Blue Cedar

1.3K posts

Blue Cedar banner
Blue Cedar

Blue Cedar

@blue_cedar

Intelligent Mobile App Security

San Francisco, CA Katılım Şubat 2016
475 Takip Edilen301 Takipçiler
Blue Cedar
Blue Cedar@blue_cedar·
Discover the crucial role of checksum validation in ensuring that an app has not been tampered with. Learn how it shields mobile app users from malicious software and other security risks. hubs.ly/Q023lzlH0
English
0
0
0
27
Blue Cedar
Blue Cedar@blue_cedar·
Discover the ways simulators can jeopardize mobile apps and how apps can be configured to protect against such cyber assaults. hubs.ly/Q023jXLp0
English
0
0
0
15
Blue Cedar
Blue Cedar@blue_cedar·
Be aware that using a mobile app on a jailbroken device can put the app's security and data at risk. Educate yourself on jailbreaking, the security risks associated with jailbroken devices, and ways to detect jailbreaks. hubs.ly/Q023jQKK0
English
0
0
0
13
Blue Cedar
Blue Cedar@blue_cedar·
Mobile apps are vulnerable to compromise through unauthorized modifications. Gain insight into attacker tactics involving app tampering and the role of anti-tamper technology in safeguarding apps against such threats. hubs.ly/Q023jPzR0
English
0
0
0
9
Blue Cedar
Blue Cedar@blue_cedar·
Are you aware that debuggers can pose a threat to mobile apps' security? Discover more about this attack method and how mobile apps can be fortified to defend against such threats. hubs.ly/Q023jQKs0
English
0
1
1
35
Blue Cedar
Blue Cedar@blue_cedar·
Whitebox cryptography is a game changer, ensuring protection even when mobile apps execute in untrusted environments. Learn more about this important technology and how it protects against reverse engineering of apps. hubs.ly/Q023jFng0
English
0
0
0
19
Blue Cedar
Blue Cedar@blue_cedar·
Mobile apps must be able to detect rooted devices to ensure their security. Learn what rooting is, the security threats posed by rooted devices, and strategies for apps to defend themselves against rooting. hubs.ly/Q023jFm_0
English
0
1
1
42
Blue Cedar
Blue Cedar@blue_cedar·
Securing mobile app network traffic is vital for mobile security. Blue Cedar's technical glossary page on certificate pinning does an excellent job explaining this technique! Check it out now. hubs.ly/Q023jpTd0
English
0
0
0
12
Blue Cedar
Blue Cedar@blue_cedar·
Detecting emulators is key for thwarting mobile app reverse engineering. This glossary describes what emulators are, their use in reverse engineering, and techniques that apps can use to detect emulator execution. hubs.ly/Q023jFn30
English
0
0
0
25
Blue Cedar
Blue Cedar@blue_cedar·
Mobile app developers know that code obfuscation is crucial for protecting intellectual property. Blue Cedar obfuscates app binaries. Check out our excellent new resource page on code obfuscation techniques to protect your apps. hubs.ly/Q023jkxb0
English
0
0
0
17
Blue Cedar
Blue Cedar@blue_cedar·
Staying on top of mobile app security terminology can be challenging. Check out this excellent technical glossary put together by the team at Blue Cedar. It covers key concepts related to jailbreak, rooting, app hardening, encryption, and much more. hubs.ly/Q023jqJ30
Blue Cedar tweet media
English
0
0
1
26
Blue Cedar
Blue Cedar@blue_cedar·
Today is your final chance at BlackHat 2023 to see a demo of Blue Cedar integrating BlackBerry Dynamics into mobile apps without writing any code. Swing by the BlackBerry booth (#1232) in Mandalay Bay, Las Vegas to see a demo. #BlackHat2023 #BlueCedar #BlackBerry #SecureApps
Blue Cedar tweet media
English
0
0
1
97