Quixxi Security
Resources
Discover new ways to transform your business by reading and watching product, solution and industry content.
Case Study
News Release
Blog
Voice Pro – preventing piracy
Published at 18 Apr 12:04
Managing over 250,000 users and turning piracy into revenue to recover over $250,000
NSW Seniors Card app
The NSW Government’s Seniors Card app makes it even easier to find businesses offering discounts so Seniors Card members can save even more money. Quixxi Analytics was implemented from the …
Nestle – pilot apps
Saving money and time by predicting the potential success of a mobile app before committing to full investment
Verimoto – GPS spoof prevention
Reducing the cost of vehicle inspections by preventing GPS spoofing… and more.
360 Degree
Freeing up developers to focus on developing great applications.
SUPER APP BROTHERS
An integral part of the team behind industry recognised apps
NSW Government selects Quixxi Security to Protect GovConnect App
Published at 02 Oct 05:10
Sydney, 20 February 2019. Lakeba Group, an Australian technology innovation firm today announced its award-winning Quixxi Mobile application Security solution has been selected by the NSW Government …
Code Protection: How to Protect Your Source Code
Published at 16 Sep 01:09
Code protection describes the tactics and procedures used to protect source code from theft, unauthorized access, and misuse. Source code is the most important intellectual property of the …
Does Pinning Certificate Enhance Application Security?
Published at 06 Aug 02:08
Application security is among the most important elements for ensuring secure business operations. Since applications are hooked to the cloud and mostly used on many different networks, they have …
Android Alert: Medusa Banking Malware’s New Strains Strike in Seven Countries!
Published at 15 Jul 01:07
The Android version of the Medusa banking malware has returned after nearly a year-long period of rather low-key activities in France, Italy, the United States, Canada, Spain, the United Kingdom, and …
Mobile Application Attacks, Static and Dynamic
Published at 21 Jun 08:06
Mobile apps have become an integral part of our daily lives. From social networking and entertainment to banking and communication, nearly everything can be done on a smartphone. Because sensitive …
Amplifying AI-powered cybersecurity to counter growing threats
Published at 31 May 06:05
Business leaders are very worried about the rise of complicated cyber threats in today’s digital world, which changes very quickly. They are finding it difficult to keep up with the increasing …
New Android Trojan “SoumniBot” Evades Detection with Clever Tricks
Published at 15 May 03:05
SoumniBot, a newly identified Android trojan, has been spotted in the open attempting to compromise users in South Korea by exploiting vulnerabilities in the manifest extraction and parsing process. …