Skip to content
APP SECURITY INSIGHTS

APP SECURITY INSIGHTS

Discover security weaknesses from an attacker’s perspective

High Profile Security Breaches: e-Commerce Industry

A hack can take a business at its peak and drive it into the ground. High profile security breaches target multinational conglomerates and large national corporations, since those businesses are the ones most likely to have something of value to steal. But don’t be fooled: every business, every app, and every developer is a potential target. For every high profile...

Categories Cyber Breach/Security Breach/Security Threats

High Profile Security Breaches: Finance Industry

It seems every time you turn on the news, you hear about another high profile security breach. And yet most people still won’t take even the most basic steps to secure their apps, online accounts, and mobile devices. We always think it won’t happen to us — until it does. Small businesses and app developers aren’t very different. They’re constantly...

Categories Cyber Breach

How to Easily Secure your Powerful Mobile Application

Think your mobile application is secure because users must use a password, or because you use some encryption? Think again. Mobile application security is constantly evolving. This makes it a complex undertaking demanding ongoing attention. It’s not something you can just set and forget.

Categories Mobile Application Security

What is the Mobile Application Security Verification Standard

Anyone familiar with what we do here at AppSolid knows how much we value mobile application security. It is, after all, our business to increase the knowledge base and protection of today’s mobile applications. In fact, the need for comprehensive security measures has never been stronger, with cyberattacks seemingly occurring more often than ever before.

Categories MASVS

When should you test your Applications Security?

When you are building a mobile application, it is essential that you take the necessary steps to test all aspects of it. The internet is an incredibly insecure place and it is very easy for people’s privacy to be compromised if their devices are not properly protected. When it comes to application security, testing isn’t a one and done process.

Categories Application Security

The Evolution of Mobile Application Security

Mobile application security. If you’re an app developer, this term should not only be familiar to you but should actively inform every step of your development. In recent years, mobile devices like smart phones and tablets have become such an essential part of everyday life that research shows smart phones in particular are the predominant tools consumers use to connect...

Categories Mobile Application Security

How Mobile Application Security is making the World a Better Place

You know that your clients care about mobile application security, and perhaps a commitment to security has even become a way to set yourself apart from the competition. Yet it’s easy for mobile application security to become little more than another industry buzzword. Securing the apps you develop is good for business — both yours and others. It’s also good...

Categories Mobile Application Security

What is App Wrapping?

The mobile app economy is growing rapidly. The convenience of using apps has made it so everyone is trying to come up with the best new functional app for society. Yet, many developers are being faced with the awakening of what an insecure app can cost them.

Categories App Wrapping

Android vs iOS – Which Platform Has Better Mobile Security?

When it comes to phones, users are divided. On one side there are people who are adamant that Android phones are the absolute best thing a person could ever purchase to make calls and watch cat videos. On the other side, there are those that are faithful as can be to iOS phones — even when the prices skyrocket and...

Categories Android Mobile Security/iOS Mobile Security

What Is The Difference Between White Hat, Grey Hat, and Black Hat Hackers?

In the public imagination, hacking is inevitably a crime. Poorly socialized hackers lurk in basements across the globe, just itching to access a bank account or dream up a new Nigerian prince to steal identities. People more familiar with computer culture know that hacking, like so many other things, exists on a continuum.

Categories Hackers

Posts pagination

  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • …
  • 11
  • 12
  • »

Recent Posts

  • How Your Credentials Get Leaked and What Happens Next
  • Penetration Testing – Manual vs Automated
  • Operational Technology Security – the Security Blind Spot
  • 7 Common Mistakes in Penetration Testing
  • 10 Cost-Effective Security Tips for SMBs

Recent Comments

No comments to show.

Archives

  • March 2025
  • May 2020
  • April 2020
  • March 2020
  • November 2019
  • October 2019
  • September 2019
  • July 2019
  • May 2019
  • April 2019
  • February 2019
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016

Categories

  • Android
  • Android Mobile Security
  • Anti Hacking Software
  • APK
  • App Piracy
  • App Wrapping
  • Application Security
  • Application Shielding
  • Binary Code
  • Business
  • common web vulnerabilities
  • Connected Cars
  • cryptocurrency
  • Cyber Breach
  • cybercrime
  • cybersecurity
  • Encryption
  • fitness apps
  • Fuzzing
  • GAMAN
  • GDPR
  • Hackers
  • Hacking Threats
  • Independent App Developer
  • Insecure Data Storage
  • iOS Mobile Security
  • Isolation Forest
  • MASVS
  • Mobile App Developers
  • Mobile App Development
  • Mobile App Hacking
  • Mobile App Security
  • Mobile App Security Testing
  • Mobile Application Security
  • Mobile Apps
  • Mobile Security
  • Mobile Security Statistics
  • MWC2018
  • MWC2019
  • News
  • Obfuscation
  • Offensive Security
  • Penetration Testing
  • Pentoma
  • Ransomware Attack
  • RForge
  • SCIForest
  • SCIKITLearn
  • Security
  • Security Breach
  • Security Threats
  • Source Code
  • Uncategorized
  • Uncategorized
  • Unsupervised Learning
  • Vulnerability Scanning
  • web application security
  • web apps

©2025 APP SECURITY INSIGHTS

Copyright © 2022 SEW Inc. All Rights Reserved.

Back To Top