In early September, radare2 users and developers from around the globe gathered in Barcelona for r2con, an annual conference celebrating the r2 multi-platform, open-source, reverse engineering framework supported by NowSecure. Around 200 attendees enjoyed four days of hacking, teaching, discussing, coding, socializing and having fun.
Keeping pace with ever-increasing mobile security threats is a team sport that requires the support and performance of many key players. Here at NowSecure, our security research team spends countless hours helping our customers find and fix vulnerabilities to secure their mobile apps. The research group at NowSecure holds multiple responsibilities. Part of its mission
Learn more about the OnePlus device backdoor created by the EngineerMode App and how the NowSecure Threat Research Team helped verify this root exploit.
This week Gartner released the Market Guide for Mobile Application Security Testing, which measures the impact of mobile app development and security testing at the enterprise. In addition, the guide provides enterprise and IT leaders with key criteria for comparing mobile app security testing vendors.
NowSecure Researcher Francesco Tamagni recently made significant improvements to R2Frida’s memory-search capabilities, and he answered some questions about those updates and how they make R2Frida (an integration of the Frida and Radare open-source tools/frameworks) even better.
Imagine a man confined in a room and observed by a researcher over video surveillance. Imagine that the surveillance cameras can also, at any time, zoom in-and-out to scrutinize the atoms, molecules, cells, tissues, organs, or organ systems that make up the man.