Which Third-Party Messenger App Is Best for Secure Business?

In October 2021, Facebook (now Meta), and all its platforms (Instagram, WhatsApp and Messenger) shut down across the globe for up to six hours, leaving billions without a messaging service. While Facebook engineers scrambled to fix the problem, users pivoted to other apps to stay connected. In the wake of the outage, Telegram added 70 […]

The post Which Third-Party Messenger App Is Best for Secure Business? appeared first on Security Intelligence.

Continue reading Which Third-Party Messenger App Is Best for Secure Business?

Securing UX in Open Banking Apps

Historically, only large, well-established banks had control over the majority of consumer and corporate finances, making it highly challenging for smaller financial services providers to break into the market. Open banking has transformed the way org… Continue reading Securing UX in Open Banking Apps

Are Your Employees’ Old Phone Numbers Creating Vulnerabilities?

In the last hour, I’ve used my phone to take pictures of my teenagers, spy on my dogs while I was out of the house, pay my electric bill and watch a funny video. Then, while buying some new dish towels (yet another use), I used my phone as an identity document without even realizing […]

The post Are Your Employees’ Old Phone Numbers Creating Vulnerabilities? appeared first on Security Intelligence.

Continue reading Are Your Employees’ Old Phone Numbers Creating Vulnerabilities?

4 Warning Signs of an Insecure App

The “golden age of digital transformation” is upon us, and companies around the globe are scurrying to meet consumers on the digital frontier. For developers, it is a virtual gold rush, as businesses overhaul their infrastructure to meet consumers whe… Continue reading 4 Warning Signs of an Insecure App

Private LTE or 5G: Which Is More Secure?

Employees using mobile devices for work is nothing new. From health care workers using them for patient care to a salesperson checking work email in an airport, most of us have our phones on us at all times. However, the increase in the number of remote workers due to the COVID-19 pandemic has ramped up […]

The post Private LTE or 5G: Which Is More Secure? appeared first on Security Intelligence.

Continue reading Private LTE or 5G: Which Is More Secure?

Assessing the state of mobile application security through the lens of COVID-19

Are today’s mobile apps secure or do they offer opportunities for attackers? Learn about the state of mobile application security in our new report.
The post Assessing the state of mobile application security through the lens of COVID-19 appeared fir… Continue reading Assessing the state of mobile application security through the lens of COVID-19

Solving 5 Challenges of Contact Tracing Apps

Contact tracing apps are designed to help public health agencies connect the dots by linking confirmed carriers of novel coronavirus to recent, close-proximity interactions. In theory, this creates a protective safety net — a way for countries to manage the spread and mitigate the impact of COVID-19 at scale. Despite good intentions, the push for […]

The post Solving 5 Challenges of Contact Tracing Apps appeared first on Security Intelligence.

Continue reading Solving 5 Challenges of Contact Tracing Apps

The Importance of Mobile Technology in State Electronic Visit Verification (EVV) Programs

Under the federal Electronic Visit Verification mandate, care providers for people with disabilities or the elderly confined to their homes will need to check in and out with a device equipped with GPS. It isn’t a security risk mandate per se, but the use of connected devices for this could add some risk.  What is Electronic […]

The post The Importance of Mobile Technology in State Electronic Visit Verification (EVV) Programs appeared first on Security Intelligence.

Continue reading The Importance of Mobile Technology in State Electronic Visit Verification (EVV) Programs

QR Code Security: What You Need to Know Today

QR codes are very common today, enough so that attackers are discovering ways of using them for profit. How can QR codes be used this way, and what can you do to boost QR code security and protect against these scams? What Are QR Codes Used For?  QR codes — short for “quick response codes” […]

The post QR Code Security: What You Need to Know Today appeared first on Security Intelligence.

Continue reading QR Code Security: What You Need to Know Today

IBM Trusteer Exposes Massive Fraud Operation Facilitated by Evil Mobile Emulator Farms

IBM Security Trusteer’s mobile security research team has recently discovered a major mobile banking fraud operation that managed to steal millions of dollars from financial institutions in Europe and the US within a matter of days in each attack before being intercepted and halted. This is the work of a professional and organized gang that […]

The post IBM Trusteer Exposes Massive Fraud Operation Facilitated by Evil Mobile Emulator Farms appeared first on Security Intelligence.

Continue reading IBM Trusteer Exposes Massive Fraud Operation Facilitated by Evil Mobile Emulator Farms