5 April, 2022 What is Mobile App Shielding? Repackaged Apps, Reverse Engineering, Threats, Mobile App Development As mobile devices become increasingly popular in the workplace, so do attacks targeting mobile...
22 February, 2022 Shielding APIs that Service Mobile Apps: Part 3 - How? Mobile App Authentication, Bots, Reverse Engineering, Threats In the third part of this article series, we will look at the component parts of a shielding...
15 February, 2022 Shielding APIs that Service Mobile Apps: Part 2 - What? Mobile App Authentication, Bots, Reverse Engineering, Threats In the second part of this article series, we are going to explore what shielding of APIs connected...
8 February, 2022 Shielding APIs that Service Mobile Apps: Part 1 - Why? Business, Account Hijacking, Mobile App Authentication, Threats In this series of articles, we are going to explore the why, what, how and when of shielding APIs...
20 January, 2022 Hacking Financial APIs - New Report, Familiar Results API Keys, Business, Reverse Engineering, Fintech Alissa Knight’s latest security research report “Scorched Earth” was recently released. In this...
17 January, 2022 Shift Left but Shield Right - and what are the options? API Keys, Business, Mobile App Authentication, API Abuse As I explained in a previous blog about the FHIR API Research Alissa Knight recently completed,...