Dev sec blog

Dev Sec Blog

Build Better Mobile Fraud Prevention

In this Build Better Mobile Fraud Prevention Security blog series, we’ll share our mobile security research and cover the top methods and tools used against Android & iOS apps including synthetic fraud, spyware, overlay attacks, keylogging and non-human actions like auto clickers, fake events, fake accounts and fake transactions to circumvent protections and commit fraud. Understanding and defending against the growing diversity of mobile exploits and attacks is critical to ensuring mobile business integrity and an amazing mobile experience for all mobile users.

We’ll also share DevOps CI/CD and Data-Driven DevSecOps™ best practices, and highlight key operational and industry insights, to help you achieve mobile DevSecOps agility and follow mobile app protection best practices in CI/CD.

Subscribe today. We’d love to have you join our community!

Blog-Ransomware-Mobile-apps-are-the-Weak-link

Ransomware: Mobile Apps Are the Weak Link

Malware can harvest unprotected network information stored in mobile apps, allowing fraudsters to launch ransomware attacks on the back end. This makes mobile apps the weak link when protecting your networks from ransomware attacks.

Read More »
Blog How Fraudsters Use Screen Overlay Attacks To Commit Mobile Fraud

How Fraudsters Use Screen Overlay Attacks to Commit Mobile Fraud

A Screen Overlay Attack (sometimes also called Clickjacking) is an attack method whereby bad actors and fraudsters uses multiple transparent or opaque layers to trick a user into clicking on a button, window, or other UI element that is hidden underneath a fake screen that the attacker has placed on top of the real screen to hide it from view.

Read More »
How To Protect Banking Apps Against Mobile Banking Trojans In 2022 Blog

How to Protect Banking Apps Against Mobile Banking Trojans in 2022

Mobile Banking Trojans remain one of the biggest threats to mobile banking and mobile banking customers in 2022. In this blog mobile app developers and security professionals responsible for retail banking applications, can learn how to best protect their mobile banking apps against malware and trojans installed on the devices of their mobile banking customers.

Read More »
Blog 15 Reasons For Securing A Telco Mobile App

Top 15 Reasons for Securing a Telco Mobile App

A 30-70% drop in traffic. That’s, according to one CEO, the impact the pandemic had on in-person visits to local branches. So how did telecommunication companies address this drop in branch traffic? They have aggressively expanded the use cases in their telco mobile app. Learn how to secure these mobile apps to protect the mobile consumer.

Read More »
Blog-Ransomware-Mobile-apps-are-the-Weak-link

Ransomware: Mobile Apps Are the Weak Link

Malware can harvest unprotected network information stored in mobile apps, allowing fraudsters to launch ransomware attacks on the back end. This makes mobile apps the weak link when protecting your networks from ransomware attacks.

Read More »
Blog How Fraudsters Use Screen Overlay Attacks To Commit Mobile Fraud

How Fraudsters Use Screen Overlay Attacks to Commit Mobile Fraud

A Screen Overlay Attack (sometimes also called Clickjacking) is an attack method whereby bad actors and fraudsters uses multiple transparent or opaque layers to trick a user into clicking on a button, window, or other UI element that is hidden underneath a fake screen that the attacker has placed on top of the real screen to hide it from view.

Read More »
How To Protect Banking Apps Against Mobile Banking Trojans In 2022 Blog

How to Protect Banking Apps Against Mobile Banking Trojans in 2022

Mobile Banking Trojans remain one of the biggest threats to mobile banking and mobile banking customers in 2022. In this blog mobile app developers and security professionals responsible for retail banking applications, can learn how to best protect their mobile banking apps against malware and trojans installed on the devices of their mobile banking customers.

Read More »
Blog 15 Reasons For Securing A Telco Mobile App

Top 15 Reasons for Securing a Telco Mobile App

A 30-70% drop in traffic. That’s, according to one CEO, the impact the pandemic had on in-person visits to local branches. So how did telecommunication companies address this drop in branch traffic? They have aggressively expanded the use cases in their telco mobile app. Learn how to secure these mobile apps to protect the mobile consumer.

Read More »

Have a Security Project?

We Can Help!

HilaMaking your security project a success!
By filling out this form, you opt-in to recieve emails from us.

Stay up to date with the DevSecOps Evolution.

Subscribe to our Mobile DevSec Blogs