Lately in the news, we’ve read a lot about popular apps performing malicious and intrusive behaviors. The fact is that as users, we only see a tiny part of the actions performed by mobile apps, the rest of them being silently executed. Comparable to an iceberg, 90% of an app’s actions are hidden and consequently, hard to control.
Most online transactions require a two-step authentication, and the One-Time-Password (OTP) sent by SMS is often one of those two steps. The purpose of an OTP is to prevent fraud by confirming that the person making the transaction and the credit card owner are one and the same. To do so, a temporary code is automatically sent by SMS to the phone number associated with the bank account used.
The digital transformation immersed us into a mobile-first world where smartphones and smart devices are the communications media. Mobile Applications became the cornerstone of this new model providing hackers with a new landscape to play in.
In the 90’s, as the home PC market really took off, a bunch of viruses began to appear. Consequently, some companies developed antivirus softwares that would categorized known threats and block them.
Two decades later, mobile devices became the first point of access to the internet and not surprisingly, they started to attract hackers’ attention. To ward off mobile attacks, the first reflex everyone had was to keep using the same kind of protection that was used with PC: antiviruses. But quickly, threats became more advanced and their number kept growing, pushing the mobile security market to renew itself.
Computer Science has no limit. This strong conviction has always been the reason for my attraction to it. But why is there no limit? Because like any other science by definition, it has no ending. Computer Science also brings into reality results of applied researches, themselves supported by fundamental researches.