ANDROID BANKING MALWARE: SOPHISTICATED TROJANS VS. FAKE BANKING APPS

January 17, 2019

In this white paper, we will provide insight into the two most prevalent types of Android banking malware to date – sophisticated banking Trojans and fake banking apps – and compare their different approaches to achieving the same malicious goal. At the same time, we will explore the impact of those approaches on potential victims. Having identified the tactics of both categories, we will provide advice for users on how to stay safe from Android banking malware.

Spotlight

WWPASS Corporation

Frustrated with the inadequate security provided by username and password authentication and the increasing vulnerabilities exploited by hackers to overcome two-factor authentication solutions, Eugene Shablygin founded WWPass Corporation in 2008. After 6 years of research & development, the company introduced our unique authentication solution which replaces the username with a secure PassKey. The PassKey does not contain any identity data; it serves only as a unique cryptographic identifier that is used to retrieve identity data from our patented Distributed Data System. By combining multiple standards-based technologies such as symmetric and asymmetric keys with AES-256 encryption and Reed-Solomon codes, the solution is immune to modern sophisticated attacks by cyber criminals seeking to impersonate user accounts. The user’s identity is never exposed in transit or at rest making credential theft virtually impossible.

OTHER WHITEPAPERS
news image

Cybersecurity 2018

whitePaper | February 2, 2020

Small businesses usually neglect cybersecurity as an essential function making their IT infrastructure vulnerable. IT security issues often cost companies a lot of money and downtime every year. Even if the IT infrastructure consists of couple laptops and Devices, cybersecurity should always be a top priority.

Read More
news image

Best Practices for Common Cybersecurity Threats

whitePaper | November 28, 2022

The threat of Criminal cyber activity continues to grow for organizations around the world, targeting everyone from select individuals to leading corporations and federal governments.

Read More
news image

Secure by Design: Lexmark Print Devices

whitePaper | October 27, 2022

As organizations enhance the security of their infrastructure and move towards security methodologies and strategies, such as, Secure Access Service Edge (SASE), defense in depth, assume breach, and zero trust to provide tighter access controls, the print infrastructure must also adapt. It must become a strategic initiative to secure the print infrastructure and consider both internal and external threats. Data has become a cornerstone for innovation and has become a company's most valuable asset. Some of the challenges that companies face are inadequate security practices and too much data to manage. It is important to remember that security is not a solo sport, and as a community, we are stronger together.

Read More
news image

Fortinet Security Fabric Enables Digital Innovation

whitePaper | February 5, 2020

Organizations are rapidly adopting digital innovation (DI) initiatives to accelerate their businesses, reduce costs, improve efficiency, and provide better customer experiences. Common initiatives involve moving applications and workflows to the cloud, deploying Internet-of-Things (IoT) devices on the corporate network, and expanding the organization’s footprint to new branch locations. With this evolving infrastructure also come security risks. Organizations must cope with growing attack surfaces, advanced threats, increased infrastructure complexity, and an expanding regulatory landscape. To accomplish their desired DI outcomes while effectively managing risks and minimizing complexities, organizations need to adopt a cybersecurity platform that provides visibility across their environment and a means to manage both security and network operations easily.

Read More
news image

Nasuni Access Anywhere Security Model

whitePaper | December 20, 2022

The Nasuni Access Anywhere add-on service delivers high-performance, VPN-less file access for remote and hybrid users, integrates an organization’s file shares with Microsoft Teams, and provides productivity tools such as desktop synchronization and external file and folder sharing to enhance user productivity and provide access to files seamlessly from anywhere on any device. This white paper outlines the security elements of the Nasuni Access Anywhere service.

Read More
news image

How to Build and Mature Your AppSec Program

whitePaper | January 24, 2023

Achieving an optimal security posture for your business happens when technology, automation, infrastructure, architecture, and security policies are in alignment across the company. This white paper provides concrete strategies to mature your AppSec program and achieve code security at scale based on your organization’s needs.

Read More

Spotlight

WWPASS Corporation

Frustrated with the inadequate security provided by username and password authentication and the increasing vulnerabilities exploited by hackers to overcome two-factor authentication solutions, Eugene Shablygin founded WWPass Corporation in 2008. After 6 years of research & development, the company introduced our unique authentication solution which replaces the username with a secure PassKey. The PassKey does not contain any identity data; it serves only as a unique cryptographic identifier that is used to retrieve identity data from our patented Distributed Data System. By combining multiple standards-based technologies such as symmetric and asymmetric keys with AES-256 encryption and Reed-Solomon codes, the solution is immune to modern sophisticated attacks by cyber criminals seeking to impersonate user accounts. The user’s identity is never exposed in transit or at rest making credential theft virtually impossible.

Events