Here we explain why additional security mechanisms, beyond the mobile OS security features, are needed to protect mobile banking applications from malware and related threats.Read more
Application hardening for mobile apps refers to implementing security measures to protect apps against reverse-engineering or tampering. In this article, we look at the importance of application hardening for mobile banking applications and explore some of the techniques that can be used to shield an app against such attacks.Read more
As the use of mobile phones for mobile banking and payment applications increases, corresponding security threats are increasing as well. The majority of smart phones use only two operating systems (Android and iOS) and, therefore, they represent prey of choice for criminal groups and malevolent hackers.
In this article, we will explain some of the defense mechanisms and security techniques involved with protecting mobile banking applications.Read more
The broader financial services industry – including banks, credit card companies, FinTech service providers, tech companies offering digital wallets etc – are today at the frontlines in the fight against cybercrime. Because these companies are involved in moving large sums of money around each day, they become obvious targets for criminal elements.Read more
In today’s cyber-world there is an ever-present risk of unauthorized access to all forms of data. Most at risk is financial and payment system data that can expose the personal identifying information (PII) or payment card details of customers and clients. Encryption is crucial for protecting PII and mitigating the risks that businesses which conduct payment transactions face every minute of every day.
In this article we will talk about symmetric encryption in banking, its advantages and some challenges of managing the keys.Read more
Retail banking has been unrecognizably transformed by digitization. Everything from payments to basic credit products can now be availed digitally. However, when it comes to corporate or business banking, the pace has just not been the same. One good example of this is the process of trade which includes both vanilla open account transactions and trades secured via documentary credit products.Read more
This article discusses the secure HTTPS Protocol intended for web-resources and its principles of operation as well as its strengths and weaknesses. It explains how attacks on HTTPS may lead to traffic being decrypted, particularly in systems for remote banking services and personal logins to web-resources.Read more
Have you ever heard the kind of sweet and innocent voice saying, “I didn’t eat my brother’s ice cream”, while the kid’s mouth and t-shirt are covered with chocolate and cream?Read more