Ok, ok, I know. It has passed almost a month since the last post. But you know, holidays, new year, a cold winter… but I’m here again to conclude this serie about the security audits in mobile devices. In part 1 we saw what were the requirements that we need before start with the audit. In part 2 we actually started with the audit and saw some of the phases of an audit. In this last part we will see the last phases of an audit.
A few months ago I enjoyed my first online course. The topic? Security. Specifically, mobile devices security. More specifically, mobile devices security audits. As an Android developer I’m really concerned about security, not only as a developer, also as a user. And because I think that what I learned there can interest you I will try to explain it here. Probably it is too much content for only one post so I will divide it in two or three parts.