Blog: Why Hackers Love Phones - Keep your Eye on the Device

Blog: Why Hackers Love Phones – Keep your Eye on the Device

This is the third article in a guest blog series from Intellyx. Catch up on the first article here and the second one here. Maintaining a corporate cybersecurity posture means locking down its ...
SEC SIM swap X account

SEC’s X Breach Highlights Need for Better Defense Against SIM Swap Attacks

The ease with which fraudsters applied the SIM swap attack on the SEC indicates the issue should be a top concern for all organizations ...
Security Boulevard
How Your Mobile Apps Leak Sensitive Data?

How Your Mobile Apps Leak Sensitive Data?

Do you know there are 2.9 million applications on the Google Play Store, which indicates that the Android market is growing quickly? Although there are many benefits and opportunities associated with it, ...

Breaking Bitlocker

It was only a matter of time before someone did this. Bitlocker is Microsoft’s technique for encrypting a desktop, laptop, or other MS Windows device. We encrypt the device to protect the ...
network Organizations Still Don’t Get Mobile app Security

Applying Zero-Trust to Voice Networks and the 5G Core

Zero-trust architecture is rapidly becoming the go-to approach for security and IT leaders to secure voice, mobile and 5G networks and applications ...
Security Boulevard
Revealing the Limitations of Apple DeviceCheck and Apple App Attest

Revealing the Limitations of Apple DeviceCheck and Apple App Attest

This overview outlines the history and use of Apple DeviceCheck including the DeviceCheck App Attest feature. It will highlight how this security solution is used and highlight some limitations. We also compare ...

What is Mobile Application Testing? How to Conduct It

A survey indicates that more than 98% of mobile applications lack security. This is primarily attributed to a common misconception in app development practices, where mobile application testing is often deferred to ...
“Mobile First” is for Mobile Secrets, Too

“Mobile First” is for Mobile Secrets, Too

This is the second article in a guest blog series from Intellyx. You can read the first article here. Organizations, such as the Citi Consumer Bank when I was head of security ...
Top Security Trends and Predictions for 2024

Top Security Trends and Predictions for 2024

Approov stands at the forefront of mobile cybersecurity: Our expansive customer base, ongoing research initiatives and the insights we collect from our live threat metrics, give us unique visibility into trends in ...
Understanding the Security of Mobile Apps in Africa

Understanding the Security of Mobile Apps in Africa

CyLab-Africa researchers partner with mobile security provider for summer collaboration experience Researchers from CyLab-Africa and the Upanzi Network recently partnered with the mobile security provider Approov to explore the security of common financial services apps used ...