ZIMPERIUM-logo_orangeZ_ff4c15_white
  • Mobile Applications
    • Mobile Application Security
      • Mobile Application Protection Suite (MAPS)
      • zScan
      • zKeyBox
      • zShield
      • zDefend
  • Mobile Devices
    • Mobile Device Security
      • Mobile Threat Defense (MTD)
      • MTD for Chromebooks
      • zSecure Resident Safety
      • Mobile Phishing Protection
  • Solutions
    • Mobile Security Solutions by Industry
      • Financial Services
      • Federal
      • Government
      • Media & Entertainment
      • Retail
      • Automotive

     

     

  • Company
    • Company
      • About Us
      • Blog
      • Careers
      • Newsroom
      • Support
    • Partners
      • Become a Partner

    Screenshot 2024-10-09 at 2.42.53 PM

     

CONTACT US
☰

Menu

Mobile Applications ›
Mobile Application Security ›
Mobile Application Protection Suite (MAPS)
zScan
zKeyBox
zShield
zDefend
Mobile Devices ›
Mobile Device Security ›
Mobile Threat Defense (MTD)
MTD for Chromebooks
zSecure Resident Safety
Mobile Phishing Protection
Solutions ›
Mobile Security Solutions by Industry ›
Financial Services
Federal
Government
Media & Entertainment
Retail
Automotive
Company ›
Company ›
About Us
Blog
Careers
Newsroom
Support
Partners ›
Become a Partner

Mobile Security 101: A Glossary of Mobile Security Terminology

A B C D M S E F G H I J K L N O P Q R T U V W Z
 

 

A

Abnormal Process Activity

Account Takeover Attacks (ATO)

Adaptive Authentication

Adaptive Security

Adaptive Security Architecture

Anti-Analysis Techniques

Anti-Debugging

Anti-Hooking

Anti-Reverse Engineering

Anti-Tampering

APK (Android Package Kit)

APKHunt

Application Security Posture

APT28

APT32

APT42

B

Bank Secrecy Act Compliance

Behavioral Analysis

Binary Packing

Blue Hat Hacker

BYOD Security Policy

C

Certificate Pinning

Cipher Suites

Clone Phishing

Cold Wallet

Common Vulnerabilities and Exposures (CVE)

Common Vulnerabilities and Exposures (CVE)

Control Flow Obfuscation

Cozy Bear

Crypto Wallet Security

Cryptographic Keys

D

DarkShades RAT

DAST (Dynamic Application Security Testing)

DAST (Dynamic Application Security Testing)

Device Attestation

Device Binding

Dodd-Frank Compliance

Dropper Apps

Dynamic Code Loading (DCL)

Dynamic Link Library Injection (DLL Injection)

Dynamic Link Library Injection (DLL Injection)

M

Malicious Actors

Malicious Apps

Malicious Insiders

Man-in-the-Middle Attack (MitM)

Manual Penetration Testing

MASVS (Mobile Application Security Verification Standard)

Mishing

MitMo

Mnemonic Phrase

Mnemonic Seed

Mobile App Hardening

Mobile App Penetration Testing

Mobile App Security Checklists

Mobile App Security Framework

Mobile App Spoofing

Mobile App Threat Model

Mobile App Vetting

Mobile App Vulnerability Testing (MAVT)

Mobile Application Management (MAM)

Mobile Application Security Assessment

Mobile Application Security Testing (MAST)

Mobile Banking Access Control

Mobile Banking Fraud

Mobile Banking Program Audit

Mobile Device Forensics

Mobile Device Management (MDM)

Mobile EDR

Mobile Fraud Solutions

Mobile Retail Banking Security

Mobile Threat

Mobile XDR

mPOS (Mobile POS)

MSTG (Mobile Security Testing Guide)

Multisig Wallets

S

SAST (Static Application Security Testing)

Scamware

SDK Security

Secure Coding

Secure Sockets Layer (SSL)

Secure Software Development Lifecycle (SSDLC)

Self-Defending Apps

Shift Left Testing

Sideloading

Signature-based Security

Silent App Installation

SIM Spoofing

SIM Swap Fraud

Smishing

SnoopSnitch

Social Engineering Attack

SoftPOS

Software Composition Analysis (SCA)

Spear Phishing

Spyware

Synthetic Identity Fraud

E

Eclipse Attack

eKYC

Embedded Banking

Endpoint Security

Enterprise Mobility Management (EMM)

Evil Twin Attacks

F

Fake Mobile Apps

Fbot Botnet

FD&C Act Section 524B

Fintech App Security

Fraud Fusion

Fuzzing

G

Grayware

Green Hat Hacker

Grey Hat Hacker

H

HITRUST CSF

Hybrid App

I

IAST (Interactive Application Security Testing)

IMSI Catcher

In-app protection

Integer Overflow Attack

Integrity Checking

J

Jailbreaking

Juice Jacking

K

Keyloggers

Keystores

L

Local File Inclusion (LFI)

Location Spoofing

Lockbit Ransomware

N

Nation-State Hacker

New Account Fraud

NIAP (National Information Assurance Partnership)

NIST Cybersecurity Framework (NIST CSF)

NJRAT – (Njw0rm) Remote Access Tool

O

Obfuscation

On-Device Fraud

On-Device Mitigation

Online Fraud Detection

Open Banking Mobile Apps

Open-Source Framework

P

PCI MPoC

Pharming

Phishing

Q

Quishing

R

Ransomware Endpoint Protection

RASP (Runtime App Self-Protection)

Red Hat Hacker

Red Teamer

Remote Access Trojan (RAT)

Remote Data Capture

Remote Deposit Capture

Riskware

Rogue Access Point

Rogue Cell Towers

Root Detection

Rooted Device

Runtime Behavior Monitoring

T

Third-Party Libraries

Threat Modeling

TOAD Attacks

Transport Layer Security (TLS)

U

Unified Endpoint Management (UEM)

V

Vishing

Vulnerability Assessment Tools

W

White Hat Hacker

Z

Zero Trust Data Security

Zero-Click Attacks

Zero-Day Attack

Make mobile security
your first priority.

Contact Us
  • Products
    • Mobile Threat Defense
    • Mobile Application Security
  • Industries
    • Financial Services
    • Government
    • Media & Entertainment
    • Retail
    • Automotive
  • Company
    • About Us
    • Careers
    • Contact Us
    • Newsroom
  • Privacy
    • Privacy Policy
    • Compliance Hotline
    • Responsible Disclosure Policy
Get the latest Mobile Security News and Updates in your inbox:
Subscribe

© 2025 Zimperium. All Rights Reserved.   Privacy Settings   Modern Slavery Act Statement