24 November, 2022 Is Certificate Pinning Worth it? TLS, Mobile App Development, MitM Attack, Certificate Pinning In a word - yes; when implemented correctly, certificate pinning is an effective method for...
10 October, 2022 How Do I Protect My Flutter App? Reverse Engineering, Mobile App Development, MitM Attack, API Security Google’s open source Flutter has quickly become one of the most popular development toolkits for...
27 May, 2022 How to Prevent API Abuse API Keys, Fake Accounts, Mobile App Authentication, Repackaged Apps API abuse, when the API is used in an unexpected way, is a growing problem in software development...
26 May, 2022 How Can I Protect My Mobile API? Mobile App Authentication, Bots, Reverse Engineering, Mobile App Development As any mobile developer knows, APIs are the foundation of any mobile app strategy. They allow...
18 May, 2022 What Are the Most Common Types of Mobile Man-in-the-Middle Attacks? API Keys, MitM Attack, Certificate Pinning, API Abuse A Man-in-the-Middle attack can come in multiple forms. This article describes these and how you can...
17 May, 2022 What Does Certificate Pinning Protect Against? Mobile App Development, MitM Attack, Certificate Pinning, API Abuse Certificate pinning is a security measure that mobile app developers can use to improve the...