4 min read
Hidden Weaknesses in Secure Elements and Enclaves
Secure elements (SE) on Android and secure enclaves on iOS have emerged as trusted hardware-backed solutions for storing and protecting sensitive...
4 min read
Secure elements (SE) on Android and secure enclaves on iOS have emerged as trusted hardware-backed solutions for storing and protecting sensitive...
3 min read
Cryptomathic is thrilled to announce a significant enhancement to our Mobile App Security Solution (MASC) offering with Insights Service. Insights...
4 min read
The choice of app protection should not be taken lightly. Modern applications face numerous threats that evolve alongside advancements in...
1 min read
We are delighted to announced the launch of Obsidian, a cutting-edge payment platform designed to meet the evolving needs of the payment industry....
7 min read
Short-lived certificates play a vital role in current infrastructures, finding a suitable quantum-resistant alternative to the currently used...
2 min read
Two foremost software security experts and pioneers in cryptographic agility and post-quantum cryptography join forces to offer comprehensive,...
4 min read
As the European Union solidifies the framework for the EUDI (European Digital Identity) wallet, the certification process outlined in the...
6 min read
This article evaluates the implementation options for the Signature Activation Module (SAM) in the context of eIDAS 2. Based on this analysis we...
2 min read
Mobile phones are increasingly vulnerable to hacking and fraud, presenting significant challenges for securing sensitive applications like the EUDI...