Bug Bounty Program

Security is of utmost importance to VASCO as is maintaining a high security bar for our products and cloud services. As such, VASCO has launched a bug bounty program to expand the security evaluation of our products beyond our walls and tap into the large pool of highly skilled ethical hackers outside our company. The bug bounty program currently consists of two projects. The server-side project covers VASCO’s IDENTIKEY Authentication… Read more


Recent data breaches and malware phishing attacks have unfortunately become the “new norm” in today’s digital world. Cybercriminals target Internet users of all stripes to gain access to online accounts associated with an email address, such as online banking. A consumer alert from the IRS reported a 400% increase in online phishing and malware attacks during the 2016 U.S. tax season. Phishing attacks resulting from successful data breaches and stolen… Read more


What Bob Dylan and RASP Have in Common

Ok, now that I have your attention, I’ll explain how I got here. Feel free to follow along. In early April, the creative folk icon finally made his way to Stockholm and the home of the Swedish Academy to formally accept his 2016 Nobel Prize for Literature and the 8 million Swedish krona (approximately $900,000 US) that went along with it. It happens that one of his most well known… Read more


SMS Authentication

Banks and payment service providers sometimes rely on SMS to verify the identity of a person who wishes to make a wire transfer or confirm a payment. They send an SMS message with a one-time password (OTP) to the person’s mobile phone, and the user has to enter this OTP into the application of the bank or payment service provider. In this blog post I discuss whether SMS-based authentication will… Read more


November 25, 2016 - Guest Blogger Lars Birkeland, Marketing Director of Promon
Tesla cars can be stolen by hacking the app

Our researchers have demonstrated that because of lack of security in the Tesla smartphone app, cyber criminals could take control of the company’s vehicles, to the point where they can track and locate the car in real-time, and unlock and drive the car away unhindered. Such a hack gives criminals total control of the vehicle, providing additional functionality to that exposed by Keen Security Labs in a different hack in… Read more


November 15, 2016 - Guest Blogger Lars Birkeland, Marketing Director of Promon
A total of 89 per cent of users wouldn’t know if their mobile device had been cyber attacked

A recent survey by app security specialist Promon has revealed that mobile users are massively unaware of cyber threats, with an overwhelming 89 per cent of respondents admitting they wouldn’t know if their device has been infected through a cyber attack. Users’ lack of awareness of mobile threats presents a significant challenge for businesses across every sector, meaning companies need to take extra steps to secure their customers’ data. Avoiding… Read more


The debate over the relative importance of mobile banking was settled long ago. Mobile banking is already the number one channel for many customers of financial institutions, it is being used by about half of those with a banking relationship, it has grown to become the number two preferred channel overall and will soon become number one, and there is nothing on the horizon that can reverse these trends. Unlike… Read more


Why Banks Will Win the Battle for the Mobile Wallet

In September of 2014, Apple CEO Tim Cook promised that his company’s upcoming mobile payment offering would forever change the way we buy. The announcement of Apple Pay undeniably accelerated our collective migration towards mobile payments.  Even though Apple has received most of the media attention, I believe it will be banks that will emerge as the winners after the dust has settled.  This is because they are the undisputed… Read more


May 22, 2014 - Marc Pletinckx
Should mobile apps be secured with strong authentication?

The answer is – obviously – YES, especially when you look at the kind of malware and vulnerabilities that are roaming around. When you launch your latest purchased app on your smartphone or tablet for the first time, you are asked to fill in your username and password. There is a big chance that those credentials are then memorized by the app, so that this information resides somewhere on your phone… Read more


How to build trustworthy apps... without scaring your users away?

The explosive growth in mobile apps and devices has triggered an increase in mobile security risks. As a consequence, users become more vigilant when deciding which apps to trust and which ones are best left untouched. Whether you build your own applications, or use them to run your day-to-day business, your users demand trustworthy apps! But how do you do that? How can you ensure users trust your apps and… Read more