SMS OTP Authentication: Not As Safe As You May Think

Posted by Roxane Suau on February 17, 2020

Most online transactions require a two-step authentication, and the One-Time-Password (OTP) sent by SMS is often one of those two steps. The purpose of an OTP is to prevent fraud by confirming that the person making the transaction and the credit card owner are one and the same. To do so, a temporary code is automatically sent by SMS to the phone number associated with the bank account used.

 

Read More

OWASP Top 10 mobile risks: Break down and mobile app development best practices

Posted by Roxane Suau on January 30, 2020

The Open Web Application Security Project (OWASP) is a worldwide non-profit organization that frequently publishes practical information on application security. OWASP has published the “Top 10 Mobile Risks”, a list dedicated to securing mobile applications.

 

Read More

Pradeo Lab's cybersecurity predictions for 2020

Posted by The Pradeo Lab on January 17, 2020

 

The cybersecurity landscape is evolving at a fast pace. Hackers constantly sophisticate their attack techniques while security vendors push their technologies forward to keep warding threats off efficiently. Mobile security has become in the last couple years a major topic for security teams, as nearly all workforces now use mobile devices for work purpose. According to our team, here is what should be expected in 2020.

 

Read More

Why Updating Mobile OS And Application Is So Important

Posted by Roxane Suau on December 19, 2019

System and application updates always seem to pop up at less than timely moments, and most of us postpone them without second thoughts, for days, weeks, months… However, these updates represent an essential piece of systems’ stability and safety, as they include functionality enhancements and patches to security holes.

 

Read More

A mobile security solution dedicated to Samsung | What is Pradeo Security for Samsung?

Posted by Stéphane Saad on December 19, 2019

Enterprise mobility is remarkably enhancing productivity. Companies have seized this opportunity by enabling collaborators to work with mobile devices and applications, often out of companies’ premises. Accordingly, mobile data privacy has become a major focus for end-users and authorities in the last years. The area is now regulated by general or industry-specific laws that require organizations to protect their mobile environment through the deployment of dedicated solutions. These new usages and legal requirements are redefining cybersecurity, constraining security heads to rethink their strategy.

 

Read More