We provide advanced security consulting services for your Android Apps. We are proficient in finding vulnerabilities and potential critical security issues in your app. AndroBugs makes sure every component in your app is secure enough and your logic is correct with no security flaws for hackers to exploit. We are giving you a chance to try it now, you may find something in your app that you may have never notice before.
Once we have found any vulnerabilities in your apps, we will give you a complete and detailed description to help you solve the potential security issues. If necessary, we will give you the PoC code to demonstrate the effect of the vulnerabilities we have found in your app.
For web apps, you can fix the security issues immediately on your server. But for Android apps, your apps may have already been deployed to more than hundreds of thousands of devices by the time you find vulnerabilities.
To protect the code safety of your app, you DO NOT need to give us your Java or C/C++ source code. You only need to give us your Android APK file.
If we find any vulnerabilities in your Android app, we will keep it confidential and will never publicly disclose it unless you allow us to do.
We closely cooperate with you, give you suggestions and complete steps to solve the security issues. But it all depends on you to make the changes or not.
We not only give you the vulnerabilities mitigation advices, but also give you performance improvement suggestions and preferable settings in your apps.
How do you know if one day you are hacked by HeartBleed vulnerabilities because you use the 3rd-party library - OpenSSL?
AndroBugs also helps you check the security of the 3rd-party libraries you are using.
We have several techniques to help your app against Reverse Engineering or being repackaging by hackers.
|Company||Hall of Fame (or Acknowledgement List)||Additional Information|
If you do not want your company listed here, please contact us.
|Google Android||https://source.android.com/devices/tech/security/acknowledgements.html||Including Google Chrome and
apps in AOSP.
|https://www.facebook.com/whitehat/thanks/||Android SDK by Facebook and
Facebook Bug Bounty Payment Website
|https://hackerone.com/twitter/thanks||Twitter Mobile Web|
|Including Office Mobile and Bing|
|Alibaba(阿里巴巴)||http://security.alibaba.com/top.htm?time=201404||Security issues in Taobao and Alipay.
Rank top 4 in April, 2014.
|AT&T||https://bugbounty.att.com/hof.php||Rank top 10 in 2Q2015 & 2Q2014.|
|Yandex||https://yandex.com/bugbounty/hall-of-fame/all/||Including iOS app by Yandex.|
|Sina(新浪微博)||http://sec.sina.com.cn/Hero/index?year=2014&month=4||Rank top 8 in April, 2014.|
|Tencent(腾讯)||A vulnerability in Android SDK by Tencent.|
|Wickr||Several vulnerabilities in Wickr Android.|
|LINE WhosCall||A vulnerability in LINE WhosCall.|
|1||Vulnerability in Facebook app allows hackers to steal access tokens and hijack accounts|
|2||Hole In WhatsApp For Android Lets Hackers Steal Your Conversations|
|3||Evernote||Evernote Android Insecure Password Change (one-click setup)|