Categories
Mobile Protection

Post COVID-19: 4 Application Trends You Need To Know

Reading Time: 2 minutes

In an already digital world, the Covid-19 pandemic forced society and businesses to adopt additional modes of technology and press on for more advanced application development. Business’ focus shifted to increased remote work collaboration, streamlined contact tracing work, and enhanced consumer e-commerce connections. With little knowledge on how much longer social distancing measures will be in place, more on-demand application development options are needed to successfully maintain workplace functionality.

Categories
Mobile Protection

Navigating the Choice Between Security and Customer Experience

Reading Time: 3 minutes

Navigating the Choice Between Security and Customer Experience

Chances are, if you’ve used a mobile banking app, or bought something online, your purchase was facilitated in part by a Fiserv product. Fiserv is a global provider of financial services technology. Clients include banks, credit unions, financial companies and retailers. As a Fintech company, Fiserv provides payment and commerce enabling technology to clients in more than 100 countries, serving as an “industry standard” across the world.

Categories
Mobile Protection

Tools Don’t Hack Apps, Hackers Do: Securing Android Apps Against Frida

Reading Time: 5 minutes

Search for lockpicking and you’ll see that there’s no shortage of suppliers ready to serve locksmiths and hobbyists, each community having a perfectly legitimate need. Is there any reason to believe that burglars don’t shop the same sites? 

Categories
Mobile Protection

RASP Deep Dive: Hype Versus Reality

Reading Time: 4 minutes

Applications are vulnerable. Eighty-six percent of web apps have access control and authentication issues, while 80 percent of mobile apps may unwittingly expose critical vulnerabilities. As noted by Dark Reading, even traditionally “safe” digital environments such as industrial control systems (ICS) are now at risk — more than 50 percent of ICS/SCADA applications available through reputable app stores contain serious authorization flaws.

Categories
Mobile Protection

5 Penetration Test Tips for Mobile Apps

Reading Time: 4 minutes

Five Penetration Test Tips to Create Secure Mobile Apps

Just as businesses and consumers make the shift from desktop-driven digital change to mobile devices and applications, so are malicious actors. While traditional attack vectors still enjoy widespread success, increasing infosec knowledge about cybercriminal origins and threat profiles has pushed attackers down a new path: Mobile.

Categories
Mobile Protection

Mobile App Security and Best Practices: Leveraging the OWASP 3-Layer Model

Reading Time: 3 minutes

Mobile App Security and Best Practices: Leveraging the OWASP 3-Layer Model

The mobile attack surface is expanding. As of January 2018 there were 3.7 billion unique mobile users worldwide choosing from more than 10 million verified applications across popular online stores. So it’s no surprise that security firms now detect millions of malicious install packages each quarter as hackers look for ways to compromise both existing mobile devices and their newest iteration, IoT.

Categories
Mobile Protection

Technology Trust Issues When Running in Untrusted Environments? Try Application Shielding

Reading Time: 4 minutes

“Software is eating the world.” The now-famous quote by technology expert Marc Andreessen was relevant in 2011 but seems downright prophetic in 2018 — the rise of web-based, mobile and IoT applications have created a market both massive and ever-changing. Companies know that simply staying competitive requires cutting-edge apps that both streamline the user experience and provide a steady flow of actionable data. But malicious actors also recognize the value of applications — and will do anything they can to compromise, infiltrate or damage business app networks.

Categories
Mobile Protection

Your apps may be getting hacked – Why should you care? What can you do?

Reading Time: 3 minutes

Today more than ever, applications are mobile and can be run worldwide. And many useful apps access sensitive data and have value-added functionality within them (such as trade secrets). Because traditional firewall type attacks are much more difficult today, hackers are increasingly targeting both consumer and enterprise mobile and desktop apps as a newer attack vector.

Categories
Mobile Protection

6 Signs That You May be Overdue for a Mobile Application Risk Review

Reading Time: 2 minutes

Every organization must ultimately make their own assessment as to the level of risk they are willing to tolerate – and mobile application risk is no exception to this rule.

Categories
Mobile Protection

PreEmptive Solutions’ Mobile Application Risk Management Portfolio: Four Releases in Four Weeks

Reading Time: 2 minutes

Preventing IP theft, data loss, privacy violations, software piracy, and a growing list of other risks uniquely tied to the rise of enterprise mobile computing.