26 May, 2022 How Can I Protect My Mobile API? Mobile App Authentication, Bots, Reverse Engineering, Mobile App Development As any mobile developer knows, APIs are the foundation of any mobile app strategy. They allow...
18 May, 2022 What Are the Most Common Types of Mobile Man-in-the-Middle Attacks? API Keys, MitM Attack, Certificate Pinning, API Abuse A Man-in-the-Middle attack can come in multiple forms. This article describes these and how you can...
17 May, 2022 What Does Certificate Pinning Protect Against? Mobile App Development, MitM Attack, Certificate Pinning, API Abuse Certificate pinning is a security measure that mobile app developers can use to improve the...
17 May, 2022 How is Certificate Pinning Done? Threats, Mobile App Development, MitM Attack, Certificate Pinning Certificate Pinning is a security technique that involves binding a cryptographic certificate to a...
12 May, 2022 The Risks & Rewards of Travel by Mobile API Keys, Business, Mobile App Authentication, Mobile App Development After a couple of false starts, we are finally emerging from behind the shadow of the Covid...
22 February, 2022 Shielding APIs that Service Mobile Apps: Part 3 - How? Mobile App Authentication, Bots, Reverse Engineering, Threats In the third part of this article series, we will look at the component parts of a shielding...