2 April, 2020 Securing the Enterprise for Remote Work Business, Mobile App Authentication, Threats, MitM Attack At a time when the world could use some good news, any good news, the central health crisis...
15 October, 2019 How to Protect Against Certificate Pinning Bypassing Mobile App Authentication, Repackaged Apps, Reverse Engineering, Threats Editor's note: This post was originally published in October 2019 and has been revamped and updated...
27 April, 2019 Apple DeviceCheck and CriticalBlue Approov API Keys, Android, Mobile App Authentication, Repackaged Apps We are often asked by customers and prospects to compare our beloved Approov with Apple's...
22 December, 2018 The Top 6 Mobile API Protection Techniques - Are They Enough? API Keys, Mobile App Authentication, Scrapers, Bots APIs are a necessary and central part of the strategy of any digital business that wants to stay...
19 February, 2018 API Abuse in 2017 (Part 3) Business, CheatingAsAService, Aggregators, Threats Two particularly challenging forms of API abuse are Aggregation and Cheating as a Service. In both...
13 February, 2018 API Abuse in 2017 (Part 2) Business, Account Hijacking, Fake Accounts, Scrapers Our first batch of business level attacks are Data Scrapers and Account Hijack. We also take a look...