Appdome Dev Sec Blog

Dev Sec Blog

Achieve CoDi Compliance without coding

CoDi Compliance, No coding required - The Fastest Way to Secure Mexico's Mobile Banking Apps What is CoDi?  CoDi is a digital/mobile payment system developed and sponsored by the Bank of Mexico (aka: Banxico), Mexico’s central bank. Banxico launched the first phase of CoDi in [...]

By |2020-09-12T00:35:04+03:00September 3rd, 2020|

Mobile Developers Guide to Mobile App Security

I’m excited to blog about Appdome’s recently published “Mobile Developers’ Guide for Mobile App Security”. At Appdome we love helping developers solve the toughest problems in mobile app security, fast. And this guide is packed with extremely practical and useful content. Here’s a quick [...]

By |2020-09-09T19:05:14+03:00August 30th, 2020|

8 Reasons Mobile App Developers Love Appdome-DEV

Mobile app developers love coding 3rd party SDKs and APIs into their apps - said no app developer, ever If you're a mobile app developer and you can't wait to automate the integration of SDKs and APIs into your mobile apps, then Appdome is for [...]

By |2020-09-02T07:09:37+03:00August 29th, 2020|

Protecting Mobile Banking Customers in the Age of COVID-19

COVID-19 has brought with it a truly unprecedented time for the digital economy. To safeguard ourselves and stem the spread of the Coronavirus, we’re all being asked to do things virtually. To comply with health official’s mandates, many of us are already required to [...]

By |2020-08-27T00:32:37+03:00August 17th, 2020|

Stop Mobile Phishing Attacks in iOS and Android

Security tips for mobile app developers - Whitelisting to prevent phishing attacks Spending much of my career in the security industry, I’m a big fan of whitelisting mobile app security features because they works well when there are a finite number of systems to communicate [...]

By |2020-08-26T21:10:29+03:00August 12th, 2020|

SSL Certificate Validation and Pinning on Mobile Apps

Security tips for mobile application developers Like screenplay writers at Starbucks, SSL is everywhere. You would hope that SSL certificate validation and pinning would be everywhere too. Unfortunately, that’s not yet the case and a lack of SSL certificate validation and pinning weakens the [...]

By |2020-09-04T02:01:18+03:00August 10th, 2020|

No-code Mobile Data-at-Rest Encryption

Mobile data-at-rest encryption isn’t a new concept for CIOs or CISOs of financial institutions, or of any other enterprise for that matter. Cybercriminals have been targeting data-at-rest with specially developed malware, spyware and other methodologies. However, considering the unprecedented number of mobile apps and devices [...]

By |2020-08-12T01:17:20+03:00August 7th, 2020|

Prevent App Modifications with No-code Anti-Tampering

Adding tampering protection to Android and iOS apps is one of the first lines of defense to prevent unauthorized changes to your app (such as 'mods' and 'fakes'). Prevent App Modifications & Fakes with Anti-Tampering Hackers tamper with apps using many techniques and for [...]

By |2020-09-05T00:53:13+03:00August 6th, 2020|

Secure BYOD That Also Protects Mobile User Privacy

A growing number of enterprises that use BYOD programs are running into unexpected obstacles on the road to achieving total mobile data protection: Mobile User Privacy. Some users are implicitly circumventing the rules, while others are explicitly flaunting their rebellion. Either way, it's become [...]

By |2020-08-12T02:49:20+03:00August 5th, 2020|

Prevent Reverse Engineering with No-Code Obfuscation

Mobile app obfuscation is one of the best defenses to prevent reverse engineering of Android and iOS apps to thwart hacking attempts. Hackers use reverse engineering techniques, such as static and dynamic code analysis to learn how your app functions and to understand the app's [...]

By |2020-08-26T21:11:09+03:00August 5th, 2020|

Prevent Reverse Engineering with Anti-Debugging

Anti-debugging protection is one of the best defenses to prevent reverse engineering of Android and iOS apps to thwart hacking attempts. Hackers use reverse engineering techniques (such as static and dynamic code analysis) to learn how your app functions and to understand the app's logic. [...]

By |2020-08-26T21:11:20+03:00August 4th, 2020|