Whitepaper:

Most Mobile Authentication Apps Can be Breached, Even if Hardware Security is Used

New research from V-Key reveals a critical flaw (“Trust Gap”) in most mobile authentication apps, putting your accounts at risk. Even hardware security features might not be enough to protect you from malicious attacks.

Download the white paper to:
  • Understand the limitations of current mobile authentication apps.
  • Learn how V-Key’s solutions address the “Trust Gap” vulnerability.
  • Discover strategies to fortify your mobile security and protect your valuable data

 

This white paper unveils:
  • A widespread vulnerability: Discover the “Trust Gap” flaw that allows hackers to exploit mobile authentication apps.
  • Stolen keys, stolen identity: Learn how attackers can steal your authentication keys and impersonate you for unauthorized transactions.
  • Beyond software, beyond hardware: Explore why this vulnerability bypasses both traditional software security and hardware-backed keystores.
  • Protecting your digital life: Gain insights into how to mitigate these risks and safeguard your accounts.

 


Whitepaper
What Digital Wallets Need to consider Regarding Authentication

Last weekend, I forgot my wallet as I took my daughter out to the mall. I realized this as we were in a cab halfway to our destination. A few years ago, this would have been a disaster, as retail financial transactions were only possible using cash or credit/debit cards.

Thankfully, I had my mobile phone with me. As long as I had an internet connection, I really didn’t need to actually have my physical wallet.

Whitepaper
V-Key Technology Whitepaper

Get an in-depth look at the technology behind V-Key’s world-class, digital security solutions.

V-Key’s CTO Er Chiang Kai and his team have released an updated whitepaper detailing a comprehensive overview of V-Key V-OS and the various product families that complement it: This whitepaper covers the following:

Whitepaper
V-Key RASP whitepaper

There are some aspects of mobile apps that make RASP for Mobile Apps different from RASP in general. We first describe RASP in general, and then zoom in to RASP for Mobile Apps. In this whitepaper, we deep dive about RASP for mobile apps and V-Key’s V-RASP, V-RASP+ and V-RASP++, a mobile-first solution specifically designed for mobile app protection.

Whitepaper
How to survive a hacking attack?

How to survive a hacking attack? Do you have confidence that your mobile app will emerge victorious or the hacker will have a great bounty? Mobile security is everyone’s top priority and making the right choice is critical. Here are 10 questions to evaluate your mobile security system.

Whitepaper
App Protection Guide

With mobile being the future of everything, most companies seek to digitalise their offerings to end-users in order to ride the tides of the ongoing digital trend. And while most businesses and institutions have taken the step towards digitalisation on mobile, cyber threats on mobile devices are still very prevalent.

Whitepaper
Sim Swap Fraud

SIM swap scam (also known as SIM jacking, SIM splitting, or Port-Out scam) is a type of account takeover fraud that exploits the weakness in conventional methods of two-factor authentication/verification. More often than not, this attack is used for applications that require an OTP verification to be verified via an SMS text or via a call by the end-user.

 

Whitepaper
Application Hooking

Hooking is a term for a range of code modification/tampering techniques that are used to change the behaviour of the original code running sequence by inserting instructions into the code segment at runtime.

Find out from this whitepaper why it is critical to understand the process of a hooking attack and how you can mitigate such attacks on your mobile device.