2 min read
Mobile Banking & Payment App Security: Anti-Tampering Insights
Mobile banking and payment app security is deeply linked to their ability to prevent attackers from tampering with them.
 
                  
                
                2 min read
 Martin Rupp (guest):  20. February 2020
                    
                    Martin Rupp (guest):  20. February 2020
                  Mobile banking and payment app security is deeply linked to their ability to prevent attackers from tampering with them.
 
                  
                
                2 min read
 Martin Rupp (guest):  18. February 2020
                    
                    Martin Rupp (guest):  18. February 2020
                  Key Blocks have been invented as a standard way for protecting the integrity of symmetric cryptographic keys and for identifying what the keys can be...
 
                  
                
                2 min read
In June 2019, the PCI Security Standards Council issued an information supplement titled PCI PIN Security Requirement 18-3 – Key Blocks, which...
 
                  
                
                3 min read
 Edlyn Teske:  24. January 2020
                    
                    Edlyn Teske:  24. January 2020
                  The first practical chosen-prefix collision attack on SHA-1 was announced in January 2020 by researchers Gaëtan Leurent and Thomas Peyrin: “SHA-1 is...
 
                  
                
                2 min read
This article discusses recent warnings that a chosen-prefix collision attack on SHA-1 is now practical and cost-effective for attackers.
 
                  
                
                2 min read
 Martin Rupp (guest):  21. January 2020
                    
                    Martin Rupp (guest):  21. January 2020
                  The ANSI X9.24-1-2017 norm details how symmetric cryptographic keys should be managed and handled by the relevant actors of the retail financial...
 
                  
                
                3 min read
FIPS 140 (“Federal Information Processing Standard”) is a series of security standards published by the U.S. government that specify security...
 
                  
                
                4 min read
In today’s cyber-world there is an ever-present risk of unauthorized access to all forms of data. Most at risk is financial and payment system data...
 
                  
                
                6 min read
A system's cryptographic protection against attacks and malicious penetration is determined by two factors: (1) the strength of the keys and the...