CRYPTOMATHIC BLOG

 

MASC (2)

Diagram showing the different layers of mobile app security

5 min read

Common Mobile Banking App Security Issues and How to Solve Them

An investigation conducted by "Which?", a consumer watchdog group based in the UK, found serious vulnerabilities in the security of banking security...

Read More

3 min read

Mobile App Hardening: Root and Jailbreak Detection

Unlike other operating systems like Windows, Linux, or OSX, both Android and iOS operating systems are usually shipped with built-in user rights...

Read More
A person peeping through a set of white Venetian blinds

3 min read

Why Native Code Obfuscation Techniques is Essential for Mobile Apps

In the mobile environment, source code is often distributed without enough security. Programs compiled as bytecode, such as the ones developed for...

Read More
A light brown praying mantis poised on the end of a leaf

3 min read

10 Anti-debugging Techniques for Mobile Banking and Payment Apps

In the mobile environment, while debuggers are legal and legitimate development tools, hackers can also use them to reverse mobile banking and...

Read More

2 min read

Addressing HTTPS Vulnerabilities in Mobile Banking and Payment Apps

Here we describe some of the HTTPS vulnerabilities in the context of mobile banking and their countermeasures.

Read More

5 min read

Secure Connectivity for Mobile Banking and Payment Apps: HTTPS Tunneling

In this article, we will describe what HTTPS tunneling is and how it has been used in mobile banking and payment applications. We also look at some...

Read More
protecting-mobile-apps-with-tokens

3 min read

Access Token Protection: Secure Connectivity for Mobile Apps

In this article, we introduce the role that access tokens play in mobile banking applications and provide recommendations on how to secure these...

Read More

2 min read

Overview of App & Code Hardening for Mobile Banking Apps

Application hardening usually consists in processing an already developed application, and transforming it so to make it difficult / impossible to...

Read More
A smartphone wrapped in a thick chain, illustrating the importance of secure storage and key protection for mobile banking and payment apps

3 min read

Secure Storage and Key Protection for Mobile Banking and Payment Apps

The security of the storage of cryptographic secrets is essential to ensuring the security of the whole chain of the cryptographic protocol, where...

Read More