Wanted to point interested readers to my article (basically a tutorial) on security assessment of blackberry applications:
resources.infosecinstitute.com/security-assessment-of-blackberry-applications/
Wanted to point interested readers to my article (basically a tutorial) on security assessment of blackberry applications:
resources.infosecinstitute.com/security-assessment-of-blackberry-applications/