Technical
Tips for Overcoming the Cybersecurity Talent Gap
7 minute read | June 6, 2023In this blog, we explore:
Read MoreFilter by Topic
Android
6 min read
| March 28, 2023
Protecting Against Android Overlay Attacks
Read More
Technical
5 min read
| February 14, 2023
Why You Need Both Pentesting and Mobile App Security Testing
Read More
Technical
18 min read
| December 13, 2022
Phases of a Mobile App Attack, Part 2: The Attacker’s POV
Read More
Technical
13 min read
| November 15, 2022
Call Graphs: The Bread and Butter of Program Analysis
Read More
Android
15 min read
| November 2, 2022
How Development Skills Translate to Reverse Engineering: Using LLDB to Reverse Engineer an Android App
Read More
Technical
30 min read
| October 11, 2022
How Classical Attacks Apply to Flutter™ Apps
Read More
Technical
6 min read
| September 28, 2022
TrollStore Implications and Mitigations For Your iOS Application
Read More
Technical
10 min read
| September 13, 2022
The Four Phases of a Mobile Application Attack
Read More
Protecting Against StrandHogg
https://www.guardsquare.com/blog/protecting-against-strandhogg
Protecting Against Android Overlay Attacks
https://www.guardsquare.com/blog/protecting-against-android-overlay-attacks-guardsquare
Why You Need Both Pentesting and Mobile App Security Testing
https://www.guardsquare.com/blog/the-difference-between-mobile-app-security-testing-and-pen-testing-and-why-you-need-both
Phases of a Mobile App Attack, Part 2: The Attacker’s POV
https://www.guardsquare.com/blog/mobile-app-attack-phases-part-2
Call Graphs: The Bread and Butter of Program Analysis
https://www.guardsquare.com/blog/call-graphs-the-bread-and-butter-of-program-analysis
How Development Skills Translate to Reverse Engineering: Using LLDB to Reverse Engineer an Android App
https://www.guardsquare.com/blog/how-development-skills-translate-to-reverse-engineering
How Classical Attacks Apply to Flutter™ Apps
https://www.guardsquare.com/blog/how-classical-attacks-apply-to-flutter-apps
TrollStore Implications and Mitigations For Your iOS Application
https://www.guardsquare.com/blog/trollstore-mitigations-for-your-ios-application
The Four Phases of a Mobile Application Attack
https://www.guardsquare.com/blog/four-phases-of-a-mobile-application-attack