ATO is an attack by Account Takeover, that is the scenario in which an attacker can take complete control of the victim's account.
How could we live without our smartphone? On the spot, you might be tempted to answer "fine”. The truth is that our lives are deeply linked to our digital presence and it will probably go on like this for many years to come.
The distinction between active and passive biometrics is based on the enrollment mode (activation) or training needed to be able to recognize the user.
Even though mobile applications have been available for years, security concepts and development practices are still less mature and in constant evolution.
The WhatsApp vulnerability disclosed a few weeks ago, once again showed how mobile apps are used for embedding surveillance tools on to our handsets.
Back in 2017 we published a report on the increase of RAT samples in the Android ecosystem. Almost two years have passed, and here we are: RAT malware is widespread in the wild!
Is the passwordless authentication era finally coming? And are we, ready to switch from the usual and reassuring user/password to something new?
Exodus is one of the latest spyware’s disguised and distributed through the Google Play Store.
XTN Cognitive Security Platform helps the automotive industry moving towards fully connected vehicles protecting customer from mobile threats and cybercriminals.