Secure Mobile Transactions – Fact or Fiction?

June 12, 2013

Many banks and various other businesses, such as online betting, have embraced the ´Go Mobile´ trend to take advantage of the ubiquity offered by smart phone devices and have been developing their own apps, some of which store users´ credentials and other sensitive data in order to allow their clients to carry out transactions while on the move. Inspired by Apple iOS, Google Android and comparable operating systems, most app developers have directed their attention towards the user experience, but – as is often the case - few have placed emphasis on security, partially for priority reasons but also because of a lack of knowledge. In other words, despite the widespread adoption of smart phones, OSs (operating systems) still remain relatively immature when it comes to security. To tackle this, some initiatives such as the Trusted Execution Environment have emerged, but it could quite possibly take up to a decade before the average user will actually enjoy the security benefits when making a transaction with their preferred apps.

Spotlight

Ipswitch, Inc

Look in any organization today and you will find a hard-working group of individuals tasked with the near impossible: navigating an increasingly complex IT environment while securely delivering virtually zero downtime. This is the IT Team. And Ipswitch helps them shine.

OTHER WHITEPAPERS
news image

The State of Mobile App Security 2022

whitePaper | July 28, 2022

Mobile apps have become key tools for businesses to serve customers, earn revenue, and enable remote work by employees. Over the last two years, mobile apps have become critical to success for the majority of businesses.

Read More
news image

Amplify Your Ransomware Defenses: Protect, Detect and Recover

whitePaper | December 28, 2022

The Cohesity platform provides exceptional value for organizations to protect and manage vast enterprise data stores. But cyber criminals target data stores for various nefarious activities, most notably ransomware and data theft. Ransomware continues as the leading threat as it provides easy monetization, and therefore cyber criminals work non-stop to compromise organizations.

Read More
news image

2022 Global Cybersecurity Awareness Training Study

whitePaper | August 31, 2022

The benefit awareness cybersecurity awareness training, particular phishing simulations, have gained wide acceptance in business and the public sector.

Read More
news image

Big Data and Ai for The Financial Sector: Challenges and Opportunities

whitePaper | September 1, 2022

Artificial Intelligence (AI) is not a recently discovered field. Since the beginning of the computer science discipline, in the late 1950s, AI has drawn a lot of attention in the international scientific community and since then it has represented a field of study which has triggered diverse and numerous research activities.

Read More
news image

Adobe Acrobat with Document Cloud Services Security Overview

whitePaper | October 26, 2022

At Adobe®, we know the security of your digital experiences is important. Security practices are deeply ingrained into our internal software development and operations processes and tools and are rigorously followed by our cross-functional teams to prevent, detect, and respond to incidents in an expedient manner.

Read More
news image

HMC 1030 Connectivity Security White Paper

whitePaper | March 14, 2023

This document describes data that is exchanged between the Hardware Management Console (HMC) and the IBM Service Delivery Center (SDC). In addition, it also covers the methods and protocols for this exchange. This includes the configuration of “Call Home” (Electronic Service Agent) on the HMC for automatic hardware error reporting. All the functionality that is described herein refers to Power Systems HMC and the HMC that is used for the IBM Storage System DS8000.

Read More

Spotlight

Ipswitch, Inc

Look in any organization today and you will find a hard-working group of individuals tasked with the near impossible: navigating an increasingly complex IT environment while securely delivering virtually zero downtime. This is the IT Team. And Ipswitch helps them shine.

Events