Ed Holloway-George Android Developer Android GDE and lover of all things mobile security, Kotlin and more.

What's the buzz about the 2024 OWASP Mobile Top 10?

The OWASP Top 10 list for Mobile has had some significant changes for the first time in nearly a decade.
In this post we'll explore the changes, what this means for your Android apps and how to learn more about the threats we face in 2024.

What's the buzz about the 2024 OWASP Mobile Top 10? feature image Photo Credit: Max Muselmann

Unpacking Android Security: Part 4 - Insecure Authentication

In this series of blog posts we take a look at Android Security in detail through the lens of the OWASP Top #10 threats to Mobile, with the end goal of learning how to write more secure code in our apps.

In this part we look at the #4 threat 'Insecure Authentication'

Unpacking Android Security: Part 4 - Insecure Authentication feature image Photo Credit: Felipe Furtado

Android Security: Securing your Gradle builds from baddies

Gradle based-supply chain attacks are sadly nothing new, however there are a number of tools available to avoid them…

Android Security: Securing your Gradle builds from baddies feature image Photo Credit: CHUTTERSNAP

Here's some Android tidbits you may have missed!

No clickbait, just a collection of bitesize Android goodies I have shared over the years

Here's some Android tidbits you may have missed! feature image Photo Credit: Clem Onojeghuo

What's new in Jetpack Security Crypto Version 1.1.0-alpha04

Out of the blue, the Jetpack Security Crypto library sees its first update in 18 months. Let's take a look at what's new!

What's new in Jetpack Security Crypto Version 1.1.0-alpha04 feature image Photo Credit: Alexander Schimmeck

Unpacking Android Security: Part 3 - Insecure Communication

In this series of blog posts we take a look at Android Security in detail through the lens of the OWASP Top #10 threats to Mobile, with the end goal of learning how to write more secure code in our apps.

In this part we look at the #3 threat 'Insecure Communication'

Unpacking Android Security: Part 3 - Insecure Communication feature image Photo Credit: Clem Onojeghuo

Unpacking Android Security: Part 2 - Insecure Data Storage

In this series of blog posts we take a look at Android Security in detail through the lens of the OWASP Top #10 threats to Mobile, with the end goal of learning how to write more secure code in our apps.

In this part we look at the #2 threat 'Insecure Data Storage'

Unpacking Android Security: Part 2 - Insecure Data Storage feature image Photo Credit: Mak

Unpacking Android Security: Part 1 - Improper Platform Usage

In this series of blog posts we take a look at Android Security in detail through the lens of the OWASP Top #10 threats to Mobile, with the end goal of learning how to write more secure code in our apps.

In this part we look at the #1 threat 'Improper Platform Usage'

Unpacking Android Security: Part 1 - Improper Platform Usage feature image Photo Credit: Mak

A day in the life of… Ed George (Senior Android Developer)

As featured in the ASOS Tech Blog

A day in the life of… Ed George (Senior Android Developer) feature image Photo Credit: David Mao

Learning to 'Hack Android' with picoCTF

A beginners guide to solving picoCTF's 'droid' challenges

Learning to 'Hack Android' with picoCTF feature image Photo Credit: Johnny Macri

Hands on with Jetpack's Security App Authenticator library

A look into Jetpack Security's latest exciting addition

Hands on with Jetpack's Security App Authenticator library feature image Photo Credit: Niv Singer

Projecting the Future: Remote IDEs

JetBrains Projector might just be the tool we need in 2021

Projecting the Future: Remote IDEs feature image Photo Credit: Jeremy Yap

The Fright Before Christmas: How a MediaPlayer and OBB file nearly ruined my holidays

A fun retrospective look at a pesky bug that threatened to ruin my holiday season

The Fright Before Christmas: How a MediaPlayer and OBB file nearly ruined my holidays feature image Photo Credit: Dawson Lovell

How To: Sorting and Reporting Your Dependencies Versions with Gradle

Working on larger projects can make dependency management difficult, in the post we will look at how to sort and generate a report of our Gradle project's dependencies and their available upgrades

How To: Sorting and Reporting Your Dependencies Versions with Gradle feature image Photo Credit: Andrew Buchanan

Writing 'Finite State Machines' in Kotlin (Part 2) - 'Delta Hat'

In this part we shall move on to defining and implementing delta hat, better known as the 'extended transition function'

Writing 'Finite State Machines' in Kotlin (Part 2) - 'Delta Hat' feature image Photo Credit: Karim Manjra

Writing 'Finite State Machines' in Kotlin (Part 1) - DFA

Could we implement finite state machines in Kotlin and how might they be useful in the real world?

Writing 'Finite State Machines' in Kotlin (Part 1) - DFA feature image Photo Credit: Pixabay

How to 100% nail your Android / iOS interviews

Some thoughts on how to smash interviews as a mobile developer

How to 100% nail your Android / iOS interviews feature image Photo Credit: Austin Distel