InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties…

Follow publication

Member-only story

Android Hardening Guide

In this post, we’ll walk through how to harden your Android device utilizing leading industry security best practices like CIS benchmarks, globally recognized cryptographic standards, and privacy-improving applications. This is one that anyone with an Android device should read, so without further ado, let’s make a splash in your security.

Table of Contents

· 1. Why Harden Your Android Device?
· 2. Benchmarks & Baselines
2.1. CIS Benchmark
2.2. U.S. DoD STIG
· 3. Communications
3.1. Messaging
3.2. Emails
· 4. VPN
· 5. Other Apps & Protections
· 6. Checklist
· References

1. Why Harden Your Android Device?

At the start of 2022, researchers at Proofpoint (2022) detected a 500% jump in mobile malware delivery attempts in Europe. It’s no secret that hackers are noticing the increasing value of mobile devices in an expanding remote-work world and taking action. Despite this knowledge of increasing attacks, it’s reported that over 80% of Android devices were susceptible to at least 1/25 vulnerabilities. This is no small number and the…

Create an account to read the full story.

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web

Already have an account? Sign in

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Responses (3)

Write a response

Thank you deep dive security for this great article. I’ve only been here for a few days. Just an amateur writer trying my best . I follow back everyone who follows me

--