Knowledge Center
AppSealing prevents money leakage in a real-money mobile-gaming platform
Learn More
Recent Posts
Pay for what you use and get billed through AWS, simplifying your payment process - no procurement headaches or POs required.
Signup from AWS
Dynamic Application Security Testing (DAST)
Dynamic Application Security Testing (DAST) is a black-box security testing methodology in which an application is tested from the outside. A tester using DAST examines an application when it is ...
Packet Sniffing
When any data is to be transmitted over a computer network, it is broken down into smaller units at the sender’s node called data packets and re-assembled at receiver’s node ...
Rooted (Rooting)
Rooting is a process that allows you to attain root access to the Android operating system code (the equivalent term for Apple devices is jailbreaking). It gives you privileges to ...
App Forgery
Forgery includes any piece of code introduced into a corporate mobile app without the user’s knowledge, which would lead a third party to gain control of the entire traffic initiated ...
Encryption-Decryption
The conversion of encrypted data into its original form is called decryption. It is generally a reverse process of encryption. It decodes the encrypted information so that an authorized user ...
Injection/Insertion
Anyone can send untrusted data to a mobile app, including external users, internal users, the application itself, or other malicious apps on the mobile device. An adversary loads simple text-based ...
Modification
Some users root or modify their phones in order to uninstall standard carrier or operating system apps they do not use. Others want more control over automating certain tasks or ...
Jailbroken (Jailbreak)
Jailbreaking refers to the process of removing all restrictions imposed on an iOS device. It allows root access to system files that can be manipulated to enable installation of apps, ...
Integrity protection (Hash Check)
A hash value is a numeric value of a fixed length that uniquely identifies data. Hash values represent large amounts of data as much smaller numeric values, so they are ...
Robustness
Robustness is the ability of a computer system to cope with errors during execution and deal with erroneous input. Robustness can encompass many areas of computer science, such as robust ...
Mobile Application Management
Mobile application management (MAM) describes software and services responsible for provisioning and controlling access to internally-developed and commercially available mobile apps used in business settings on both company-provided and “bring your own device” ...
App Player (Emulator)
An emulator is a program that allows a host system to perform the functions of and act like the guest system. This means, even if an Android smartphone or tablet is not ...
Mobile Game Cheat Tool
On android memory editing, APK modding, data editing, and diverse client-side methods can be used to cheat in online and offline games alike. If a game does not require an ...
Mobile Device Management
Mobile device management (MDM) is a type of security software used by an IT department to monitor, manage, and secure employees' mobile devices (laptops, smartphones, tablets, etc.) that are deployed ...
Memory Dump
A memory dump is a process in which the contents of memory are displayed and stored in case of an application or system crash. It helps software developers and system ...
Untrusted Environment
A recent surge of reported vulnerabilities in mobile apps have pushed top anti-malware companies to change their posture and begin adapting to a world where virtualization. Though, it is a ...
Reverse Engineering
Reverse engineering techniques involve extraction of source code and various resources from the Android Package (APK) file. There are numerous tools available for assistance in decompiling an APK file, such ...
Packet Spoofing
Packet spoofing or IP spoofing is the creation of Internet Protocol (IP) packets having a source IP address with the purpose of concealing the identity of the sender or impersonating ...
Open Web Application Security Project (OWASP)
The Open Web Application Security Project, or OWASP, is an international non-profit organization dedicated to web application security. One of OWASP’s core principles is that all of its material be freely ...
Vulnerability
Gaming has become a premier form of digital entertainment. Online gaming allows real-time interaction among several users. There are several unaddressed vulnerabilities in these games. The security for these games ...
Static Application Security Testing (SAST)
Static Application Security Testing (SAST) is a set of technologies designed to analyze application source code, binaries, and byte code in a non-running state, revealing security vulnerabilities that make mobile ...
Software Composition Analysis (SCA)
Software Composition Analysis (SCA) is a set of tools that provides users visibility into their open source inventory. SCA tools generate an inventory report of all open source components in ...
Runtime Application Self-Protection (RASP)
Runtime Application Self-Protection (RASP) is a security software that integrates with an application or its runtime environment during execution and constantly intercepts calls to the application to check their security ...