What are modern protections against mobile application cloning
I recently started thinking about an attacker which would clone a mobile application, and add some code which would do something malicious, e.g. credential theft. This cloned app would communicate with a legitimate server and therefore off… Continue reading What are modern protections against mobile application cloning