Attify - Simplifying SecurityGetting started with Firmware Emulation for IoT DevicesIn this post, we will have a look at how we can perform Firmware Emulation of a given IoT device.Mar 10, 20181Mar 10, 20181
Attify - Simplifying SecurityThe Ninja Recon Technique for IoT PentestingHow many times has it happened that you or your team is in the middle of an IoT pentest and they don’t know what to do next? You get told…Sep 8, 2017Sep 8, 2017
Attify - Simplifying SecurityFirmware Analysis for IoT DevicesAny IoT device you use, you will be interacting with firmware, and this is because firmware can be thought of as the actual code that runs…Jun 16, 2017Jun 16, 2017
Attify - Simplifying SecurityHow to stay secure as an IoT Device user — An actionable guideIf you are an IoT device user, chances are that your device is riddled with numerous security issues. This post teaches you on how to stay…Jun 5, 2017Jun 5, 2017
Attify - Simplifying Security5 Tips to secure your Mobile ApplicationMobile Applications can have various type of security issues. We audit applications for security issues on a daily basis as a part of our…Jun 2, 2017Jun 2, 2017
Attify - Simplifying SecuritySecuring your “SMART” PrinterWhen you think of the ways in which a computer network is penetrated, a printer is not the first thing that comes to mind. Most of the…Jun 2, 2017Jun 2, 2017