We're Hiring!

Approov Blog

Public Comments Analysis on HIPAA Security Rule Amendment for Cybersecurity

March 21, 2025

Major cybersecurity breaches continue to plague the US healthcare industry, and on December 27, 2024, the U.S. Department of Health and Human Services (HHS) issued a Notice of Proposed Rulemaking (NPRM) to amend the HIPAA Security Rule, titled "The HIPAA Security Rule to Strengthen the Cybersecurity of Electronic Protected Health Information". Comments were requested and over 4000 were received before the comment period ended on March 7 2025. This blog summarizes what the comments covered - and what comes next. Read Full Story

The UK NHS API Flaw: A Wake-Up Call for Mobile Security

March 17, 2025

A recent vulnerability discovered in an UK National Health Service HS API has once again highlighted the risks associated with insecure mobile application programming interfaces (APIs). The flaw reportedly allowed unauthorized access to sensitive patient data, raising serious concerns about the security of healthcare applications. Read Full Story

Injecting Mobile App Security into The HIPAA Healthcare Security Rule

February 21, 2025

A proposed update to the HIPAA Security Rule to Strengthen the Cybersecurity of Electronic Protected Health Information was issued in June 2024. Comments were requested and Approov has proposed some changes. This blog outlines the Approov recommendations to strengthen The Rule, specifically around mobile apps on personal mobile devices accessing ePHI. Read Full Story

DeepSeek App’s Security Failures: How Approov Could Have Prevented the Damage

February 19, 2025

With a global AI race underway, mobile app security is not optional - it’s a necessity. A recent security audit of the DeepSeek iOS application revealed significant vulnerabilities that put user data at risk. These weaknesses, including unencrypted data transmission, insecure cryptographic practices, and disabled security mechanisms, have exposed users to potential data breaches and cyberattacks. Read Full Story

Three Actions You Should Take Right Now to Stop Mobile MitM Attacks

February 3, 2025

Man-in-the-middle (MitM) attacks occur when an attacker intercepts or manipulates mobile device communications to gain access to sensitive information. Attackers can extract login information, API keys and useful credentials from messages and can modify messages and intercept sensitive commercial or personal data, or even easily launch a denial of service attack against the service being accessed via a mobile app. Read Full Story

Mobile Cybersecurity in 2025: What We Predict and How to Prepare

January 20, 2025

All the key players in cyber-security make predictions at the end of every year and 2025 is no exception, there was a flurry of predictions which are nicely summarized here. Read Full Story

Navigating Life Outside Google & Apple: Developer Opportunities in 2025

January 6, 2025

In 2024, a lot has happened to curtail the Apple and Google mobile app monopolies and mobile app developers are exploring exciting opportunities beyond the Google and Apple ecosystems. This blog presents a roundup of some of the key initiatives and how they may evolve in 2025. Read Full Story

Why Over-the-Air Updates are Key for Mobile App Security in the AI Era

December 18, 2024

The rapid pace of technological advancements, particularly in artificial intelligence (AI), has transformed both the opportunities and threats in the mobile app ecosystem. This blog describes why over-the-air (OTA) updates to security solutions are essential to maintain an effective security posture for apps and APIs in this rapidly evolving threat landscape. Read Full Story

Mobile App API Security: Closing the Protection Gap with a mobile SDK

December 10, 2024

The large app sec vendors are only now starting to recognize the mobile gap in their portfolio - that an SDK in mobile apps is needed to eliminate the growing mobile threat. But SDKs differ in how they gather and use contextual signals. This blog shows how to choose the right one and integrate it with your app security quickly to eliminate the threat from hacked apps and devices. Read Full Story

Breaking Free: Why Direct-to-Consumer is the Future for Mobile Apps

December 5, 2024

For years, mobile app developers have been at the mercy of app store gatekeepers like Apple and Google. These giants dictate distribution, set exorbitant fees, and often stifle innovation with restrictive rules. But the tide is turning. A global push for open app ecosystems is gaining momentum, and direct-to-consumer (DTC) distribution is emerging as a powerful alternative. Read Full Story

Posts by Topic

see all

Subscribe to our blog