In our development career, we may encounter tasks in which, for example, we will have to use various types of encryption algorithms. We will see then that one of the acceptance criteria can be the creation of an encryption key,…
Category: ios app security
Here you will learn, you will find interesting facts on how to create an application that will be difficult to crack or steal data.
In my development career I have created an SDK to handle in-app payments (Apple Pay, Visa, Mastercard and so on), as well as an SDK to handle 3DSecure authorization, which has passed EMVco and PCI certification.
I will try to show you how to make an application step by step that is almost impossible to break (because you know that you can break everything with a specific determination)
A few words about automatically generated screenshots
One of the most common elements of mobile applications are data forms. We use them to log in to our account, or to enter other important data about us, sometimes very sensitive and confidential. One such is the form for…
How to detect that an emulator is being used to run the app?
Attacks on mobile applications (e.g. payment apps) often start with the use of an emulator for the mobile operating system in which the target application will be run and analyzed. In order for an attacker to e.g. attach a debugger,…
Is the application installed from a trusted source?
This post begins the series of mobile application security. Information on this subject is sometimes difficult to find, does not fully cover the topic, or is incomprehensible or leaves further questions. Based on my experience, I will try to share…