CRYPTOMATHIC BLOG

 

Mobile App Security (3)

3 min read

Mobile Banking Application Protection: Challenges and Techniques

As the use of mobile phones for mobile banking and payment applications increases, so too do the security threats. Most smartphones use only two...

Read More
A detailed diagram showing the various steps involved in mobile payment tokenization

4 min read

How to Secure Mobile Payment Apps with Tokenization

The use of mobile payments is expected to continue to rise and become the second most popular payment method after debit cards by 2022. Analysts...

Read More

3 min read

Mobile App Data Obfuscation Techniques for Banking

Code obfuscation is one of the most effective techniques for protecting sensitive data in mobile banking and payment apps. However, it's not always...

Read More

2 min read

Why Emulator Detection is Essential for Mobile Banking and Payment App Security

Attacks on mobile banking and payment applications frequently begin with the use of an emulator for the mobile operating system, where the targeted...

Read More
Diagram showing the different layers of mobile app security

5 min read

Common Mobile Banking App Security Issues and How to Solve Them

An investigation conducted by "Which?", a consumer watchdog group based in the UK, found serious vulnerabilities in the security of banking security...

Read More

3 min read

Mobile App Hardening: Root and Jailbreak Detection

Unlike other operating systems like Windows, Linux, or OSX, both Android and iOS operating systems are usually shipped with built-in user rights...

Read More
A person peeping through a set of white Venetian blinds

3 min read

Why Native Code Obfuscation Techniques is Essential for Mobile Apps

In the mobile environment, source code is often distributed without enough security. Programs compiled as bytecode, such as the ones developed for...

Read More
A light brown praying mantis poised on the end of a leaf

3 min read

10 Anti-debugging Techniques for Mobile Banking and Payment Apps

In the mobile environment, while debuggers are legal and legitimate development tools, hackers can also use them to reverse mobile banking and...

Read More

2 min read

Addressing HTTPS Vulnerabilities in Mobile Banking and Payment Apps

Here we describe some of the HTTPS vulnerabilities in the context of mobile banking and their countermeasures.

Read More