Mobile Application Security Testing

Mobile Security

In recent years we have seen a tremendous increase in the amount of mobile devices and it is expected to exceed the total number of PCs in the near future. A consequence of this is an increase in mobile applications to meet people's demands for everyday life.

Currently users have the ability to do online banking, keep track of their accumulated points at their favorite grocery store chain or even remotely access their desktop computer. Our job is to ensure these applications are secure and safe against hackers.

Why is it important to audit mobile applications?

  • To detect insecure web services which are at risk by being exposed to everyone.
  • To identify programming errors which could allow unauthorized access to personal information.
  • To find design errors which could put the user's sensitive information at risk.
  • To detect weak communication channels (internal and external) in the application.
  • To detect misconfigurations which could lead to vulnerabilities.
  • To detect poorly implemented encryption methods for data storage and transportation.

Learn about our testing

A mobile security evaluation consists of dynamic and static analysis to find potential vulnerabilities in your applications. All tests are performed manually by our experienced staff trained in mobile security.

Currently we can secure mobile applications for the following Operating Systems:

  • Android
  • iOS
  • Blackberry

For information on pricing and availability, please contact us.

Request more information

Latest Blog Entries

Three Non Web-based XSS Injections
In this post guest blogger Alejandro Hernandez (nitr0us) writes about some interesting and fun XSS vectors which are not commonly seen.

Belkin Wemo Switch NMap Scripts
Belkin Wemo Switch Smart Plug is a network controlled power outlet. The current firmware version does not requiere authentication to switch the power ON or OFF or to gather information such as nearby wireless networks. Two NMap scripts have been published

Downloading an Application's Entire Source Code Through an Exposed GIT Directory
Website administrators sometimes inadvertently leave an exposed .git directory, from which it is possible to download the entire source code of the web application using just wget and a common server misconfiguration.

Latest News

Blackhat EU 2015
Websec participated with two tools at the Blackhat, EU Arsenal held in Amsterdam, NL from the 10-13 of November, 2015. During this event, we introduced our brand new tool "credmap: The Credential Mapper" and also presented an amped-up version of Panoptic.

BSides Vancouver 2015
Websec is proud to announce that we will be attending the 3rd annual edition of BSides Vancouver, a local non-profit information security conference held in the heart of Vancouver, BC on March 16 and 17.