{"id":927,"date":"2022-09-05T16:14:03","date_gmt":"2022-09-05T16:14:03","guid":{"rendered":"https:\/\/thesecurityone.com\/?page_id=927"},"modified":"2023-07-05T07:29:40","modified_gmt":"2023-07-05T07:29:40","slug":"cybersecurity-services-6","status":"publish","type":"page","link":"https:\/\/thesecurityone.com\/index.php\/cybersecurity-services-6\/","title":{"rendered":"Cybersecurity Services"},"content":{"rendered":"<div  data-label=\"Content\" data-id=\"content--5\" data-export-id=\"content-12\" data-category=\"content\" class=\"content-12 content-section content-section-spacing\" id=\"content-5\" style=\"background-color: rgb(255, 255, 255);\"><div  class=\"gridContainer\"> <div  class=\"row text-center\"><div  class=\"section-title-col\" data-type=\"column\"> <h2  class=\"\"><span  style=\"font-weight: 700; color: rgb(3, 169, 244);\">Mobile Security Testing<\/span><\/h2> <p  class=\"lead\" style=\"text-align: justify;\">New technology always introduces new security risks, and mobile computing is no exception. Modern mobile operating systems are arguably more secure than traditional desktop operating systems, but problems can still appear when we don\u2019t carefully consider security during mobile app development. Data storage, inter-app communication, proper usage of cryptographic APIs, and secure network communication are only some of these considerations.<\/p><\/div> <\/div> <div  class=\"row center-xs middle-xs\"> <div  class=\"col-sm-9\" data-type=\"column\"> <\/div> <\/div><\/div> <\/div><div  data-label=\"About\" data-id=\"about--1\" data-export-id=\"about-5\" data-category=\"about\" class=\"about-5 content-section content-section-spacing\" id=\"about-1\" style=\"background-color: rgb(245, 250, 253); background-image: none;\"><div  class=\"gridContainer\"> <div  class=\"row middle-sm text-center\"><div  class=\"col-sm-6 space-bottom-xs\" data-type=\"column\">  <h2  class=\"\"><span  style=\"font-weight: 700;\">Android Security Testing<\/span><\/h2>  <p  class=\"lead\" style=\"text-align: left;\"><span  style=\"font-weight: 600;\">Android Platform Overview<\/span><\/p><p  class=\"lead\" style=\"text-align: left;\"><span  id=\"_mce_caret\" data-mce-bogus=\"1\" data-mce-type=\"format-caret\"><span  style=\"font-weight: 600;\">\ufeffAndroid Basic Security Testing<\/span><\/span><\/p><p  class=\"lead\" style=\"text-align: left;\"><span  id=\"_mce_caret\" data-mce-bogus=\"1\" data-mce-type=\"format-caret\"><span  style=\"font-weight: 600;\">\ufeffAndroid Tampering and Reverse Engineering<\/span><\/span><\/p><p  class=\"lead\" style=\"text-align: left;\"><span  id=\"_mce_caret\" data-mce-bogus=\"1\" data-mce-type=\"format-caret\"><span  style=\"font-weight: 600;\">\ufeffAndroid Data Storage<\/span><\/span><\/p><p  class=\"lead\" style=\"text-align: left;\"><span  id=\"_mce_caret\" data-mce-bogus=\"1\" data-mce-type=\"format-caret\"><span  style=\"font-weight: 600;\">\ufeffAndroid Cryptographic APIs<\/span><\/span><\/p><p  class=\"lead\" style=\"text-align: left;\"><span  id=\"_mce_caret\" data-mce-bogus=\"1\" data-mce-type=\"format-caret\"><span  style=\"font-weight: 600;\">\ufeffAndroid Local Authentication<\/span><\/span><\/p><p  class=\"lead\" style=\"text-align: left;\"><span  id=\"_mce_caret\" data-mce-bogus=\"1\" data-mce-type=\"format-caret\"><span  style=\"font-weight: 600;\">\ufeffAndrois Network APIs<\/span><\/span><\/p><p  class=\"lead\" style=\"text-align: left;\"><span  id=\"_mce_caret\" data-mce-bogus=\"1\" data-mce-type=\"format-caret\"><span  style=\"font-weight: 600;\">\ufeffAndroid Platform APIs<\/span><\/span><\/p><p  class=\"lead\" style=\"text-align: left;\"><span  id=\"_mce_caret\" data-mce-bogus=\"1\" data-mce-type=\"format-caret\"><span  style=\"font-weight: 600;\">\ufeffAndroid Code Quality and Build Settings<\/span><\/span><\/p><p  class=\"lead\" style=\"text-align: left;\"><span  style=\"font-weight: 600;\">Android Anti-Reversing Defenses<\/span><\/p><\/div> <div  class=\"col-sm-6 flexbox image-group-right-2 around-xs top-xs space-bottom-xs\"><div  