How the rise and rise of mobile is sparking a tech war for online casinos

Long gone are the days when the online casino experience meant huddling around a desktop computer and spinning your favourite slots.

And while that still goes on, the eye-watering growth in the industry comes from mobile casino gaming. Like all aspects of entertainment today, the modern consumer wants to have access whenever and wherever they like, 24 hours a day.

But the challenge for online casinos is delivering a user experience as good, and possibly even better, than the old fashioned desktop. Continue reading


What is secure messaging?

Secure messaging app

We rely increasingly on messaging apps to carry out our daily communications, whether for personal use or to do business. And there are literally tons of them on the internet and app stores, each sporting different features and social reach.

Having messaging apps have become an inherent part of our lives, we often use them to exchange sensitive information without regard to how capable they are of keeping that information secure. With messaging apps, we share personal information and photos, or report on sensitive issues in countries where the internet is strictly controlled and monitored by autocratic regimes.

So just how secure and trustworthy is your favorite messaging app? Here are four criteria that will help you decide. Continue reading

The future of mobile payments

mobile payment

By Edward Robles – Qondado LLC

Magnetic stripes on cards were developed in the late 1960s.  The technological breakthrough helped convert “raised letter” credit cards from single-purpose tools to universal cards accepted by a wide variety of places. Even more importantly, the development of the magnetic stripe cleared the way for fast, nearly instantaneous computerized transactions. As a result, every credit or debit card has the same format of information in the same place with only slight variations in color and branding based on the issuer.

Today, credit, debit and charge cards are the instrument and interface of most transactions around the world. The design and utility crosses cultures, languages and requires no explanation.  Retail and banking systems know precisely how to handle and capture credit card data due to the uniform nature of the instrument.  This is not the case in the mobile payments space. Continue reading

Authentication methods need to evolve

biometric authentication

Guest post by Edward Robles

Smartphones have changed our lives. We can communicate with family and friends around the world via video calls and instant multimedia messages. We order groceries with our phones and broadcast our ideas to the world.  The innovations in personal devices and their capabilities are unprecedented.  Mobile devices are integrated into our routines and impact the manner in which we express ourselves and our phone numbers have become our virtual addresses, a means of reaching us wherever we are in the world. Continue reading

How do you protect your passwords?


It’s no secret that I hate passwords (I’ve written about it here, here and here). But while I despise these increasingly complex and unique phrases that we have to memorize for each of our dozens and scores of online accounts (and which we have to change every now and then, lest we risk our most sensitive data being stolen by malicious actors), I do admit that we’re still not ready to get over the use of passwords. Continue reading

How mobile technology is helping improve authentication


For many years, the issues with password-based authentication have been riddling the cybersecurity industry. Passwords are being stolen, bruteforced and circumvented in a myriad of ways by hackers that are seeking to find their way into the accounts of their unfortunate victims. The main mechanism to counter this problem has historically been known as two-factor and multifactor authentication (2FA/MFA).

Basically, two-factor authentication involve the combination of something you know (the password) and something you have (physical token, fingerprint, retina scan, voice recognition…) in order to authenticate users. Continue reading