Smartphones and tablets have become the first point of access to the internet. This evolution has led to the creation of many Wi-Fi networks so people can connect from almost anywhere, but it opens a new playground for hackers. The growing amount of public networks and users who get connected to them has increased Man-In-The-Middle attack opportunities.
Most online transactions require a two-step authentication, and the One-Time-Password (OTP) sent by SMS is often one of those two steps. The purpose of an OTP is to prevent fraud by confirming that the person making the transaction and the credit card owner are one and the same. To do so, a temporary code is automatically sent by SMS to the phone number associated with the bank account used.
In the 90’s, as the home PC market really took off, a bunch of viruses began to appear. Consequently, some companies developed antivirus softwares that would categorized known threats and block them.
Two decades later, mobile devices became the first point of access to the internet and not surprisingly, they started to attract hackers’ attention. To ward off mobile attacks, the first reflex everyone had was to keep using the same kind of protection that was used with PC: antiviruses. But quickly, threats became more advanced and their number kept growing, pushing the mobile security market to renew itself.
Computer Science has no limit. This strong conviction has always been the reason for my attraction to it. But why is there no limit? Because like any other science by definition, it has no ending. Computer Science also brings into reality results of applied researches, themselves supported by fundamental researches.