Tips to protect your mobile devices There is no secret that nowadays the technology we use can make us a target to cyber-attacks if we do not have basic knowledge on how to properly protect against these. No manual comes… Read More

Tips to protect your mobile devices There is no secret that nowadays the technology we use can make us a target to cyber-attacks if we do not have basic knowledge on how to properly protect against these. No manual comes… Read More
How to secure web and mobile applications Security online is crucial, and we all can imagine why. Hacks and breaches could have a huge negative impact on companies: Loss of customer trust; Financial losses; Leaked user data; Legal issues. You… Read More
How to keep your identity and your personal financial information safe in 2021 Surfing the internet Nowadays, billions of people use the Internet and are sharing their personal information through social media and different other ways. Knowing how to keep… Read More
How to Bypass RootBeer’s Root Detection During the android penetration testing process, one of the challenges is to bypass root detection in order to be able to access the target application folder on the device. The most common library that… Read More
with Reverse IP lookups Often, we face a situation where we receive a domain to pentest, and after each attempt in the playbook, we still don’t find any way to get in. So, how to expand your attack surface? When… Read More
Adding CA to an Android system and bypass SSL pinning protections are two very important steps in testing the security of different applications. After my latest article – How To Install And Root Your Android Emulator – I received a… Read More
Mobile applications became an essential part of our lives, somehow we are dependent of them. We are using a lot of mobile applications every day. If you are lost in a new city, Google Maps gets you out of this… Read More