MitM Attack
How Do I Protect My Flutter App?
David Stewart | | Android Security, API security, API Security - Analysis, News and Insights, MitM Attack, mobile app development, Mobile Security, Reverse Engineering
Google’s open source Flutter has quickly become one of the most popular development toolkits for building cross platform mobile applications. In this article we will examine what security is built-in to Flutter ...
What are Bot Attacks?
David Stewart | | API Abuse, API security, API Security - Analysis, News and Insights, Bots, MitM Attack, mobile app development, Mobile Security, pentesting
In this day and age, it's more important than ever to make sure your mobile app - and the APIs it uses - are well-protected against bot attacks. Bot attacks can come ...
How to Prevent API Abuse
David Stewart | | API Abuse, API Keys, API Security - Analysis, News and Insights, Fake accounts, MitM Attack, Mobile App Authentication, mobile app development, Mobile Security, Repackaged Apps
API abuse, when the API is used in an unexpected way, is a growing problem in software development and one of the leading attack vectors cybercriminals exploit. According to a recent security ...
How Can I Protect My Mobile API?
David Stewart | | API Abuse, API Security - Analysis, News and Insights, Bots, certificate pinning, MitM Attack, Mobile App Authentication, mobile app development, Mobility, Reverse Engineering
As any mobile developer knows, APIs are the foundation of any mobile app strategy. They allow developers to quickly and efficiently access the data and functionality they need to build amazing apps ...
What Are the Most Common Types of Mobile Man-in-the-Middle Attacks?
David Stewart | | API Abuse, API Keys, API security, API Security - Analysis, News and Insights, certificate pinning, MitM Attack, Mobile Security
A Man-in-the-Middle attack can come in multiple forms. This article describes these and how you can mitigate such attacks ...
What Does Certificate Pinning Protect Against?
David Stewart | | API Abuse, API security, API Security - Analysis, News and Insights, certificate pinning, MitM Attack, mobile app development, Mobile Security
Certificate pinning is a security measure that mobile app developers can use to improve the security of their apps. It ensures that your app only connects with a backend API via TLS ...
How is Certificate Pinning Done?
David Stewart | | API Abuse, API security, API Security - Analysis, News and Insights, certificate pinning, MitM Attack, mobile app development, threats
Certificate Pinning is a security technique that involves binding a cryptographic certificate to a specific host or domain. This ensures that the app and server communications are protected from man-in-the-middle attacks. Developers ...
Shielding APIs that Service Mobile Apps: Part 1 – Why?
David Stewart | | account hijacking, API Abuse, API Security - Analysis, News and Insights, Business, MitM Attack, Mobile App Authentication, Mobile Security, threats
In this series of articles, we are going to explore the why, what, how and when of shielding APIs that service mobile apps. Increasingly, mobile represents a special case when it comes ...
Shielding APIs that Service Mobile Apps: Part 1 – Why?
David Stewart | | account hijacking, API Abuse, API Security - Analysis, News and Insights, Business, MitM Attack, Mobile App Authentication, Mobile Security, threats
In this series of articles, we are going to explore the why, what, how and when of shielding APIs that service mobile apps. Increasingly, mobile represents a special case when it comes ...
What is Bank-Grade Security and is it Enough for 2022?
David Stewart | | API Abuse, API Security - Analysis, News and Insights, aws, Business, certificate pinning, Fintech, MitM Attack, Mobile App Authentication, Mobile Security
Many digital companies describe their platforms as being protected by ‘bank-grade security’. In this article, we will examine what is meant by this term and whether or not you should be comforted ...