The Hidden Face of Uber: Behaviors & Vulnerabilities

Posted by Roxane Suau on October 12, 2017

Lately in the news, we’ve read a lot about popular apps performing malicious and intrusive behaviors. The fact is that as users, we only see a tiny part of the actions performed by mobile apps, the rest of them being silently executed. Comparable to an iceberg, 90% of an app’s actions are hidden and consequently, hard to control.

Read More

SMS OTP Authentication: Not As Safe As You May Think

Posted by Nicolas Desnos on October 05, 2017

Most online transactions require a two-step authentication, and the One-Time-Password (OTP) sent by SMS is often one of those two steps. The purpose of an OTP is to prevent fraud by confirming that the person making the transaction and the credit card owner are one and the same. To do so, a temporary code is automatically sent by SMS to the phone number associated with the bank account used.

Read More

Mobile Application Security Guide 2017

Posted by Roxane Suau on September 20, 2017

The digital transformation immersed us into a mobile-first world where smartphones and smart devices are the communications media. Mobile Applications became the cornerstone of this new model providing hackers with a new landscape to play in.

Read More

Impostor Apps Put Android Users At Risk

Posted by Roxane Suau on August 07, 2017

In an article published in March, we were informing you about the risks behind malicious clones of popular applications. Five months later, impostor apps are still trying to access our data and to target more users.

Read More

Overlay Malwares, Silently Stealing your Banking Credentials

Posted by Vivien Raoul on July 19, 2017

Overlay malware allows attackers to create an overlay to be displayed on top of legitimate Android applications. The overlay mimics the real app UI (User Interface) to trick users into entering sensitive data into a fake window that will collect and forward them to a remote attacker.

Read More