Mobile Security
Blog: Why Hackers Love Phones – Keep your Eye on the Device
This is the third article in a guest blog series from Intellyx. Catch up on the first article here and the second one here. Maintaining a corporate cybersecurity posture means locking down its ...
SEC’s X Breach Highlights Need for Better Defense Against SIM Swap Attacks
The ease with which fraudsters applied the SIM swap attack on the SEC indicates the issue should be a top concern for all organizations ...
How Your Mobile Apps Leak Sensitive Data?
Do you know there are 2.9 million applications on the Google Play Store, which indicates that the Android market is growing quickly? Although there are many benefits and opportunities associated with it, ...
Breaking Bitlocker
It was only a matter of time before someone did this. Bitlocker is Microsoft’s technique for encrypting a desktop, laptop, or other MS Windows device. We encrypt the device to protect the ...
Applying Zero-Trust to Voice Networks and the 5G Core
Zero-trust architecture is rapidly becoming the go-to approach for security and IT leaders to secure voice, mobile and 5G networks and applications ...
Revealing the Limitations of Apple DeviceCheck and Apple App Attest
This overview outlines the history and use of Apple DeviceCheck including the DeviceCheck App Attest feature. It will highlight how this security solution is used and highlight some limitations. We also compare ...
What is Mobile Application Testing? How to Conduct It
A survey indicates that more than 98% of mobile applications lack security. This is primarily attributed to a common misconception in app development practices, where mobile application testing is often deferred to ...
“Mobile First” is for Mobile Secrets, Too
This is the second article in a guest blog series from Intellyx. You can read the first article here. Organizations, such as the Citi Consumer Bank when I was head of security ...
Top Security Trends and Predictions for 2024
Approov stands at the forefront of mobile cybersecurity: Our expansive customer base, ongoing research initiatives and the insights we collect from our live threat metrics, give us unique visibility into trends in ...
Understanding the Security of Mobile Apps in Africa
CyLab-Africa researchers partner with mobile security provider for summer collaboration experience Researchers from CyLab-Africa and the Upanzi Network recently partnered with the mobile security provider Approov to explore the security of common financial services apps used ...