V-Key

V-Key

V-Key

Whitepapers

What Digital Wallets Need to consider Regarding Authentication

For this I can thank the existence of electronic wallets or e-wallets for short. As many people know, an e-wallet is a digital tool for transferring funds or making transactions for goods and services. Within an e-wallet, I can store credit… Read More

V-Key Technology Whitepaper

Get an in-depth look at the technology behind V-Key’s world-class, digital security solutions. V-Key’s CTO Er Chiang Kai and his team have released an updated whitepaper detailing a comprehensive overview of V-Key V-OS and the various product families that complement it:… Read More

Most Mobile Authentication Apps Can be Breached, Even if Hardware Security is Used

New research from V-Key reveals a critical flaw (“Trust Gap”) in most mobile authentication apps, putting your accounts at risk. Even hardware security features might not be enough to protect you from malicious attacks. Download the white paper to: Understand the limitations of… Read More

V-Key RASP whitepaper

Fortify Your Mobile Apps: V-Key RASP Whitepaper on Next-Gen Security Mobile apps face unique security challenges. Traditional methods might not be sufficient in untrusted environments where compromised devices are a potential hazard. V-Key’s RASP offers a powerful defense against these threats. Download the V-Key… Read More

How to survive a hacking attack?

A data breach can be devastating – lost customer trust, financial penalties, and reputational damage. This white paper equips you with 10 essential questions to evaluate your mobile security system and ensure your app survives a hacking attempt. Uncover your vulnerabilities… Read More

App Protection Guide

Today’s smartphones hold a wealth of sensitive data – banking information, personal documents, and more. Cybercriminals are constantly developing new methods to exploit these vulnerabilities, putting your privacy and security at risk. This white paper will equip you with the… Read More

Sim Swap Fraud

What is SIM swap scam SIM swap scam (also known as SIM jacking, SIM splitting, or Port-Out scam) is a type of account takeover fraud that exploits the weakness in conventional methods of two-factor authentication/verification. More often than not, this attack… Read More

Application Hooking

What is Hooking Hooking is a term for a range of code modification/tampering techniques that are used to change the behaviour of the original code running sequence by inserting instructions into the code segment at runtime. Find out from this whitepaper why… Read More