Technical
8 min read
| January 23, 2024
A Glance at the Current Financial Services Android Malware Landscape
Android
Technical
Protection
Financial services
6 min read
| October 3, 2023
Android App Vulnerabilities: Hidden Mobile App Security Risks
Android
Technical
AppSweep
Security testing
3 min read
| September 6, 2023
How to Secure Android App Code: Storing Keys & Secrets
Technical
App Security Tips & Tricks
5 min read
| May 9, 2023
Protecting Against StrandHogg
Android
Technical
Protection
Dexguard
Security research
4 min read
| March 28, 2023
Android Overlay Attacks How To Protect Against Them
Android
Technical
Dexguard
Security research
4 min read
| March 21, 2023
How to Protect the Android Accessibility Service
Android
Technical
Dexguard
Security research
6 min read
| December 13, 2022
Phases of a Mobile App Attack, Part 2: The Attacker’s POV
Technical
Protection
General
5 min read
| November 15, 2022
Call Graphs: The Bread and Butter of Program Analysis
Android
Technical
Dexguard
ProGuard & R8
6 min read
| November 2, 2022
How Development Skills Translate to Reverse Engineering: Using LLDB to Reverse Engineer an Android App
Android
Technical
Why Your IntelliJ AI Assistant Needs a Security Sidekick
https://www.guardsquare.com/blog/ai-coding-assistant-mast
A Glance at the Current Financial Services Android Malware Landscape
https://www.guardsquare.com/blog/android-finserv-malware-landscape
Android App Vulnerabilities: Hidden Mobile App Security Risks
https://www.guardsquare.com/blog/hidden-mobile-app-security-risks-in-android-libraries-guardsquare
How to Secure Android App Code: Storing Keys & Secrets
https://www.guardsquare.com/blog/android-security-misconceptions
Protecting Against StrandHogg
https://www.guardsquare.com/blog/protecting-against-strandhogg
Android Overlay Attacks How To Protect Against Them
https://www.guardsquare.com/blog/protecting-against-android-overlay-attacks-guardsquare
How to Protect the Android Accessibility Service
https://www.guardsquare.com/blog/protecting-against-android-accessibility-services-threats
Phases of a Mobile App Attack, Part 2: The Attacker’s POV
https://www.guardsquare.com/blog/mobile-app-attack-phases-part-2
Call Graphs: The Bread and Butter of Program Analysis
https://www.guardsquare.com/blog/call-graphs-the-bread-and-butter-of-program-analysis
How Development Skills Translate to Reverse Engineering: Using LLDB to Reverse Engineer an Android App
https://www.guardsquare.com/blog/how-development-skills-translate-to-reverse-engineering
General Terms | Privacy Policy | Cookie Policy | Security
Tervuursevest 362 bus 1, 3000 Leuven, Belgium |
VAT: BE0550675829 |
© 2016-2025 Guardsquare nv. All rights reserved.


