12 February, 2020 Using a Reverse Proxy to Protect Third Party APIs API Keys, Third Party APIs, API, API Abuse In this article you will start by learning what Third Party APIs are, and why you shouldn’t access...
22 January, 2020 Getting Authentication Correct API Keys, Mobile App Authentication, API Abuse, API Security For zero trust mobile apps and APIs, credentials aren’t nearly enough. Photo by Sebastiaan Stam on...
24 July, 2019 Improve the Security of API Keys API Keys, Mobile App Authentication, Reverse Engineering, API Securely identify your API Caller Dunnottar Castle As a developer, API Keys are typically issued to...
27 April, 2019 Apple DeviceCheck and CriticalBlue Approov API Keys, Android, Mobile App Authentication, Repackaged Apps We are often asked by customers and prospects to compare our beloved Approov with Apple's...
4 April, 2019 Steal That API Key with a Man in the Middle Attack API Keys, Mobile App Authentication, Reverse Engineering, Third Party APIs Editor's note: This post was originally published in April 2019 and has been revamped and updated...
14 March, 2019 How to Extract an API Key from a Mobile App by Static Binary Analysis API Keys, Reverse Engineering An API key is probably the most common method used by developers to identify what is making the...