Technical
Closing the Loophole of Custom Keyboards
8 minute read | February 21, 2024Custom keyboards are user controls that facilitate text entry in PCs, tablets, and mobile apps. They’re used worldwide and are especially helpful for languages with more characters than a standard Latin alphabet keyboard, such as Japanese, Chinese,...
Read more
11 min read
| October 3, 2023
Unseen Dangers: Hidden Mobile App Security Risks in Android Libraries
Android
Technical
AppSweep
Security testing
6 min read
| September 6, 2023
Android Security Misconceptions: Storing Keys & Secrets in Native Code
Technical
App Security Tips & Tricks
9 min read
| May 9, 2023
Protecting Against StrandHogg
Android
Technical
Protection
Dexguard
Security research
6 min read
| March 28, 2023
How to Protect Against Android Overlay Attacks
Android
Technical
Dexguard
Security research
7 min read
| March 21, 2023
Protecting Against Android Accessibility Services Threats
Android
Technical
Dexguard
Security research
18 min read
| December 13, 2022
Phases of a Mobile App Attack, Part 2: The Attacker’s POV
Technical
Protection
General
13 min read
| November 15, 2022
Call Graphs: The Bread and Butter of Program Analysis
Android
Technical
Dexguard
ProGuard & R8
15 min read
| November 2, 2022
How Development Skills Translate to Reverse Engineering: Using LLDB to Reverse Engineer an Android App
Android
Technical
30 min read
| October 11, 2022
How Classical Attacks Apply to Flutter™ Apps
Android
iOS
Technical
Protection
Hybrid frameworks
A Glance at the Current Financial Services Android Malware Landscape
https://www.guardsquare.com/blog/android-finserv-malware-landscape
Unseen Dangers: Hidden Mobile App Security Risks in Android Libraries
https://www.guardsquare.com/blog/hidden-mobile-app-security-risks-in-android-libraries-guardsquare
Android Security Misconceptions: Storing Keys & Secrets in Native Code
https://www.guardsquare.com/blog/android-security-misconceptions
Protecting Against StrandHogg
https://www.guardsquare.com/blog/protecting-against-strandhogg
How to Protect Against Android Overlay Attacks
https://www.guardsquare.com/blog/protecting-against-android-overlay-attacks-guardsquare
Protecting Against Android Accessibility Services Threats
https://www.guardsquare.com/blog/protecting-against-android-accessibility-services-threats
Phases of a Mobile App Attack, Part 2: The Attacker’s POV
https://www.guardsquare.com/blog/mobile-app-attack-phases-part-2
Call Graphs: The Bread and Butter of Program Analysis
https://www.guardsquare.com/blog/call-graphs-the-bread-and-butter-of-program-analysis
How Development Skills Translate to Reverse Engineering: Using LLDB to Reverse Engineer an Android App
https://www.guardsquare.com/blog/how-development-skills-translate-to-reverse-engineering
How Classical Attacks Apply to Flutter™ Apps
https://www.guardsquare.com/blog/how-classical-attacks-apply-to-flutter-apps
General Terms | Privacy Policy | Cookie Policy
Tervuursevest 362 bus 1, 3000 Leuven, Belgium |
VAT: BE0550675829 |
© 2016-2024 Guardsquare nv. All rights reserved.