From banks to government agencies, many organisations are intrigued by and exploring software security solutions such as mobile tokens and mobile identity systems for individual identification, authorisation and authentication. This raises questions such as: What happens if a mobile banking customer… Read More
Articles
Building V-OS with HSM
V-OS is the world’s first virtual secure element, a software solution with security built into the firmware code. These include secret cryptographic parameters and data, which need to be randomly generated and securely persisted, and are then transformed into code… Read More
Cryptography in V-OS
V-OS is the world’s first virtual secure element. This is something we at V-Key take great pride in. It is also a claim we dare to make, based on the innovation that has gone into virtualizing the hardware tamper-proof protection, the… Read More
Why Existing Mobile Software Protections are Insufficient
Why Existing Mobile Software Protections are Insufficient In August 2018, Security researchers from Kryptowire, a security firm, found 38 different vulnerabilities loaded onto 25 Android phones, including devices from Asus, ZTE, LG and the Essential Phone, which are used by global… Read More