Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Mobile App

Below you will find reports with the tag of “Mobile App”

image from Rogueware Reborn: A Business Analysis Of A Growing Fraud In Android

Rogueware Reborn: A Business Analysis Of A Growing Fraud In Android

Rogueware has been reborn in the Android ecosystem, particularly on Google Play. This research paper reveals that hundreds of antivirus and optimization tool apps on Google Play mislead users into believing that they have a virus or performance problems on their devices to manipulate them to install other fake tools.

(more available)
Added: October 21, 2018
image from The Tao Of Mobile App DevSecOps: Building A Mobile App Sec Factory

The Tao Of Mobile App DevSecOps: Building A Mobile App Sec Factory

This report seeks to aid the reader in developing a better way to create apps and not compromise on security.

(more available)
Added: October 21, 2018
image from Threat Advisory: Thomas Cook (India) Ltd. Mobile Apps And Website

Threat Advisory: Thomas Cook (India) Ltd. Mobile Apps And Website

This is a threat advisory for Thomas Cook Ltd. Mobile Apps & Website

Added: October 21, 2018
image from 5th Annual State of Application Security Report, Healthcare Edition (January 2016)

5th Annual State of Application Security Report, Healthcare Edition (January 2016)

This report deals with mobile healthcare apps and their ability to be easily hacked.

Added: October 20, 2018
image from Eavesdropper: How A Mobile Developer Error Is Exposing Millions Of Conversations

Eavesdropper: How A Mobile Developer Error Is Exposing Millions Of Conversations

This report focuses the vulnerability that they call “Eavesdropper.” The Eavesdropper vulnerability is due to the hardcoding of credentials in mobile apps that are using the Twilio Rest API as well as some using the Twilio SDK. This vulnerability exposes massive amounts of current and historic data, including sensitive call and messaging data.

(more available)
Added: October 20, 2018
image from eCommerce Threats Of 2018

eCommerce Threats Of 2018

This report discusses the malicious Bots in 2018 and how they can impact the eCommerce sector.

Added: October 20, 2018
image from Email Archiving: It's Time For An Update

Email Archiving: It's Time For An Update

This report offers a guide to understanding the importance of email archiving.

Added: October 20, 2018
image from Mobile Security Report: 2017 Spotlight Report

Mobile Security Report: 2017 Spotlight Report

This mobile security report provides insights into the events of 2017.

Added: October 20, 2018
image from Secure Mobile Development Best Practices

Secure Mobile Development Best Practices

This guide gives specific recommendations to use during your development process. The descriptions of attacks and security recommendations in this report are not exhaustive or perfect, but you will get practical advice that you can use to make your apps more secure.

(more available)
Added: October 20, 2018
image from Swearing Trojan Overview

Swearing Trojan Overview

This is an overview of the Swearing Trojan infecting mobile banking.

Added: October 20, 2018
image from Threat Advisory: The Fork

Threat Advisory: The Fork

This is a threat advisory for The Fork

Added: October 20, 2018
image from 2016 Mobile Security Report

2016 Mobile Security Report

From the report, “We present this report, gleaned from our database of mobile security intelligence, to help IT and security pros make informed decisions about managing and securing mobile devices, mobile apps, and their enterprises’ mobile ecosystem.”

(more available)
Added: October 19, 2018
image from 2017 Credential Spill Report

2017 Credential Spill Report

Shap Security has a unique position to talk about credtial spills. This paper provides a breakdown of their experiences with the credential spill issues of 2017.

(more available)
Added: October 19, 2018
image from 2018 Bad Bot Report:The Year Bad Bots Went Mainstream

2018 Bad Bot Report:The Year Bad Bots Went Mainstream

Focussing on Bad Bots, this report offers some updated insights into the current bad bot statistics and situations.

Added: October 19, 2018
image from 4th Annual State of Application Security Report (2015 Mid-Year Report)

4th Annual State of Application Security Report (2015 Mid-Year Report)

Arxan and iThreat Cyber Group (ICG) analyzed data collected by ICG over the past 3.5 years that looked at the distribution of pirated software and digital assets on the Dark Web (i.e., the portion of content on the World Wide Web that is not indexed by standard search engines) and indexed sites that are focused on distributing pirated releases.

(more available)
Added: October 19, 2018
image from Ad-Supported Apps: How Personal Data Collection Hides In Plain Sight & Puts Mobile Users And Enterprises At Risk

Ad-Supported Apps: How Personal Data Collection Hides In Plain Sight & Puts Mobile Users And Enterprises At Risk

From the report, “The Appthority Mobile Threat Team analyzed iOS apps in enterprise environments and found over 24,000 unique apps that access various types of user data, such as the calendar, bluetooth and photos, for advertising. These twenty-four thousand apps are just those that are up front with the user about requesting permission to access data for advertising purposes. Over 70% of enterprise environments contain these apps.”

(more available)
Added: October 19, 2018
image from Internet Trends 2016 Code Conference

Internet Trends 2016 Code Conference

This is Mary Meeker’s annual report on Internet Trends.

Added: October 19, 2018
image from Mobile Banking: Big Business, Big Target, Big Opportunity

Mobile Banking: Big Business, Big Target, Big Opportunity

This report provides insights into the security issues surrounding Mobile Banking.

Added: October 19, 2018
image from Open Banking Security Considerations And Potential Risks

Open Banking Security Considerations And Potential Risks

This report takes a good look at Open Banking, it defines what it is, and considers the security implications for using it.

(more available)
Added: October 19, 2018
image from Addressing Mobile Risk: Why Network Traffic Analysis Isn't Enough

Addressing Mobile Risk: Why Network Traffic Analysis Isn't Enough

In this whitepaper, they explain why enterprises need to take a mobile first approach to the security of employees and the data they access and share via apps on their mobile devices. They’ll show you why relying on network traffic analysis alone is insufficient to protect against mobile app threat risk, leaving blind spots that weaken your security posture in an increasingly mobile-centric world.

(more available)
Added: October 18, 2018
image from Cyber Risk Report 2016

Cyber Risk Report 2016

From the report, “In this report we provide a broad view of the 2015 threat landscape, ranging from industry-wide data to a focused look at different technologies, including open source, mobile, and the Internet of Things. The goal of this report is to provide security information leading to a better understanding of the threat landscape, and to provide resources that can aid in minimizing security risk.”

(more available)
Added: October 18, 2018
  • ««
  • «
  • 4
  • 5
  • 6
  • 7
  • 8
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 04:08 UTC (build b1d7be4)