Android Hacking and Security, Part 2: Content Provider Leakage

Android Hacking and Security, Part 2: Content Provider Leakage

| | feature, Hacking
In the previous article, we discussed how an attacker exploits vulnerable Activity Components and ways to secure them. In this article, we will discuss “Content Provider Leakage.” What... Go on to the site to read the full article ... Read More
AWS Cloud Security for Beginners — Part 2

AWS Cloud Security for Beginners — Part 2

| | cloud computing
Introduction In the previous part of this series, we set up our free-tier account and then configured AWS CLI. In this article, we will discuss S3 buckets and the security concepts associated with... Go on to the site to read the full article ... Read More
AWS Cloud Security for Beginners — Part 1

AWS Cloud Security for Beginners — Part 1

| | cloud computing
Introduction Cloud computing has gained enormous attention during the past few years, and a lot of companies are shifting their infrastructure into the cloud environments. With most of the cloud... Go on to the site to read the full article ... Read More