mobilesecurity

Using SSL Pinning for Mobile App Security

The article will help developers and mobile application security specialists to understand how the process of attaching (pinning) SSL certificates works. We will focus on a helicopter view of network activity and for those who want to dive deeper we will provide...

The most common mobile application vulnerabilities

The most common mobile application vulnerabilities

Compared to web applications, the mobile ecosystem is a young technology, but it is a growing and dynamic segment, developing at a breakneck pace becoming more and more popular each year. According to a recent report, it is estimated that first-time app installs...