Android 6.0 permissions in defense and attack

By | 03.07.2017

Post Views: 3,034 Every day in mobile devices reveal vulnerabilities that can be exploited by intruders. They can send SMS to a paid number, they can collect a large database of contacts and sell it, or they can compromise a particular person. Successful exploitation of a vulnerability usually involves a number of conditions. But you… Read More »

How I parsed someone else’s code. What’s useful can be found inside well-known Android applications

By | 25.06.2017

Post Views: 1,703 In this article I will tell you how I analyzed the code of other people’s programs and found one interesting undocumented function for working with widgets of applications. Widget with setting when adding Many of us have seen the settings screen that appears when you add a widget to the device screen.… Read More »