PinnedPublished inThe StartupNative vs Non-Native Mobile Apps — What’s the Difference?Working in mobile security over the last 5 years I often hear some combination or variant the following questions:Oct 25, 20203Oct 25, 20203
PinnedPublished inThe StartupHow to Prevent MFA Bypass in Mobile AppsIn this blog post, I’ll discuss how to prevent MFA Bypass attacks that cybercriminals use to compromise iOS and Android apps.Sep 28, 20202Sep 28, 20202
Shifting Dynamics in Mobile Fraud Prevention: A Call for Developer ResponsibilityIn an era dominated by mobile technology, the convenience of smartphones and mobile apps comes hand in hand with the rising threat of…Aug 31Aug 31
Eliminating Information Asymmetry in the Attack Chain With GenAIUnderstanding Information Asymmetry in the Attack ChainJul 30Jul 30
Preventing Living Off the Land Attacks on iOS and Android AppsFor brands that rely on Android and iOS apps as a key part of their business (which is most brands today), protecting the information…May 31, 2023May 31, 2023
How to Prevent Malicious Use of Parallel Space and Virtual Space apps?Parallel Space is a popular virtualization app that allows mobile users to make clones of Android apps and cheat mobile games.Oct 22, 20222Oct 22, 20222
What “Shift Left” security really means for SDK VendorsShift left your application security. Just press the pause button on your continuous delivery pipeline and ask your developers to download…Apr 8, 2022Apr 8, 2022
How to Secure Crypto Wallets and other eWallet AppsIn this blog post, I’ll discuss the security implications of crypto wallets and offer some tips to mobile developers on how to secure…Jan 20, 20221Jan 20, 20221
What is a Mobile SDK Anyway?This is a multi-part blog series on mobile SDKs. I’ll describe mobile SDKs from a comprehensive standpoint and answer all the burning…Aug 14, 20211Aug 14, 20211