Financial systems

Developing Secure Blockchain Applications

You can find many articles about blockchain because there has been a lot of discussion about this technology in recent years. Blockchain is often...

Outsmarting Smart Contracts – an essential walkthrough a blockchain security minefields

Outsmarting Smart Contracts – an essential walkthrough a blockchain security minefields from SecuRing   The goal of this presentation is...

Internet banking safeguards vulnerabilities

Internet banking safeguards vulnerabilities – OWASP AppSec EU 2016 from SecuRing

Demystifying Host Card Emulation Security – Best Practices for Implementing Secure Mobile Payments

Demystifying Host Card Emulation Security – Best Practices for Implementing Secure Mobile Payments from SecuRing   Accompanying whitepaper...

Transaction Authorization Cheat Sheet

Update 23/12/2015  Version 2.0   Transaction authorization is implemented in modern financial systems in order to protect against unauthorized...

Struts security app-ocalypse. IT security manager’s survival guide

Sławek Jasek – IT security expert, SecuRing   The problem  Recently, we have seen one of the most spectacular data breaches in history. Equifax...

Mobile payment card cloning possibilities

  Nowadays we are observing very dynamic adoption of mobile contactless payments. These are systems provided by OS manufacturers (Android Pay,...

HCE cloning FAQ

  HCE cloning FAQ Our research demonstrated that it is possible to copy mobile contactless card data, enrol it to another phone, and use it for...

Several polish banks hit by watering hole attack – lessons learnt?

Wojciech Dworakowski (wojciech.dworakowski@securing.pl, @wojdwo)   Last days Badcyber.com –informed about ongoing attack on polish banks....

Script-based malware detection in Online Banking Security Overview

Online banking applications are particularly exposed to malware attacks. In order to prevent stealing from customer accounts, banks have invested in...