21 June, 2022 How To Add Security To Your Mobile App Mobile App Authentication, Mobile App Development, API Abuse, API Security In a previous article, we discussed “When do we add security into our app and onto our APIs?” The...
27 May, 2022 How to Prevent API Abuse API Keys, Fake Accounts, Mobile App Authentication, Repackaged Apps API abuse, when the API is used in an unexpected way, is a growing problem in software development...
26 May, 2022 How Can I Protect My Mobile API? Mobile App Authentication, Bots, Reverse Engineering, Mobile App Development As any mobile developer knows, APIs are the foundation of any mobile app strategy. They allow...
18 May, 2022 What Are the Most Common Types of Mobile Man-in-the-Middle Attacks? API Keys, MitM Attack, Certificate Pinning, API Abuse A Man-in-the-Middle attack can come in multiple forms. This article describes these and how you can...
17 May, 2022 What Does Certificate Pinning Protect Against? Mobile App Development, MitM Attack, Certificate Pinning, API Abuse Certificate pinning is a security measure that mobile app developers can use to improve the...
17 May, 2022 How is Certificate Pinning Done? Threats, Mobile App Development, MitM Attack, Certificate Pinning Certificate Pinning is a security technique that involves binding a cryptographic certificate to a...