27 May, 2022 How to Prevent API Abuse API Keys, Fake Accounts, Mobile App Authentication, Repackaged Apps API abuse, when the API is used in an unexpected way, is a growing problem in software development...
18 May, 2022 What Are the Most Common Types of Mobile Man-in-the-Middle Attacks? API Keys, MitM Attack, Certificate Pinning, API Abuse A Man-in-the-Middle attack can come in multiple forms. This article describes these and how you can...
12 May, 2022 The Risks & Rewards of Travel by Mobile API Keys, Business, Mobile App Authentication, Mobile App Development After a couple of false starts, we are finally emerging from behind the shadow of the Covid...
20 January, 2022 Hacking Financial APIs - New Report, Familiar Results API Keys, Business, Reverse Engineering, Fintech Alissa Knight’s latest security research report “Scorched Earth” was recently released. In this...
17 January, 2022 Shift Left but Shield Right - and what are the options? API Keys, Business, Mobile App Authentication, API Abuse As I explained in a previous blog about the FHIR API Research Alissa Knight recently completed,...
12 January, 2022 Shift Left but Shield Right - but what does that mean? API Keys, Business, Mobile App Development, API Abuse We sponsored a major report “Playing with FHIR” by Alissa Knight, released in October 2021...