Posts in category Mobile Security

Advanced Malware Analysis Training Se...

Advanced Malware Analysis Training Session 8 – Introduction to Android

Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) and our advanced malware training session on Introduction to Android This is part of our FREE ‘Advanced Malware Analysis Training’ series started from Dec 2012.   In this session, Swapnil gave quick introduction to Android explaining technical details as well as various security […]

Stealing iPhone Backups using Metaspl...

Stealing iPhone Backups using Metasploit

Introduction to iPhone Backups: iTunes is used to back up the iPhone data to a computer. iTunes backup makes a copy of everything on the device like contacts, SMS, photos, calendar, music, call logs, configuration files, database files, keychain, network settings, offline web application cache, safari bookmarks, cookies and application data, etc. It also backups […]

ClubHack 2011 – The Exclusive C...

ClubHack 2011 – The Exclusive Coverage

ClubHack 2011 ends in another great show and here is the exclusive coverage of finest moments from 5th edition of India’s first Hacker Con. . . This is my first appearance at ClubHack and I was indeed delighted to be in the mid of hackers.  To start with, Rohit Shrivastava – founder of ClubHack – […]

Book of the Month – Android in ...

Book of the Month – Android in Action

Lately I was looking for the best & latest book on Android programming and after stumbling through many of the Android books on Amazon I finally got exactly what I was looking for! . The best & latest Android book  –  ‘Android in Action’. The book covers A-Z of Android Programming, starting with basics to […]

Book of the Month – Mobile Malw...

Book of the Month – Mobile Malware Attacks and Defense

As mobile devices becoming more and more sophisticated with their computing power and memory, the attackers are slowing shifting their focus from PC to these Mobile devices. Unlike earlier generation of mobile devices, current mobile devices are as powerful as our computer systems with increased memory and performance along with built-in internet connectivity. All of […]

Our Company

Follow us on Facebook


Join Mailing List

Get direct access to our expert trainers or mingle with like minded security folks in our mailing list