Fornite on Mobile

CEO Tim Sweeny of Epic Games, the publisher of the wildly popular Fortnite game, is on a mission to “advance the openness of all platforms” – not to mention side-step Google’s 30% take of developer proceeds – by distributing Fortnite for the Android platform via their website rather than the Google Play store. I applaud a maverick challenging the status… Read more


August 14, 2018 - Frederik Mennes
overlay attacks

The growth of mobile technology and the increased importance of cybersecurity have dominated news cycles in the past year. At the same time, one of the biggest threats we’re seeing against mobile are overlay attacks – combining social engineering with inherent security weaknesses found in mobile apps, these attacks take advantage of users to trick them into sharing sensitive data…. Read more


Diving into Summer Vacation Security Risks

We are in the middle of the holiday season, and while it may be the most enjoyable part of the year, it’s definitely not the safest. We all take our technology gear with us on vacation, the kids enjoy their devices and professionals today worry about completely disconnecting from their work responsibilities. Here’s the problem, security threats don’t stop just… Read more


PSD2: Creating a Secure Execution Environment for Mobile Banking Apps

The revised Payment Services Directive, also known as PSD2, pays a lot of attention to the security of mobile banking apps, mobile payment apps, mobile wallets, and other apps that offer payment functionality. The most important requirements related to mobile app security are present in Article 9 of the final Regulatory Technical Standards (RTS) on Strong Customer Authentication (SCA) and… Read more


New iOS 12 Feature Risks Exposing Users to Online Banking Fraud

Security Code AutoFill is a new feature for iPhones in iOS 12. It is supposed to improve the usability of two-factor authentication, but could expose users to online banking fraud by removing the human validation aspect of the transaction signing/authentication process. Two-factor authentication (2FA), which is often referred to as two-step verification, is an essential element of many security systems,… Read more


selfie

The Economic Growth, Regulatory Relief, and Consumer Protection Act was just signed into law by President Trump.  Also known as the Dodd-Frank Repeal, the new law removes many of the regulations imposed on banks after the financial crisis and the Great Recession of the late 2000s.  As with most laws, the Act includes numerous provisions. Among these is Section 213,… Read more


mobile

As part of a secure and seamless mobile first strategy, banks, credit unions, and other financial institutions must rethink the customer journey. Financial institutions strategically aim for customers to do more with mobile while minimizing fraud exposure tied to untrusted, high-risk devices. To enable growth in the mobile channel, financial institutions need to provide fast, convenient, and frictionless high-value services… Read more


Mobile App Shielding

We regularly host webcasts on topics such as mobile app shielding, fraud, authentication, RASP and risk analysis to provide guidance on how to protect your customers and data. If you missed our latest webcast, Delivering Trust Through Mobile App Shielding and Hardening, here is the 5-minute summary. The full presentation is available on-demand. As mobile devices and apps proliferate, organizations are increasingly… Read more


Mobile Banking

The mobile channel doesn’t grow itself. It requires a strategy, a team committed to execution, and constant care and grooming. As financial services organizations embark on mobile-first initiatives or offer more and more mobile services to their customers, they prioritize three goals:   1. Optimize both user convenience and security 2. Stay ahead of the curve on mobile security and… Read more


At DeveloperWeek 2018 in San Francisco, I had a provocative question for mobile app developers: “Is mobile app security important to you, and if so, what are you doing about it?” The majority of developers I spoke with at the event agreed that security is important. However, when pressed for more detail, many could not describe the specific measures taken… Read more