Unpacking Android Security: Part 4 — Insecure Authentication | by Ed Holloway-George | Sep, 2023
Photo Credit: Felipe Furtado 👋 Hi and welcome to the fourth post in this series where we deep-dive into Android Security (Part 1, 2 and 3). This series focuses on the Top 10 Mobile security threats as determined by The Open Web Application Security Project…
Android Security: Securing your Gradle builds from baddies | by Ed Holloway-George | Jul, 2023
The provenance, or origin of a dependency is verified via the signature that was used to sign the artifacts. This signature is generated by a public-private key pair used by the library’s author when uploading the library to a Maven Repo. To allow for this…
Ensuring Security and Compliance For Your App Solution
Healthcare software development has revolutionized the way medical professionals provide care, manage patient information, and streamline administrative processes. Custom healthcare software development has emerged as a powerful tool to address the unique needs and challenges of healthcare organizations. By tailoring software solutions to specific requirements, healthcare…