Menu
Contents
Contents
  1. Start
  2. Introduction
  1. Principles

    Overview
  2. The big picture
  3. What needs protecting
  4. Develop a threat model for your application
  5. The four layers of mobile application protection
  1. Threats

    Overview
  2. Decompilation and modification
  3. Dynamic analysis and tampering
  4. Emulators and Virtualization Apps
  5. Malware
  6. Network communications interception
  7. Mobile app fraud
  1. Practice

    Overview
  2. Mobile app protection checklist
  3. Continuous security
  1. Summary

Guide Home Guide Home Threats

On the following pages of this guide you’ll find details of some of the most common and dangerous mobile application threats you’re likely to be up against. You’ll learn how bad actors carry out their attacks, why they’re often able to succeed and, most importantly, what you can do to stop them from doing so.

In this section