Reverse engineering and tampering attacks threaten every mobile app, yet many apps apply basic code hardening techniques (or none at all!) to defend against these attempts. In fact, research has shown ...
Attackers are increasingly changing up the techniques used to obfuscate what their software is doing, with one group hiding parts of their code using a variety of techniques swapped out every 37 days ...
A relatively new cyber-espionage group is using an intriguing custom arsenal of tools and techniques to compromise companies and governments in Southeast Asia, the Middle East, and southern Africa, ...
Today's modern consumer uses mobile apps for every aspect of their lives - from banking to buying concert tickets - even dating! As digital nomads, we rely heavily on mobile applications to entertain, ...
What does the demise of bitcode mean for the future of application security? Your email has been sent For app developers, Low-Level Virtual Machine bitcode has been a staple of Apple’s toolchain and ...