What Are the Most Common Types of Mobile Man-in-the-Middle Attacks?

What Are the Most Common Types of Mobile Man-in-the-Middle Attacks?

A Man-in-the-Middle attack can come in multiple forms. This article describes these and how you can mitigate such attacks ...
What Does Certificate Pinning Protect Against?

What Does Certificate Pinning Protect Against?

Certificate pinning is a security measure that mobile app developers can use to improve the security of their apps. It ensures that your app only connects with a backend API via TLS ...
ransomware FCC Google mobile Cybersecurity Issues in Mobile App Development

Mobile Devices As Attack Vector for Ransomware

The amount of damage that can be done by a ransomware attack against a network is well known. We’ve seen the stories about hospitals, universities, and governments taken offline and the threats ...
Security Boulevard
What Is In-App Protection?

What Is In-App Protection?

In-app protection refers to the security features built into mobile apps. These features help protect the app and the data it contains from unauthorized access, theft, or tampering. Below, we discuss in-app ...
What is Mobile App Shielding?

What is Mobile App Shielding?

As mobile devices become increasingly popular in the workplace, so do attacks targeting mobile apps. In fact, according to a recent 2021 cybersecurity study by Checkpoint, 46% of organizations had at least ...
Shielding APIs that Service Mobile Apps: Part 4 - When?

Shielding APIs that Service Mobile Apps: Part 4 – When?

In the final part of this four part series, we’ll recommend what actions you should take and when you should take them in order to implement effective shielding of your mobile app ...
Shielding APIs that Service Mobile Apps: Part 4 - When?

Shielding APIs that Service Mobile Apps: Part 4 – When?

In the final part of this four part series, we’ll recommend what actions you should take and when you should take them in order to implement effective shielding of your mobile app ...
Consumers demand cybersecurity. Can you afford not to provide it?

Consumers demand cybersecurity. Can you afford not to provide it?

If you had asked 8,000 global subscribers about mobile security and parental controls, what do you think they would say? Is mobile security important? Who do they trust to keep them secure ...
Shielding APIs that Service Mobile Apps: Part 3 - How?

Shielding APIs that Service Mobile Apps: Part 3 – How?

In the third part of this article series, we will look at the component parts of a shielding approach for APIs which service mobile apps and provide some guidance about what to ...
Shielding APIs that Service Mobile Apps: Part 3 - How?

Shielding APIs that Service Mobile Apps: Part 3 – How?

In the third part of this article series, we will look at the component parts of a shielding approach for APIs which service mobile apps and provide some guidance about what to ...