Testing Appdome Build2Test-Secured Android Apps with Tricentis
This Knowledge Base article provides instructions on how to test Appdome-Secured Android Apps using Tricentis Device Cloud’s Live Testing suite, a versatile testing platform for web and mobile applications. Appdome seamlessly…
How to Use Secure Screen Cloaking in iOS Apps
…
How to Use Appdome’s Feature Strip Export Names in iOS SDKs
What are Export Names?
Export names in iOS SDKs serve as identifiers for symbols such as functions, variables, and classes, enabling these elements to be externally accessible from a…
How to Verify SDK Assets and Libs
What Are SDK Assets and Libraries?
Assets refer to various resources bundled with the SDK, which can include audio files, visuals, and other types of static data used by…
How to Prevent Stream Manipulation in Android Apps
…
How to Protect Android Apps Against Octo
What is Octo?
Octo is a highly sophisticated Android banking trojan designed to carry out financial fraud and identity theft. It spreads through malicious apps and phishing links, often…
How to Implement Obfuscate SDK Protect to Secure Mobile SDKs
What is Obfuscate SDK Protect Feature on Appdome?
Obfuscate SDK Protect is part of Appdome’s SDK Threat-Shielding suite, crafted specifically to conceal and protect Appdome’s unique code integrated within…
How to Protect Android Apps Against BianLian
What is BianLian?
BianLian is an insidious Android banking trojan primarily targeting users in China. It spreads through malicious apps and third-party stores, often disguised as legitimate applications. Once…
How to Encrypt Java Strings in Android SDKs
…
How to Defend Against MiTM (Man-in-the-Middle) Attacks in Mobile SDKs
Learn how to safeguard your mobile SDKs from Man-in-the-Middle (MitM) attacks, employing Appdome’s advanced security measures in a data-driven DevSecOps™ build system tailored for mobile SDK environments.
What are…
How to Protect Android Apps Against Anubis
What is Anubis?
Anubis is a sophisticated banking Trojan malware specifically targeting Android devices. Initially detected as a threat to financial information, it has since evolved, incorporating advanced features…
How to Disallow Non-System Overlays in Android Apps
…