Whitepaper:

App Protection Guide

Today’s smartphones hold a wealth of sensitive data – banking information, personal documents, and more. Cybercriminals are constantly developing new methods to exploit these vulnerabilities, putting your privacy and security at risk. This white paper will equip you with the knowledge to protect your mobile apps.

Download the V-Key App Protection Guide today and:
  • Uncover the evolving landscape of mobile cybercrime: Learn about the latest threats like malware, phishing, and SIM swapping, and the financial impact they can have.
  • Discover the limitations of built-in security features: Explore why traditional methods might not be enough to safeguard your data.
  • Introducing V-OS Mobile App Protection: Learn how this innovative technology creates a secure enclave within your app, shielding it from malicious attacks.

 

Whitepaper
What Digital Wallets Need to consider Regarding Authentication

Last weekend, I forgot my wallet as I took my daughter out to the mall. I realized this as we were in a cab halfway to our destination. A few years ago, this would have been a disaster, as retail financial transactions were only possible using cash or credit/debit cards.

Thankfully, I had my mobile phone with me. As long as I had an internet connection, I really didn’t need to actually have my physical wallet.

Whitepaper
V-Key Technology Whitepaper

Get an in-depth look at the technology behind V-Key’s world-class, digital security solutions.

V-Key’s CTO Er Chiang Kai and his team have released an updated whitepaper detailing a comprehensive overview of V-Key V-OS and the various product families that complement it: This whitepaper covers the following:

Whitepaper
Most Mobile Authentication Apps Can be Breached, Even if Hardware Security is Used

New research by V-key shows that most apps used for mobile authentication have serious vulnerabilities, even if hardware security is used. V-Key has discovered a general flaw (named the “Trust Gap”) in these apps’ architectural design which hackers can exploit using malware to illegally obtain a target’s authenticator keys. This enables bad actors to make unauthorized transactions or sign bogus documents, opening up a digital service to account takeovers, data leakage, fraud or worse. This is an insidious and sophisticated attack as the targeted authentication app doesn’t even need to be running or be tampered with to be compromised.

Whitepaper
V-Key RASP whitepaper

There are some aspects of mobile apps that make RASP for Mobile Apps different from RASP in general. We first describe RASP in general, and then zoom in to RASP for Mobile Apps. In this whitepaper, we deep dive about RASP for mobile apps and V-Key’s V-RASP, V-RASP+ and V-RASP++, a mobile-first solution specifically designed for mobile app protection.

Whitepaper
How to survive a hacking attack?

How to survive a hacking attack? Do you have confidence that your mobile app will emerge victorious or the hacker will have a great bounty? Mobile security is everyone’s top priority and making the right choice is critical. Here are 10 questions to evaluate your mobile security system.

Whitepaper
Sim Swap Fraud

SIM swap scam (also known as SIM jacking, SIM splitting, or Port-Out scam) is a type of account takeover fraud that exploits the weakness in conventional methods of two-factor authentication/verification. More often than not, this attack is used for applications that require an OTP verification to be verified via an SMS text or via a call by the end-user.

 

Whitepaper
Application Hooking

Hooking is a term for a range of code modification/tampering techniques that are used to change the behaviour of the original code running sequence by inserting instructions into the code segment at runtime.

Find out from this whitepaper why it is critical to understand the process of a hooking attack and how you can mitigate such attacks on your mobile device.