3 min read
Why Native Code Obfuscation is Essential for Mobile Apps
In the mobile environment, source code is often distributed without enough security. Programs compiled as bytecode, such as the ones developed for...
3 min read
In the mobile environment, source code is often distributed without enough security. Programs compiled as bytecode, such as the ones developed for...
3 min read
In the mobile environment, while debuggers are legal and legitimate development tools, hackers can also use them to reverse mobile banking and...
2 min read
Here we describe some of the HTTPS vulnerabilities in the context of mobile banking and their countermeasures.
5 min read
In this article, we will describe what HTTPS tunneling is and how it has been used in mobile banking and payment applications. We also look at some...
3 min read
In this article, we introduce the role that access tokens play in mobile banking applications and provide recommendations on how to secure these...
2 min read
Application hardening usually consists in processing an already developed application, and transforming it so to make it difficult / impossible to...
3 min read
The security of the storage of cryptographic secrets is essential to ensuring the security of the whole chain of the cryptographic protocol, where...
2 min read
Mobile banking and payment app security is deeply linked to their ability to prevent attackers from tampering with them.
3 min read
AdES stands for Advanced Electronic Signature, which embraces a family of eIDAS-compliant standards for digital signatures including PAdES, CAdES and...