Articles by our team members and guest experts (become one of them) that explore practical mobile security and threat defense topics for the developer community.
How Secure Are Flutter Apps?
How to Detect Root using Kotlin
How to Detect Jailbreak using Swift
How to Detect Hooking (Frida) using Kotlin
How to Detect Hooking (Frida) using Swift
How to Detect VPN using Swift
How to Detect VPN using Kotlin
AppiCrypt Against Time Spoofing: From Free Trial Abuse to License Fraud and Audit Log Corruption
Preventing Piracy and Cheating in Games: A Guide to Countering GameGuardian with Talsec
iOS Keychain vs. Android Keystore
Introducing Multi-Instancing Detection for freeRASP
Introducing the Talsec Portal: A New Way to Monitor Your App — Try It Now!
How to Achieve Root-Like Control Without Rooting: Shizuku's Perils & Talsec's Root Detection
freeRASP for Unity Guide [new!]
ApkSignatureKiller: How it Works and How Talsec Protects Your Apps
AI Device Risk Summary Demo | Threat Protection | Risk Scoring | Malware Detection | Android & iOS
Podcast: iOS Keychain vs Android Keystore
Obfuscation of Mobile Apps
OWASP Top 10 For Flutter – M6: Inadequate Privacy Controls in Flutter & Dart
Simple Root Detection: Implementation and verification
Flutter - M5: Insecure Communication for Flutter and Dart
OWASP Top 10 For Flutter – M4: Insufficient Input/Output Validation in Flutter
OWASP Top 10 For Flutter – M3: Insecure Authentication and Authorization in Flutter
OWASP Top 10 For Flutter – M2: Inadequate Supply Chain Security in Flutter
OWASP Top 10 For Flutter - M1: Mastering Credential Security in Flutter
🚀A Developer’s Guide to Implement End-to-End Encryption in Mobile Apps 🛡️
Flutter Security 101: Restricting Installs to Protect Your App from Unofficial Sources
Learn how to implement the Secure Storage in Flutter and understand storage restrictions.
Dive into our full guide as Himesh Panchal walks you through creating a robust and secure authentication flow!
Introduction: Root Detection Basics
OWASP Top 10 For Flutter – M2: Inadequate Supply Chain Security in Flutter
Hook, Hack, Defend: Frida's Impact on Mobile Security & How to Fight Back
Emulators in Gaming: Threats and Detections
Exclusive Research: Unlocking Reliable Crash Tracking with PLCrashReporter for iOS SDKs
How to Block Screenshots, Screen Recording, and Remote Access Tools in Android and iOS Apps
How do you test a RASP? This guide will walk you through the entire process of RASP evaluation. It is written for penetration testers and RASP integrators.
Fact about the origin of the Talsec name
React Native Secure Boilerplate 2024: Ignite with freeRASP
Hacking and protection of Mobile Apps and backend APIs | 2024 Talsec Threat Modeling Exercise
Flutter CTO Report 2024: Flutter App Security Trends
Mobile API Anti-abuse Protection with AppiCrypt®: A New Play Integrity and DeviceCheck Alternative
Detect system VPNs with freeRASP
Introducing Talsec’s advanced malware protection!
Fraud-Proofing an Android App: Choosing the Best Device ID for Promo Abuse Prevention
Enhancing Capacitor App Security with freeRASP: Your Shield Against Threats 🛡️
Safeguarding Your Data in React Native: Secure Storage Solutions
Secure Storage: What Flutter can do, what Flutter could do
🔒 Flutter Plugin Attack: Mechanics and Prevention
Protecting Your API from App Impersonation: Token Hijacking Guide and Mitigation of JWT Theft
Build secure apps in React Native
How to Hack & Protect Flutter Apps — Simple and Actionable Guide (Pt. 1/3)
How to Hack & Protect Flutter Apps — OWASP MAS and RASP. Use them and your project will cut the mustard! (Pt. 2/3)
How to Hack & Protect Flutter Apps — Steal Firebase Auth token and attack the API. (Pt. 3/3)
freeRASP meets Cordova
Philosophizing security in a mobile-first world
5 Things John Learned Fighting Hackers of His App — A must-read for PM’s and CISO’s
Missing Hero of Flutter World