Blog
Blog
FIM: File Integrity Monitoring
18.02.2026
In information security, a Demilitarized Zone (DMZ) is a perimeter local network located between an organization's internal network and an external network, generally the Internet.
Blog
DMZ: Demilitarized Zone
28.01.2026
In information security, a Demilitarized Zone (DMZ) is a perimeter local network located between an organization's internal network and an external network, generally the Internet.
Blog
Personal Data Protection (Part 2)
16.12.2025
Since the General Data Protection Regulation (GDPR) came into force in Europe, many techniques have been used by companies to effectively
Blog
Personal Data Protection: Encryption
02.12.2025
Today, in an increasingly digitalized and connected world, the value of data for an organization — and for the owners of that data — is highly appreciated and indisputable
Blog
The persistent security crisis in mobile networks: old vulnerabilities keep haunting new generations
21.10.2025
This article is based on research «Unveiling the Ghosts of Mobile Networks: When Will Old Bugs Die?»
Blog
SNMP Security
18.10.2025
SNMP (Simple Network Management Protocol) consists of 3 essential parts
Blog
ArmoredMobile team reflections on Pixnapping attack
16.10.2025
The malicious app’s attack works by opening the target app (e.g., Google Authenticator), then displaying its own window on top of the target app’s window, and scanning the content pixel by pixel, analyzing the execution time of graphic operations on each pixel.
Blog
Privacy vs. Security: Finding the Balance in an Increasingly Connected World
07.10.2025
From unlocking your phone with a glance to moving through an airport security gate, technology quietly collects pieces of our lives.
Blog
SNMP: Simple Network Management Protocol
16.09.2025
Simple Network Management Protocol (SNMP) works on the application layer of the OSI Reference Model, to manage and control network devices.
More blogs