3 min read
Mobile App Hardening: Root and Jailbreak Detection Techniques
Unlike other operating systems like Windows, Linux, or OSX, both Android and iOS operating systems are usually shipped with built-in user rights...
3 min read
Unlike other operating systems like Windows, Linux, or OSX, both Android and iOS operating systems are usually shipped with built-in user rights...
3 min read
In the mobile environment, source code is often distributed without enough security. Programs compiled as bytecode, such as the ones developed for...
3 min read
In the mobile environment, while debuggers are legal and legitimate development tools, hackers can also use them to reverse mobile banking and...
2 min read
Here we describe some of the HTTPS vulnerabilities in the context of mobile banking and their countermeasures.
5 min read
In this article, we will describe what HTTPS tunneling is and how it has been used in mobile banking and payment applications. We also look at some...
3 min read
In this article, we introduce the role that access tokens play in mobile banking applications and provide recommendations on how to secure these...
2 min read
Application hardening usually consists in processing an already developed application, and transforming it so to make it difficult / impossible to...
3 min read
The security of the storage of cryptographic secrets is essential to ensuring the security of the whole chain of the cryptographic protocol, where...
2 min read
Mobile banking and payment app security is deeply linked to their ability to prevent attackers from tampering with them.