Across
- 2. One time password authentication code
- 3. Enterprise mobile device management system
- 5. Remote monitoring spyware for iOS
- 8. Secure Android storage for cryptographic keys
- 9. Mobile application runtime protection platform
- 10. Runtime instrumentation and hooking framework
- 11. Taking control of device via Bluetooth
- 15. Isolating apps to restrict system access
- 18. Android application package file format
- 19. Mobile application source code scanner
- 21. Hijacking camera using remote malware
- 22. Low orbit ion cannon DoS tool
- 24. Mobile anti spyware protection software
- 25. Removing Apple iOS security restrictions
- 27. Android post exploitation control framework
- 29. SIM toolkit vulnerability SMS attack
- 31. SMS phishing attack using text messages
- 32. Gaining privileged Android system access
- 34. Android debugging bridge command tool
- 35. Google Android device tracking service
- 37. iOS post exploitation framework tool
- 38. iOS runtime manipulation framework
Down
- 1. Mobile antivirus and privacy protection
- 2. Mobile runtime security testing framework
- 4. Mobile security framework analysis tool
- 6. Android network traffic capture tool
- 7. Extracts stored secrets from iOS
- 11. Employees use personal devices for work
- 12. iOS malware targeting biometric data
- 13. Android remote administration trojan tool
- 14. Exploiting trusted computer pairing connection
- 16. Android app reverse engineering tool
- 17. Eavesdropping using smartphone motion sensors
- 20. Mobile malware protection security tool
- 23. Stealing data over Bluetooth connection
- 26. Mobile application penetration testing toolkit
- 28. Apple device location tracking service
- 30. Secure iOS storage for passwords
- 33. Tor based proxy privacy application
- 36. Android application attack surface testing tool
