27 October, 2023 The Critical Need to Defend Against Unauthorized Apps Business, Repackaged Apps, Reverse Engineering, Mobile App Development Safeguarding Security and Integrity: In today's digital landscape, mobile applications have become...
2 December, 2022 How to Prevent API Abuse on Mobile Apps Mobile App Authentication, Bots, Repackaged Apps, Reverse Engineering API abuse is a growing concern in today's digital landscape, with criminals finding new and...
27 May, 2022 How to Prevent API Abuse API Keys, Fake Accounts, Mobile App Authentication, Repackaged Apps API abuse, when the API is used in an unexpected way, is a growing problem in software development...
19 April, 2022 What Is In-App Protection? Bots, Repackaged Apps, Reverse Engineering, Threats In-app protection refers to the security features built into mobile apps. These features help...
5 April, 2022 What is Mobile App Shielding? Repackaged Apps, Reverse Engineering, Threats, Mobile App Development As mobile devices become increasingly popular in the workplace, so do attacks targeting mobile...
25 November, 2021 How to Defend against App Impersonation Mobile App Authentication, Repackaged Apps, API Abuse, API Security Editor's note: This post was originally published in November 2021 in ThreatPost Most users who...