Whats new in... 'AndroidX Text - 1.0.0-alpha01'
A quick look at one of the latest additions to the AndroidX suite of libraries
Photo Credit: Galen Crout
A quick look at one of the latest additions to the AndroidX suite of libraries
Photo Credit: Galen Crout
Android 16 introduces official support for Certificate Transparency, but what is it and why is it so important?
Photo Credit: Ramakant Sharda
EncryptedSharedPreferences is now deprecated, but what does this mean for your app and its security?
Photo Credit: Annie Spratt
I don't want to alarm you, but if you've updated the Gradle version in an Android project, you've probably done it incorrectly at least once
Photo Credit: James Hammond
The OWASP Top 10 list for Mobile has had some significant changes for the first time in nearly a decade.
In this post we'll explore the changes, what this means for your Android apps and how to learn more about the threats we face in 2024.
Photo Credit: Max Muselmann
In this series of blog posts we take a look at Android Security in detail through the lens of the OWASP Top #10 threats to Mobile, with the end goal of learning how to write more secure code in our apps.
In this part we look at the #4 threat 'Insecure Authentication'
Photo Credit: Felipe Furtado
Gradle based-supply chain attacks are sadly nothing new, however there are a number of tools available to avoid them…
Photo Credit: CHUTTERSNAP
No clickbait, just a collection of bitesize Android goodies I have shared over the years
Photo Credit: Clem Onojeghuo
Out of the blue, the Jetpack Security Crypto library sees its first update in 18 months. Let's take a look at what's new!
Photo Credit: Alexander Schimmeck
In this series of blog posts we take a look at Android Security in detail through the lens of the OWASP Top #10 threats to Mobile, with the end goal of learning how to write more secure code in our apps.
In this part we look at the #3 threat 'Insecure Communication'
Photo Credit: Clem Onojeghuo
In this series of blog posts we take a look at Android Security in detail through the lens of the OWASP Top #10 threats to Mobile, with the end goal of learning how to write more secure code in our apps.
In this part we look at the #2 threat 'Insecure Data Storage'
Photo Credit: Mak
In this series of blog posts we take a look at Android Security in detail through the lens of the OWASP Top #10 threats to Mobile, with the end goal of learning how to write more secure code in our apps.
In this part we look at the #1 threat 'Improper Platform Usage'
Photo Credit: Mak
As featured in the ASOS Tech Blog
Photo Credit: David Mao
A beginners guide to solving picoCTF's 'droid' challenges
Photo Credit: Johnny Macri
A look into Jetpack Security's latest exciting addition
Photo Credit: Niv Singer
JetBrains Projector might just be the tool we need in 2021
Photo Credit: Jeremy Yap
A fun retrospective look at a pesky bug that threatened to ruin my holiday season
Photo Credit: Dawson Lovell
Working on larger projects can make dependency management difficult, in the post we will look at how to sort and generate a report of our Gradle project's dependencies and their available upgrades
Photo Credit: Andrew Buchanan
In this part we shall move on to defining and implementing delta hat, better known as the 'extended transition function'
Photo Credit: Karim Manjra
Could we implement finite state machines in Kotlin and how might they be useful in the real world?
Photo Credit: Pixabay
Some thoughts on how to smash interviews as a mobile developer
Photo Credit: Austin Distel