The alarming security state of airline mobile apps

Posted by The Pradeo Lab on May 23, 2019

Do you usually install your airline mobile app when traveling? You may think twice before using it for your next vacation.

Our latest study based on the security testing of global top 50 airline mobile applications shed the light on some alarming data privacy concerns. The audit was performed this week by Pradeo Security, an engine designed to reveal mobile apps’ behaviors (data processing) and vulnerabilities. Among the 50 mobile applications tested, had been included the most used ones globally, mainly from North America, Western Europe and Eastern Asia.

 

Read More

SMS OTP Authentication: Not As Safe As You May Think

Posted by Roxane Suau on May 21, 2019

Most online transactions require a two-step authentication, and the One-Time-Password (OTP) sent by SMS is often one of those two steps. The purpose of an OTP is to prevent fraud by confirming that the person making the transaction and the credit card owner are one and the same. To do so, a temporary code is automatically sent by SMS to the phone number associated with the bank account used.

 

Read More

Monetization of mobile applications: Everything about user profiling

Posted by Roxane Suau on May 06, 2019

It is common to observe in films or books a society where citizens are constantly spied on. Even though this  vision is exaggerated, these narratives lead us to put into perspective the concept of confidentiality in our era.

 

Read More

Why Updating Mobile OS And Application Is So Important

Posted by Roxane Suau on April 29, 2019

System and application updates always seem to pop up at less than timely moments, and most of us postpone them without second thoughts, for days, weeks, months… However, these updates represent an essential piece of systems’ stability and safety, as they include functionality enhancements and patches to security holes.

 

Read More

White Paper | Mobile security for Governments: Threats, real-life cases & adapted security answers

Posted by Roxane Suau on April 18, 2019

The proliferation of mobile devices accessing agency networks, including employees’ personal smartphones and tablets, offers a prosperous playground to hackers.

 

 

Read More