Getting started with “IoT Security” – Mapping the attack surface

IoT or the Internet of Things is the new buzzword all around. However, not enough attention has been paid to the security aspect of these so-called “smart” devices. This...

Securing your “smart” printer

When you think of the ways in which a computer network is penetrated, a printer is not the first thing that comes to mind. Most of the employees in an organisation will have their...

BlackHat Asia 2016 : Wrap Up

Like almost any other major security conference, this time at BlackHat Asia 2016 , Attify was present to interact with its existing clients and also to conduct a security...

5 tips to secure your Mobile Application

Mobile Applications can have various type of security issues. We audit applications for security issues on a daily basis as a part of our Mobile Application Auditing services. If...

Security Consulting for your organisation

The consulting industry is one of the oldest in most parts of the world, but continues to be highly fragmented due to the lack of restrictions. Whereas most industries like...

10 Secure Coding Guidelines for Mobile Apps

Attify is a leading provider for Mobile Application security for various organisations all over the world. We have got a number of requests to share the top secure coding...

3 Steps to Secure your IoT Devices from getting HACKED.

A lot of new IoT  ( Internet of Things ) and smart  devices are coming up every now and then, and being a user myself, I thought a few  basic and handy tips will be useful to...

Write your own Drozer Module for Android Application Security Testing

If you have worked in penetration testing or application testing, you already know how often you are repeating common tasks. This is where Drozer comes into the picture. Drozer :...

Android Application Security Vulnerability : Hacking Twitter Vine app

This blog post shares one of the Android application security vulnerability we discovered around a year back in 2014. Attify has been in business for the last couple of years, and...

OWASP Mobile Security Top 10 for Android and iOS apps

Mobile Applications are often insecure. There can be a lot of reasons leading to the vulnerabilities – the most common being developer mistakes. So how do you ensure the...