Training

Protect the Integrity of Mobile Financial Apps from Hacking Attacks and Malware Exploits

Protect the Integrity of Mobile Financial Apps from Hacking Attacks and Malware Exploits

Over 90% of Top 100 iOS and Android apps have been found as hacked versions proving that mobile financial apps can easily be cracked open, modified, and exploited by hackers. This requires enterprises to proactively incorporate application security measures that protect the integrity of their mobile apps out "in the wild" as they are offered for download from app stores.

Join our webinar to learn:

  • The anatomy of mobile app integrity attacks, and how apps can be compromised in less than 3 minutes;
  • How app developers can protect the integrity of their financial apps by instrumenting them with self-defense and tamper-resistance before release;
  • Review a case study of a top 5 Financial Services customer that is applying application protection to reduce risk from both programming flaws and integrity attacks.

Background

Gartner forecasts the volume of mobile payment transactions worldwide to be at $235 billion this year and grow to $721 billion by 2017. As the financial industry continues to undergo rapid mobile expansion, characterized by peer-to-peer payments, balance transfers, bill payment transactions, etc., the underlying mobile applications are now targets of attack.

Mobile financial apps can easily be cracked open, modified, and exploited by hackers - over 90% of Top 100 iOS and Android apps have been found as hacked versions. The changing attack surface is exemplified by malware insertion, bypass of critical security routines such as jailbreak/root detection, unauthorized access, fraud, or IP/ data theft. This requires an evolution in application security measures that protect the integrity of mobile apps out "in the wild" and which exceed device-level capabilities.

Webinar Registration

Coming Soon

Request to be notified when this webinar is made available OnDemand.

Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.