CRYPTOMATHIC BLOG

 

Mobile App Security (3)

5 min read

Key Cybersecurity Trends to Watch in 2023 and Beyond

Each year, various events within the cybersecurity industry have a significant impact on the industry, leading experts to predict an increase in the...

Read More

5 min read

Protecting the European Digital Identity Wallet

The European Commission promotes the European Digital Identity wallet (EUDI wallet) as part of its effort to digitize the economy and help foster...

Read More
Great white shark gliding lazily beneath the ocean, symbolising malware threats to mobile banking apps

5 min read

Understanding Malware Protection for Mobile Banking Apps

To bank safely online, you need additional mobile app security mechanisms that go beyond standard OS security features. In this article, we take an...

Read More

3 min read

Mobile Banking Application Protection: Challenges and Techniques

As the use of mobile phones for mobile banking and payment applications increases, so too do the security threats. Most smartphones use only two...

Read More
A detailed diagram showing the various steps involved in mobile payment tokenization

4 min read

How Tokenization Secures Mobile Payment Applications

The use of mobile payments is expected to continue to rise and become the second most popular payment method after debit cards by 2022. Analysts...

Read More

3 min read

Mobile Banking Security: Data Obfuscation Techniques

Code obfuscation is one of the most effective techniques for protecting sensitive data in mobile banking and payment apps. However, it's not always...

Read More

2 min read

Emulator Detection: Key for Mobile Banking & Payment App Security

Attacks on mobile banking and payment applications frequently begin with the use of an emulator for the mobile operating system, where the targeted...

Read More
Diagram showing the different layers of mobile app security

5 min read

Solving Common Mobile Banking Security Issues

An investigation conducted by "Which?", a consumer watchdog group based in the UK, found serious vulnerabilities in the security of banking security...

Read More

3 min read

Mobile App Hardening: Root and Jailbreak Detection Techniques

Unlike other operating systems like Windows, Linux, or OSX, both Android and iOS operating systems are usually shipped with built-in user rights...

Read More