22 February, 2022 Shielding APIs that Service Mobile Apps: Part 3 - How? Mobile App Authentication, Bots, Reverse Engineering, Threats In the third part of this article series, we will look at the component parts of a shielding...
15 February, 2022 Shielding APIs that Service Mobile Apps: Part 2 - What? Mobile App Authentication, Bots, Reverse Engineering, Threats In the second part of this article series, we are going to explore what shielding of APIs connected...
20 January, 2022 Hacking Financial APIs - New Report, Familiar Results API Keys, Business, Reverse Engineering, Fintech Alissa Knight’s latest security research report “Scorched Earth” was recently released. In this...
16 February, 2021 Building Your Gold Standard For Account Access Mobile App Authentication, Bots, Reverse Engineering, Fintech In this article we are going to look at the key use cases you should consider around protecting...
6 January, 2021 Man-in-the-Middle (MitM): Myths and Legends API Keys, Android, iOS, Scrapers Man-in-the-Middle (MitM), or more correctly Person-in-the-Middle, is the technique of inserting...
4 December, 2020 Securing API Keys for Robust Mobile API Security Bots, Repackaged Apps, Reverse Engineering, Threats It’s been nearly half a decade since Gartner declared the API economy open, hailing it the enabler...