Open in app
Home
Notifications
Lists
Stories

Write
Wojciech Reguła
Wojciech Reguła

Home

Published in SecuRing

·Jan 12

Vulnerabilities and Threats in Local Authorization on iOS Devices — Securing

We present potential threats of performing local authorization on iOS. You will learn how to protect your resources against unauthorized access. TL;DR All checks done on the device can be bypassed Move access control logic to the server If you support in-app purchases always verify receipt server-server Context As the “mobile-first” slogan…

App Security

6 min read

Vulnerabilities and Threats in Local Authorization on iOS Devices — Securing
Vulnerabilities and Threats in Local Authorization on iOS Devices — Securing

Published in SecuRing

·Oct 7, 2021

Secure implementation of WebView in iOS applications — Securing

TL;DR Do not use UIWebView. Make sure your Info.plist doesn’t contain App Transport Security Exceptions. Follow the least privilege principle. Consider disabling JavaScript. Code JavaScript-ObjC/Swift bridges carefully. Follow good mobile application development practices -> see our Guidelines on mobile application security — iOS edition . Context Recently I had a chance to…

App Security

7 min read

Secure implementation of WebView in iOS applications — Securing
Secure implementation of WebView in iOS applications — Securing

Published in SecuRing

·Jun 8, 2021

Key aspects of secure networking on iOS — Securing

TL;DR Stop using HTTP, use HTTPS. App Transport Security exceptions shouldn’t be set on production environments. If you use third party networking libraries, verify the secure connection. For high risk applications, use certificate pinning. Always follow good mobile application development practices -> see our Guidelines on mobile application security — iOS…

I OS

6 min read

Key aspects of secure networking on iOS — Securing
Key aspects of secure networking on iOS — Securing

Published in SecuRing

·Apr 28, 2021

5 security tips for your macOS environment

Nowadays, Macs cannot be treated as a niche platform in companies. We meet Macs in all sized companies — from startups to big companies with thousands of employees. It’s not a big surprise that this fact was also noticed by attackers. During the security assessment, SecuRing team observed that usually…

Macos

3 min read

5 security tips for your macOS environment — Securing
5 security tips for your macOS environment — Securing

Published in SecuRing

·Apr 15, 2021

The secure way to store secrets on iOS devices

TL;DR Whenever possible, avoid storing secrets on the device. Keychain is the right place to store your small app’s secrets. Entries saved in the Keychain can be additionally protected by setting proper accessibility and authentication flags. Watch out what you synchronize with iCloud. Files stored in the application container can also…

App Security

5 min read

The secure way to store secrets on iOS devices — Securing
The secure way to store secrets on iOS devices — Securing

Published in SecuRing

·Jan 5, 2021

Stealing your app’s keychain entries from locked iPhone

What is the Keychain? Keychain is essentially the safest place on your phone in terms of storing data. It is used by developers to store passwords, certificates, identities, or other keys in many forms. It is quickly adopted and many developers already understand how important it is to keep the most sensitive data in…

App Security

7 min read

Stealing your app’s keychain entries from locked iPhone
Stealing your app’s keychain entries from locked iPhone

Published in SecuRing

·Dec 9, 2020

Local Privilege Escalation in macOS infrastructure

MacOS infrastructure Apple devices have been present in the companies for a long time. Wherever there is a need to deploy iOS applications, testers and programmers have to use Macs. UX/UI designers and movie editors use Macs for apps that have only Apple versions. It is also worth noting that Macs are…

Security Testing

3 min read

Local Privilege Escalation in macOS infrastructure
Local Privilege Escalation in macOS infrastructure

Published in SecuRing

·Aug 13, 2020

Why is jailbreak detection important? — COVID apps case

Some time ago I got stuck in the USA because of the COVID-19. After coming back to Poland with the “evacuation flight” I had to undergo mandatory quarantine for 14 days. Every day the Polish Police was visiting me and checking if I’m sitting at home and don’t go outside…

App Security

4 min read

Why is jailbreak detection important? — COVID apps case
Why is jailbreak detection important? — COVID apps case

Published in SecuRing

·Jan 27, 2020

Bypassing your apps’ biometric checks on iOS

Using iOS biometrics features like Touch ID and Face ID is a really convenient way to authenticate a user before performing sensitive actions. These actions, of course, depend on apps’ features. Usually, we test apps that use TouchID/FaceID to log in and to confirm financial actions (e.g. wire transfer). …

I OS

2 min read

Bypassing your apps’ biometric checks on iOS
Bypassing your apps’ biometric checks on iOS

Published in SecuRing

·May 20, 2019

Implementing anti-tampering mechanism in iOS apps

Security is a topic that should be considered also by iOS developers. Since the platform cannot be treated as 100% secure, devs and security division need to create a separate threat model for mobile applications. For all the years when iOS exists, many different types of application vulnerabilities have been…

I OS

2 min read

Implementing anti-tampering mechanism in iOS apps
Implementing anti-tampering mechanism in iOS apps
Wojciech Reguła

Wojciech Reguła

Web apps / iOS / macOS security & blogger — https://wojciechregula.blog

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable