Approov Blog
Secure your iOS, Android, and HarmonyOS apps and APIs. Learn mobile app security best practices, API key protection, and incident response strategies.

Strategies to Stop Credential Stuffing Attacks on Mobile Apps
George McGregor | | account takeover, API Security - Analysis, News and Insights, credential stuffing, Data Security, mobile app development, mobile app security, zero trust
Identity-based and social engineering attacks are surging in 2024. Stolen credentials give hackers immediate access and control… and an instant path to stealing data and orchestrating ransomware attacks. Credential stuffing attacks ...

Securing API Keys: Why It Should Be Your Top Priority Now
Pearce Erensel | | API Keys, API security, API Security - Analysis, News and Insights, App Attestation, mobile app security, zero trust
I will cut to the chase in this blog. Protecting and managing the API keys MUST be number one on your security to-do-list. A wave of recent breaches show just how exposed ...

Enhance Cross-Platform Development with Robust Security Solutions
George McGregor | | android, Android Security, API Security - Analysis, News and Insights, Cross-platform, HarmonyOS, ios, mobile app development, mobile app security
Cross-platform development tools such as Flutter and React Native are increasingly being used to develop mobile apps. The financial and organizational advantages of using such frameworks are becoming clearer and any perceived ...

Responding to and Recovering from Mobile App Security Breaches
George McGregor | | API Security - Analysis, News and Insights, mobile app security, rasp, sdlc, zero trust
Zero Trust says “assume breach” and your response plan must cover handling third-party security incidents too. Mobile apps depend on third party APIs, and you need to be prepared to act quickly ...

Why Isn’t Zero Trust Systematically Applied in Mobile App Security?
George McGregor | | API Security - Analysis, News and Insights, mobile app development, mobile app security, zero trust
Here at Appoov, we were wondering why there has been so little discussion about applying the principles of Zero Trust specifically to mobile apps when this is a concept which has become ...

Privacy Risks in Google’s New Play Store Personalization
Ted Miracco | | API Abuse, API security, API Security - Analysis, News and Insights, Google Play, Mobile API Security, mobile app development
Personolization is a double edged sword. On one hand, it enhances user experiences by offering tailored recommendations, but on the other hand, it raises significant privacy concerns. Google Play's recent announcement about ...

The Rise of Unofficial Apps in Delivery, Automotive, and E-Commerce
George McGregor | | API Abuse, API security, API Security - Analysis, News and Insights, Automotive, e-commerce, Mobile API Security, mobile app development, Mobility, retail
Understanding the Security Risks and Solutions for Protecting Sensitive Data There is a trend emerging for anyone launching a consumer business. Almost every business these days does two things: the first is ...

How Poor API Security Led to Major Breaches in 2024
Shona Hossell | | API Abuse, API Keys, API security, API Security - Analysis, News and Insights, Mobile API Security, Mobile App Authentication, mobile app development
Major API Breaches in H1 of 2024 Earlier this year, we provided an overview of the significant security breaches from 2023. It's now clear that for API related breaches, this year is ...

Limitations of Huawei HarmonyOS Safety Detect: What You Need to Know
George McGregor | | API Security - Analysis, News and Insights, App Attestation, certificate pinning, HarmonyOS, MitM Attack, Mobile API Security, mobile app security
This overview outlines the development and adoption of Huawei HarmonyOS and the associated security solution Safety Detect, highlighting some limitations with the approach. As regulations such as the EU DMA force the ...

Streamlining the Defense Against Mobile App Bots
George McGregor | | API Security - Analysis, News and Insights, Bots, Mobile API Security, mobile app security
Let’s talk about bots. And be a little provocative. A review of bot solutions (see previous blog) reveals a common assumption that I think is misleading: Namely that separating good from bad ...