Just like web applications, Android applications may use the untrusted input to construct SQL queries and do so in a way that's exploitable.

July 13, 2018 By hpAndro

Weak Hashing Algorithm SHA-1

In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte)...

July 13, 2018 By hpAndro