Android. Data theft via keyboard: myth or reality?
Can confidential user data be stolen through third-party apps on the device? Ideas for protection against potential attacks and discussion of how possible this is today
Can confidential user data be stolen through third-party apps on the device? Ideas for protection against potential attacks and discussion of how possible this is today
Once, while traveling through remote Vietnamese villages, I asked a girl to squeeze me a glass of sugarcane juice. To explain, I used Google Translate. From her eyes,…
In my previous article, I mentioned the implementation of a device that was developed to facilitate the process of setting up sensors by the maintenance staff, and the…
The field of elderly care is a complex and, frankly, unprestigious job that almost no one strives to get into. The idea of introducing helper robots into this area seems…
Hello, tekkix, my name is Alexey Onosov, I am an author at vAITI media. In this article, I will talk about setting up DLNA on servers, TV and mobile players, and hardware…
Hello tekkix. I will tell you about my experience of building a home theater with multichannel sound on an Android TV box.
It is no secret that bug hunting is gaining popularity every year, attracting the attention of both companies seeking to improve the security of their products and white…
On August 21, the Chrome browser received an update that fixed 37 security-related bugs. The attention of researchers around the world was drawn to the vulnerability…
Many people have photos of their passport, driver's license, and child's birth certificate on their phone. But not everyone realizes how easy it is to access them. One…
In the article, I will tell a case from the practice of analyzing the protection of Android applications. Names and places of events have been changed. Any coincidences…