Skip to the main content.

CRYPTOMATHIC BLOG

 

Mobile App Security (3)

4 min read

Steps to Achieve State-of-the-Art Protection for Your Mobile Apps

In today's digital landscape, ensuring the security of your mobile applications is paramount. Cryptomathic's Mobile App Security Core (MASC) is at...

Read More

2 min read

Mobile Point of Sale Compliance – What is it all about?

PCI have recently released the new standard and compliance program for Mobile Payments on Commercial off-the-shelf devices (MPoC). This blog is the...

Read More

2 min read

Demystifying Mobile Application Hardening: Techniques & Best Practices

What is Mobile Application Hardening? Mobile application hardening refers to the process of securing mobile applications against various threats and...

Read More

7 min read

Top 10 Mobile App Security Threats and How to Protect Your Data

The ubiquity of mobile applications has made them part of our day-to-day lives, but with the increased use comes the risk of potential security...

Read More

4 min read

Cryptomathic's Mobile App Security Core for EUDI Wallet protection

The European Digital Identity (EUDI) Wallet is set to become a cornerstone of digital trust across the EU. In 2025, as the first production wallets...

Read More

6 min read

Resources to Help You Develop and Test EUDI Wallet App Security

Itemizing the potential risks of the European Digital Identity (EUDl) Wallet scheme is a complex task that involves assessing the attack surface of...

Read More

3 min read

Threats to the EUDI Wallet App

The European Digital Identity wallet (EUDI wallet) is proposed by the European Commission to provide a secure, safe and standardized digital identity...

Read More

5 min read

How Assurance Protocols Enhance Mobile App Security

Mobile apps and mobile software components are rarely stand-alone as they frequently perform their most important operations on various backend...

Read More

5 min read

Key Cybersecurity Trends to Watch in 2023 and Beyond

Each year, various events within the cybersecurity industry have a significant impact on the industry, leading experts to predict an increase in the...

Read More