Mobile App Reverse Engineering is easier than you think: Arxan AppSec Series 2/3
Everyone knows that high-value mobile applications like banking or payment apps can be the gateway to a treasure trove of sensitive information. What most organizations may not understand, however, is just how easy it is to reverse engineer applications after they’ve been deployed to an app store, using freely available tools. In part two of our application security series, Arxan Director of Research Chris Stahly will demonstrate how easily an attacker can gain access to IP, customer data, and even encryption keys if a high-value app is not properly protected. We’ll discuss ways to improve mobile app security, reduce threat response times and minimize the impact of an attack using real-time threat intelligence.