/Tag:Security

RSAConference 2018: Thanks to all who stopped by at the booth and met us

Thanks to all who stopped by at the booth and met us. Weren’t you at RSA Conference? Here's the opportunity to download our company overview with the main topics addressed during the event.  

April 21st, 2018|

XTN started the #RSAC week with one big InfoSec Award win from Cyber Defense Magazine

San Francisco, CA - April 19th, 2018 The XTN MORE® (Mobile Operative Risk Evaluator) Software earned the win in the Application Shielding (as Most Innovative product) separating itself from Mobile Threat Prevention competition ahead  thanks to the numerous features and security checks natively made available by the solution. Much thanks once more to InfoSec Award and to Cyber Defense Magazine !

April 19th, 2018|

Cyber Defense Magazine Nominated XTN Cognitive Security Most Innovative in Application Security

San Francisco, CA - April 16th, 2018 Cyber Defense Magazine, the industry leading electronic information security magazine, has honoured XTN Cognitive Security in its 2018 Infosec Awards. XTN Cognitive Security was nominated the most innovative for its capabilities in application security. “We are so excited to be winners of Cyber Defense Magazine’s InfoSec Awards” said [...]

April 16th, 2018|

White Paper – Mobile Financial Malware 2017 Threat Report

This document describes the evolution and trends in Android malware behaviour with a focus on the financial context. After an initial contextualisation and an explanation of the usual anatomy of a mobile malware attack, the current landscape is presented with some interesting statistics. In conclusion, the MORE® malware engine is introduced explaining the benefits of [...]

April 12th, 2018|

White Paper – Intel – Android Ubiquitous leakage through VFS (CVE-2017-13165)

As widely known, the Android operating system is based on Linux. Even if it has been subjected to a heavy customisation to improve it in terms of performance and security on mobile/embedded devices, it still preserves a lot of interesting concepts and components of its parent, one of them is the “everything is a file” [...]

April 10th, 2018|

Mobile malware detection from inside out: protect your customers

Android malware is on the rise along with the popularity of Android OS. Malware writers are using novel techniques to create malicious Android applications which severely undermine the capability of traditional malware detectors which are ineffective towards detecting these unknown malicious applications. One of the last malware discovered, dubbed Expensive Wall, has infected about 21 [...]

September 25th, 2017|

White Paper – The analysis conducted on the malware PowerFakeToken

The analysed malware, internally baptised as PowerFakeToken, has been identified to belong to the Android/FakeToken.A family. In a nutshell, the mentioned malware family pretends to be a mobile token generator, typically used for transaction validation in online banking systems, but in fact it is an application whose purpose is to steal sensitive credentials to perform [...]

December 27th, 2016|

Mobile Report 2016

This document is a synthesis regarding the results of a Security Assessment activity, based on a sample of mobile apps, released by institutes and companies such as bank and finance services, on-demand multimedia content providers, automotive, home automation, social and enterprise management, from the Italian and worldwide scenes. In consideration of the exponential growth of [...]

December 20th, 2016|

Mobile Security Token? Not As Secure As You Think

Security researcher Bernhard Mueller states that mobile applications that create tokens for two-factor authentication can be hacked and cloned by malware. The security expert Bernhard Mueller has published a detailed report on compromising software token generators on mobile devices that are used for two-factor authentication (usually a password or a pin).  The software token generators [...]

September 28th, 2016|

Smartphone: An Extension Of Ourselves

Every smartphone knows more about us, than what we know about it. It’s able to know where users have been, thanks to the GPS data, with whom and for how long, the birthdays of all acquaintances. Also, smartphones are in constant contact with the bank details, the company account, data relating to health, the payment [...]

June 30th, 2016|