In accordance with our Pandemic Plan, NowSecure is taking proactive steps to help ensure the health and safety of our personnel, customers and partners while maintaining continuity of our business operations. We are very focused on serving and supporting our customers through these challenging times. As companies move to remote work, mobile app security and privacy is now more important than ever. The attackers will not stop due to COVID-19 and sadly will attempt to exploit the situation.
Reverse engineering refers to the process of taking something apart to see how it works. The NowSecure Services team frequently performs reverse engineering on mobile apps to uncover security vulnerabilities and privacy flaws. This tutorial will help you master the basics of analyzing an Android app and knowing what to look for.
As a longtime innovator of automated mobile appsec testing software and services, NowSecure continues to embrace emerging technology by delivering the world’s first Interactive Application Security Testing (IAST) technology purpose-built for mobile. Sometimes called DAST 2.0 or the next generation of DAST by the security industry, this advancement provides security analysts and app developers with greater visibility into app vulnerabilities and privacy issues.
A keen focus on technology has helped fast casual company Sweetgreen expand across the nation. The company has plans to create a ‘food platform’ or integrated food system from supply chain all the way to delivery. Sweetgreen is but one example of mobile digital transformation that dramatically changes the way that companies interact with their customers, employees and partners. And attackers have taken notice of mobile.
What will 2020 hold for mobile application security? NowSecure predicts we’ll see an intensified focus on privacy, mobile DevSecOps gaining traction and ample activity around wearables and Internet of Things (IoT). Here are some of the mobile appsec trends and challenges that our experts anticipate we’ll see in 2020.
Many people have heard about mobile man-in-the-middle (MiTM) attacks but aren’t sure just exactly what they are or how they happen. Learn more including the development and security issues that can leave apps vulnerable to MiTM attacks, tips for testing and the layers of network defense that can help you avoid these issues.