Thanks to all who stopped by at the booth and met us. Weren’t you at RSA Conference? Here's the opportunity to download our company overview with the main topics addressed during the event.
San Francisco, CA - April 19th, 2018 The XTN MORE® (Mobile Operative Risk Evaluator) Software earned the win in the Application Shielding (as Most Innovative product) separating itself from Mobile Threat Prevention competition ahead thanks to the numerous features and security checks natively made available by the solution. Much thanks once more to InfoSec Award and to Cyber Defense Magazine !
San Francisco, CA - April 16th, 2018 Cyber Defense Magazine, the industry leading electronic information security magazine, has honoured XTN Cognitive Security in its 2018 Infosec Awards. XTN Cognitive Security was nominated the most innovative for its capabilities in application security. “We are so excited to be winners of Cyber Defense Magazine’s InfoSec Awards” said [...]
This document describes the evolution and trends in Android malware behaviour with a focus on the financial context. After an initial contextualisation and an explanation of the usual anatomy of a mobile malware attack, the current landscape is presented with some interesting statistics. In conclusion, the MORE® malware engine is introduced explaining the benefits of [...]
As widely known, the Android operating system is based on Linux. Even if it has been subjected to a heavy customisation to improve it in terms of performance and security on mobile/embedded devices, it still preserves a lot of interesting concepts and components of its parent, one of them is the “everything is a file” [...]
Android malware is on the rise along with the popularity of Android OS. Malware writers are using novel techniques to create malicious Android applications which severely undermine the capability of traditional malware detectors which are ineffective towards detecting these unknown malicious applications. One of the last malware discovered, dubbed Expensive Wall, has infected about 21 [...]
The analysed malware, internally baptised as PowerFakeToken, has been identified to belong to the Android/FakeToken.A family. In a nutshell, the mentioned malware family pretends to be a mobile token generator, typically used for transaction validation in online banking systems, but in fact it is an application whose purpose is to steal sensitive credentials to perform [...]
This document is a synthesis regarding the results of a Security Assessment activity, based on a sample of mobile apps, released by institutes and companies such as bank and finance services, on-demand multimedia content providers, automotive, home automation, social and enterprise management, from the Italian and worldwide scenes. In consideration of the exponential growth of [...]
Security researcher Bernhard Mueller states that mobile applications that create tokens for two-factor authentication can be hacked and cloned by malware. The security expert Bernhard Mueller has published a detailed report on compromising software token generators on mobile devices that are used for two-factor authentication (usually a password or a pin). The software token generators [...]
Every smartphone knows more about us, than what we know about it. It’s able to know where users have been, thanks to the GPS data, with whom and for how long, the birthdays of all acquaintances. Also, smartphones are in constant contact with the bank details, the company account, data relating to health, the payment [...]