How to Prevent API Abuse on Mobile Apps

How to Prevent API Abuse on Mobile Apps

API abuse is a growing concern in today's digital landscape, with criminals finding new and innovative ways to exploit APIs for their own gain. According to a recent study by Salt Security, "malicious API attack traffic surged 117% over the past year, from an average of 12.22 million malicious calls ... Read More
Can I Share My API Key?

Can I Share My API Key?

An API key is a token provided by a client when making API calls. It is used to authenticate and authorize access to specific resources. In this article, we answer the question, "Can I share my API key?" and provide some guidance on when it is appropriate to do so ... Read More
What is SafetyNet and How Does it Improve Android Security?

What is SafetyNet and How Does it Improve Android Security?

The Google SafetyNet API is a service for verifying the trustworthiness of the Android operating system on a given device mobile device. In this article we will look at the security it brings and how that will change as it is replaced by Google’s Play Integrity API ... Read More
Securing Mobile Gambling Platforms

Securing Mobile Gambling Platforms

Gambling has come a long way since the days of visiting a bricks and mortar outlet and filling in some paperwork to bet on a small set of events and outcomes. Recent years have seen dramatic changes in this market. In this article we’ll look at how it has evolved ... Read More
How Do I Protect My Flutter App?

How Do I Protect My Flutter App?

Google’s open source Flutter has quickly become one of the most popular development toolkits for building cross platform mobile applications. In this article we will examine what security is built-in to Flutter mobile apps and recommend additional layers which you may wish to consider for your mobile projects ... Read More
The False Economics of Agentless Security for Mobile

The False Economics of Agentless Security for Mobile

Editor's note: This post was originally published in September 2022 in IDG TECH(talk). Agentless security for mobile is an approach that promises businesses protection from attack without having to add any security related software into their mobile apps. In this article we will look at the pros and cons of ... Read More
Securing Electric Vehicle Charging Platforms

Securing Electric Vehicle Charging Platforms

Spikes in the prices of fossil fuels have provided yet another incentive for consumers to move towards electric vehicles (EVs). Alongside that trend is the pressing requirement to have a charging infrastructure which provides enough capacity to satisfy this need. In this article we will explore how EV charging platforms ... Read More
How Do I Make My API Gateway Secure?

How Do I Make My API Gateway Secure?

An API Gateway is a tool that manages APIs and API traffic. Essentially it sits between remote clients (servers, browsers, mobile apps) and backend services and is responsible for routing API requests in either direction to the right source. It provides a degree of protection out of the box and ... Read More
How Can Bots Be Prevented?

How Can Bots Be Prevented?

This blog explains bot attacks in detail, how to distinguish good from bad bots, and explains how to let good bots do their useful work while preventing bad bots from doing any damage. It also explains why bot attacks on and by mobile apps are particularly problematic and require special ... Read More
What is Bot Protection?

What is Bot Protection?

If you're a mobile app developer, chances are you've heard of bot protection. Bots are programs that run automated tasks over the internet. Although criminals can use them for malicious purposes, such as spamming or denial of service attacks, they can also be used for legitimate tasks, such as web ... Read More