Blog: Why Hackers Love Phones - Keep your Eye on the Device

Blog: Why Hackers Love Phones – Keep your Eye on the Device

This is the third article in a guest blog series from Intellyx. Catch up on the first article here and the second one here. Maintaining a corporate cybersecurity posture means locking down its ...
Revealing the Limitations of Apple DeviceCheck and Apple App Attest

Revealing the Limitations of Apple DeviceCheck and Apple App Attest

This overview outlines the history and use of Apple DeviceCheck including the DeviceCheck App Attest feature. It will highlight how this security solution is used and highlight some limitations. We also compare ...
Empowering Mobile Payments: Approov's Security and PCI MPoC Mastery

Empowering Mobile Payments: Approov’s Security and PCI MPoC Mastery

In the ever-evolving landscape of mobile applications, especially those dealing with sensitive financial transactions, security is paramount. Approov, an advanced App and API security solution, takes a multifaceted approach to ensure the ...
“Mobile First” is for Mobile Secrets, Too

“Mobile First” is for Mobile Secrets, Too

This is the second article in a guest blog series from Intellyx. You can read the first article here. Organizations, such as the Citi Consumer Bank when I was head of security ...
2024: Reflecting on a Dynamic, Tumultuous Cyber Year

2024: Reflecting on a Dynamic, Tumultuous Cyber Year

As we step into 2024, it's crucial to reflect on the cyber landscape of the past year, marked by significant breaches that underscore the persistent challenges in securing our digital lives. Here ...
Play Integrity API for Android developers

The Limitations of Google Play Integrity API (ex SafetyNet)

This overview outlines the history and use of Google Play Integrity API and highlights some limitations. We also compare and contrast Google Play Integrity API with the comprehensive mobile security offered by ...
Approov Addresses Apple Watch Security Issues

Approov Addresses Apple Watch Security Issues

Apple and MIT recently published a study indicating that 2.6 billion personal records were exposed through data breaches over the last two years. These findings underscore the need for protecting data in ...
Top Security Trends and Predictions for 2024

Top Security Trends and Predictions for 2024

Approov stands at the forefront of mobile cybersecurity: Our expansive customer base, ongoing research initiatives and the insights we collect from our live threat metrics, give us unique visibility into trends in ...
Understanding the Security of Mobile Apps in Africa

Understanding the Security of Mobile Apps in Africa

CyLab-Africa researchers partner with mobile security provider for summer collaboration experience Researchers from CyLab-Africa and the Upanzi Network recently partnered with the mobile security provider Approov to explore the security of common financial services apps used ...
Why Isn’t Mobile at the Center of Your Cybersecurity Strategy?

Why Isn’t Mobile at the Center of Your Cybersecurity Strategy?

This is the first article in a guest blog series by Jason Bloomberg, Managing Partner, Intellyx Focusing on user authentication, including multi-factor authentication, is not enough to put mobile at the center of ...