Tag

Mobile Security

1 views collected around this technical thread.

Java Tech Enthusiast
Java Tech Enthusiast
Nov 9, 2024 · Information Security

How Companies Monitor Employee WeChat Chats and Ways to Protect Your Privacy

Companies can monitor employee WeChat chats on corporate‑issued, rooted computers through network sniffing, OS‑level screen capture, and file‑watching tools, allowing them to view personal messages, infer app usage, and thus personal privacy on work devices is vulnerable, so users should avoid personal WeChat on such devices or use separate accounts and enterprise archiving features.

Mobile Securityemployee monitoringinformation security
0 likes · 5 min read
How Companies Monitor Employee WeChat Chats and Ways to Protect Your Privacy
Efficient Ops
Efficient Ops
Sep 29, 2024 · Information Security

How ICBC Strengthens HarmonyOS Mobile Banking App Security

Amid global competition and rising cyber threats, ICBC is advancing HarmonyOS mobile banking security by developing proprietary secure keyboards, leveraging native OS safeguards, collaborating with Huawei and third‑party vendors, and contributing to industry standards that govern the full lifecycle of Harmony apps.

App DevelopmentHarmonyOSMobile Security
0 likes · 5 min read
How ICBC Strengthens HarmonyOS Mobile Banking App Security
AntTech
AntTech
Jan 19, 2024 · Information Security

Ant Group’s Mobile Security Parallel Slice Wins 2023 Mobile App Security Vulnerability Governance Award

Ant Group’s mobile security parallel slice technology, recognized with the 2023 Mobile App Security Vulnerability Governance Excellent Case award, offers a low‑intrusive, configurable SDK‑based solution that decouples security from business logic, enabling real‑time threat detection, rapid response, and broad deployment across major mobile applications.

Ant GroupApp VulnerabilityMobile Security
0 likes · 7 min read
Ant Group’s Mobile Security Parallel Slice Wins 2023 Mobile App Security Vulnerability Governance Award
Baidu Geek Talk
Baidu Geek Talk
Dec 25, 2023 · Information Security

Anti‑Screenshot and Screen‑Recording Protection Strategies for Mobile Applications (iOS & Android)

This article explains how to prevent screenshots and screen recordings on Android by using FLAG_SECURE and on iOS by monitoring screenshot and capture notifications, detailing the Baidu Account SDK’s cross‑platform implementation and emphasizing the importance of such protections for apps handling sensitive user data.

AndroidFLAG_SECUREMobile Security
0 likes · 10 min read
Anti‑Screenshot and Screen‑Recording Protection Strategies for Mobile Applications (iOS & Android)
Sohu Tech Products
Sohu Tech Products
May 31, 2023 · Mobile Development

Analysis of an Android Step Counter Manipulation App Using the Xposed Framework

This article provides a detailed technical analysis of an Android step‑counter simulator app that leverages the Xposed framework to hook system sensor APIs, modify step data, and achieve user‑defined step targets, while also explaining relevant sensor fundamentals and required permissions.

AndroidHookingMobile Security
0 likes · 7 min read
Analysis of an Android Step Counter Manipulation App Using the Xposed Framework
vivo Internet Technology
vivo Internet Technology
Apr 5, 2023 · Information Security

TrustZone Architecture: Hardware-Level Privacy Protection for Smartphones

TrustZone implements a hardware‑level privacy shield for smartphones by partitioning CPU, bus, memory, peripherals and interrupts into a Secure World and a Normal World, using ARMv8 exception levels and extensions such as SCR, TZPC, TZASC, GIC and MMU to isolate user data from non‑secure software.

ARM SecurityMemory ProtectionMobile Security
0 likes · 12 min read
TrustZone Architecture: Hardware-Level Privacy Protection for Smartphones
37 Interactive Technology Team
37 Interactive Technology Team
Nov 7, 2022 · Mobile Development

iOS App Unpacking Tutorial Using dumpdecrypted and frida‑ios‑dump

This tutorial walks through jailbreaking an iPhone, configuring Cydia and Frida, then using either dumpdecrypted or frida‑ios‑dump to strip the App Store protection shell, rebuild the IPA with a decrypted binary, and extract class headers, while addressing typical connection and compatibility problems.

FridaMobile SecurityReverse Engineering
0 likes · 10 min read
iOS App Unpacking Tutorial Using dumpdecrypted and frida‑ios‑dump
AntTech
AntTech
Aug 11, 2022 · Information Security

Ant Financial's End‑to‑End Mobile Security Architecture and Future Trends

The article outlines Ant Financial’s evolving mobile endpoint security strategy, detailing three development stages, the challenges of balancing security with user experience, risk pre‑emptive control, and privacy compliance, and introduces the AntDTX trusted middleware that integrates hardware and software for cloud‑edge collaborative risk mitigation.

Cloud-Edge CollaborationMobile SecurityTrusted Computing
0 likes · 15 min read
Ant Financial's End‑to‑End Mobile Security Architecture and Future Trends
Baidu Geek Talk
Baidu Geek Talk
Aug 10, 2022 · Information Security

Baidu bdtls: A TLS 1.3‑Based Secure Communication Protocol for Mini Programs

Baidu’s bdtls protocol adapts TLS 1.3 for mini‑programs, delivering mutual authentication, AES‑128‑GCM encryption, RSA‑signed Diffie‑Hellman key exchange, sub‑10 % handshake latency, and extensible multi‑business support to defend against static, dynamic and cheating attacks while ensuring high availability.

