This case study describes how a large automotive group was looking for a solution to secure their new services that involve vehicle interaction through a mobile app. MORE® provided a way to identify the app user, prevent unauthorised access and evaluate the risk for each vehicle/app interaction in detail. Integrating MORE® through APIs, the automotive [...]
XTN exhibited at Infosecurity Europe 2018, which took place from 5 to 7 June in London. During the event, the Infosecurity team also had a chat with our CTO about the Cognitive Security Platform and XTN’s approach to fraud prevention. Many thanks to Infosecurity Europe and to everyone who came by our stand! https://www.youtube.com/watch?v=4ZIWTE-8Y2c [...]
Thanks to all who stopped by at the booth and met us. Weren’t you at RSA Conference? Here's the opportunity to download our company overview with the main topics addressed during the event.
San Francisco, CA - April 19th, 2018 The XTN MORE® (Mobile Operative Risk Evaluator) Software earned the win in the Application Shielding (as Most Innovative product) separating itself from Mobile Threat Prevention competition ahead thanks to the numerous features and security checks natively made available by the solution. Much thanks once more to InfoSec Award and to Cyber Defense Magazine !
San Francisco, CA - April 16th, 2018 Cyber Defense Magazine, the industry leading electronic information security magazine, has honoured XTN Cognitive Security in its 2018 Infosec Awards. XTN Cognitive Security was nominated the most innovative for its capabilities in application security. “We are so excited to be winners of Cyber Defense Magazine’s InfoSec Awards” said [...]
This document describes the evolution and trends in Android malware behaviour with a focus on the financial context. After an initial contextualisation and an explanation of the usual anatomy of a mobile malware attack, the current landscape is presented with some interesting statistics. In conclusion, the MORE® malware engine is introduced explaining the benefits of [...]
As widely known, the Android operating system is based on Linux. Even if it has been subjected to a heavy customisation to improve it in terms of performance and security on mobile/embedded devices, it still preserves a lot of interesting concepts and components of its parent, one of them is the “everything is a file” [...]
Android malware is on the rise along with the popularity of Android OS. Malware writers are using novel techniques to create malicious Android applications which severely undermine the capability of traditional malware detectors which are ineffective towards detecting these unknown malicious applications. One of the last malware discovered, dubbed Expensive Wall, has infected about 21 [...]
The analysed malware, internally baptised as PowerFakeToken, has been identified to belong to the Android/FakeToken.A family. In a nutshell, the mentioned malware family pretends to be a mobile token generator, typically used for transaction validation in online banking systems, but in fact it is an application whose purpose is to steal sensitive credentials to perform [...]
This document is a synthesis regarding the results of a Security Assessment activity, based on a sample of mobile apps, released by institutes and companies such as bank and finance services, on-demand multimedia content providers, automotive, home automation, social and enterprise management, from the Italian and worldwide scenes. In consideration of the exponential growth of [...]