3 min read
Postbank Master Key Breach: Why Strong Key Management is Essential
In the last couple of months, facts regarding breaches that occurred during December 2018 at PostBank, the national postal bank operator of South...
3 min read
In the last couple of months, facts regarding breaches that occurred during December 2018 at PostBank, the national postal bank operator of South...
4 min read
Tokenization is a generalized concept of a cryptographic hash. It means representing something by a symbol (‘token’).
3 min read
Invented by Mohamed Atalla, the Atalla key block is the root of all key blocks. All over the globe, hundreds of millions of financial transactions...
3 min read
In the mobile environment, source code is often distributed without enough security. Programs compiled as bytecode, such as the ones developed for...
5 min read
The World Wide Web Consortium or W3C as it is commonly known was founded in 1994 by the original architect of the World Wide Web, Tim Berners-Lee. It...
8 min read
This article discusses the main phases involved in the life-cycle of a cryptographic key, and how the operational lifetime of a key and its strength...
6 min read
With data protection standards, such as GDPR, and the sheer mass of data that companies collect and accumulate, the protection and control of...
3 min read
In the mobile environment, while debuggers are legal and legitimate development tools, hackers can also use them to reverse mobile banking and...
2 min read
Here we describe some of the HTTPS vulnerabilities in the context of mobile banking and their countermeasures.