27 June, 2022 How Should API Keys be Stored? API Keys, Reverse Engineering, Mobile App Development, API Abuse Mobile app developers keep hearing that they shouldn’t store API keys in their app code but they...
21 June, 2022 How To Add Security To Your Mobile App Mobile App Authentication, Mobile App Development, API Abuse, API Security In a previous article, we discussed “When do we add security into our app and onto our APIs?” The...
27 May, 2022 How to Prevent API Abuse API Keys, Fake Accounts, Mobile App Authentication, Repackaged Apps API abuse, when the API is used in an unexpected way, is a growing problem in software development...
26 May, 2022 How Can I Protect My Mobile API? Mobile App Authentication, Bots, Reverse Engineering, Mobile App Development As any mobile developer knows, APIs are the foundation of any mobile app strategy. They allow...
23 May, 2022 When To Add Security To Your New Mobile App Business, Mobile App Authentication, Reverse Engineering, Mobile App Development Whether you are a brand new company bringing a mobile-centric digital service to market, or an...
18 May, 2022 What Are the Most Common Types of Mobile Man-in-the-Middle Attacks? API Keys, MitM Attack, Certificate Pinning, API Abuse A Man-in-the-Middle attack can come in multiple forms. This article describes these and how you can...