Whether you’re a novice mobile app developer, a seasoned mobile application security analyst or somewhere in between, here’s a roundup of 31 best practices to hone your secure coding and mobile appsec testing skills. You can find useful advice from NowSecure experts in our twice-monthly “All Things Mobile DevSecOps” newsletter — subscribe now to be in the know.
Enterprise software companies are building mobile apps that feature innovative technologies such as artificial intelligence (AI), augmented reality (AR) and other emerging technologies. Incorporating these advanced features in mobile apps helps businesses improve services, enrich the customer experience and gain a competitive edge.
With the Android 11 preview beta being released last month, you may be scratching your head asking, “What did I miss in Android 10?” Developers will face a Nov. 2 deadline to update their mobile apps to accommodate a target SDK of Android API level 29 or higher. The addition of Scoped Storage ushers in noteworthy changes to external storage, otherwise known as public storage, SD card, shared storage, or emulated storage.
Mobile app security is critical to daily operations as remote work becomes the new reality. NowSecure tested the mobile app security and privacy of 25 mobile apps on iOS and Android platforms. See which mobile apps are the safest for remote workforce security.
Reverse engineering refers to the process of taking something apart to see how it works. The NowSecure Services team frequently performs reverse engineering on mobile apps to uncover security vulnerabilities and privacy flaws. This tutorial will help you master the basics of analyzing an Android app and knowing what to look for.
A keen focus on technology has helped fast casual company Sweetgreen expand across the nation. The company has plans to create a ‘food platform’ or integrated food system from supply chain all the way to delivery. Sweetgreen is but one example of mobile digital transformation that dramatically changes the way that companies interact with their customers, employees and partners. And attackers have taken notice of mobile.