Posts by Guardsquare
Attack techniques overview
| October 21, 2025Recently, a new pixel stealing attack called Pixnapping has been demonstrated by researchers. The attack successfully leaked secrets from Android apps such as Google Authenticator through a timing side-channel attributable to GPU graphical data...
Read MoreFilter by Topic
About Guardsquare
4 min read
| October 21, 2025
View hiding and restoring
Read More
1 min read
| September 30, 2025
Welcome to Guardsquare's Security Research Center
Read More
2 min read
| September 28, 2025
What is Credential Theft?
Read More
5 min read
| September 28, 2025
Credential theft: Defense techniques
Read More
2 min read
| September 28, 2025
What is Session Hijacking?
Read More
1 min read
| September 28, 2025
Session hijacking: Defense techniques
Read More
2 min read
| September 28, 2025
What is Device Impersonation?
Read More
4 min read
| September 28, 2025
Device Impersonation: Defense Techniques
Read More
2 min read
| September 28, 2025
Device binding overview
Read More
Attack techniques overview
https://www.guardsquare.com/mobile-app-security-research-center/malware/pixnapping
View hiding and restoring
https://www.guardsquare.com/mobile-app-security-research-center/view-hiding-and-restoring-defense-guardsquare
Welcome to Guardsquare's Security Research Center
https://www.guardsquare.com/mobile-app-security-research-center/welcome
What is Credential Theft?
https://www.guardsquare.com/mobile-app-security-research-center/device-binding/credential-theft-attacks
Credential theft: Defense techniques
https://www.guardsquare.com/mobile-app-security-research-center/device-binding/credential-theft-defense
What is Session Hijacking?
https://www.guardsquare.com/mobile-app-security-research-center/device-binding/session-hijacking-attacks
Session hijacking: Defense techniques
https://www.guardsquare.com/mobile-app-security-research-center/device-binding/session-hijacking-defense
What is Device Impersonation?
https://www.guardsquare.com/mobile-app-security-research-center/device-binding/device-impersonation-attacks
Device Impersonation: Defense Techniques
https://www.guardsquare.com/mobile-app-security-research-center/device-binding/device-impersonation-defense
Device binding overview
https://www.guardsquare.com/mobile-app-security-research-center/device-binding/overview


