Łukasz BobrekinSecuRingCloud Shared Responsibility Model explainedThe cloud computing is the future, and many companies are moving their workloads to the cloud. However, there is a general misconception…Apr 14, 2023Apr 14, 2023
Łukasz BobrekinSecuRingStoring secrets in Android applicationsWhat is the best place to keep your secrets secure on Android devices? This article shows available methods and our security…Mar 8, 20221Mar 8, 20221
Łukasz BobrekinSecuRingPrevent Reverse Engineering (RE) of your Android applicationFrom this article, you’ll learn how to implement protection measures against reverse engineering in your android application.Mar 7, 20221Mar 7, 20221
Łukasz BobrekinSecuRingWebView security issues in Android applicationsWebView is in common use in Android applications. Here you will find tips on how to use WebView with security in mind.Nov 8, 2021Nov 8, 2021
Łukasz BobrekinSecuRingHow to force Android devices to communicate securely?Secure network communication is one of the most critical aspects of mobile application development. In this article, you will find tips on…Oct 20, 2021Oct 20, 2021
Łukasz BobrekinSecuRingSecurity Features in Financial Applications — our recommendationsThis article is an introduction to our open source project: Financial Application Features Security Guide (FAFSG).Sep 2, 2021Sep 2, 2021
Łukasz BobrekinSecuRingThe twisted world of Android Instance Identifiers and how to deal with itThe purpose of this article is to make you aware of the risks associated with improper usage of instance identifiers.May 28, 2021May 28, 2021
Łukasz BobrekinSecuRingHackers vs root detection on AndroidSince the beginning of time, security researchers and hackers are in need of bypassing root detection mechanisms in Android apps…Mar 10, 2021Mar 10, 2021