5 April, 2022 What is Mobile App Shielding? Repackaged Apps, Reverse Engineering, Threats, Mobile App Development As mobile devices become increasingly popular in the workplace, so do attacks targeting mobile...
9 March, 2022 Shielding APIs that Service Mobile Apps: Part 4 - When? Business, Threats, API Security, Mobile Security In the final part of this four part series, we’ll recommend what actions you should take and when...
22 February, 2022 Shielding APIs that Service Mobile Apps: Part 3 - How? Mobile App Authentication, Bots, Reverse Engineering, Threats In the third part of this article series, we will look at the component parts of a shielding...
15 February, 2022 Shielding APIs that Service Mobile Apps: Part 2 - What? Mobile App Authentication, Bots, Reverse Engineering, Threats In the second part of this article series, we are going to explore what shielding of APIs connected...
8 February, 2022 Shielding APIs that Service Mobile Apps: Part 1 - Why? Business, Account Hijacking, Mobile App Authentication, Threats In this series of articles, we are going to explore the why, what, how and when of shielding APIs...
20 January, 2022 Hacking Financial APIs - New Report, Familiar Results API Keys, Business, Reverse Engineering, Fintech Alissa Knight’s latest security research report “Scorched Earth” was recently released. In this...