Mobile App Penetration Test Blog by turingpoint

Blog posts about Mobile App Penetration Test from our team.

Pentest: Which Components should be Considered First?
Pentest: Which Components should be Considered First?
New

For most applications, it makes sense to check the API interface first. Vulnerabilities of severity critical can arise here.

More
Does a Pentest have to be Done only Once?
Does a Pentest have to be Done only Once?

Companies often think that a single pentest before rolling out a system is sufficient. Why this assumption is a mistake?

More
What is an Ethical Hacker?
What is an Ethical Hacker?

Hackers have a bad reputation. They penetrate security systems, steal data and cause financial damage. But is that true?

More
Six Linux Distributions for Penetration Testing
Six Linux Distributions for Penetration Testing

For penetration tests, there are various Linux distributions that are precisely tailored for use in security analyses.

More
Maturity Analysis of the IT Security Organization
Maturity Analysis of the IT Security Organization

Every IT security organization should evaluate at which stage the measures already taken are in order to avoid redundant security analyses.

More
XSS - Overview, Definition and Case Studies
XSS - Overview, Definition and Case Studies

XSS vulnerabilities are found during penetration tests in single-page web applications, as there is a lot of business logic through JavaScript in the front end.

More
Cost and Pricing for a Pentest
Cost and Pricing for a Pentest

How much costs should be considered for a pentest? The response depends on several factors, including the complexity of the organization to be evaluated.

More