attify Author

IoT Security – What, Why and How – Internet of Things

IoT Security is a key factor to implement in today’s world. The amount of IoT devices in today’s world is just overwhelming. Everywhere we go, we see an IoT device...

How to stay secure as an IoT Device user – an actionable guide

If you are an IoT device user, chances are that your device is riddled with numerous security issues. This post teaches you on how to stay secure if you are an end consumer with...

Bypass Jailbreak Detection with Frida in iOS applications

In this blog post, we will have a look at Frida, which is one of the really interesting tools for mobile application security analysis. This is also something we cover in-depth in...

Zigbee security and exploitation for IoT devices

While working on our training material for the Offensive IoT Exploitation course, we here at Attify did a ton of in-depth research into all the possible aspects of IoT devices....

Introduction to Attify Badge : Hacking IoT hardware

Welcome to the new blog post by Attify. In this blog post, we will introduce our newest creation – Attify Badge, something which we use in order to perform hardware...

Emulating and Exploiting Firmware binaries

Welcome to the third post in the “Offensive IoT Exploitation” series. In the previous one, we learned about how we can get started with analyzing firmware and extracting file...

Firmware Analysis for IoT Devices

This is the second post in the IoT Exploitation and Penetration Testing series. In this post, we are going to have a look at a key component in an IoT device architecture –...

Getting started with “IoT Security” – Mapping the attack surface

IoT or the Internet of Things is the new buzzword all around. However, not enough attention has been paid to the security aspect of these so-called “smart” devices. This...

BlackHat Asia 2016 : Wrap Up

Like almost any other major security conference, this time at BlackHat Asia 2016 , Attify was present to interact with its existing clients and also to conduct a security...

5 tips to secure your Mobile Application

Mobile Applications can have various type of security issues. We audit applications for security issues on a daily basis as a part of our Mobile Application Auditing services. If...