Technical
Top 4 Mobile App Security Trends for 2024
10 minute read | November 29, 2023The year is coming to a close, and now is the perfect time to consider where mobile app security is headed and what Guardsquare recommends mobile app developers and security pros should focus on in 2024.
Read MoreFilter by Topic
Technical
6 min read
| September 6, 2023
Android Security Misconceptions: Storing Keys & Secrets in Native Code
Read More
Technical
6 min read
| August 8, 2023
Android Security and Obfuscation Realities of R8
Read More
Android
9 min read
| May 9, 2023
Protecting Against StrandHogg
Read More
Android
6 min read
| March 28, 2023
Protecting Against Android Overlay Attacks
Read More
Technical
5 min read
| February 14, 2023
Why You Need Both Pentesting and Mobile App Security Testing
Read More
Technical
18 min read
| December 13, 2022
Phases of a Mobile App Attack, Part 2: The Attacker’s POV
Read More
Technical
13 min read
| November 15, 2022
Call Graphs: The Bread and Butter of Program Analysis
Read More
Android
15 min read
| November 2, 2022
How Development Skills Translate to Reverse Engineering: Using LLDB to Reverse Engineer an Android App
Read More
Unseen Dangers: Hidden Mobile App Security Risks in Android Libraries
https://www.guardsquare.com/blog/hidden-mobile-app-security-risks-in-android-libraries-guardsquare
Android Security Misconceptions: Storing Keys & Secrets in Native Code
https://www.guardsquare.com/blog/android-security-misconceptions
Android Security and Obfuscation Realities of R8
https://www.guardsquare.com/blog/android-security-and-obfuscation-realities-of-r8
Protecting Against StrandHogg
https://www.guardsquare.com/blog/protecting-against-strandhogg
Protecting Against Android Overlay Attacks
https://www.guardsquare.com/blog/protecting-against-android-overlay-attacks-guardsquare
Why You Need Both Pentesting and Mobile App Security Testing
https://www.guardsquare.com/blog/the-difference-between-mobile-app-security-testing-and-pen-testing-and-why-you-need-both
Phases of a Mobile App Attack, Part 2: The Attacker’s POV
https://www.guardsquare.com/blog/mobile-app-attack-phases-part-2
Call Graphs: The Bread and Butter of Program Analysis
https://www.guardsquare.com/blog/call-graphs-the-bread-and-butter-of-program-analysis
How Development Skills Translate to Reverse Engineering: Using LLDB to Reverse Engineer an Android App
https://www.guardsquare.com/blog/how-development-skills-translate-to-reverse-engineering