10 October, 2022 How Do I Protect My Flutter App? Reverse Engineering, Mobile App Development, MitM Attack, API Security Google’s open source Flutter has quickly become one of the most popular development toolkits for...
27 June, 2022 How Should API Keys be Stored? API Keys, Reverse Engineering, Mobile App Development, API Abuse Mobile app developers keep hearing that they shouldn’t store API keys in their app code but they...
26 May, 2022 How Can I Protect My Mobile API? Mobile App Authentication, Bots, Reverse Engineering, Mobile App Development As any mobile developer knows, APIs are the foundation of any mobile app strategy. They allow...
23 May, 2022 When To Add Security To Your New Mobile App Business, Mobile App Authentication, Reverse Engineering, Mobile App Development Whether you are a brand new company bringing a mobile-centric digital service to market, or an...
19 April, 2022 What Is In-App Protection? Bots, Repackaged Apps, Reverse Engineering, Threats In-app protection refers to the security features built into mobile apps. These features help...
5 April, 2022 What is Mobile App Shielding? Repackaged Apps, Reverse Engineering, Threats, Mobile App Development As mobile devices become increasingly popular in the workplace, so do attacks targeting mobile...