Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Mobile App

Below you will find reports with the tag of “Mobile App”

image from The State Of Chargebacks: 2018 Report

The State Of Chargebacks: 2018 Report

The State of Chargebacks: 2018 Report, brought to you by Kount and Chargebacks911, is intended to provide an overview of the health and status of chargeback management in the Card Not Present (CNP) payments space. It includes key facts and figures about chargebacks, dispute and win rates. In addition, participating organizations shared insights about the tools, services, and solutions they employ for fraud detection and chargeback management, as well as the greatest challenges they face.

(more available)
Added: February 16, 2019
image from 6th Annual Mobile Payments And Fraud: 2018 Report

6th Annual Mobile Payments And Fraud: 2018 Report

From the report, “The 2018 Mobile Payments and Fraud Survey marks the sixth consecutive year of this study. This year’s report, with nearly 600 merchant respondents, is focused on understanding the growth, challenges and developments in the mobile channel. The report also set out to provide a better understanding of how the mobile market has evolved since the inaugural survey report in 2013.”

(more available)
Added: February 16, 2019
image from Fraud Prevention Industry Benchmarks: 2018 Report

Fraud Prevention Industry Benchmarks: 2018 Report

The Fraud Prevention Industry Benchmarks Survey was focused specifically on merchants doing business in the Card or Customer Not Present (CNP) channel. This study was designed to gain insights and information for comparison of key performance indicators (KPIs) such as manual review rates, chargeback rates, false positive rates and other metrics across different types of merchants, while the analysis report is intended to serve as an industry resource and point-of-reference for organizations looking to benchmark and compare the performance of their fraud prevention strategy against others in their vertical.

(more available)
Added: February 16, 2019
image from The Anatomy of an Attack Surface: Five Ways Hackers are Cashing In

The Anatomy of an Attack Surface: Five Ways Hackers are Cashing In

From the report, “For security teams, the sheer depth and breadth of what they need to defend may seem daunting, but thinking about the Internet from an attacker’s perspective —a collection of digital assets that are discoverable by hackers as they research their next campaigns— can put the massive scope of their organization’s attack surface into perspective. In this report, we’ll highlight five areas that we feel help to better frame the challenges faced in keeping the Internet a safe environment, all of which underline a need to broaden awareness of the potential risks involved to foster a more informed approach to cyber defense.”

(more available)
Added: February 6, 2019
image from 2018 Webroot Threat Report

2018 Webroot Threat Report

The 2018 edition of Webroot’s annual Threat Report shares a glimpse into their discoveries and analysis of threat activity throughout 2017, to equip you with the knowledge you need to overcome modern cybercrime.

(more available)
Added: January 31, 2019
image from The Path To Digital Transformation

The Path To Digital Transformation

This report offers insight into controlling friction while tackling Cybercrime in Financial Services.

Added: January 30, 2019
image from 2017 Cybercrime Report: Travel and Entertainment Industry DeepDive

2017 Cybercrime Report: Travel and Entertainment Industry DeepDive

This report from ThreatMetrix compiles their 2017 Cybercrime report in such a way that they offer unique insight into the travel and entertainment industry and how cybercrime is impacting that arena.

(more available)
Added: January 30, 2019
image from Q2 2016 Cybercrime Report

Q2 2016 Cybercrime Report

This is ThreatMetrix’s Report of events from the second quarter of 2016.

Added: January 30, 2019
image from The Q3 2017 Mobile Threat Landscape Report

The Q3 2017 Mobile Threat Landscape Report

The third quarter of 2017 saw an increase in the number of malicious apps flooding the mobile marketplace, the continued issues of imitation and trojan apps in official app stores, and the emergence of the WireX mobile botnet. In this report, they’ll give an overview of these mobile threats, as well as emerging trends they anticipate will be prevalent in Q4 and beyond to help you protect yourself and your customers.

(more available)
Added: January 25, 2019
image from The Q4 2017 Mobile Threat Landscape Report

The Q4 2017 Mobile Threat Landscape Report

RiskIQ uses its repository of scanned mobile application stores to perform analysis on threat trends in the mobile application space. The fourth quarter of 2017 showed a 37 percent decrease in blocklisted apps over Q3. Key threat trends include brand imitation, phishing, malware, and bankbot attacks on cryptocurrency users.

(more available)
Added: January 25, 2019
image from The Q3 2018 Mobile Threat Landscape Report

The Q3 2018 Mobile Threat Landscape Report

RiskIQ uses its repository of scanned mobile application stores to perform analysis on threat trends in the mobile application space. Q3 showed a nearly 220 percent increase in blocklisted apps over Q2. Due to a surge in total apps observed, the percentage of blocklisted apps dropped from 4% in Q2 to 3% in Q3.

(more available)
Added: January 25, 2019
image from The Q2 2018 Mobile Threat Landscape Report

The Q2 2018 Mobile Threat Landscape Report

RiskIQ uses its repository of scanned mobile application stores to perform analysis on threat trends in the mobile application space. Q2 showed a nearly 57 percent increase in blocklisted apps over Q1. Key threat trends include brand imitation, phishing, malware, malvertising scams crossing into the mobile realm, targetted attacks against MyEtherWallet, and the misuse of location data by major mobile providers.

