Is Certificate Pinning Worth it?

Is Certificate Pinning Worth it?

In a word - yes; when implemented correctly, certificate pinning is an effective method for securing mobile application traffic by restricting the accepted certificates to just those you are willing to trust ...
How Can I Protect My Mobile API?

How Can I Protect My Mobile API?

As any mobile developer knows, APIs are the foundation of any mobile app strategy. They allow developers to quickly and efficiently access the data and functionality they need to build amazing apps ...
What Are the Most Common Types of Mobile Man-in-the-Middle Attacks?

What Are the Most Common Types of Mobile Man-in-the-Middle Attacks?

A Man-in-the-Middle attack can come in multiple forms. This article describes these and how you can mitigate such attacks ...
What Does Certificate Pinning Protect Against?

What Does Certificate Pinning Protect Against?

Certificate pinning is a security measure that mobile app developers can use to improve the security of their apps. It ensures that your app only connects with a backend API via TLS ...
How is Certificate Pinning Done?

How is Certificate Pinning Done?

Certificate Pinning is a security technique that involves binding a cryptographic certificate to a specific host or domain. This ensures that the app and server communications are protected from man-in-the-middle attacks. Developers ...
The Risks & Rewards of Travel by Mobile

The Risks & Rewards of Travel by Mobile

    After a couple of false starts, we are finally emerging from behind the shadow of the Covid pandemic. Some businesses prospered explosively during it as people suddenly needed to access ...
Shielding APIs that Service Mobile Apps: Part 3 - How?

Shielding APIs that Service Mobile Apps: Part 3 – How?

In the third part of this article series, we will look at the component parts of a shielding approach for APIs which service mobile apps and provide some guidance about what to ...
Shielding APIs that Service Mobile Apps: Part 3 - How?

Shielding APIs that Service Mobile Apps: Part 3 – How?

In the third part of this article series, we will look at the component parts of a shielding approach for APIs which service mobile apps and provide some guidance about what to ...
Shielding APIs that Service Mobile Apps: Part 2 - What?

Shielding APIs that Service Mobile Apps: Part 2 – What?

In the second part of this article series, we are going to explore what shielding of APIs connected to mobile apps actually means. To provide some context, we will also look at ...
Shielding APIs that Service Mobile Apps: Part 2 - What?

Shielding APIs that Service Mobile Apps: Part 2 – What?

In the second part of this article series, we are going to explore what shielding of APIs connected to mobile apps actually means. To provide some context, we will also look at ...