5 min read
Common Mobile Banking App Security Issues and How to Solve Them
An investigation conducted by "Which?", a consumer watchdog group based in the UK, found serious vulnerabilities in the security of banking security...
5 min read
An investigation conducted by "Which?", a consumer watchdog group based in the UK, found serious vulnerabilities in the security of banking security...
3 min read
Unlike other operating systems like Windows, Linux, or OSX, both Android and iOS operating systems are usually shipped with built-in user rights...
3 min read
In the mobile environment, source code is often distributed without enough security. Programs compiled as bytecode, such as the ones developed for...
3 min read
In the mobile environment, while debuggers are legal and legitimate development tools, hackers can also use them to reverse mobile banking and...
2 min read
Here we describe some of the HTTPS vulnerabilities in the context of mobile banking and their countermeasures.
5 min read
In this article, we will describe what HTTPS tunneling is and how it has been used in mobile banking and payment applications. We also look at some...
3 min read
In this article, we introduce the role that access tokens play in mobile banking applications and provide recommendations on how to secure these...
2 min read
Application hardening usually consists in processing an already developed application, and transforming it so to make it difficult / impossible to...
3 min read
The security of the storage of cryptographic secrets is essential to ensuring the security of the whole chain of the cryptographic protocol, where...