Software Security Goes Mobile
Erik Costlow says that, as more and more business is transacted on mobile platforms, securing the applications and data that run on them is a business imperative. Developers and their managers are asked to make key decisions regarding data caching, authorized permissions, authentication requirements on the backend, and safe coding practices—all of which contribute to the protection of their organization’s intellectual property. However, hackers have taken advantage of a knowledge gap to develop creative attacks against mobile applications. Becoming more common is “intent spoofing” in which hackers write a special application that targets an existing app on the Android platform and directs it to take malicious actions. Erik guides you through the steps you can take—use of two-factor authentication, code analysis, and obfuscation—to protect your intellectual property and your customers’ data against these and other potential threats.