Here’s how your business can benefit from embracing strong customer authentication requirements.
As a proudly Czech company, Wultra’s own company values are built around establishing the Czech Republic as a haven for individuals and businesses seeking reliable data protection and cyber-security providers.
Over time, mobile banking security practices have ramped up after unreliable, faulty user entry and authentication methods have led to phishing attacks and compliance issues.
Let’s take a moment to think about each of the services that we carry out using a variety of mobile applications. Whether we’re purchasing something online or managing personal finances, we turn to solutions that we access on our mobile devices.
Facial authentication is one of the good ways to verify one’s identity with a high level of confidence. However, it isn’t a one-size-fits-all solution; there are multiple “levels” of facial authentication that provide corresponding levels of protection.
Our team continuously monitors for significant mobile banking and related security threats that are lurking in the digital world.
For many people, the concept of passwordless authentication can be difficult to wrap their head around. How is it that one safely logs in to and interacts with sensitive services without using a password, you may wonder?
Authentication via SMS-OTP is considered outdated because of higher overall costs, low user convenience, insufficient regulatory compliance in specific geographic regions, but primarily for practical security reasons.
Our latest market analysis will help you make a qualified decision about releasing your mobile banking app to Huawei AppGallery.
The security of digital banking systems often relies on strong cryptography. However, the algorithms we currently know and take for granted, such as RSA or ECC, are threatened by a new computational paradigm and a machine with an unprecedented force: the quantum computer.
The demand for in-app protection is driven by security requirements, as well as regulatory compliance.
NIST announced the round 3 of the contest for post-quantum cryptographic (PQC) algorithms, selecting 7 finalists and 8 alternate candidates.
The more people use smartphones, the bigger amount of various apps they install to manage their daily tasks or spend leisure time.
Large scale quantum computing has always been “ten years away” since it has become apparent a quantum computer could be built. Something quite unexpected has happened recently: This moving timeline has changed.
PSD2 defines a range of requirements on digital banking security. These requirements concern both banks and third parties. The subject that is especially pronounced is the topic of mobile application security.