Blogs by Eric Newcomer
Eric Newcomer
Principal Analyst and CTO at Intellyx, a technology analysis firm focused on enterprise digital transformation.
He previously served as CTO at WSO2 and at IONA, led Security Architecture for Citi’s consumer banking and was Chief Architect for Citi and Credit Suisse’s trade and investment divisions.
Eric is an internationally recognized expert in transaction processing, integration and cloud migration, having contributed to many industry standards including OSGi, Eclipse, SOAP, WSDL, UDDI, AMQP and more. His textbooks, including Principles of Transaction Processing, Understanding Web Services, and Understanding SOA with Web Services are used at universities around the world.
Posts on
- Mobile API Security (184)
- Mobile App Authentication (93)
- Mobile App Development (83)
- Mobile App Security (75)
- Mobile Security (74)
- Threats (70)
- API Abuse (64)
- Integration (55)
- API Keys (52)
- MitM (48)
- Bots (39)
- Business (38)
- Certificate Pinning (33)
- Reverse Engineering (31)
- Quickstart (25)
- Android Security (23)
- Backend (23)
- App Attestation (22)
- TLS (22)
- Repackaged Apps (20)
- Mobile Finance (17)
- Scrapers (17)
- iOS (17)
- Mobility (13)
- RASP (13)
- Mobile Health (12)
- Zero Trust (12)
- Gaming and Gambling (9)
- News (9)
- Run-time Secrets Protection (8)
- Third Party APIs (8)
- Fake Accounts (7)
- ReactNative (7)
- Retail (7)
- API Gateway (6)
- Account Hijacking (6)
- Apple (6)
- Compliance & Privacy (6)
- Huawei (6)
- Google (5)
- OAuth2 (5)
- Reverse Proxy (5)
- Code Obfuscation (4)
- OWASP (4)
- Aggregators (3)
- App Store (3)
- Cloud (3)
- Cross-Platform (3)
- Cybersecurity (3)
- Data Security (3)
- E-Commerce (3)
- Mobile App Distribution (3)
- SafetyNet (3)
- Token-Based API Access (3)
- Web Security (3)
- gRPC (3)
- Frontend (2)
- Mobile Banking (2)
- Mobile Payment Security (2)
- Pentesting (2)
- Runtime Application Self-Protection (2)
- SDLC (2)
- App Shielding (1)
- CNIL (1)
- Credential Stuffing (1)
- DeviceCheck (1)
- Frida (1)
- Google Play (1)
- Supply-chain (1)
Popular Posts
- How to Bypass Certificate Pinning with Frida on an Android App
- Revealing the Limitations of Apple DeviceCheck and Apple App Attest
- How to Extract an API Key from a Mobile App by Static Binary Analysis
- Limitations of Google Play Integrity API vs. Approov Mobile Security
- MitM Attacks on Android Apps: A Step-by-Step Guide Using Emulators
- Three Actions You Should Take Right Now to Stop Mobile MitM Attacks
- 5 Threats to Mobile Games and 5 Essential Security Measures
- Why Does Your Mobile App Need an API Key?
- Securing APIs with Approov and Cloudflare: A Comprehensive Guide
- Are You Human, Robot or Just Impatient?
- Limitations of Huawei HarmonyOS Safety Detect: What You Need to Know
- Securing HTTPS with Certificate Pinning on Android
- How to Ride the Bus for Free (Hackers Need Not Apply)
- Bypassing Certificate Pinning
- Epic Games Beat Google, but Lost to Apple - What are the Implications?
