Trusted Transactions | Entersekt Blog

Trusted Transactions | Entersekt Blog

Russian hackers making borscht of banks worldwide

Posted by Jolette Roodt, Writer/Analyst, Entersekt

Nov 17, 2016 10:30:00 AM

As if the nearly $44 million that Russian cybercriminals stole from banks in their own country between June 2015 and June 2016 weren’t enough, these fraudsters seem to be moving on to greener pastures abroad. Stealing directly from banks as well as from individual online accounts, Russians have started targeting the rest of Europe – and the rest of the world.

 

 

 

 

Read More

Topics: Mobile app vulnerabilities, Data breaches, Malware

Mobile Africa – now’s the time to refocus on security

Posted by Pieter de Wet, VP Key accounts Africa

Oct 8, 2015 3:43:00 PM

In its Global Innovation Index 2015 report, INSEAD makes the point that, “While gaps remain in overall innovation performance between rich and poor countries, the technology gap is narrowing. This is due to the fact that recent new technologies are globalised from the start, such as 3D printing, cloud computing, and big data analytics.” I’d place mobile technology in that same category.

Africa
Read More

Topics: Mobile banking authentication, Mobile app vulnerabilities, User experience

It’s happened again. Should we care about Stagefright?

Posted by Christiaan Brand, chief technology officer, Entersekt

Jul 29, 2015 11:39:00 AM

In April, Five years, two months, and nine days. That's how long it's been since the release of Android 2.2 (May 20, 2010). It's also how long a bug has existed on the Google Android mobile operating system that allows remote code execution.

Read More

Topics: Mobile app vulnerabilities, Android

Into the jungle of smartphone app permissions

Posted by Altus van Tonder, VP sales support Europe, Entersekt

Apr 2, 2015 9:30:00 AM

App_permissionsIn the age of smartphones, we mainly use our phones for apps – many, many apps. Making voice calls and performing other traditional phone functions come second to using the wealth of apps available. Most of us are aware by now that apps bring with them additional risk – that they can expose us to unwanted prying and data theft. So, I’d like to look at app permissions a little closer. It’s a topic you probably do not lose much sleep over, but it does impact your security and personal data directly.

The trade-off
Apps can do a plethora of scary-seeming things on our smartphones: access our location, peek at our photo galleries, read our address books, and gather personal information about us and our devices. This would arguably be okay if you fully trusted the apps you use – but can you really? There are millions of app creators out there – some, surely, with less pure intentions than others – and we mostly end up giving them carte blanche to access our information at any time via their software.

So what can we users do to limit any unwanted intrusion into our privacy?.

Read More

Topics: Mobile app vulnerabilities, Apple, Mobile app permissions

Flawed security is the elephant in the app store

Posted by Gerhard Oosthuizen, Chief Information Officer, Entersekt

Sep 25, 2014 3:30:00 PM

Elephant_in_the_app_storeMobile is where it starts these days 

The world has embraced mobile in a big way. Mobile applications are suddenly an indispensable feature of daily life, serving as sources of information, productivity tools or entertaining ways to pass the time. There are now more than 1.3 million Android apps on the market and almost exactly as many available to users of Apple’s mobile devices. In June 2014 alone, 75 billion apps were downloaded from the Apple App Store!

Most large enterprises aim to help their customers, employees and other agents interact or transact with a range of mobile apps spanning the various platforms. I’m reasonably sure that your enterprise has either already deployed these or is busy building them. The apps probably provide some form of login, beyond which users can view and manage personal information. You plan to keep expanding the transactional functionality: if you don’t already allow people to perform sensitive transactions, you are likely to have it on your roadmap. 

Read More

Topics: Mobile app vulnerabilities

About Trusted Transactions

Trusted Transactions is Entersekt's blog devoted to keeping our customers, prospects and friends updated with industry news, security threats and technology advances in consumer authentication. We can protect against online banking fraud and account takeovers. Trusted Transactions brings you industry data and insights to help safeguard your online and mobile banking and payments transactions. 

Subscribe to Entersekt's Blog

 

Download white paper: The importance of transaction  signing to banks  

 

Follow Entersekt