As a proud sponsor of the OWASP Mobile Security Project and the Global AppSec conference, NowSecure researchers helped develop and maintain the Radare2 Pay v1.0 Android crack-me app featured in the OWASP Mobile Security Testing Guide (MSTG). Intended to be similar to popular mobile payment applications, the Radare2 Pay app is difficult to crack. It features layers and layers of obfuscation and protection and anti-rooting technology in order to delay attacks.
In early September, radare2 users and developers from around the globe gathered in Barcelona for r2con, an annual conference celebrating the r2 multi-platform, open-source, reverse engineering framework supported by NowSecure. Around 200 attendees enjoyed four days of hacking, teaching, discussing, coding, socializing and having fun.
Keeping pace with ever-increasing mobile security threats is a team sport that requires the support and performance of many key players. Here at NowSecure, our security research team spends countless hours helping our customers find and fix vulnerabilities to secure their mobile apps. The research group at NowSecure holds multiple responsibilities. Part of its mission
Learn more about the OnePlus device backdoor created by the EngineerMode App and how the NowSecure Threat Research Team helped verify this root exploit.
This week Gartner released the Market Guide for Mobile Application Security Testing, which measures the impact of mobile app development and security testing at the enterprise. In addition, the guide provides enterprise and IT leaders with key criteria for comparing mobile app security testing vendors.
NowSecure Researcher Francesco Tamagni recently made significant improvements to R2Frida’s memory-search capabilities, and he answered some questions about those updates and how they make R2Frida (an integration of the Frida and Radare open-source tools/frameworks) even better.