Dev sec blog

Dev Sec Blog

Welcome to the Mobile Security Solutions from Appdome Blog Series.

We created this series for anyone looking to increase their overall knowledge of all the mobile security solutions Appdome has to offer. Please subscribe to our blog to stay in the know.

Blog How Fraudsters Use Screen Overlay Attacks To Commit Mobile Fraud

How Fraudsters Use Screen Overlay Attacks to Commit Mobile Fraud

A Screen Overlay Attack (sometimes also called Clickjacking) is an attack method whereby bad actors and fraudsters uses multiple transparent or opaque layers to trick a user into clicking on a button, window, or other UI element that is hidden underneath a fake screen that the attacker has placed on top of the real screen to hide it from view.

Read More »
Blog 15 Reasons For Securing A Telco Mobile App

15 Reasons for Securing a Telco Mobile App

A 30-70% drop in traffic. That’s, according to one CEO, the impact the pandemic had on in-person visits to local branches. So how did telecommunication companies address this drop in branch traffic? They have aggressively expanded the use cases in their telco mobile app. Learn how to secure these mobile apps to protect the mobile consumer.

Read More »
Blog How Fraudsters Use Screen Overlay Attacks To Commit Mobile Fraud

How Fraudsters Use Screen Overlay Attacks to Commit Mobile Fraud

A Screen Overlay Attack (sometimes also called Clickjacking) is an attack method whereby bad actors and fraudsters uses multiple transparent or opaque layers to trick a user into clicking on a button, window, or other UI element that is hidden underneath a fake screen that the attacker has placed on top of the real screen to hide it from view.

Read More »
Blog 15 Reasons For Securing A Telco Mobile App

15 Reasons for Securing a Telco Mobile App

A 30-70% drop in traffic. That’s, according to one CEO, the impact the pandemic had on in-person visits to local branches. So how did telecommunication companies address this drop in branch traffic? They have aggressively expanded the use cases in their telco mobile app. Learn how to secure these mobile apps to protect the mobile consumer.

Read More »

Have a Security Project?

We Can Help!

JohnMaking your security project a success!
By filling out this form, you opt-in to recieve emails from us.
Skip to content