Whitepaper:

How to survive a hacking attack?


Whitepaper
What Digital Wallets Need to consider Regarding Authentication

Last weekend, I forgot my wallet as I took my daughter out to the mall. I realized this as we were in a cab halfway to our destination. A few years ago, this would have been a disaster, as retail financial transactions were only possible using cash or credit/debit cards.

Thankfully, I had my mobile phone with me. As long as I had an internet connection, I really didn’t need to actually have my physical wallet.

Whitepaper
V-Key Technology Whitepaper

Get an in-depth look at the technology behind V-Key’s world-class, digital security solutions.

V-Key’s CTO Er Chiang Kai and his team have released an updated whitepaper detailing a comprehensive overview of V-Key V-OS and the various product families that complement it: This whitepaper covers the following:

Whitepaper
Most Mobile Authentication Apps Can be Breached, Even if Hardware Security is Used

New research by V-key shows that most apps used for mobile authentication have serious vulnerabilities, even if hardware security is used. V-Key has discovered a general flaw (named the “Trust Gap”) in these apps’ architectural design which hackers can exploit using malware to illegally obtain a target’s authenticator keys. This enables bad actors to make unauthorized transactions or sign bogus documents, opening up a digital service to account takeovers, data leakage, fraud or worse. This is an insidious and sophisticated attack as the targeted authentication app doesn’t even need to be running or be tampered with to be compromised.

Whitepaper
V-Key RASP whitepaper

There are some aspects of mobile apps that make RASP for Mobile Apps different from RASP in general. We first describe RASP in general, and then zoom in to RASP for Mobile Apps. In this whitepaper, we deep dive about RASP for mobile apps and V-Key’s V-RASP, V-RASP+ and V-RASP++, a mobile-first solution specifically designed for mobile app protection.

Whitepaper
App Protection Guide

With mobile being the future of everything, most companies seek to digitalise their offerings to end-users in order to ride the tides of the ongoing digital trend. And while most businesses and institutions have taken the step towards digitalisation on mobile, cyber threats on mobile devices are still very prevalent.

Whitepaper
Sim Swap Fraud

SIM swap scam (also known as SIM jacking, SIM splitting, or Port-Out scam) is a type of account takeover fraud that exploits the weakness in conventional methods of two-factor authentication/verification. More often than not, this attack is used for applications that require an OTP verification to be verified via an SMS text or via a call by the end-user.

 

Whitepaper
Application Hooking

Hooking is a term for a range of code modification/tampering techniques that are used to change the behaviour of the original code running sequence by inserting instructions into the code segment at runtime.

Find out from this whitepaper why it is critical to understand the process of a hooking attack and how you can mitigate such attacks on your mobile device.