95% OF MOBILE APPS FAIL THE OWASP MASVS INDUSTRY STANDARD FOR MOBILE SECURITY FINDS NOWSECURE INDUSTRY BENCHMARK

Major mobile app security gaps place millions of mobile app users at risk, demonstrating that current security and privacy methods are not working and change is needed to protect the consumer.

Media Announcement
95% OF MOBILE APPS FAIL THE OWASP MASVS INDUSTRY STANDARD FOR MOBILE SECURITY FINDS NOWSECURE INDUSTRY BENCHMARK 95% OF MOBILE APPS FAIL THE OWASP MASVS INDUSTRY STANDARD FOR MOBILE SECURITY FINDS NOWSECURE INDUSTRY BENCHMARK Show More
magnifying glass icon

How to Protect Mobile Apps from MiTM Attacks

Posted by

Rono Dasgupta

Mobile Security Analyst
At NowSecure, Rono finds vulnerabilities in mobile technology and attempts to exploit them. He is passionate about helping developers understand and improve the security of their products and systems. Rono holds a master's degree in security informatics from Johns Hopkins University.

Nearly all mobile apps interact with backend systems and require secure communications. One best practice for developers to safeguard network communications is to implement certificate pinning in their apps. Certificate pinning protects against attackers intercepting sensitive data via man-in-the-middle (MiTM) attacks.

Download this practical guide to learn:

  • All about MiTM attacks
  • When and why to use cert pinning in Android and iOS apps
  • The three types of certificates
  • How to test and maintain cert pinning in your mobile app.