PinnedGUARDSQUAREinGUARDSQUAREAndroid Security MisconceptionsBy James Hamilton | This blog explains why you need to take a multi-layered approach to protecting your app and why complexity can be good.Sep 6, 2023Sep 6, 2023
GUARDSQUAREinGUARDSQUAREWhy App Protection Matters More than Ever for Mobile BankingBy Dario Dallefrate | This blog provides insights on mobile banking app security and provides recommendations on how to improve app…Jun 24Jun 24
GUARDSQUAREinGUARDSQUARERole of Obfuscation in Mobile App Protection Using Compiler DesignBy Jija Bhattacharya | This blog explores the importance of obfuscation in securing mobile applications.Jun 18Jun 18
GUARDSQUAREinGUARDSQUAREHow Mobile App Security Helps Reduce FraudBy Dario Dallefrate | This blog dives into fast payment fraud on mobile apps before providing proactive strategies developers can take.May 29May 29
GUARDSQUAREinGUARDSQUAREI Just Bypassed Your App’s Payment ProcessBy Jija Bhattacharya | This blog highlights the dangers of mobile app tampering and the importance of code hardening and runtime protection.May 17May 17
GUARDSQUAREinGUARDSQUARE10 Types of Man-in-the-Middle AttacksThis blog explores a comprehensive list of MiTM attacks & provides a list of action items to help mobile app developers protect against themMay 14May 14
GUARDSQUAREinGUARDSQUARE90% of Organizations Had a Mobile App Security Incident in the Last YearThis blog summarizes recent 2024 report of a survey of 500 mobile app security professionals conducted by research firm Vanson Bourne.Apr 26Apr 26
GUARDSQUAREinGUARDSQUARECompiler-Based Mobile App Security vs. App WrappersBy Sander Bogaert | This blog explores compiler- vs wrapper-based mobile app security solutions and how to choose the one for your use…Apr 24Apr 24
GUARDSQUAREinGUARDSQUAREWebinar Recap: How Android Malware Works and How to Protect Against ItBy Brian Adam Pratama | This blog summarizes a recent webinar on how Android Malware works and how to defend against it.Apr 9Apr 9
GUARDSQUAREinGUARDSQUAREResetting the Clock with Compiler-Based Tools in Mobile AppSecBy Jija Bhattacharya | This blog evaluates mobile app protection through the lens of polymorphism — resetting the clock for attackers.Apr 1Apr 1