5 min read
Plugging the Security Gaps in Mobile Banking Apps
An investigation conducted by "Which?", a consumer watchdog group based in the UK, found serious vulnerabilities in the security of banking security...
5 min read
An investigation conducted by "Which?", a consumer watchdog group based in the UK, found serious vulnerabilities in the security of banking security...
3 min read
Unlike other operating systems like Windows, Linux, or OSX, both Android and iOS operating systems are usually shipped with built-in user rights...
3 min read
In the mobile environment, source code is often distributed without enough security. Programs compiled as bytecode, such as the ones developed for...
3 min read
In the mobile environment, while debuggers are legal and legitimate development tools, they can also be used to reverse mobile banking and payment...
2 min read
Here we describe some of the HTTPS vulnerabilities in the context of mobile banking and their countermeasures.
5 min read
In this article, we will describe what HTTPS tunneling is and how it has been used in mobile banking and payment applications. We also look at some...
3 min read
In this article, we introduce the role that access tokens play in mobile banking applications and provide recommendations on how to secure these...
2 min read
Application hardening usually consists in processing an already developed application, and transforming it so to make it difficult / impossible to...
4 min read
In this article, we shall focus on the techniques used for protecting keys and in general, cryptographic secrets in the context of mobile banking &...