![Greek Cyber Security Challenge 2016 write-ups part 7: J-Android-Mobile Security](https://twelvesec.com/wp-content/uploads/2017/10/ECSC-write-ups-min.jpg)
![Greek Cyber Security Challenge 2016 write-ups part 7: J-Android-Mobile Security](https://twelvesec.com/wp-content/uploads/2017/10/ECSC-write-ups-min.jpg)
LATEST POSTS
- Domain Admin through a simple Xerox Printer July 24, 2024
- LedgerSMB – CVE-2024-23831: Privilege escalation through CSRF attack on “setup.pl” February 2, 2024
- The Current State of Phishing Attacks November 22, 2023
- Bypassing anti-reversing defences in iOS applications October 10, 2023
- iOS Instrumentation using Corellium, frida and r2frida September 27, 2023
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
TAGS
cybersecurity
teleworking
partnerships
Corelan
Application Penetration Test
Penetration Testing
ICT security
infosec
pentesting
community
android
social distancing
vulnerabilities
CCPA
IT security
Covid-19
Burp Extender
Information Leakage
pentest
Phising
capture the flag
Mobile Security
mobile
GDPR
GDPR compliance
social responsibility
Reverse Engineering
pen-test
self-isolation
Web Application Penetration Testing
reversing
Coronavirus
ctf
security
Misconfigurations
Privacy
Ransomware attacks
Web Security
TwelveSec
collaborations
iot
penetration test
computer security
cyber security
Cyber Defense tool
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.