1. Start
  2. Introduction
  1. Principles

  2. The big picture
  3. What needs protecting
  4. Develop a threat model for your application
  5. The four layers of mobile application protection
  1. Threats

  2. Decompilation and modification
  3. Dynamic analysis and tampering
  4. Emulators and Virtualization Apps
  5. Malware
  6. Network communications interception
  7. Mobile app fraud
  1. Practice

  2. Mobile app protection checklist
  3. Continuous security
  1. Summary

Guide Home Guide Home Threats

On the following pages of this guide you’ll find details of some of the most common and dangerous mobile application threats you’re likely to be up against. You’ll learn how bad actors carry out their attacks, why they’re often able to succeed and, most importantly, what you can do to stop them from doing so.

In this section