EncryptionMobile SecurityTLS
0 likes · 22 min read
Baidu bdtls: A TLS 1.3‑Based Secure Communication Protocol for Mini Programs
37 Interactive Technology Team
37 Interactive Technology Team
Jul 27, 2022 · Mobile Development

Android APK Digital Signature: Purpose, Principles, and v1‑v4 Signing Schemes

Android APK digital signatures ensure app integrity and author authenticity by hashing files and signing with a private key, with four schemes—v1 (JAR‑style per‑file digests), v2 (whole‑APK block), v3 (key‑rotation support), and v4 (external .idsig for fast incremental installs)—each offering progressively stronger protection and installation speed.

APK signingAndroidMobile Security
0 likes · 16 min read
Android APK Digital Signature: Purpose, Principles, and v1‑v4 Signing Schemes
AntTech
AntTech
Jul 8, 2022 · Information Security

Ant Group mPaaS Full‑Chain Mobile Security Solution: Overview and Practical Insights

This article reviews Ant Group's award‑winning mPaaS mobile security solution, detailing the current mobile app security landscape, regulatory pressures, and the four‑layer full‑chain protection architecture—including data security, privacy control, biometric authentication, and app hardening—along with practical compliance and risk‑mitigation practices.

Ant GroupMobile Securityapplication security
0 likes · 8 min read
Ant Group mPaaS Full‑Chain Mobile Security Solution: Overview and Practical Insights
IT Services Circle
IT Services Circle
Mar 31, 2022 · Information Security

Mobile Browsers Read Clipboard Data and Expose Plaintext Passwords, CCTV Report Shows

A CCTV investigation revealed that some mobile browsers and integrated third‑party SDKs silently read users’ clipboard, capturing bank account numbers, passwords and other personal data in plaintext even when running in the background, highlighting serious privacy risks under China’s Personal Information Protection Law.

CCTVClipboardMobile Security
0 likes · 3 min read
Mobile Browsers Read Clipboard Data and Expose Plaintext Passwords, CCTV Report Shows
Java Architect Essentials
Java Architect Essentials
Dec 11, 2021 · Information Security

Protecting Mobile Privacy in the Big Data Era: Risks of Data Leakage and How to Stay Safe

In today's big‑data era, excessive stress leads many to seek relief through risky online activities, but unauthorized app permissions and visits to dubious sites can expose personal information, so users must stay vigilant, limit permissions, avoid harmful sites, and use security tools to protect their mobile privacy.

Big DataMobile Securitydata leakage
0 likes · 6 min read
Protecting Mobile Privacy in the Big Data Era: Risks of Data Leakage and How to Stay Safe
Ctrip Technology
Ctrip Technology
Nov 11, 2021 · Information Security

Mobile App Security Hardening: Risks, Detection Techniques, and Protection Strategies

This article examines the security challenges faced by mobile applications, outlines static, dynamic, and business‑level attack vectors, and presents comprehensive hardening techniques—including environment detection, data collection, code and algorithm obfuscation, and virtual‑machine protection—illustrated with iOS‑specific examples and code snippets.

Mobile Securityapp hardeningcode obfuscation
0 likes · 13 min read
Mobile App Security Hardening: Risks, Detection Techniques, and Protection Strategies
Architects Research Society
Architects Research Society
Apr 10, 2021 · Information Security

Unclear Responsibility and Growing Risks in IoT and Mobile Application Security

The article highlights the rapid expansion of IoT and mobile applications, the escalating security concerns, and the lack of clear ownership for protecting these platforms, citing survey data that shows widespread uncertainty and insufficient protective measures across enterprises.

IoT securityMobile Securityenterprise risk
0 likes · 5 min read
Unclear Responsibility and Growing Risks in IoT and Mobile Application Security
Java Architect Essentials
Java Architect Essentials
Mar 7, 2021 · Information Security

Security Analysis of the “Le Bao” Fake Chat Application Used for Pornographic Promotion

This report investigates the malicious “Le Bao” Android application that masquerades as a WeChat‑like chat tool, detailing its sample characteristics, hidden QR‑code group‑joining mechanism, membership‑based porn livestream access, promotion methods, profit model, and comprehensive traceability of servers, payment channels, and social accounts.

Mobile Securityapp investigationillegal content
0 likes · 13 min read
Security Analysis of the “Le Bao” Fake Chat Application Used for Pornographic Promotion
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Mar 5, 2021 · Information Security

Introduction to TEE (Trusted Execution Environment) and Its Application in Fingerprint Authentication

The article explains how Trusted Execution Environments (TEE), built on ARM TrustZone, provide a secure world separate from the Rich Execution Environment, detailing its architecture, GP API interactions, and how fingerprint enrollment and authentication are performed within TEE to protect sensitive biometric data.

ARM TrustZoneGP APIMobile Security
0 likes · 10 min read
Introduction to TEE (Trusted Execution Environment) and Its Application in Fingerprint Authentication