Mobile Application Security Testing, A Must Do

Posted by Roxane Suau on October 19, 2017

Every month, thousands of mobile applications are released and the amount of apps available on stores is currently estimated to be over 4 millions. In a recent study, the Ponemon institute identified that 60% of IT security leaders reported a data breach caused by an insecure mobile app, meanwhile only 29% of mobile applications are being tested for vulnerabilities.

Read More

The Hidden Face of Uber: Behaviors & Vulnerabilities

Posted by Roxane Suau on October 12, 2017

Lately in the news, we’ve read a lot about popular apps performing malicious and intrusive behaviors. The fact is that as users, we only see a tiny part of the actions performed by mobile apps, the rest of them being silently executed. Comparable to an iceberg, 90% of an app’s actions are hidden and consequently, hard to control.

Read More

SMS OTP Authentication: Not As Safe As You May Think

Posted by Nicolas Desnos on October 05, 2017

Most online transactions require a two-step authentication, and the One-Time-Password (OTP) sent by SMS is often one of those two steps. The purpose of an OTP is to prevent fraud by confirming that the person making the transaction and the credit card owner are one and the same. To do so, a temporary code is automatically sent by SMS to the phone number associated with the bank account used.

Read More

Mobile Application Security Guide 2017

Posted by Roxane Suau on September 20, 2017

The digital transformation immersed us into a mobile-first world where smartphones and smart devices are the communications media. Mobile Applications became the cornerstone of this new model providing hackers with a new landscape to play in.

Read More

Impostor Apps Put Android Users At Risk

Posted by Roxane Suau on August 07, 2017

In an article published in March, we were informing you about the risks behind malicious clones of popular applications. Five months later, impostor apps are still trying to access our data and to target more users.

Read More