With this post I want to introduce you to one of my side projects. This introduction will serve to explain what the project consists of, how long I have been working on it and why I started to work specifically this idea.
I will try to be very general in my posts and probably will not write only about programming, although right now it is a big part of what I am doing so it takes up all my time dedicated to the application.
Ok, ok, I know. It has passed almost a month since the last post. But you know, holidays, new year, a cold winter… but I’m here again to conclude this serie about the security audits in mobile devices. In part 1 we saw what were the requirements that we need before start with the audit. In part 2 we actually started with the audit and saw some of the phases of an audit. In this last part we will see the last phases of an audit.
A few months ago I enjoyed my first online course. The topic? Security. Specifically, mobile devices security. More specifically, mobile devices security audits. As an Android developer I’m really concerned about security, not only as a developer, also as a user.And because I think that what I learned there can interest you I will try to explain it here.Probably it is too much content for only one post so I will divide it in two or three parts.
Security have become an important part of everyone’s life. And, when we talk about online security, everything have changed a little bit since Snowden leaked all the information and documents about the fact that we have been being observed for the USA government and the NSA. Now, the people are worry a little bit more about their privacy, but what hasn’t changed a lot is the worry of the people about their security online.
People don’t want to be worried about security. Should be the companies and developers who must have always an eye in give the best in security to the user.
With the purpose to serve as a reminder to companies, has been created the OWASP project. To help companies and developers to don’t forget some aspects of the online security.
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.