-
Principles
Overview - The big picture
- What needs protecting
- Develop a threat model for your application
- The four layers of mobile application protection
-
Threats
Overview - Decompilation and modification
- Dynamic analysis and tampering
- Emulators and Virtualization Apps
- Malware
- Network communications interception
- Mobile app fraud
Threats
On the following pages of this guide you’ll find details of some of the most common and dangerous mobile application threats you’re likely to be up against. You’ll learn how bad actors carry out their attacks, why they’re often able to succeed and, most importantly, what you can do to stop them from doing so.