CRYPTOMATHIC BLOG

 

Mobile App Security (3)

Great white shark gliding lazily beneath the ocean, symbolising malware threats to mobile banking apps

5 min read

Understanding Malware Protection for Mobile Banking Apps

To bank safely online, you need additional mobile app security mechanisms that go beyond standard OS security features. In this article, we take an...

Read More

3 min read

Mobile Banking Application Protection: Challenges and Techniques

As the use of mobile phones for mobile banking and payment applications increases, so too do the security threats. Most smartphones use only two...

Read More
A detailed diagram showing the various steps involved in mobile payment tokenization

4 min read

How Tokenization Secures Mobile Payment Applications

The use of mobile payments is expected to continue to rise and become the second most popular payment method after debit cards by 2022. Analysts...

Read More

3 min read

Mobile Banking Security: Data Obfuscation Techniques

Code obfuscation is one of the most effective techniques for protecting sensitive data in mobile banking and payment apps. However, it's not always...

Read More

2 min read

Emulator Detection: Key for Mobile Banking & Payment App Security

Attacks on mobile banking and payment applications frequently begin with the use of an emulator for the mobile operating system, where the targeted...

Read More
Diagram showing the different layers of mobile app security

5 min read

Solving Common Mobile Banking Security Issues

An investigation conducted by "Which?", a consumer watchdog group based in the UK, found serious vulnerabilities in the security of banking security...

Read More

3 min read

Mobile App Hardening: Root and Jailbreak Detection Techniques

Unlike other operating systems like Windows, Linux, or OSX, both Android and iOS operating systems are usually shipped with built-in user rights...

Read More
A person peeping through a set of white Venetian blinds

3 min read

Why Native Code Obfuscation is Essential for Mobile Apps

In the mobile environment, source code is often distributed without enough security. Programs compiled as bytecode, such as the ones developed for...

Read More
A light brown praying mantis poised on the end of a leaf

3 min read

10 Anti-debugging Techniques for Mobile Banking Apps

In the mobile environment, while debuggers are legal and legitimate development tools, hackers can also use them to reverse mobile banking and...

Read More