Solutions
Function
Security Leaders ›
IT ›
DevSecOps ›
Industry
Federal Government ›
State & Local Government ›
Financial Services ›
Healthcare ›
mCommerce ›
Telecoms ›
Enhance Security Offering with Quokka intelligence feed ›
Products
Products
Mobile App Security Testing ›
Mobile App Vetting ›
Explore Quokka's Mobile App Risk Intelligence ›
Resources
Resources
Resource Center ›
Blog ›
Events ›
Original Research
CVEs ›
Paper & Conferences ›
Customer Support ›
Partners
Partners
Resellers & Distributors ›
Technology Partners & Integrations ›
Become a Quokka Partner ›
Enhance your offering with Quokka's intelligence feed ›
Company
Company
About us ›
Leadership ›
Newsroom ›
Careers ›
Contact Us ›
Search ...
Results
Request Demo
Request Demo
Mobile Security Intelligence Resources
Clear all
Industries
Industries
Federal
State & Local
Financial Services
Healthcare
MSSP
mCommerce
Mobile Gaming
Government
Education
Solutions
Solutions
CISA MAV
MAST
BYOD
Content types
Content types
Article
Video
Whitepaper
Guide
Webinar
Solution Brief
Academic Paper
Security Standard
Technical Paper
Topics
Topics
TikTok
App Threats
Sign up for our newsletter, The Quokka Intel Briefing
Solution Brief
Q-firm: Android Firmware Security Analysis
Webinar
App Risk Visibility Reinvented: The Intune + Q-scout Advantage
Webinar
App-Layer Intelligence Meets Device Management: Quokka & Hexnode
Webinar
Outsmarting Mobile Malware: The Next Generation of App Vetting
Technical Paper
Uhale Digital Picture Frame: Security Assessment
Video
Q-scout overview | Mobile app vetting explained
Webinar
The App Risks You Don’t See → From Proof to Resolution
Webinar
Silent Saboteurs: Preventing Supply Chain Attacks in Mobile App Security
Webinar
Why Mobile App Risk Demands Action: Fast Fixes with Hexnode & Quokka
Solution Brief
Q-scout integration with Hexnode UEM
Webinar
Take the Guesswork Out of Mobile App Testing—Even Across Distributed Teams
Solution Brief
Q-scout for Corporate-Owned Business-Only
Webinar
Secure by Demand: Proactive Strategies for Mobile App Cybersecurity
Solution Brief
Q-scout Mobile App Vetting in Microsoft Environments
Webinar
Securing Mobile Endpoints: App Vetting with Quokka & Microsoft Intune
Solution Brief
Quokka Overview: The Future of Mobile Security
Webinar
Beyond MDM: Strengthening Mobile Security with App-Level Intelligence
Solution Brief
Malware Detection Engine: Advanced Threat Protection
Webinar
Top Mobile Security Stories & Trends of 2024 and 2025 Predictions
Webinar
Mobile Apps are the New Endpoint
Guide
Mitigating Mobile App Threats: A Practical Guide for CISOs
Webinar
What’s Lurking in Your Phone: Navigating the Risks in Mobile Apps
Solution Brief
Q-mast Sample Report: Actionable Mobile Security Insights
Solution Brief
Q-scout: Mobile App Vetting at Scale
Video
What’s Lurking in Your Phone? Mobile Security Insights
Webinar
Actionable Intelligence: A Breakthrough in Mobile AppSec
Webinar
8 ways attackers target mobile apps to steal your data (and how to stop them)
Webinar
Can Mobile Security & Privacy Coexist? Mobile Security Risks & Privacy Concerns for Government
Video
Federal DevSecOps Insights with Chris Gogoel, VP & GM Public Sector & APAC, Quokka
Guide
The App Security Gaps Created by BYOD
Webinar
Implications of TikTok ban on the future of mobile security
Solution Brief
Q-mast: Comprehensive Mobile App Security Testing
Video
Emerging Tech Talk | Quokka at GITEC 2024
Technical Paper
Android App Usage and Cell Tower Location: Privacy & Security Risks
Webinar
Defense in Depth: How MAST and Pen Testing Work Together
Webinar
Protecting the Mobile Ecosystem: Risks & Security Measures
Video
CISA Secure by Design intro
Article
CISA’s Federal Enterprise Operations Cyber Alignment Plan
Webinar
Protecting The Mobile Ecosystem – Part 1
Article
OIG Management Alert – ICE Management and Oversight of Mobile Apps
Article
CISA Secure by Design: Strengthening Software Security
Security Standard
NIST SP 1800-22: Mobile Device Security
Technical Paper
Revisiting the Security of Prepaid Android Carrier Devices
Academic Paper
Libra: Library Identification in Obfuscated Android Apps
Webinar
Is Banning TikTok the Right Approach or Are We Ignoring the Real Problem?
Whitepaper
Zero Trust Architecture: Mobile Application and Device Security for Federal Agencies
Whitepaper
What Is Mobile Security and Why Is Mobile App Security Testing Important?
Guide
Mobile Application Security: Best Practices for Fintech Apps
Guide
DevSecOps Adoption for Federal Agencies
Webinar
Safeguarding Federal Agency Mobile Applications and Devices
Academic Paper
Detecting and Measuring Misconfigured Manifest in Android Apps
Technical Paper
101 Commands for the Unisoc AutoSLT Network
Technical Paper
Bootlooped: Assorted AOSP Attacks Against Availability
Technical Paper
A Historical Perspective on Samsung Android Smartphones
Whitepaper
What Is Vulnerability Management?
Whitepaper
Healthcare Hacking: Protecting mHealth Apps from Cyber Threats
Security Standard
NIAP Protection Profile 462: Security Requirements for Mobile Devices
Technical Paper
Samsung Android: System User Activity Start Vulnerability
Whitepaper
What Are Supply Chain Attacks and Why Should I Care?
Whitepaper
Mobile App Security & Privacy: Transformational Assessment for NHS
Academic Paper
DEFInit: An Analysis of Exposed Android Init Routines
Technical Paper
(Un)protected Broadcasts in Android 9 and 10
Security Standard
NIST SP 1800-21: Mobile Application Single Sign-On
Article
DHS Automated Vetting Process for Mobile Apps Could Cut Costs
Security Standard
Automating NIAP Requirements Testing for Mobile Apps
Academic Paper
Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware
Security Standard
NIST SP 800-163r1: Vetting the Security of Mobile Applications
Academic Paper
Resilient & Scalable Cloned App Detection Using Forced Execution & Compression Trees
Academic Paper
A Longitudinal Study of Android Inter-App Vulnerabilities
Technical Paper
An Evaluation of Android Carrier Devices: Security & Performance
Technical Paper
Kryptowire Discovers Mobile Phone Firmware that Transmitts PII Without User Consent
Technical Paper
Resurrecting the READ_LOGS Permission on Samsung Devices
Academic Paper
Analysis of Content Copyright Infringement in Mobile Application Markets
Academic Paper
Forced-Path Execution for Android Applications on x86 Platforms
Technical Paper
Exposing Security Risks for Commercial Mobile Devices
Technical Paper
Security Analysis of Simo’s vSIM Android Software
Our award-winning mobile app security technology
Mobile security that makes you smile.
Sign up for our newsletter, The Quokka Intel Briefing
Copyright © 2026, Quokka. All rights reserved.
Search ...
Results