man-in-the-middle

Appdome Verifies Hostnames in Certificate Pinning Used in Mobile Apps and Prevents MiTM Attacks

January 09, 2018
There’s never a dull moment on the mobile security front. Several large, consumer-facing, banking apps recently made the news. It turns out that some of their apps were not verifying hostnames in their certificate pinning schemes.

Tags: MitM, Man in the Middle, mobile security, android app, CA certificate, ios app, secure communication, SSL certificate, certificate pinning

Man in the Middle Attacks (MiTM) on Mobile Apps

October 05, 2016
Man in the middle attacks (MiTM) are a popular method for hackers to get between a sender and a receiver. MiTM attacks, which are a form of session hijacking are not new. However, what might not be known is that mobile devices are vulnerable to MiTM attacks too. In particular, mobile apps are vulnerable to MiTM attacks.

Tags: Data Protection, mobile applications, MitM, Data Breach, Mobile threats, Security, Man in the Middle, mobile security, android app, iOS security, CA certificate, ios app, Android security, SSL certificate, whitelisting, certificate pinning, certificate validation

Gartner's Take on Mobile Security Best Practices

April 04, 2016
In a newly released research note, Gartner discusses mobile security as it applies to consumer facing apps. The piece, entitled “Avoiding Mobile App Development Security Pitfalls – March 2016” covers various aspects of the mobile app development landscape in detail,...

Tags: BYOD, mobile applications, app wrapping, MitM, Data Breach, Fusion, Man in the Middle, Malware, mobile security, devops, Gartner, iOS SDK, Android SDK, source code, enterprise apps

YiSpecter & Internet Traffic Hijacking

October 13, 2015
The latest on the YiSpecter malware – a malicious code capable of infecting non-jailbroken iOS devices – presents an interesting dilemma. Not only does it conclusively dispel the notion that a device’s official factory configuration insulates it from software abuses,...

Tags: MitM, Mobile Banking Apps, Fusion, Security, Man in the Middle, Malware, mobile security, anti-tampering, phishing, malicious app, YiSpecter

DevOps: At Odds with Mobile Security Strategies?

October 06, 2015
The fast pace of mobile innovation has put enormous pressure on enterprise IT groups to compress development cycles and move towards a continuous release model. In fact, the goal of most DevOps teams is to be agile enough to handle...

Tags: MitM, Mobile threats, Security, Man in the Middle, Malware, Trojan horse, mobile security, devops

1 2

Subscribe to Appdome's Blog

Latest Posts

Tags