2 December, 2022 How to Prevent API Abuse on Mobile Apps Mobile App Authentication, Bots, Repackaged Apps, Reverse Engineering API abuse is a growing concern in today's digital landscape, with criminals finding new and...
28 November, 2022 Can I Share My API Key? API Keys, Mobile App Authentication, Mobile App Development, API Security An API key is a token provided by a client when making API calls. It is used to authenticate and...
24 November, 2022 Is Certificate Pinning Worth it? TLS, Mobile App Development, MitM Attack, Certificate Pinning In a word - yes; when implemented correctly, certificate pinning is an effective method for...
8 November, 2022 Securing Mobile Gambling Platforms Bots, Reverse Engineering, Threats, Mobile App Development Gambling has come a long way since the days of visiting a bricks and mortar outlet and filling in...
10 October, 2022 How Do I Protect My Flutter App? Reverse Engineering, Mobile App Development, MitM Attack, API Security Google’s open source Flutter has quickly become one of the most popular development toolkits for...
29 September, 2022 The False Economics of Agentless Security for Mobile Business, Bots, Mobile App Development, API Security Editor's note: This post was originally published in September 2022 in IDG TECH(talk). Agentless...