(more available)
Added: January 25, 2019
image from The Q2 2017 Mobile Threat Landscape Report

The Q2 2017 Mobile Threat Landscape Report

In this report, we’ll give an overview of the recent mobile threats RiskIQ detected in Q2 of 2017, as well as emerging trends we anticipate will be prevalent in Q3 and beyond to help you protect yourself and your customers.

(more available)
Added: January 25, 2019
image from The Q1 2018 Mobile Threat Landscape Report

The Q1 2018 Mobile Threat Landscape Report

RiskIQ uses its repository of scanned mobile application stores to perform analaysis on threat trends in the mobile application space. The first quarter of 2018 showed a 43 percent decrease in blocklisted apps over Q4. Key threat trends include brand imitation, phishing, malware. A spike in apps targeting cryptocurrency and high-profile threats from nation-state actors.

(more available)
Added: January 25, 2019
image from AppSession: Is Our Appetite For Mobile Apps Putting Us At Risk

AppSession: Is Our Appetite For Mobile Apps Putting Us At Risk

From the report, “With so much of our personal information now flowing through mobile applications, has our security awareness kept pace? Have consumers adopted best practice behaviors or are they leaving themselves vulnerable to cyber attacks? To better understand consumer behavior, RiskIQ commissioned Ginger Comms² to survey 1,000 US and 1,000 UK consumers aged 16 to 60+, specifically focusing on smartphone apps. The survey was conducted between February and March 2017.”

(more available)
Added: January 25, 2019
image from Threat Report - Messaging Applications: The New Dark Web

Threat Report - Messaging Applications: The New Dark Web

In this report, IntSights looks to identify which mobile platforms are gaining traction and may be the future backbone of the illegal cyber-economy. The data in this report will help you understand how dark web communication is changing with mobile adoption and how this impacts the way security teams monitor dark web activity. By reading this report, security teams can better prepare for this shift and be better resourced to evolve with it

(more available)
Added: January 25, 2019
image from Threat Intelligence Report: Mobile Malware As A Service

Threat Intelligence Report: Mobile Malware As A Service

Long gone are the simple days of malware threats only being associated with the computers on our desks or at our business offices. Today, we’ve all become accustomed to malware infiltrating our homes and pockets across a variety of platforms, be that our telephones, tablets, smart TV or even ‘connected’ devices such as our fridges. Whilst malware can be tailored for different platforms and differ in their abilities or functionality, the overall taxonomy remains very much the same. Back in the ‘halcyon’ days many malware authors released their wares for fun, ‘lulz’ in modern parlance, today most are criminally motivated and driven by financial gain, ideology, revenge and nation state doctrine. The objective of these attacks, and the compromised devices or networks, are typically similar and result in the threat actor gaining access, leading to the theft of confidential and personal information, or disrupting the operations and functionality.

(more available)
Added: December 5, 2018
image from Executive Guide To Mobile Banking Trojans

Executive Guide To Mobile Banking Trojans

This report offers a helpful look at Mobile Banking Trojans.

Added: December 4, 2018
image from Smartphones, Tablets, and Fraud: When Apathy Meets Security

Smartphones, Tablets, and Fraud: When Apathy Meets Security

Consumers rely on their mobile devices on an ever‐growing basis to keep them connected. Smartphones and tablets provide them with access to each other through email, messaging, and social media while also putting financial services and shopping in the palm of their hands. And each and every one of these activities holds value for criminals in search of account credentials and personally identifiable information (PII) to sell or misuse. Unfortunately, for all of the potential that mobile devices represent, the apathy of every mobile stakeholder is undermining the security of mobile devices and the accounts of their users. Protecting Android, iOS, and Windows mobile device users from fraud will require a concerted effort by all stakeholders to eliminate vulnerabilities, encourage security‐minded behaviors, and to leverage all the security benefits that mobile devices have to offer.

(more available)
Added: November 27, 2018
image from Top Consumer Authentication Pitfalls To Avoid

Top Consumer Authentication Pitfalls To Avoid

Digital businesses must manage, govern, and secure customers’ access to systems without hurting the customer experience. As firms increase the digital channels for customer interaction, they also increase the number of potentially confusing consumer authentication experiences. As a result, they’re hemorrhaging customers and suffering increased support costs related to password and authentication. This report outlines 10 barriers to authentication success — and how S&R pros can improve online security without sacrificing experience.

(more available)
Added: November 27, 2018
image from Identity Security Trends In The Mobile Era

Identity Security Trends In The Mobile Era

To better understand the mindset and priorities of those who make security decisions for mobile devices in the workplace, Ping Identity conducted a mobility survey in partnership with Gatepoint Research. The results shed light on four main insights into the top challenges and motivations for enterprise mobile initiatives.

(more available)
Added: November 27, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 00:08 UTC (build b1d7be4)