Top 10 Mobile App Security Threats: Safeguard Your Data from Potential Risks

Top 10 Mobile App Security Threats: Safeguard Your Data from Potential Risks

The ubiquity of mobile applications has made them part of our day-to-day lives, but with the increased use comes the risk of potential security threats. It is essential to be aware of these threats and take appropriate measures to safeguard your data and identity. In this article, we will take a look at the top 10 mobile application security threats and how you (as an app developer or user) can protect yourself from them.

Securing a Software-Defined Future in the Automotive Sector

Securing a Software-Defined Future in the Automotive Sector

For decades, cars have been equipped with multiple connected electronic control units (ECUs) that manage various functions like entertainment, route finding, and engine controls. To prevent unauthorized access, each of these components with external connections requires security measures, resulting in a complicated network of overlapping security systems that may contain weaknesses.

Customer confidence in electronic signatures - What is an electronic signature? (and other definitions)

Customer confidence in electronic signatures - What is an electronic signature? (and other definitions)

Were I to ask you what a handwritten signature looks like, with an air of confidence will you grab a pen and scrawl your name on a piece of paper, or, with a flourish, will you grip your thumb and fingers together and, sign your name in the air? 'Voila!’

Payments from a European Digital Identity (EUDI) Wallet

Payments from a European Digital Identity (EUDI) Wallet

The European Digital Identity Wallet (EUDI Wallet) is at the forefront of the European Commission's eIDAS initiative to establish a secure and user-friendly digital identity framework for citizens across the European Union, in order to securely store and manage various digital identity data such as driving license, permits, health cards, diplomas, etc. Beyond identity management, the EUDI Wallet also offers a secure payment solution that leverages the Payment Services Directive 2 (PSD2) and Single Euro Payments Area Credit Transfer (SCT) method. This article explores the features of EUDI Wallet, the process of PSD2 payments, and the stringent security measures employed by wallet providers to protect user funds and data. Discover how EUDI Wallet combines digital identity and payment services to provide a comprehensive and secure user experience.

PQC and How Organizations are Preparing for the Quantum Security Era

PQC and How Organizations are Preparing for the Quantum Security Era

Quantum computers offer potential transformational power for organizations dealing with complex computational problems in various industries such as finance, pharmaceuticals, and automotive. They also pose the risk of breaking the cryptography that currently secures many common digital activities, such as online banking or something as common as browsing the internet (Yes, that green lock in your address bar means you can trust the connection – for now).

How FinTech is Helping Build a More Sustainable Financial Future

How FinTech is Helping Build a More Sustainable Financial Future

Along with the increased convenience and security offered by digital payment technology, many consumers are now showing greater interest in sustainability and are demanding green initiatives, which often go hand in hand with digital payments. This article looks at the current trends in the financial industry, including the impact of FinTech on sustainability and the environment.

The evolution of zero-trust security

The evolution of zero-trust security

The zero-trust approach to enterprise cybersecurity assumes that no connections to corporate systems and networks should be trusted. It requires authentication of users, devices, and systems prior to initial connection and multiple points of re-verification before accessing networks, systems, and data.

How Cryptomathic's Mobile App Security Core Protects the EUDI Wallet

How Cryptomathic's Mobile App Security Core Protects the EUDI Wallet

Cryptomathic Mobile App Security Core (MASC) is a comprehensive security software solution for the European Digital Identity (EUDI) wallet, eID apps, mobile banking apps, etc., comprised of multiple layers of mutually reinforcing mobile app security components that are provided with a simple, easy-to-use API. It enables app developers to focus on developing excellent business applications while leaving the specialist security-critical parts to MASC.

NIST Seeks Public Feedback to Draft Guide on Migration to Post-Quantum Cryptography

NIST Seeks Public Feedback to Draft Guide on Migration to Post-Quantum Cryptography

The National Cybersecurity Center of Excellence (NCCoE) has released a preliminary guide on practices for migrating from legacy cryptography to quantum-resistant cryptography and is seeking comments from industry, government, and academia. The draft document, NIST Special Publication (SP) 1800-38a, Migration to Post-Quantum Cryptography, is open for comment until June 8, 2023.