● Category
Mobile Security
20 entries
- mobile-security№ 694
Mobile App Security
The practice of designing, building, and testing iOS and Android applications to protect user data, prevent reverse engineering, and resist runtime tampering.
- mobile-security№ 562
Jailbreak (iOS)
The process of bypassing Apple's code-signing and sandbox restrictions on an iPhone or iPad so the user can install software that Apple has not approved.
- mobile-security№ 948
Rooting (Android)
Gaining unrestricted superuser (root) privileges on an Android device, bypassing the protections enforced by the Linux kernel, SELinux, and the Android verified boot chain.
- mobile-security№ 047
Android Malware
Malicious software that targets the Android operating system, typically distributed through sideloaded APKs, dropper apps on Google Play, or compromised third-party stores.
- mobile-security№ 550
iOS Malware
Malicious software targeting Apple iPhones and iPads, including supply-chain attacks on app developers, mercenary spyware, and threats specific to jailbroken devices.
- mobile-security№ 697
Mobile Device Management (MDM)
Software that lets an organization enroll, configure, monitor, and remotely wipe iOS, Android, macOS, and Windows endpoints from a central console.
- mobile-security№ 696
Mobile Application Management (MAM)
Controls that protect corporate data inside specific mobile applications without taking full management of the underlying device.
- mobile-security№ 123
Bring Your Own Device (BYOD)
A workplace model in which employees use their personally owned smartphones, tablets, or laptops to access corporate applications and data.
- mobile-security№ 382
Enterprise Mobility Management (EMM)
An integrated platform that combines MDM, MAM, identity, content, and access controls to manage mobile devices and apps across an enterprise.
- mobile-security№ 693
Mobile App Sandbox
An operating-system enforced boundary that limits what files, IPC, and APIs a mobile application can access, so a compromised app cannot easily reach other apps' data.
- mobile-security№ 695
Mobile App Store Attack
An attack that abuses a mobile app distribution channel — Google Play, Apple App Store, OEM stores, or third-party markets — to deliver malicious or repackaged applications to victims.
- mobile-security№ 692
Mobile App Permissions
The operating-system controls that require user consent before an app can access sensitive resources such as location, microphone, camera, contacts, photos, SMS, or background sensors.
- mobile-security№ 810
Pegasus Spyware (NSO Group)
A commercial mobile spyware developed by the Israeli company NSO Group that infects iOS and Android phones, often through zero-click exploits, and exfiltrates messages, calls, location, and microphone data.
- mobile-security№ 849
Predator Spyware (Intellexa)
Commercial mobile spyware developed by Cytrox and marketed by the Intellexa consortium, used by government customers against journalists, opposition politicians, and civil society on iOS and Android.
- mobile-security№ 517
IMEI (International Mobile Equipment Identity)
A 15-digit number that uniquely identifies a mobile device on a cellular network, allocated by the GSMA and used by carriers to block stolen handsets.
- mobile-security№ 520
IMSI (International Mobile Subscriber Identity)
A 15-digit identifier stored on the SIM or eSIM profile that uniquely identifies a subscriber on a cellular network, made of MCC, MNC, and MSIN fields.
- mobile-security№ 085
Baseband Attack
An exploit against the cellular modem (baseband processor) of a phone, abusing protocol parsing bugs in 2G, 3G, 4G, or 5G stacks to gain code execution before the application OS sees the traffic.
- mobile-security№ 046
Android Debug Bridge (ADB)
A command-line developer tool, part of the Android SDK, that lets a host computer communicate with an Android device or emulator over USB or TCP to install apps, read logs, and run shell commands.
- mobile-security№ 700
Mobile OTP Interception
Attacks that capture one-time passwords delivered to a phone, undermining SMS- or app-based two-factor authentication.
- mobile-security№ 701
Mobile VPN
A virtual private network designed for smartphones and tablets, tunnelling traffic from a mobile device to a corporate gateway or a privacy-focused provider over cellular and Wi-Fi links.