Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
📱 Mobile Security
Android security, iOS security, APK analysis, mobile pentest
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
187403
posts in
14.7
ms
Mobile
Forensics
Explained:
Closing
the Mobile Security Gap
🔍
Digital Forensics
jamf.com
·
1d
Box — On-device Android AI: chat, image generation, speech-to-text, and vision in one offline APK (
LiteRT
+ llama.cpp + SD + Whisper, encrypted,
biometric
lock)
🛠️
Ghidra
github.com
·
6d
·
r/opensource
SXSW
2026:
Rediscovering
conviction and creativity in the age of AI
⏱️
Productivity
uk.themedialeader.com
·
22h
ARIstoteles
-- Dissecting Apple's
Baseband
Interface
🐛
Fuzzing
arxiv.org
·
2d
7 Reasons
Smishing
Is More Effective Than
Phishing
🌐
Web App Security
iverify.io
·
4d
New comment by john_
strinlai
in "Your phone is about to stop being
yours
"
💥
Cyberattack
news.ycombinator.com
·
2d
·
Hacker News
A new Gemini feature could save you from getting
suddenly
locked
out
💥
Cyberattack
phandroid.com
·
2d
[
mamiiblt/instafel
] Release
v702
🛠️
Ghidra
5 Dakikada Teknoloji Gündemi <team@aposto.com> via kill-the-newsletter.com
·
6d
Google could soon say goodbye to current Gemini voices (
APK
teardown
)
🛠️
Ghidra
androidauthority.com
·
2d
Building an Android App Analysis
Lab
on Ubuntu: A
Practical
Setup Guide
⚙️
Reverse Engineering
infosecwriteups.com
·
22h
Inspektor
Gadget
Security Audit
🔧
Hardware Hacking
shielder.com
·
13h
·
r/netsec
Release Notes:
Expanded
Threat Intelligence Access, AI Assisted Search 1,770 New
Detections
and More
🕵️
Threat Intelligence
malware.news
·
15h
Attackers
Are Still Coming for Security Companies. Here's Where We
Stand
.
🔓
Penetration Testing
semgrep.dev
·
29m
A study of 1,000 Android apps finds a privacy policy
logging
gap
🦠
Malware Analysis
sh.itjust.works
·
15h
[
MorpheApp/morphe-manager
] Pre-release
v1.16.0-dev.7
💿
software
5 Dakikada Teknoloji Gündemi <team@aposto.com> via kill-the-newsletter.com
·
6d
Researchers discover new all-in-one ‘
Bluekit
’ phishing kit capable of bypassing enterprise 2FA protocols and
emulating
40+ global brands
📡
Network Security
techradar.com
·
12h
The Third-Party Mobile App Risk Hidden Inside Your
Approved
Apps
🕵️
Threat Intelligence
nowsecure.com
·
2d
IXT
integrates
Zscaler
Zero Trust into cellular IoT to replace VPNs and strengthen OT security
📡
Network Security
iotinsider.com
·
18h
Image-Based Malware Type Classification on
MalNet-Image
Tiny: Effects of Multi-Scale Fusion, Transfer Learning, Data Augmentation, and Schedule-Free
Optimizatio
...
🦠
Malware Analysis
arxiv.org
·
6d
Mobile App Development Company in India
💻
Software Development
mittaltechnologies.com
·
2d
·
DEV
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help