Despite being built with various shielding techniques, mobile apps are easily cloned or mimicked. As a result, fraud figures have kept growing since...
Continue ReadingTopic: Mobile Application Security
How to vet mobile apps before issuing them to collaborators
By
Roxane Suau on June 30, 2020
Cybersecurity experts are unanimous, mobile apps are hackers’ preferred vector to exfiltrate valuable data from mobile devices. Yet, the flexibility...
Continue ReadingApplication threat analysis/App vetting: how to separate key decision-making insights from pointless information
By
Roxane Suau on June 26, 2020
Needless to emphasize that applications stand at the very heart of mobile usages. Except for very specific business cases, mobile workers require...
Continue ReadingWhy cloning your app is a piece of cake?
By
Roxane Suau on June 19, 2020
One thing is certain: cloning an application is a child’s play for cyber-criminals. Fake apps (or clones) are Android or iOS mobile applications that
Continue ReadingA basic wallpaper app dressed up into a COVID-19 info app
By
Roxane Suau on April 16, 2020
In those troubled times, the world population demonstrates each day an unprecedented outpouring of solidarity, goodwill and aid. Unfortunately, the...
Continue Reading