![Greek Cyber Security Challenge 2016 write-ups part 7: J-Android-Mobile Security](https://twelvesec.com/wp-content/uploads/2017/10/ECSC-write-ups-min.jpg)
![Greek Cyber Security Challenge 2016 write-ups part 7: J-Android-Mobile Security](https://twelvesec.com/wp-content/uploads/2017/10/ECSC-write-ups-min.jpg)
LATEST POSTS
- Domain Admin through a simple Xerox Printer July 24, 2024
- LedgerSMB – CVE-2024-23831: Privilege escalation through CSRF attack on “setup.pl” February 2, 2024
- The Current State of Phishing Attacks November 22, 2023
- Bypassing anti-reversing defences in iOS applications October 10, 2023
- iOS Instrumentation using Corellium, frida and r2frida September 27, 2023
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
TAGS
CCPA
vulnerabilities
community
Covid-19
Burp Extender
computer security
teleworking
pentest
partnerships
pen-test
mobile
Corelan
Phising
Privacy
ICT security
Reverse Engineering
iot
Penetration Testing
penetration test
TwelveSec
Ransomware attacks
IT security
self-isolation
capture the flag
Coronavirus
Web Security
cyber security
pentesting
Application Penetration Test
collaborations
reversing
GDPR
cybersecurity
ctf
GDPR compliance
Cyber Defense tool
Information Leakage
android
Misconfigurations
social distancing
infosec
Mobile Security
security
social responsibility
Web Application Penetration Testing
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.