3 min read
Access Token Protection for Secure Mobile Connectivity
In this article, we introduce the role that access tokens play in mobile banking applications and provide recommendations on how to secure these...
3 min read
In this article, we introduce the role that access tokens play in mobile banking applications and provide recommendations on how to secure these...
2 min read
Application hardening usually consists in processing an already developed application, and transforming it so to make it difficult / impossible to...
3 min read
The security of the storage of cryptographic secrets is essential to ensuring the security of the whole chain of the cryptographic protocol, where...
4 min read
In today’s cyber-world there is an ever-present risk of unauthorized access to all forms of data. Most at risk is financial and payment system data...
3 min read
Retail banking has been unrecognizably changed by digitization. Everything from payments to basic credit products can now be availed digitally....
3 min read
This article discusses the secure HTTPS Protocol intended for web-resources and its principles of operation as well as its strengths and weaknesses....
5 min read
Have you ever heard the kind of sweet and innocent voice saying, “I didn’t eat my brother’s ice cream”, while the kid’s mouth and t-shirt are covered...