26 May, 2022 How Can I Protect My Mobile API? Mobile App Authentication, Bots, Reverse Engineering, Mobile App Development As any mobile developer knows, APIs are the foundation of any mobile app strategy. They allow...
18 May, 2022 What Are the Most Common Types of Mobile Man-in-the-Middle Attacks? API Keys, MitM Attack, Certificate Pinning, API Abuse A Man-in-the-Middle attack can come in multiple forms. This article describes these and how you can...
17 May, 2022 What Does Certificate Pinning Protect Against? Mobile App Development, MitM Attack, Certificate Pinning, API Abuse Certificate pinning is a security measure that mobile app developers can use to improve the...
17 May, 2022 How is Certificate Pinning Done? Threats, Mobile App Development, MitM Attack, Certificate Pinning Certificate Pinning is a security technique that involves binding a cryptographic certificate to a...
5 April, 2022 What is Mobile App Shielding? Repackaged Apps, Reverse Engineering, Threats, Mobile App Development As mobile devices become increasingly popular in the workplace, so do attacks targeting mobile...
9 March, 2022 Shielding APIs that Service Mobile Apps: Part 4 - When? Business, Threats, API Security, Mobile Security In the final part of this four part series, we’ll recommend what actions you should take and when...