The Problem
Mobile applications can be reverse engineered using readily available disassemblers and/or decompilers, making it easy for hackers to access and analyze the source code of your applications. Hackers can then:
-
Steal intellectual property & clone applications
-
Extract sensitive information & harvest credentials
-
Identify vulnerabilities
-
Add malicious code to apps & repackage them
Data of a sensitive nature may include; valuable intellectual property (such as custom algorithms), authentication mechanisms, in-app payment mechanisms, keys (API keys, hardcoded encryption keys etc.), credentials (database passwords etc.), the logic behind server communication, and much more.