class=\"left-el\"> <img decoding=\"async\"  class=\"shadow-large\" data-size=\"300x430\" src=\"https:\/\/thesecurityone.com\/wp-content\/uploads\/2022\/09\/andr1.jpg\" title=\"andr1\" alt=\"\"><\/div> <div  class=\"right-el\"> <img decoding=\"async\"  class=\"shadow-large\" data-size=\"300x430\" src=\"https:\/\/thesecurityone.com\/wp-content\/uploads\/2022\/09\/andr2.jpg\" title=\"andr2\" alt=\"\"><\/div> <div  class=\"center-overlay inner-shadow border-large\"><\/div><\/div> <\/div><\/div> <\/div><div  data-label=\"About\" data-id=\"about--2\" data-export-id=\"about-4\" data-category=\"about\" class=\"about-4 content-section content-section-spacing\" id=\"about-2\" style=\"background-color: rgb(255, 255, 255); background-image: none;\"><div  class=\"gridContainer\"> <div  class=\"row middle-sm text-center\"><div  class=\"col-sm-5 space-bottom-xs\" data-type=\"column\">  <h2  class=\"\"><span  style=\"font-weight: 700;\">iOS Security Testing<\/span><\/h2>  <p  class=\"lead\" style=\"text-align: left;\"><span  style=\"font-weight: 600;\">iOS Platform Overview<\/span><\/p><p  class=\"lead\" style=\"text-align: left;\"><span  style=\"font-weight: 600;\">iOS Basic Security Testing<\/span><span  id=\"_mce_caret\" data-mce-bogus=\"1\" data-mce-type=\"format-caret\"><span  style=\"font-weight: 600;\">\ufeff<\/span><\/span><\/p><p  class=\"lead\" style=\"text-align: left;\"><span  style=\"font-weight: 600;\">iOS Tampering and Reverse Engineering<\/span><\/p><p  class=\"lead\" style=\"text-align: left;\"><span  style=\"font-weight: 600;\">iOS Data Storage<\/span><\/p><p  class=\"lead\" style=\"text-align: left;\"><span  style=\"font-weight: 600;\">iOS Cryptographic APIs<\/span><\/p><p  class=\"lead\" style=\"text-align: left;\"><span  style=\"font-weight: 600;\">iOS Local Authentication<\/span><\/p><p  class=\"lead\" style=\"text-align: left;\"><span  style=\"font-weight: 600;\">iOS Network APIs<\/span><\/p><p  class=\"lead\" style=\"text-align: left;\"><span  style=\"font-weight: 600;\">iOS Platform APIs<\/span><\/p><p  class=\"lead\" style=\"text-align: left;\"><span  style=\"font-weight: 600;\">iOS Code Quality and Build Settings<\/span><\/p><p  class=\"lead\" style=\"text-align: left;\"><span  style=\"font-weight: 600;\">iOS Anti-Reversing Defenses<\/span><\/p><\/div> <div  class=\"col-sm-7 flexbox center-xs middle-xs image-group-2-img\"> <img decoding=\"async\"  class=\"img-1 shadow-large\" data-size=\"250x200\" src=\"https:\/\/thesecurityone.com\/wp-content\/uploads\/2022\/09\/ios1.jpg\" title=\"ios1\" alt=\"\"> <img decoding=\"async\"  class=\"img-2 shadow-large\" data-size=\"220x170\" src=\"https:\/\/thesecurityone.com\/wp-content\/uploads\/2022\/09\/ios2.jpg\" title=\"ios2\" alt=\"\"><\/div> <\/div><\/div> <\/div><div  data-label=\"Cta\" data-id=\"cta--3\" data-export-id=\"cta-centered-bg-section\" data-category=\"cta\" data-section-ov=\"1\" class=\"cta-centered-bg-section content-section content-section-spacing-medium white-text\" data-parallax-depth=\"20\" id=\"cta-3\" style=\"background-color: rgb(245, 250, 253);\"><div  class=\"gridContainer\"> <div  class=\"row text-center\"><div  data-type=\"column\" class=\"\"> <h2  class=\"\">Join us! <span  class=\"font-300\">It will only take a minute<\/span><\/h2> <a class=\"button color2\" href=\"https:\/\/thesecurityone.com\/index.php\/contact-us\" target=\"_self\" data-cp-link=\"1\" data-icon=\"\" rel=\"noopener\">GET STARTED TODAY<\/a><\/div> <\/div><\/div> <\/div><div  data-label=\"Content\" data-id=\"content--4\" data-export-id=\"content-6-2\" data-category=\"content\" class=\"content-6-2 content-section content-section-spacing\" id=\"content-4\" style=\"background-color: rgb(245, 250, 253);\"><div  class=\"gridContainer\"> <div  class=\"row text-center\"><div  class=\"section-title-col\" data-type=\"column\"> <h2  class=\"\"><span  style=\"font-weight: 700; color: rgb(3, 169, 244);\">Mobile Security Testing Report<\/span><\/h2> <\/div> <\/div> <div  class=\"row middle-sm\"> <div  class=\"col-sm-6 flexbox around-xs