All Ruby on Rails Node JS Android iOS React Native Frontend
This article is part of a series: Android Security Analysis Tools, part one - JAADAS Android Security Analysis Tools, part two - DIVA app and AndroBugs Android Security Analysis Tools, part three - Drozer and QARK Android Security Analysis Tools, part four - MobSF   In the previous article, we began our exploration of security testing in Android applications. We started by discussing the testing problem and analyzing the first testing tools suggested by OWASP Mobile Testing Guide (MSTG). In this chapter, we will focus on the next tool for static security analysis suggested by MSTG - AndroBugs.
Read more
Introduction Nowadays, the Bluetooth technology is widely used for general mobile phone and wireless IoT solutions, this last one thanks to the implementation of the Bluetooth Low Energy (BLE) standard suitable for battery-powered IoT sensors.
Read more
Log entries are very important in a developer’s life. We use it to display useful information, errors, workflows or even to debug something. Logs are very helpful during the development process, but should we leave them in a production app? Exposing information about the app Every information that we log can be a potential source of security issues! 
Read more
Introduction The most important question when we create a new Android application from scratch is which architecture should we choose. Developers can choose between MVC, MVP, MVI and MVVM (among others). These architectural patterns are popular for Android development. For years, developers had to implement from scratch, by themselves, the application skeleton without any SDK support. After many years, at the annual Google I/O event, in May 2017, Google presented the Architecture Guide, in which object lifecycle is the most important functionality to support from the point of view of Android OS. During that I/O, Google presented some examples of Android Architecture Blueprints.
Read more
Introduction Nowadays, IoT sensors are almost everywhere and they can sense information that may affect privacy or reveal information that wasn’t intended if it leaks. Particularly, Wireless Sensor Networks(later called WSN) are used extensively in many applications related with health monitoring, environmental monitoring, military purposes and home automation. Security of the privacy rights and the system from malicious attacks is vital when talking about this kind of applications because of the information they sense, plus the combined computational power. Unfortunately, since individually they are not wealthy regarding computational power and battery life, WSNs are not able to deal with traditionals cryptography algorithms to secure data transmission. That’s why other methods and algorithms must be designed and used for IoT systems.
Read more
One of the most important things in mobile development is secure communication, especially between the app and its backend server. Currently, the most common architecture of web services is REST based on HTTP. The best protection method for this model of communication is the TLS/SSL standard. It can be combined with the HTTP protocol to create an encrypted variant called HTTPs. HTTPs ensures safe, encrypted communication channels between client apps and the backend server. Moreover, implementing this security feature is very simple on Android. You just need to watch out for some common pitfalls.
Read more
In our previous article from the Pragmatic iOS Development series, we discussed the Model View Controller pattern and why (in my opinion, unrightfully) it is criticised within the community. I also mentioned two things about selecting perfect architecture for your project. The first thing was that there’s no happy medium that fits all of the use cases. Secondly, in the last sentence of the article, I gave a sneak peek of the architecture you’re going to fall love with, MVA. But there’s one thing I lied about: that there’s no architectural approach you can fit to any project you can think of. The truth is, such approach exists. And hey, good news: we’re going to focus on it today, and I’m going to tell you how to take advantage of this approach.
Read more
MQTT (the acronym that, apparently, shouldn’t be expanded to Message Queue Telemetry Transport anymore) is a communication protocol focused on energy efficiency, data-transfer minimization, and assurance of delivery. These three qualities make it the perfect choice for any Internet of Things projects where the Internet connection is given but can be unreliable. Definitions aside, we can use MQTT for:
Read more
On March 30, the long-awaited iOS 11.3 update was released, with support for basic PWA features on iPhones and iPads, such as service workers and app manifest files. Although it is great that these are finally supported, the user experience of Progressive Web Applications on iOS is still not perfect.
Read more
The ZigBee or ZigBee/IEEE 802.15.4 protocol is a specification created for wireless networking. It includes hardware and software standard design for WSN (Wireless sensor network) requiring high reliability, low cost, low power, scalability and low data rate. ZigBee-style self-organizing ad-hoc digital radio networks were conceived in the 1990s, but the IEEE 802.15.4-2003/ZigBee specification was ratified on December 14, 2004. And only half year later the ZigBee Alliance announces availability of Specification 1.0 (on June 13, 2005).
Read more
Need a successful project?
Estimate project or contact us