CRYPTOMATHIC BLOG

 

Mobile App Security

4 min read

The Challenges of Certifying the EUDI Wallet: A Deep Dive

As the European Union solidifies the framework for the EUDI (European Digital Identity) wallet, the certification process outlined in the...

Read More

2 min read

Hard Truths About Hardware: Why the EUDI Wallet Needs More Than Just Secure Chips

Mobile phones are increasingly vulnerable to hacking and fraud, presenting significant challenges for securing sensitive applications like the EUDI...

Read More

2 min read

Assessing the EUDI Wallet Reference Implementation Code

The EUDI wallet reference implementation serves as a practical guide for developers to create secure digital identity management solutions based on...

Read More

3 min read

Key Vulnerabilities of the EUDI Wallet Solution Reference Architecture (ARF)

The EUDI (European Digital Identity) wallet solution reference architecture (ARF) is designed to provide a secure framework for managing digital...

Read More

3 min read

7 essential strategies to secure mobile-first consumer-driven banking

North America is catching up fast to the open banking initiatives that are currently thriving across Europe, South America and Asia Pacific. As...

Read More

4 min read

Steps to Achieve State-of-the-Art Protection for Your Mobile Apps

In today's digital landscape, ensuring the security of your mobile applications is paramount. Cryptomathic's Mobile App Security Core (MASC) is at...

Read More

2 min read

Mobile Point of Sale Compliance – What is it all about?

PCI have recently released the new standard and compliance program for Mobile Payments on Commercial off-the-shelf devices (MPoC). This blog is the...

Read More

2 min read

Demystifying Mobile Application Hardening: Techniques and Best Practices

What is Mobile Application Hardening? Mobile application hardening refers to the process of securing mobile applications against various threats and...

Read More

7 min read

Top 10 Mobile App Security Threats and How to Protect Your Data

The ubiquity of mobile applications has made them part of our day-to-day lives, but with the increased use comes the risk of potential security...

Read More