BlackRock – an advanced Android malware derived from Xeres malware – evades detection and steals login credentials or credit card data from 337 different mobile banking, shopping, lifestyle, and video apps. BlackRock was disclosed in July 2020 by ThreatFabric. The Zimperium z9 engine had begun detecting early variants of BlackRock in the weeks prior to […]
The below timeline includes notable mobile app breaches, failures, and data leaks in 2020. Scroll through the dozens of stories to learn about the more prominent breaches. The timeline is built using Timeline JS from The Northwestern University Knight Lab.
This data visualization is constructed using Google Data Studio using a data set of mobile banking app security risks and vulnerabilities. The data set was formulated using a mobile app scanning and testing platform from Zimperium.
This presentation describes the differences between application shielding or hardening technologies and in-app protection. Application shielding is a set of technologies that modify and obfuscate an application’s binary code. App shielding makes an application more tamper-resistant, protecting against intellectual property theft, piracy, and vulnerability discovery by reverse engineering, and unauthorized access. It creates a more resilient […]
This data visualization is constructed with Google Data Studio using a dataset from Vice. Clink this link to view the interactive chart. Link to interactive chart Source: We Built a Database of Over 500 iPhones Cops Have Tried to Unlock
DevOps is a set of practices combining software development and information technology operations aiming to continuously deliver higher quality software in a shorter amount of time. It sounds easy. Your ability to do a better job in less time depends on how big or small your organization is and how many variables and constraints you […]
This presentation describes the top five ways hackers attack mobile apps looking for secrets. It describes particular attacks, the tools used in the attacks, what specific information the bad actor hopes to obtain, and cites real-world examples of each of the attack methods. The presentation is a collection of dozens of stories and was constructed […]
Marketers want to provide the most personalized experience to customers and prospects to increase conversions and revenue. If you make prospects feel like you really know them, then they will trust you and purchase products and services from you. There are hundreds of marketing automation and targeting systems to help you target very specific and […]
This presentation provides details on development best practices, data leakage risk and security exposure for 45 Android mobile apps from the top US banks and mobile payment providers. The research displays vulnerabilities in consumer mobile banking apps and the correlating risk they introduce for banks and mobile users. This presentation was delivered at Droidcon SFO […]
I had a teen learning how to drive and created an analogy of how teaching teen drivers to make good decisions is similar to your mobile apps in the wild. You can warn them both about the dangers but they are free to fail on their own. It’s interesting how risk affects auto insurance premiums […]