This year may mark a turning point in the cyber world. As the pandemic urged organizations to enable remote working, the dissolution of traditional...
Continue ReadingTopic: Mobile Application Security
In-App Protection | Prevent fraud by thwarting clones and fake apps
By
Roxane Suau on September 21, 2020
Despite being built with various shielding techniques, mobile apps are easily cloned or mimicked. As a result, fraud figures have kept growing since...
Continue ReadingHow to vet mobile apps before issuing them to collaborators
By
Roxane Suau on June 30, 2020
Cybersecurity experts are unanimous, mobile apps are hackers’ preferred vector to exfiltrate valuable data from mobile devices. Yet, the flexibility...
Continue ReadingApplication threat analysis/App vetting: how to separate key decision-making insights from pointless information
By
Roxane Suau on June 26, 2020
Needless to emphasize that applications stand at the very heart of mobile usages. Except for very specific business cases, mobile workers require...
Continue ReadingWhy cloning your app is a piece of cake?
By
Roxane Suau on June 19, 2020
One thing is certain: cloning an application is a child’s play for cyber-criminals. Fake apps (or clones) are Android or iOS mobile applications that
Continue Reading