ATO is an attack by Account Takeover, that is the scenario in which an attacker can take complete control of the victim's account.
How could we live without our smartphone? On the spot, you might be tempted to answer "fine”. The truth is that our lives are deeply linked to our digital presence and it will probably go on like this for many years to come.
The distinction between active and passive biometrics is based on the enrollment mode (activation) or training needed to be able to recognize the user.
Even though mobile applications have been available for years, security concepts and development practices are still less mature and in constant evolution.
The WhatsApp vulnerability disclosed a few weeks ago, once again showed how mobile apps are used for embedding surveillance tools on to our handsets.