top-xs\"> <div  class=\"overlay-box flexbox middle-xs center-xs overlay-holder\"> <div  class=\"overlay-box-offset offset-border shadow-medium border-color2 hide-xs\"><\/div> <a  data-cp-link=\"1\" href=\"#\"><img decoding=\"async\"  class=\"flexbox shadow-large img1\" data-size=\"485x632\" src=\"https:\/\/thesecurityone.com\/wp-content\/uploads\/2022\/09\/MS.jpg\" title=\"MS\" alt=\"\"><\/a><\/div> <\/div> <div  class=\"col-sm-6 space-top-xs\"> <div  class=\"row\"> <div  class=\"col-xs-12 space-bottom\" data-type=\"column\">  <\/div> <div  data-type=\"row\" class=\"col-xs-12\"><div  class=\"row space-bottom force-align\"> <div  class=\"col-xs-12 col-sm-fit text-center\"><i  class=\"fa icon fa-check-square-o big color1\"><\/i><\/div> <div  class=\"col-xs-12 col-sm\" data-type=\"column\"><h5  class=\"color1\"><span  style=\"font-weight: 600;\">Executive Summary<\/span><\/h5> <p  class=\"\">It provides a very brief overview of your major findings and their potential impact on the application being tested<\/p><\/div> <\/div> <div  class=\"row space-bottom force-align\"> <div  class=\"col-xs-12 col-sm-fit text-center\"> <i  class=\"fa icon fa-check-square-o big color1\"><\/i><\/div> <div  class=\"col-xs-12 col-sm\" data-type=\"column\"><h5  class=\"color1\"><span  style=\"font-weight: 600;\">Recommendations<\/span><\/h5> <p  class=\"\">Our recommendation for remedial approach<\/p><\/div> <\/div> <div  class=\"row space-bottom force-align\"> <div  class=\"col-xs-12 col-sm-fit text-center\"> <i  class=\"fa icon fa-check-square-o big color1\"><\/i><\/div> <div  class=\"col-xs-12 col-sm\" data-type=\"column\"><h5  class=\"color1\"><span  style=\"font-weight: 600;\">Evaluation Methodology<\/span><\/h5> <p  class=\"\">The evaluation methodology used for automatic and manual mobile security testing<\/p><\/div> <\/div><div  class=\"row space-bottom force-align\"> <div  class=\"col-xs-12 col-sm-fit text-center\"><i  class=\"fa icon fa-check-square-o big color1\"><\/i><\/div> <div  class=\"col-xs-12 col-sm\" data-type=\"column\"><h5  class=\"color1\"><span  style=\"font-weight: 600;\">Findings Summary<\/span><\/h5> <p  class=\"\">List of all vulnerabilities found and classified according to their risk and impact<\/p><\/div> <\/div><div  class=\"row space-bottom force-align\"> <div  class=\"col-xs-12 col-sm-fit text-center\"><i  class=\"fa icon fa-check-square-o big color1\"><\/i><\/div> <div  class=\"col-xs-12 col-sm\" data-type=\"column\"><h5  class=\"color1\"><span  style=\"font-weight: 600;\">Vulnerabilities Details<\/span><\/h5> <p  class=\"\">For each vulnerability, we will include  the associated risk, the technical description, the proof of concept, its impact and the recommended remedial actions<\/p><\/div> <\/div><\/div> <\/div><\/div> <\/div><\/div> <\/div>","protected":false},"excerpt":{"rendered":"<p>Mobile Security Testing New technology always introduces new security risks, and mobile computing is no exception. Modern mobile operating systems are arguably more secure than traditional desktop operating systems, but problems can still appear when we don\u2019t carefully consider security during mobile app development. Data storage, inter-app communication, proper usage of cryptographic APIs, and secure&hellip; <br \/> <a class=\"read-more\" href=\"https:\/\/thesecurityone.com\/index.php\/cybersecurity-services-6\/\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"pro\/page-templates\/full-width-page.php","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-927","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/pages\/927","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/comments?post=927"}],"version-history":[{"count":1,"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/pages\/927\/revisions"}],"predecessor-version":[{"id":1058,"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/pages\/927\/revisions\/1058"}],"wp:attachment":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/media?parent=927"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}