Whitepaper:

What Digital Wallets Need to consider Regarding Authentication

For this I can thank the existence of electronic wallets or e-wallets for short.

As many people know, an e-wallet is a digital tool for transferring funds or making transactions for goods and services. Within an e-wallet, I can store credit cards, coupons, loyalty memberships, various kinds of tickets, and other items I could have otherwise stored in my traditional wallet.

In 2021, 43.2 percent of smartphone owners used mobile payments via e-wallets, and that number is projected to reach over 50% by 2025, according to market research company Insider Intelligence1. A significant increase in digital payment usage is owed to changing consumer habits caused by the COVID pandemic — during which there was a 29% increase.

Download the Position Paper now –


Whitepaper
V-Key Technology Whitepaper

Get an in-depth look at the technology behind V-Key’s world-class, digital security solutions.

V-Key’s CTO Er Chiang Kai and his team have released an updated whitepaper detailing a comprehensive overview of V-Key V-OS and the various product families that complement it: This whitepaper covers the following:

Whitepaper
Most Mobile Authentication Apps Can be Breached, Even if Hardware Security is Used

New research by V-key shows that most apps used for mobile authentication have serious vulnerabilities, even if hardware security is used. V-Key has discovered a general flaw (named the “Trust Gap”) in these apps’ architectural design which hackers can exploit using malware to illegally obtain a target’s authenticator keys. This enables bad actors to make unauthorized transactions or sign bogus documents, opening up a digital service to account takeovers, data leakage, fraud or worse. This is an insidious and sophisticated attack as the targeted authentication app doesn’t even need to be running or be tampered with to be compromised.

Whitepaper
V-Key RASP whitepaper

There are some aspects of mobile apps that make RASP for Mobile Apps different from RASP in general. We first describe RASP in general, and then zoom in to RASP for Mobile Apps. In this whitepaper, we deep dive about RASP for mobile apps and V-Key’s V-RASP, V-RASP+ and V-RASP++, a mobile-first solution specifically designed for mobile app protection.

Whitepaper
How to survive a hacking attack?

How to survive a hacking attack? Do you have confidence that your mobile app will emerge victorious or the hacker will have a great bounty? Mobile security is everyone’s top priority and making the right choice is critical. Here are 10 questions to evaluate your mobile security system.

Whitepaper
App Protection Guide

With mobile being the future of everything, most companies seek to digitalise their offerings to end-users in order to ride the tides of the ongoing digital trend. And while most businesses and institutions have taken the step towards digitalisation on mobile, cyber threats on mobile devices are still very prevalent.

Whitepaper
Sim Swap Fraud

SIM swap scam (also known as SIM jacking, SIM splitting, or Port-Out scam) is a type of account takeover fraud that exploits the weakness in conventional methods of two-factor authentication/verification. More often than not, this attack is used for applications that require an OTP verification to be verified via an SMS text or via a call by the end-user.

 

Whitepaper
Application Hooking

Hooking is a term for a range of code modification/tampering techniques that are used to change the behaviour of the original code running sequence by inserting instructions into the code segment at runtime.

Find out from this whitepaper why it is critical to understand the process of a hooking attack and how you can mitigate such attacks on your mobile device.