App security resources

The Mobile App Security Library

Browse through our ever-growing collection of mobile app protection resources and get to know some of our subject-matter experts.

    Webinars & events

    Attend a webinar, meet us at industry events, and secure your spot at exclusive Promon-hosted sessions.

    View all
    On demand
    Jul 5, 2023
    Webinar

    How to hack (and secure) an Android app

    Master Android app hacking and security techniques. Learn to identify vulnerabilities, implement robust defenses, and create more secure Android applications.
    Speaker_template_Benjamin_Adolphi-1
    On demand
    Dec 14, 2023
    Webinar

    2024 cybersecurity predictions

    Review 2024's cybersecurity landscape. Leverage expert predictions, understand emerging threats, and develop strategies to safeguard your digital assets.
    Andrew Whaley
    On demand
    Apr 11, 2024
    Webinar

    Dispelling the myth: Is iOS more secure than Android?

    Debunk iOS vs Android security myths with expert insights. Learn about real-world vulnerabilities, compare platform security, and enhance your mobile app protection.
    Benjamin Adolphi

    Ebooks & whitepapers

    Download detailed mobile app protection checklists, reports, ebooks, and more.

    View all
  • PCI DSS compliance checklist

    Streamline PCI DSS compliance with our security checklist. Ensure data security, protect customer information, and meet industry standards.
    Learn more Download
  • Beginner's guide to code obfuscation

    Learn app code obfuscation with our expert guide. Protect intellectual property, prevent reverse engineering, and strengthen your app's defenses.
    Learn more Download
  • StrandHogg 2.0: A new Android vulnerability

    Understand the StrandHogg 2.0 Android vulnerability. Learn about this serious security threat, protect your apps, and safeguard user data from potential exploits.
    Learn more Download

    Tools & games

    Get insight into your mobile app security risk with our calculators, databases, quizes, and games.

    View all
  • Compliance handbook
    Free
    Database
    Coming soon

    Promon Global App Security Compliance Handbook

    Maintain mobile app security compliance by leveraging our comprehensive global legal database, designed to help you stay compliant and secure as your organization expands.
  • Rapper or malware
    Free
    Game

    Rapper or Malware?

    Test your knowledge! Can you distinguish between rappers and malware names? Boost your app security awareness and brush up on hip-hop trivia.

    Glossary

    Unpack all the technical jargon and gain a better understanding of the mobile app security industry.

    View all
  • Code obfuscation

    Code obfuscation is the process of modifying an executable so that it is useless to a hacker while remaining fully functional. The functionality of the code remains unchanged, and code obfuscation helps conceal the logic and purpose of an app’s code. It works through transformations like data, layout, and control flow obfuscation, each targeting different aspects of the code to mask its true structure and logic.
  • Certificate pinning

    Certificate pinning is a security technique that increases secure communication over the TLS (transport layer security) protocol, like HTTPS. It ties a chosen TLS certificate or public key exclusively to the API server, allowing the application to reliably confirm the server's identity each time it connects. During interactions, the server presents a digital certificate to prove its identity and secures the encryption of data sent through APIs between the client and server. By matching the server’s shown certificate against a predetermined or "pinned" certificate within the app, certificate pinning ensures an additional layer of security, preventing man-in-the-middle (MITM) attacks and ensuring server communication integrity.
  • Continuous integration and continuous delivery/deployment (CI/CD)

    CI/CD stands for continuous integration (CI) and continuous delivery/ continuous deployment (CD). CI/CD automates the process of integrating code changes and deploying them to production environments, ensuring frequent, reliable updates with minimal manual intervention. Continuous delivery takes this further by automating the process of preparing code for release, ensuring it's always in a deployable state. Continuous deployment, an advanced step, automates the release of code to production immediately after passing all tests, without human approval.
  • Application shielding

    Application shielding refers to a set of technologies that modify an application’s source, byte, or binary code, making it more resistant to intrusion, tampering, reverse engineering, and malware attacks. Unlike security solutions that monitor and test vulnerabilities, application shielding can detect and prevent real-time attacks against mobile applications.

Stay ahead with expert insights

Get the latest insights, updates, and expert tips delivered straight to your inbox.
Sign up now
  • Promon-Shield-for-Desktop

    Discover our mission

    Learn how we’re revolutionizing app security to protect what matters most.

    About us
  • contact-message-dots

    Have any questions or feedback?

    We value your input. Whether you have suggestions, inquiries, or just want to share your thoughts, our team is here to help.

    Contact us