We're Hiring!

Approov Blog

Three Actions You Should Take Right Now to Stop Mobile MitM Attacks

February 3, 2025

Man-in-the-middle (MitM) attacks occur when an attacker intercepts or manipulates mobile device communications to gain access to sensitive information. Attackers can extract login information, API keys and useful credentials from messages and can modify messages and intercept sensitive commercial or personal data, or even easily launch a denial of service attack against the service being accessed via a mobile app. Read Full Story

Mobile Cybersecurity in 2025: What We Predict and How to Prepare

January 20, 2025

All the key players in cyber-security make predictions at the end of every year and 2025 is no exception, there was a flurry of predictions which are nicely summarized here. Read Full Story

Navigating Life Outside Google & Apple: Developer Opportunities in 2025

January 6, 2025

In 2024, a lot has happened to curtail the Apple and Google mobile app monopolies and mobile app developers are exploring exciting opportunities beyond the Google and Apple ecosystems. This blog presents a roundup of some of the key initiatives and how they may evolve in 2025. Read Full Story

Why Over-the-Air Updates are Key for Mobile App Security in the AI Era

December 18, 2024

The rapid pace of technological advancements, particularly in artificial intelligence (AI), has transformed both the opportunities and threats in the mobile app ecosystem. This blog describes why over-the-air (OTA) updates to security solutions are essential to maintain an effective security posture for apps and APIs in this rapidly evolving threat landscape. Read Full Story

Mobile App API Security: Closing the Protection Gap with a mobile SDK

December 10, 2024

The large app sec vendors are only now starting to recognize the mobile gap in their portfolio - that an SDK in mobile apps is needed to eliminate the growing mobile threat. But SDKs differ in how they gather and use contextual signals. This blog shows how to choose the right one and integrate it with your app security quickly to eliminate the threat from hacked apps and devices. Read Full Story

Breaking Free: Why Direct-to-Consumer is the Future for Mobile Apps

December 5, 2024

For years, mobile app developers have been at the mercy of app store gatekeepers like Apple and Google. These giants dictate distribution, set exorbitant fees, and often stifle innovation with restrictive rules. But the tide is turning. A global push for open app ecosystems is gaining momentum, and direct-to-consumer (DTC) distribution is emerging as a powerful alternative. Read Full Story

The Importance of a Global Perspective in Mobile App Development

November 22, 2024

As Chinese smartphone manufacturers, like Realme, Oppo, Honor, and Huawei, make significant strides in Europe and other global markets, developers must broaden their scope to include non-GMS Android and HarmonyOS platforms. The days of concentrating solely on Apple, Google, or Samsung ecosystems are fading fast. This global perspective is not just about market reach; it's also about embracing a broader security and privacy posture across diverse operating environments. Read Full Story

How to Prevent Credential Stuffing Attacks on Mobile Apps

November 18, 2024

Identity-based and social engineering attacks are surging in 2024. Stolen credentials give hackers immediate access and control… and an instant path to stealing data and orchestrating ransomware attacks. Credential stuffing attacks are the method of choice for hackers, so what are the steps you need to take to prevent them? Read Full Story

Why the OWASP Mobile Application Security Project is Critical

November 5, 2024

And Why Apple, Google and Huawei Need to Participate The OWASP MAS project continues to lead the way in mobile application security. This article describes the resources and tools which have recently been added to OWASP MAS, which provides mobile app security guidance and tools for developers and security professionals alike. Also, we will argue that OWASP really deserves to receive the full support of the major mobile platform and device vendors. Read Full Story

Now is the Time to Get Serious About Securing API Keys

November 5, 2024

I will cut to the chase in this blog. Protecting and managing the API keys MUST be number one on your security to-do-list. A wave of recent breaches show just how exposed mobile apps are to API key abuse. This blog explains how to make a plan to fix the issue right now. Read Full Story

Posts by Topic

see all

Subscribe to our blog