![Greek Cyber Security Challenge 2016 write-ups part 7: J-Android-Mobile Security](https://twelvesec.com/wp-content/uploads/2017/10/ECSC-write-ups-min.jpg)
![Greek Cyber Security Challenge 2016 write-ups part 7: J-Android-Mobile Security](https://twelvesec.com/wp-content/uploads/2017/10/ECSC-write-ups-min.jpg)
LATEST POSTS
- Domain Admin through a simple Xerox Printer July 24, 2024
- LedgerSMB – CVE-2024-23831: Privilege escalation through CSRF attack on “setup.pl” February 2, 2024
- The Current State of Phishing Attacks November 22, 2023
- Bypassing anti-reversing defences in iOS applications October 10, 2023
- iOS Instrumentation using Corellium, frida and r2frida September 27, 2023
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
TAGS
Ransomware attacks
social distancing
Penetration Testing
IT security
Mobile Security
Corelan
cyber security
Covid-19
cybersecurity
collaborations
security
capture the flag
Burp Extender
computer security
infosec
Application Penetration Test
Cyber Defense tool
Coronavirus
penetration test
ctf
TwelveSec
pentest
Privacy
reversing
Misconfigurations
CCPA
teleworking
Phising
pen-test
pentesting
vulnerabilities
social responsibility
community
GDPR compliance
self-isolation
Web Security
partnerships
ICT security
Information Leakage
iot
mobile
Web Application Penetration Testing
android
Reverse Engineering
GDPR
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.