Posts

Showing posts from 2022

The adventurous trek of tech enthusiasts on the deck of nature

Image
A team outing was long overdue. And what could be more relieving than going out on a weekday? So, on one fine Wednesday, the Bugsmirror team went out for a trek. Away from the hustle-bustle of Indore city, our destination was - Junapani Waterfall 🤩. It is situated amidst the hills & forest of Junapani, a small village near Simrol, about 30 km from Indore. Early in the morning, we gathered at our office. The weather was pleasant and everyone was very excited about the trek. We boarded a traveller and began our journey towards Junapani Waterfall. Our first stop was Apna Sweets, Rau, where we had a fulfilling breakfast of Poha, Jalebis, Kachoris, tea & coffee. Then we went further and reached a substation in Memdi village, Simrol. During the journey, we listened to music, gossiped with each other, and enjoyed a lot. The trek was organized in coordination with “Malwa Trekkers” and 2 of their professional trekkers accompanied us. We got down at the substation and prepared our trek...

8 Threats to Security of Mobile Phones and Ways to Prevent Them

Image
Security Blogs  | 6 min read (Alt text: 8 threats to security of mobile phones and ways to prevent them) Mobile phones are one of mankind's greatest inventions. Around 6.6 billion people use mobile phones worldwide. Their use in personal as well as professional life has increased dramatically. And so have the threats to the security of mobile phones increased. According to Zimperium’s Global Mobile Threat Report , in 2021, security threats impacted over 10 million mobile phones in 214 countries . In this blog post, we will look at 8 common threats to the security of mobile phones and how you can prevent them. Table of contents Threats to the security of your mobile phones Weak passwords Malware Phishing Insecure public/open Wi-Fi Drive-by downloads Browser exploits Rooting or jailbreaking Operating system exploits Tips to prevent mobile security threats Threats to the security of your mobile phones A mobile security threat is a condition or a means that attackers exploit to gain u...

PoC and steps of reproduction of bugs help to fix vulnerabilities

Image
Table of contents Introduction Proof-of-Concept (PoC) Steps of reproduction of bugs Bugsmirror: One-stop solution for all your security needs Introduction In the previous blog post, we discussed security audits in detail. After a security audit finds bugs or vulnerabilities in a mobile application, “Proof-of-Concept (PoC)” and “steps of reproduction of bugs” are reported for each vulnerability. They help companies to verify the security vulnerabilities, understand where they were found in the code and fix them. The more vulnerabilities a company fixes, the more secure its products will be. Proof-of-Concept (PoC) A proof-of-concept of a bug or vulnerability is a screenshot or a video which shows & proves that the vulnerability was found during a security audit of an app or a product. PoC can be screenshots of parts of a code, data leaked due to security vulnerability, etc. Let’s understand proof-of-concept in detail with an example of a hospital data management app’s security audi...