Mobile Applications
Mobile Application Security
Mobile Application Protection Suite (MAPS)
zScan
zKeyBox
zShield
zDefend
Mobile Devices
Mobile Device Security
Mobile Threat Defense (MTD)
MTD for Chromebooks
zSecure Resident Safety
Mobile Phishing Protection
Solutions
Mobile Security Solutions by Industry
Financial Services
Federal
Government
Media & Entertainment
Retail
Automotive
Company
Company
About Us
Blog
Careers
Support
Partners
Become a Partner
CONTACT US
☰
Menu
Mobile Applications
›
Mobile Application Security
›
Mobile Application Protection Suite (MAPS)
zScan
zKeyBox
zShield
zDefend
Mobile Devices
›
Mobile Device Security
›
Mobile Threat Defense (MTD)
MTD for Chromebooks
zSecure Resident Safety
Mobile Phishing Protection
Solutions
›
Mobile Security Solutions by Industry
›
Financial Services
Federal
Government
Media & Entertainment
Retail
Automotive
Company
›
Company
›
About Us
Blog
Careers
Support
Partners
›
Become a Partner
Mobile Security 101:
A Glossary of Mobile Security Terminology
A
B
C
D
M
S
E
F
G
H
I
J
K
L
N
O
P
Q
R
T
U
V
W
Z
A
Abnormal Process Activity
Account Takeover Attacks (ATO)
Adaptive Authentication
Adaptive Security
Adaptive Security Architecture
Anti-Analysis Techniques
Anti-Debugging
Anti-Hooking
Anti-Reverse Engineering
Anti-Tampering
APK (Android Package Kit)
APKHunt
Application Security Posture
APT28
APT32
APT42
B
Bank Secrecy Act Compliance
Behavioral Analysis
Binary Packing
Blue Hat Hacker
BYOD Security Policy
C
Certificate Pinning
Cipher Suites
Clone Phishing
Cold Wallet
Common Vulnerabilities and Exposures (CVE)
Common Vulnerabilities and Exposures (CVE)
Control Flow Obfuscation
Cozy Bear
Crypto Wallet Security
Cryptographic Keys
D
DarkShades RAT
DAST (Dynamic Application Security Testing)
DAST (Dynamic Application Security Testing)
Device Attestation
Device Binding
Dodd-Frank Compliance
Dropper Apps
Dynamic Code Loading (DCL)
Dynamic Link Library Injection (DLL Injection)
Dynamic Link Library Injection (DLL Injection)
M
Malicious Actors
Malicious Apps
Malicious Insiders
Man-in-the-Middle Attack (MitM)
Manual Penetration Testing
MASVS (Mobile Application Security Verification Standard)
Mishing
MitMo
Mnemonic Phrase
Mnemonic Seed
Mobile App Hardening
Mobile App Penetration Testing
Mobile App Security Checklists
Mobile App Security Framework
Mobile App Spoofing
Mobile App Threat Model
Mobile App Vetting
Mobile App Vulnerability Testing (MAVT)
Mobile Application Management (MAM)
Mobile Application Security Assessment
Mobile Application Security Testing (MAST)
Mobile Banking Access Control
Mobile Banking Fraud
Mobile Banking Program Audit
Mobile Device Forensics
Mobile Device Management (MDM)
Mobile EDR
Mobile Fraud Solutions
Mobile Retail Banking Security
Mobile Threat
Mobile XDR
mPOS (Mobile POS)
MSTG (Mobile Security Testing Guide)
Multisig Wallets
S
SAST (Static Application Security Testing)
Scamware
SDK Security
Secure Coding
Secure Sockets Layer (SSL)
Secure Software Development Lifecycle (SSDLC)
Self-Defending Apps
Shift Left Testing
Sideloading
Signature-based Security
Silent App Installation
SIM Spoofing
SIM Swap Fraud
Smishing
SnoopSnitch
Social Engineering Attack
SoftPOS
Software Composition Analysis (SCA)
Spear Phishing
Spyware
Synthetic Identity Fraud
E
Eclipse Attack
eKYC
Embedded Banking
Endpoint Security
Enterprise Mobility Management (EMM)
Evil Twin Attacks
F
Fake Mobile Apps
Fbot Botnet
FD&C Act Section 524B
Fintech App Security
Fraud Fusion
Fuzzing
G
Grayware
Green Hat Hacker
Grey Hat Hacker
H
HITRUST CSF
Hybrid App
I
IAST (Interactive Application Security Testing)
IMSI Catcher
In-app protection
Integer Overflow Attack
Integrity Checking
J
Jailbreaking
Juice Jacking
K
Keyloggers
Keystores
L
Local File Inclusion (LFI)
Location Spoofing
Lockbit Ransomware
N
Nation-State Hacker
New Account Fraud
NIAP (National Information Assurance Partnership)
NIST Cybersecurity Framework (NIST CSF)
NJRAT – (Njw0rm) Remote Access Tool
O
Obfuscation
On-Device Fraud
On-Device Mitigation
Online Fraud Detection
Open Banking Mobile Apps
Open-Source Framework
P
PCI MPoC
Pharming
Phishing
Q
Quishing
R
Ransomware Endpoint Protection
RASP (Runtime App Self-Protection)
Red Hat Hacker
Red Teamer
Remote Access Trojan (RAT)
Remote Data Capture
Remote Deposit Capture
Riskware
Rogue Access Point
Rogue Cell Towers
Root Detection
Rooted Device
Runtime Behavior Monitoring
T
Third-Party Libraries
Threat Modeling
TOAD Attacks
Transport Layer Security (TLS)
U
Unified Endpoint Management (UEM)
V
Vishing
Vulnerability Assessment Tools
W
White Hat Hacker
Z
Zero Trust Data Security
Zero-Click Attacks
Zero-Day Attack