Product
Game Protection
Anti-Cheat & Anti-Hack
Online Protection
Solutions
FPS Game Solution
SLG Game Solution
Casual Game Solution
MMO Game Solution
Card Game Solution
Help Center
Android
User Manual
Tool Download
FAQ
iOS
User Manual
Tool Download
FAQ
Windows
User Manual
Tool Download
FAQ
Blog
Price
Android
iOS
Windows
Company
About us
Why JikGuard
Contact us
Log in
Free Trial
News
Mobile application security testing (MAST)
Mobile application security testing (MAST) is a range of methodologies that identify vulnerabilities and ensure the security of mobile apps.
May 27, 2025
Mobile app security
Mobile app security is a set of best practices that protect your app from cyberthreats, vulnerabilities, and unauthorized access.
May 27, 2025
Malware
Malware, short for malicious software, refers to any software specifically designed to disrupt, damage, or gain unauthorized access to computer systems, devices, or networks.
May 27, 2025
Keylogging
Keylogging, short for "keystroke logging," is a method of covertly capturing and recording keystrokes made on a computer or other input device, like a keyboard.
May 27, 2025
Jailbreaking
Jailbreaking is the process of exploiting vulnerabilities in an iOS device's software to remove manufacturer-imposed restrictions.
May 27, 2025
Hooking framework
Hooking framework technique allows to you to intercept and modify a mobile application’s behavior at runtime.
May 27, 2025
False positive
A false positive occurs when a security system incorrectly identifies legitimate, non-malicious activity as a threat.
May 27, 2025
Encryption
Encryption protects sensitive data by converting it into a coded format that can only be read by someone with the proper decryption key.
May 27, 2025
Device cloning
Device cloning is the unauthorized duplication of a mobile device's identity attributes used to create a copy or mimic the original device.
May 27, 2025
Deobfuscation
Code deobfuscation involves reversing techniques used to obscure the functionality of a program.
May 27, 2025
Continuous integration and continuous delivery/deployment (CI/CD)
CI/CD stands for continuous integration (CI) and continuous delivery/ continuous deployment (CD).
May 27, 2025
Code obfuscation
Code obfuscation is the process of modifying an executable so that it is useless to a hacker while remaining fully functional.
May 27, 2025
Prev
1
...
445
446
447
448
449
450
451
452
453
...
7640
Next