Payment Service Directive (PSD2): What are the challenges for mobile security?

Posted by Roxane Suau on July 19, 2018

What is the PSD2?

The second Payment Service Directive (PSD2) and its associated Regulatory Technical Standards (RTS) have been published by the European Banking Authority and validated by the European Parliament in early 2018.

Read More

Pradeo Sheds the Light on its Unique Mobile Threat Detection Intelligence

Posted by Vivien Raoul on June 14, 2018

Pradeo developed an advanced Artificial Intelligence process delivering the most accurate threat detection technology of the market. Through the years, the Pradeo intelligence center has collected 100 billions of mobile security data, implemented 200.000 security rules and detected nearly 1 million severe mobile threats and billions of leaky behaviors.

Read More

Eurosport Official Mobile App Vulnerable to Data Leakage

Posted by Vivien Raoul on June 08, 2018

While the World Cup is around the corner, football applications are becoming omnipresent. Among their features, you can check live scores, follow your team ranking, create an account linked to your social media etc. At first sight, nothing scary. But while investigating applications* connected to one of the most followed event in the world, Pradeo’s research team found out a worrying trend: most of them are highly intrusive and vulnerable. On top of the list, there is the Eurosport app which was downloaded more than 10 million times.

Read More

Mobile Threat Defense Guide 2018

Posted by Roxane Suau on May 31, 2018

Our highly digital world has fundamentally changed companies’ organization. Smartphones and tablets are now at the center of our personal and professional usages, with an average of 5 hours per day spent on them. In constant demand of immediacy, the new employee is mobile, flexible and always connected.

Read More

New Research: The Current State of Mobile Application Security

Posted by Roxane Suau on May 24, 2018

Mobile applications are the first media we use to access information from our smartphones and tablets. We easily trust them with sensitive data, but what do we know about their security levels? Organizations develop mobile applications at a fast pace to keep up with business needs and often leave aside security measures.

Read More