Threat Research Series – Part 2: HTTP Verb Tampering Anybody with a flourishing business goes paranoid every now and then that a begrudging party might unleash an attack with the motive of bringing down the reputation of their brand. While it isn’t always easy to stop meddlers, many companies fail to pay attention […]

Fixing OWASP Top Tep Vulnerabilities - IDOR - Aleph Tav Technologies

Insecure Direct Object Reference (IDOR) – A Gaping Hole

Application Security Threat Research Series – Part 1: IDOR This is an aerial shot of sheep leaving a grazing field in complete accord through a narrow gate while it looks like there isn’t even a fence in the first place (or perhaps a frail one that would not hold for long). The sheep are c onditioned to […]

Aleph Tav Technologies Android Application Vulnerabilities

8 Signs your Android app is about to be hacked.

Developing Android apps that make the cut as secure, reliable and robust is a goal that is getting increasingly dodgy, thanks to the myriad ways in which hackers are exploiting inherent platform vulnerabilities, code loopholes and API bugs. The Android development community is faced with new challenges as devices are perked up with futuristic technologies, […]