Blogs by Richard Taylor
Richard Taylor
CTO and Co-Founder at Approov Ltd
Chief Technical Officer with more than 30 years of industry experience. Background in compiler optimization and processor architecture, working more recently in application security and cloud computing technologies. Richard Co-Founded and is CTO of Approov Mobile Security (previously Critical Blue Ltd) and has led a number of innovative product developments in the area of EDA, software optimization and remote software attestation.
Posts on
- Mobile API Security (184)
- Mobile App Authentication (93)
- Mobile App Development (83)
- Mobile App Security (75)
- Mobile Security (74)
- Threats (70)
- API Abuse (64)
- Integration (55)
- API Keys (52)
- MitM (48)
- Bots (39)
- Business (38)
- Certificate Pinning (33)
- Reverse Engineering (31)
- Quickstart (25)
- Android Security (23)
- Backend (23)
- App Attestation (22)
- TLS (22)
- Repackaged Apps (20)
- Mobile Finance (17)
- Scrapers (17)
- iOS (17)
- Mobility (13)
- RASP (13)
- Mobile Health (12)
- Zero Trust (12)
- Gaming and Gambling (9)
- News (9)
- Run-time Secrets Protection (8)
- Third Party APIs (8)
- Fake Accounts (7)
- ReactNative (7)
- Retail (7)
- API Gateway (6)
- Account Hijacking (6)
- Apple (6)
- Compliance & Privacy (6)
- Huawei (6)
- Google (5)
- OAuth2 (5)
- Reverse Proxy (5)
- Code Obfuscation (4)
- OWASP (4)
- Aggregators (3)
- App Store (3)
- Cloud (3)
- Cross-Platform (3)
- Cybersecurity (3)
- Data Security (3)
- E-Commerce (3)
- Mobile App Distribution (3)
- SafetyNet (3)
- Token-Based API Access (3)
- Web Security (3)
- gRPC (3)
- Frontend (2)
- Mobile Banking (2)
- Mobile Payment Security (2)
- Pentesting (2)
- Runtime Application Self-Protection (2)
- SDLC (2)
- App Shielding (1)
- CNIL (1)
- Credential Stuffing (1)
- DeviceCheck (1)
- Frida (1)
- Google Play (1)
- Supply-chain (1)
Popular Posts
- How to Bypass Certificate Pinning with Frida on an Android App
- Revealing the Limitations of Apple DeviceCheck and Apple App Attest
- How to Extract an API Key from a Mobile App by Static Binary Analysis
- Limitations of Google Play Integrity API vs. Approov Mobile Security
- MitM Attacks on Android Apps: A Step-by-Step Guide Using Emulators
- Three Actions You Should Take Right Now to Stop Mobile MitM Attacks
- 5 Threats to Mobile Games and 5 Essential Security Measures
- Why Does Your Mobile App Need an API Key?
- Securing APIs with Approov and Cloudflare: A Comprehensive Guide
- Are You Human, Robot or Just Impatient?
- Limitations of Huawei HarmonyOS Safety Detect: What You Need to Know
- Securing HTTPS with Certificate Pinning on Android
- How to Ride the Bus for Free (Hackers Need Not Apply)
- Bypassing Certificate Pinning
- Epic Games Beat Google, but Lost to Apple - What are the Implications?
