
#Avast network inspector chinese mobile device android#
Android debate when it comes to security. TechNadu: Where do you stand on the iOS vs. Our users profit from features that go beyond traditional AV protection, as we provide additional security layers to protect their privacy, for example with our Wi-Fi Inspector feature that checks the network you're connected to for security risks, the photo vault that allows you to move photos to a password-protected, encrypted vault, and the App Locking feature, that allows you to password-protect sensitive apps from prying eyes. Our strong mobile protection has just recently been verified again by independent testing institution AV-Test, where we scored 100% in protection against the latest Android malware attacks in real-time, and 100% in the detection of new, widespread Android malware. Our Avast Mobile Security's protection technology is based on our threat detection network, which is among the most advanced in the world, using machine learning and artificial intelligence technologies to detect and stop threats in real-time. Can you give us the main reasons why people should choose it over the competition? What unique features does it bring on the table? TechNadu: “Avast Mobile Security” is among the top-notch solutions in the Android and iOS markets. Since early 2019, as the lead of Avast’s Threat Intelligence Platforms, I am working with teams on improving the current internal and public apklab.io platform and developing other exciting new projects.

Nowadays, our analysts are fully dependent on the platform, using it, and providing ideas and suggestions for new features. We opened the platform to the security community in early 2019. In early 2017, I started developing apklab.io with my team, first for internal use, in order to help us automate most of our tasks and focus entirely on mobile threat intelligence, including easier tracking, hunting, classification, and the detection of mobile malware. In addition, I focused on creating blog posts and content, helping the security community by sharing our findings. I started almost seven years ago as a mobile malware analyst, mainly creating detections, developing tools to automate the detections, and understanding new malware families in-depth. TechNadu: As an Avast employee, what can you tell us about the work that you do for the security firm? How much of your time goes into “hands-on” engineering, and what is left for guiding teams and conducting research work? The same year, one of the first Android malware samples was discovered: “DroidSMS.” This was the reason I entirely shifted my focus to mobile malware, which remains my focus today.

A few years later, in 2010, I moved to Android with the Nexus One, and continued experimenting, by rooting the device and exploring its internals. That was when I started reverse engineering various apps and trying to understand and learn how they work. A few months later, researchers released the first jailbreak for the iPhone, opening the “doors” to the system and every app included on it.


My passion for mobile security first developed with the release of the first iPhone in 2007. Back then, one of my main passions, including developing, was to try to reverse-engineer various "crackmes" that were available online to test reverse engineering skills. I took my first steps in cybersecurity at the very end of the ’90s, close to the end of the SoftIce (kernel-mode debugger) era, and the starting of the Ollydbg (x86 debugger) era.
