Mobile Malware and Threat Research Without Limits
Oct 30, 2023

Mobile Malware and Threat Research Without Limits

In this article, we look at several types of mobile malware — of increasing sophistication — and discuss opportunities for research and analysis using virtual devices.
Deep Dive into Reverse Engineering on Android
Sep 14, 2023

Deep Dive into Reverse Engineering on Android

Learn the tools and tactics needed to optimize your approach to Android reverse engineering. Watch our expert webinar or read the recap and case study.
Investigating iOS Phishing Using Virtualization Technology
Jun 27, 2023

Investigating iOS Phishing Using Virtualization Technology

By taking advantage of virtualization technology, security engineers can actively engage with iPhone phishing scams directly from a virtual iOS device. Here’s how.
Unveiling the World of Mobile Malware and Threat Research: Tools, Tactics, and Procedures
Jun 09, 2023

Unveiling the World of Mobile Malware and Threat Research: Tools, Tactics, and Procedures

Mobile malware detection is challenging, but with the right combination of tools, tactics, and procedures, threat researchers can conduct mobile malware testing.
Mobile App Reverse Engineering: Tools, Tactics, and Procedures Unveiled
Jun 08, 2023

Mobile App Reverse Engineering: Tools, Tactics, and Procedures Unveiled

Learn about the tools, tactics, and procedures employed in reverse engineering iOS and Android apps, including an overview of the process and responsible practices.
3 Mobile App Security Testing Challenges and How to Overcome Them
Apr 28, 2023

3 Mobile App Security Testing Challenges and How to Overcome Them

Mobile app security testing is full of tedious tasks, but it’s vital to find vulnerabilities before bad actors do. Read about challenges and how to overcome them.