Tools to Meet Tomorrow’s Mobile Cybersecurity Threats for Government

Author(s):

Brian Robison, VP of Product Marketing & Chief Evangelist, Corellium

Tools to Meet Tomorrow’s Mobile Cybersecurity Threats for Government

The quest for innovative solutions is relentless in an era where government agencies and service providers grapple with increasingly sophisticated cybersecurity challenges. One such solution that has emerged as a potent tool in mobile security is using virtual iPhones and Android phones for penetration testing and malware analysis. These virtualized environments have ushered in a … Read more

The Importance of Jailbreaks for iOS Security Work

Author(s):

Anthony Ricco, Chief Marketing Officer, Corellium

The importance of jailbreaks for iOS security research

The realm of iOS security research has seen significant advancements in recent years. With each new iOS release, Apple tightens its grip on the operating system’s security. As a result, public jailbreaks have become increasingly rare. However, jailbreaks still play a critical role in iOS security work. The Significance of Jailbreaks in iOS Security Research … Read more

Left Shifting Mobile Security with DevSecOps

Author(s):

Steven Smiley, , Corellium

A mobile device on a black background with interconnecting points.

In today’s fast-paced digital world, organizations can no longer afford to overlook the importance of strong security measures when developing software. With the increasing frequency of cyber attacks targeting businesses of all sizes and industries, having a robust cybersecurity posture has become a necessity. To achieve this, companies must prioritize product-specific security and integrate it … Read more

Transforming Mobile App Development and Security for the Enterprise

Author(s):

Anthony Ricco, Chief Marketing Officer, Corellium

Mobile App Development

In today’s rapidly evolving digital landscape, smart devices have become the new battleground for cybersecurity. The vulnerabilities within mobile devices are continually exploited by attackers and malware, making it crucial for enterprises to prioritize security practices from the early stages of the software development process. However, traditional tools used for mobile app development and security, … Read more

Investigating iOS Phishing Using Virtualization Technology

Author(s):

Anthony Ricco, Chief Marketing Officer, Corellium

Phishing Attacks

Virtualization became a powerful tool in agile development due to its versatility and capability to deliver solutions quickly. It is no surprise then that security engineers are also turning to this technology, like Corellium, in order to investigate phishing attacks against iOS devices. As phishing attacks become more and more sophisticated – and it’s only … Read more

Unveiling the World of Mobile Malware and Threat Research: Tools, Tactics, and Procedures

Author(s):

Anthony Ricco, Chief Marketing Officer, Corellium

Mobile Malware

As mobile devices become an integral part of our daily lives, the importance of understanding and combating mobile malware and threats becomes increasingly critical. Mobile malware poses a significant risk to users, with the potential to compromise sensitive data, invade privacy, and disrupt normal device functionality. This article illuminates the power of mobile malware threats … Read more

Mobile App Reverse Engineering: Tools, Tactics, and Procedures

Author(s):

Anthony Ricco, Chief Marketing Officer, Corellium

Mobile App Reverse Engineering

Mobile app reverse engineering is a process that involves dissecting and analyzing the internal workings of a mobile application to gain insights into its structure, functionality, and security vulnerabilities. While reverse engineering can serve legitimate purposes, such as security audits and app analysis, it is crucial to approach it ethically, respecting intellectual property rights and … Read more

Virtualization Is Transforming Mobile Security Research: Here’s How

Author(s):

Anthony Ricco, Chief Marketing Officer, Corellium

Mobile Security

The Internet of Things (IoT) is taking mobile security research by storm. According to market research firm Statista, the number of IoT devices worldwide is forecast to include more than 29 billion IoT devices by 2030. Consumer internet and media devices like smartphones and smartwatches are expected to make up 17 billion of these devices, … Read more