Knowledge Center

AppSealing prevents money leakage in a real-money mobile-gaming platform Learn More
Pay for what you use and get billed through AWS, simplifying your payment process - no procurement headaches or POs required. Signup from AWS

Dynamic Application Security Testing (DAST)

Dynamic Application Security Testing (DAST) is a black-box security testing methodology in which an application is tested from the outside. A tester using DAST examines an application when it is ...

Packet Sniffing

When any data is to be transmitted over a computer network, it is broken down into smaller units at the sender’s node called data packets and re-assembled at receiver’s node ...

Rooted (Rooting)

Rooting is a process that allows you to attain root access to the Android operating system code (the equivalent term for Apple devices is jailbreaking). It gives you privileges to ...

App Forgery

Forgery includes any piece of code introduced into a corporate mobile app without the user’s knowledge, which would lead a third party to gain control of the entire traffic initiated ...

Encryption-Decryption

The conversion of encrypted data into its original form is called decryption. It is generally a reverse process of encryption. It decodes the encrypted information so that an authorized user ...

Injection/Insertion

Anyone can send untrusted data to a mobile app, including external users, internal users, the application itself, or other malicious apps on the mobile device. An adversary loads simple text-based ...

Modification

Some users root or modify their phones in order to uninstall standard carrier or operating system apps they do not use. Others want more control over automating certain tasks or ...

Game Mods

Mods have arguably become an increasingly important factor in the commercial success of some games, as they add a depth to the original work. The term mod is derived from the act of ...

Jailbroken (Jailbreak)

Jailbreaking refers to the process of removing all restrictions imposed on an iOS device. It allows root access to system files that can be manipulated to enable installation of apps, ...

Integrity protection (Hash Check)

A hash value is a numeric value of a fixed length that uniquely identifies data. Hash values represent large amounts of data as much smaller numeric values, so they are ...

Robustness

Robustness is the ability of a computer system to cope with errors during execution and deal with erroneous input. Robustness can encompass many areas of computer science, such as robust ...

Mobile Application Management

Mobile application management (MAM) describes software and services responsible for provisioning and controlling access to internally-developed and commercially available mobile apps used in business settings on both company-provided and “bring your own device” ...

Hardening

Application hardening is a process of taking a finished application and making it more resistant to reverse-engineering, tampering, invasive monitoring, and intrusion. Combined with secure coding practices, application hardening is a best practice for companies ...

Malware

Malware is code that is designed to maliciously disrupt the normal operation of, or cause harm to, a network or user’s computer, phone, tablet, or other devices. There is a wide ...

App Player (Emulator)

An emulator is a program that allows a host system to perform the functions of and act like the guest system. This means, even if an Android smartphone or tablet is not ...

Mobile Game Cheat Tool

On android memory editing, APK modding, data editing, and diverse client-side methods can be used to cheat in online and offline games alike. If a game does not require an ...

Mobile Device Management

Mobile device management (MDM) is a type of security software used by an IT department to monitor, manage, and secure employees' mobile devices (laptops, smartphones, tablets, etc.) that are deployed ...

Memory Dump

A memory dump is a process in which the contents of memory are displayed and stored in case of an application or system crash. It helps software developers and system ...

Decompile

To decompile is to convert executable (ready-to-run) program code (also called object code) into some form of higher-level programming language so that it has a more readable format. Decompilation is ...

Untrusted Environment

A recent surge of reported vulnerabilities in mobile apps have pushed top anti-malware companies to change their posture and begin adapting to a world where virtualization. Though, it is a ...

Tampering

Any code can be reversed or tampered with especially on a jailbroken or rooted mobile device. As apps become more advanced, they often have intricate logic flows. That logic likely ...

Reverse Engineering

Reverse engineering techniques involve extraction of source code and various resources from the Android Package (APK) file. There are numerous tools available for assistance in decompiling an APK file, such ...

Packet Spoofing

Packet spoofing or IP spoofing is the creation of Internet Protocol (IP) packets having a source IP address with the purpose of concealing the identity of the sender or impersonating ...

Open Web Application Security Project (OWASP)

The Open Web Application Security Project, or OWASP, is an international non-profit organization dedicated to web application security. One of OWASP’s core principles is that all of its material be freely ...

Debugging

Debugging, in computer programming and engineering, is a multi-step process that involves identifying a problem, isolating its source, and then either correcting the problem or determining a way to work ...

Vulnerability

Gaming has become a premier form of digital entertainment. Online gaming allows real-time interaction among several users. There are several unaddressed vulnerabilities in these games. The security for these games ...

Static Application Security Testing (SAST)

Static Application Security Testing (SAST) is a set of technologies designed to analyze application source code, binaries, and byte code in a non-running state, revealing security vulnerabilities that make mobile ...

Software Composition Analysis (SCA)

Software Composition Analysis (SCA) is a set of tools that provides users visibility into their open source inventory. SCA tools generate an inventory report of all open source components in ...

Runtime Application Self-Protection (RASP)

Runtime Application Self-Protection (RASP) is a security software that integrates with an application or its runtime environment during execution and constantly intercepts calls to the application to check their security ...