3 min read
Mobile Banking Security: Data Obfuscation Techniques
Code obfuscation is one of the most effective techniques for protecting sensitive data in mobile banking and payment apps. However, it's not always...
3 min read
Code obfuscation is one of the most effective techniques for protecting sensitive data in mobile banking and payment apps. However, it's not always...
2 min read
Attacks on mobile banking and payment applications frequently begin with the use of an emulator for the mobile operating system, where the targeted...
5 min read
An investigation conducted by "Which?", a consumer watchdog group based in the UK, found serious vulnerabilities in the security of banking security...
3 min read
Unlike other operating systems like Windows, Linux, or OSX, both Android and iOS operating systems are usually shipped with built-in user rights...
3 min read
In the mobile environment, source code is often distributed without enough security. Programs compiled as bytecode, such as the ones developed for...
3 min read
In the mobile environment, while debuggers are legal and legitimate development tools, hackers can also use them to reverse mobile banking and...
2 min read
Here we describe some of the HTTPS vulnerabilities in the context of mobile banking and their countermeasures.
5 min read
In this article, we will describe what HTTPS tunneling is and how it has been used in mobile banking and payment applications. We also look at some...
3 min read
In this article, we introduce the role that access tokens play in mobile banking applications and provide recommendations on how to secure these...