Blogs

INAUTH MALWARE AND MOBILE THREAT UPDATE

ANDROID BANKING TROJAN CAN BLOCK CALLS, BANKBOT TROJAN DISGUISED AS GAME, MALWARE STEALS BANKING CREDENTIALS Welcome to the latest update from InAuth where we compile recent headlines and top threats affecting mobile devices.  Here are some of the most recent highlights: New Android Banking Trojan Can Block Incoming Calls Researchers at SfyLabs discovered a new […]

Read more

InAuth Featured in Finextra Article, “Do Biometrics Keep You Safe? Yes…and No”

InAuth Chief Strategy Officer Michael Lynch was recently featured in a Finextra article discussing whether or not biometrics keep you safe from fraud and cybercrime.  As he outlines in the article, yes, biometrics are a big step forward in authentication, but their use requires that the environment in which the biometric operates also be secure.  […]

Read more

INAUTH MALWARE AND MOBILE THREAT UPDATE

ANDROID RANSOMWARE, LGEXIN MALICIOUS PLUGIN, GOOGLE PLAY MALWARE DROPPER Welcome to the latest update from InAuth where we compile recent headlines and top threats affecting mobile devices.  Here are some of the most recent highlights:   Android App for Generating Turnkey Malware Discovered Researchers at Symantec have discovered Trojan Development Kits (TDKs) that now allow […]

Read more

InAuth Malware and Mobile Threat Update: Triada, Svpeng, SonicSpy Spyware, Dictionary.com App

Welcome to the latest update from InAuth where we compile recent headlines and top threats affecting mobile devices.  Here are some of the most recent highlights: Triada Malware Found Pre-installed on Low-end Android Devices Researchers at Dr. Web discovered Triada malware pre-installed on Android devices and embedded in the system libraries. Triada can penetrate running […]

Read more

[InAuth On-Demand Webinar] New Ways to Pay Require New Ways to Secure

With mobile commerce growing at a rate of 300% and with more than half of online sales projected to be mobile-based in just a few short years, businesses are feeling the pressure to provide an array of mobile services such as mobile wallets and mobile payments to customers, yet they must simultaneously strengthen security and […]

Read more

Malware Covers Up for Summer

To most people, Halloween is the time for disguises, but this summer has highlighted the fraudster’s favorite way to disseminate malware: to disguise it as something innocuous and attractive to end-users in order to trick them into downloading it. Hiding in Legitimate Apps There have been numerous threats reported over the summer of malware disguised […]

Read more

Build Your Own Digital Wallet – Will it “Pay” Off?

It seems that the time is now for companies to create their own digital payments application, based on some recent examples in the market. Done right, it seems the xPay competition is vulnerable to alternatives. Brands such as Kohls, Starbucks, and Walmart have seen success using new payment experiences with their applications and wallets. In […]

Read more

Whitepaper: Credential Compromise: A Primer

Credential compromise—which encompasses the theft, spilling and stuffing of user account information—has remained the methodology of choice for committing fraud for a long time. It involves infiltrating a company’s systems, stealing credentials like email addresses, user IDs and passwords, and then either using them directly for theft or selling them on the dark web to […]

Read more

Sign up to receive updates from InAuth about industry trends and technologies to protect your customers.

Sign me up!