17 May, 2022 What Does Certificate Pinning Protect Against? Mobile App Development, MitM Attack, Certificate Pinning, API Abuse Certificate pinning is a security measure that mobile app developers can use to improve the...
17 May, 2022 How is Certificate Pinning Done? Threats, Mobile App Development, MitM Attack, Certificate Pinning Certificate Pinning is a security technique that involves binding a cryptographic certificate to a...
12 May, 2022 The Risks & Rewards of Travel by Mobile API Keys, Business, Mobile App Authentication, Mobile App Development After a couple of false starts, we are finally emerging from behind the shadow of the Covid...
19 April, 2022 What Is In-App Protection? Bots, Repackaged Apps, Reverse Engineering, Threats In-app protection refers to the security features built into mobile apps. These features help...
10 April, 2022 How Do You Make a Mobile App Secure? Mobile App Authentication, Mobile App Security Mobile apps are an integral part of our lives, but all too often, they're not secure. Over the...
5 April, 2022 What is Mobile App Shielding? Repackaged Apps, Reverse Engineering, Threats, Mobile App Development As mobile devices become increasingly popular in the workplace, so do attacks targeting mobile...