Discover 35 articles on Security in mobile performance
Showing 20 of 35 articles (Page 1 of 2)
Pascal Hartig explores how Meta's Product Security team uses AI to automatically patch security vulnerabilities across millions of lines of Android code. The challenge? Doing this at scale without disrupting th...
Matthew McCullough just dropped Android 17 Beta 2, and it's packed with APIs that fundamentally change how apps handle privacy, cross-device experiences, and local network access. This isn't just another increm...
Jija Bhattacharya from Guardsquare breaks down recent mobile app vulnerabilities that exposed millions of users. These weren't sophisticated exploits—they were logic flaws and authorization failures hiding in p...
Pavithra Chamod J from PickMe Engineering drops a hard truth: your mobile app's security measures are probably theater. Once an APK hits a rooted device, all bets are off.
Sanath Sajeeva Kumara from PickMe reveals a chilling truth: simply opening a project in Android Studio can steal your credentials before you click a single button. A 2026 incident proves your IDE might be your ...
Timothy Werquin from Guardsquare reveals why Apple's new Xcode 26 'enhanced security' features miss the most common iOS app threats. While exploit mitigation sounds impressive, the real danger lies elsewhere.
Meta just shared how they're using AI to automatically fix security vulnerabilities across billions of lines of code. The twist? The AI doesn't need to be perfect to be incredibly useful.
Bennet Manuel and Rob Clifford from Google just dropped a security feature so simple it's almost embarrassing we didn't have it sooner: one line of code that blocks malware from reading your app's sensitive dat...
Suzanne Frey from Google just announced a major shift in Android's security model. Starting 2026, every app installed on certified Android devices will need a verified developer behind it.
Numesh Dilusha from PickMe Engineering drops a hard truth: Android malware surged 40% in 2024/2025, and your hardcoded API keys are basically an open invitation. This comprehensive guide shows exactly how to lo...
X (Twitter) rebuilt their encrypted DMs for millions of users with a team of just 5 Android engineers. Their secret? Kotlin Multiplatform.
Chamod Lakmal from PickMe reveals why most Android apps store secrets dangerously wrong. Hardcoded keys and SharedPreferences encryption are fundamentally broken, leaving user data vulnerable to extraction.
Callstack explores how React Native is becoming the unexpected bridge between traditional mobile development and the Web3 ecosystem. Building decentralized apps just got a lot more practical.
Swift just made a major statement at FOSDEM 2025, and it's not just about iOS anymore. The language is pushing hard into memory safety, embedded systems, and even Java interoperability.
Kcrdissanayake from PickMe Engineering reveals why SwiftUI's AppStorage is a security risk for sensitive data. Their solution? A custom property wrapper that encrypts everything before it hits storage.
Building Flutter auth? The choice between Auth0's SDK and direct API isn't just about convenience. It's about whether you need speed or surgical control over your authentication flow.
Here's a performance optimization problem most Android teams don't see coming: your security tooling might be silently breaking your baseline profiles. Guardsquare just solved it.
Nina from Signal just announced they're killing a feature that's been in the Android app since before Signal even existed. After nearly a decade of supporting plaintext SMS alongside encrypted messages, they're...
Swiggy's Android team faced a UX dilemma: auto-reading OTPs felt magical to some users, creepy to others. How do you balance convenience with transparency?
Alvin Matthew Pratama from Tokopedia tackles a deceptively complex problem: validating social media URLs when each platform has wildly different URL structures. Regex alone won't cut it.