ML MusingsiOS Development Security and Privacy Best PracticesExplore best practices for securing your iOS device and ensuring privacy is protectedFeb 22, 2023Feb 22, 2023
Rubens ZimbresHow to Check if your iPhone is Infected with Spyware/StalkerwareRecently I was watching Frontline PBS documentary “Global Spyware Scandal: Exposing Pegasus Part One (full documentary) | FRONTLINE”…Jan 16, 20245Jan 16, 20245
InThe StartupbyShashank ThakurHow to Make iOS App Secure From Screenshot and Recording?Making iOS App Secure from Screenshot and RecordingSep 13, 20202Sep 13, 20202
i.vikashIs your iOS app secure ?Test your app against Mobile App Security Checklist.Jul 12, 20221Jul 12, 20221
FleksyWhy Mobile App Developers Need Data Privacy and SecurityWhile technology has transformed the world for the better, it also comes with pitfalls and drawbacks. The main concern that people have…Nov 12, 2021Nov 12, 2021
Felipe FerrariiOS App Security CheatsheetIn a previous article we saw an example on how an attacker could analyse an app in the search of vulnerabilities, and perform an XSS attack…Nov 3, 2022Nov 3, 2022
InITNEXTbyKristiina RahkemaRisks of using third-party libraries in iOS appsHow high is the risk of introducing vulnerabilities to iOS apps through third-party libraries?Jul 13, 2022Jul 13, 2022
InDev GeniusbyKristiina RahkemaSwiftDependencyChecker — check CocoaPods, Carthage and Swift PM dependencies for known…One source of vulnerabilities in our applications is the use of vulnerable versions of third party libraries. There are public…Jan 10, 20221Jan 10, 20221
Kenneth PoonLet’s write Swift code to intercept SSL Pinning HTTPS RequestsOne of the popular ways to inspect HTTPS requests in iOS Apps is the Man-in-the-middle (MITM) attack. This technique requires a machine to…Jun 3, 20183Jun 3, 20183
InBetter ProgrammingbySteven CurtisSecure iOS Apps Through App PinningHow to provide high-level API security in iOSAug 30, 2019Aug 30, 2019