Mi3 Security prides itself on having two key differentiators; the DEPTH of risk intelligence we produce for applications and the SPEED at which we produce those intelligence results.
DEPTH of Risk intelligence
Mi3 Security has spent nearly half a decade creating the RECON Platform to aggregate and integrate threat intelligence feeds across every possible threat source. The platform analyzes everything from malicious Android and iOS frameworks to OWASP Top 10 threats to rogue brand infringement on torrent engines.
Speed of results
We heard our customers, and we listened. Mi3 Security has fine tuned the RECON Platform to analyze threats and uncover actionable risk conditions in record time; eleven minutes for iOS applications and six minutes for Android applications, ensuring rapid response for the most demanding app test environments.
There are two things wrong with the preconception that cyber criminals rely on tacky, free mobile apps to get victims to leak their financial details, so that the criminals can then empty their bank accounts. First, mobile data leaks also happen via many popular, well-perceived app brands. Second, financial data is only one part of the treasure trove for cyber criminals, who may find even richer gains by using additional, non-financial, personal data.
In the aftermath of the recent attack in London by an alleged terrorist, the popular WhatsApp messaging service has itself become a target of the British Government. The U.K. Home Secretary, Amber Rudd, wants WhatsApp to make end-user content available to British intelligence services. This follows disclosure that the attacker used the messaging service shortly before launching the violent aggressions that claimed the lives of four people.
When it comes to Internet of Things app security, many enterprises are like deer caught in the headlights. They know something bad is going to happen if they don’t make a move. When IoT apps fail to properly protect the data and devices with which they work, damage can range over breach of private personal information, for example in the case of wearables, to sabotage of large systems and machines, such as production lines and power generating turbines.