Application Security Is Getting Worse, Not Better

The app insecurity complex

  • Create fake apps or clones of existing apps via reverse engineering to trick users into providing credentials and other sensitive data as well as access to accounts. This is also known as “tampering.”
  • Install bots to launch attacks on websites and perform online betting and other transactions
  • Install malware on the device or on others in its network. In the infamous WhatsApp malware injection breach, attackers exploited a VOIP (voice over internet protocol) vulnerability in the mobile app that allowed them to inject malware into phones simply by calling them.
  • Skim credit-card information
  • Inject malicious scripts for clickjacking and formjacking
  • Provide access to sensitive stored data — via the device’s operating system, the development framework, cookies and preferences, and other avenues for attack
  • Eavesdrop on API communications to steal the data in transit — also known as a “man in the middle” attack

In-app protection techniques






We help companies develop secure products

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Testnet Guide — zkSync 2.0

ROKUCOIN Sale Guidelines

{UPDATE} Helicopter Pilot AR Hack Free Resources Generator

{UPDATE} Car Transporter Truck Hack Free Resources Generator

Security Series I: Timelock

The wild card that could trigger the next financial crisis

Managing the risks of digital transformation.

Approaches to Contact Center Fraud Mitigation

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


We help companies develop secure products

More from Medium

Why Outsource Product Development

Three eCommerce Business Models that Trends in the Retail sector

Three eCommerce Business Models that Trends in the Retail sector

How I worked only 2 hours in the last 3 weeks — Jira Automation

Picture of the automation library in JIRA

Why is customer flow important? | VYou