When deploying a secure mobile application one of the first thing you do is that you make sure that all communication is going over a secure channel such as HTTPS, however even though you are using a valid certificate and HTTPS, your application may still be vulnerable to several attacks.
One of the main threats is a man-in-the-middle (MitM) attack, which is a well-known technique that attackers utilize in order to setup a proxy with fake Certificate Authorities (CAs) to intercept traffic to and from your application to identify vulnerabilities.
The internet has become an integral part of our life. We use it for various functions, such as online banking, social media, retail purchases and online gambling. When browsing through various web sites, a lot of personal and financial information is being transmitted and stored across a number of systems. It’s no wonder that security has become a top priority when developing web applications.