PinnedPublished inProAndroidDevSecuring the Future: Navigating the deprecation of Encrypted Shared PreferencesEncryptedSharedPreferences is now deprecated, but what does this mean for your app and its security?May 28, 2024A response icon4May 28, 2024A response icon4
Published inProAndroidDevHow to have “Crystal Clear Certificates”Securing your Android Apps using Certificate TransparencyApr 21A response icon1Apr 21A response icon1
The elephant in the room: How to update Gradle in your Android project correctlyI don’t want to alarm you, but if you’ve updated the Gradle version in an Android project, you’ve probably done it incorrectly at least…May 27, 2024A response icon2May 27, 2024A response icon2
Published inProAndroidDevWhat’s the buzz about the 2024 OWASP Mobile Top 10 changes?In this post, we take a look at what has changed in the most recent update to OWASP’s Mobile Top 10Feb 26, 2024A response icon1Feb 26, 2024A response icon1
Published inProAndroidDevUnpacking Android Security: Part 4 — Insecure AuthenticationThis is the fourth post in this series where we deep-dive into Android Security and the OWASP Top 10 — Insecure AuthenticationSep 12, 2023A response icon1Sep 12, 2023A response icon1
Published inProAndroidDevAndroid Security: Securing your Gradle builds from baddiesGradle based-supply chain attacks are sadly nothing new, however there are a number of tools available to avoid them…Jul 24, 2023A response icon1Jul 24, 2023A response icon1
What’s new in Jetpack Security Crypto Version 1.1.0-alpha04Out of the blue, the Jetpack Security Crypto library sees its first update in 18 months. Let’s take a look at what’s new!Nov 10, 2022A response icon1Nov 10, 2022A response icon1
Published inProAndroidDevUnpacking Android Security: Part 3 — Insecure CommunicationIn this series of blog posts we take a look at Android Security in detail through the lens of the OWASP Top #10 threats to MobileAug 16, 2022A response icon3Aug 16, 2022A response icon3
Published inProAndroidDevUnpacking Android Security: Part 2 — Insecure Data StorageIn this series of blog posts we take a look at Android Security in detail through the lens of the OWASP Top #10 threats to MobileJun 5, 2022A response icon2Jun 5, 2022A response icon2
Published inProAndroidDevUnpacking Android Security: Part 1 — Improper Platform UsageIn this series of blog posts we take a look at Android Security in detail through the lens of the OWASP Top #10 threats to MobileFeb 4, 2022A response icon1Feb 4, 2022A response icon1