SURVEY: 1 IN 2 BUYERS REQUIRE CSR IN PROCUREM... » Almost half of buyer documents (48 per cent) seen by electrotechnical businesses with turnover above... G4S Africa supports small business development thr... » The latest product in the G4S Deposita range is a smart safe system called mini-pay that holds up to... Commissioner's statement following incident in Man... » This is an utterly appalling attack. My thoughts are with the people of Manchester as they try to co... UPDATE: Policing events in the Capital » Following the horrific terrorist attack in Manchester last night, in which 22 people were killed and... Statement from Assistant Commissioner » Statement from Assistant Commissioner Mark Rowley, Head of National Counter Terrorism Policing: The... Met intensifies policing activities in London fol... » The Metropolitan Police Service (MPS) has increased police numbers and operations across the Capital... OF FOOLS OF THE MIDDLE BELT, ONE NORTH AND PASTORA... » Please visit also: SERIES: BUHARISM AND THE FIERCE URGENCY OF NOW A treat... Home Secretary’s statement on the Manchester attac... » I know that some people will only just be waking up to the news of the horrific attacks in Mancheste... Checkpoint Systems unveils Bug Tag 2 loss preventi... » Checkpoint Systems has announced the launch of Bug Tag 2 – an innovative loss prevention solution th... Edesix launches new head and torso mounted body wo... » Edesix has announced the launch of new head and torso mounted cameras. The X-100 is a side-mounta...



Book and Arts Review

LONDON, UK: The Mobile Application Hacker's Handbook has been released. It is a comprehensive and practical guide to securing mobile applications. The book, co-authored by security professionals, including Tyrone Erasmus, head of the Mobile Practice at MWR InfoSecurity in South Africa, cleverly tackles the problem of information vulnerabilities and discusses issues from the point of view of a hacker. Filled with expert guidance, this publication addresses how one can discover and exploit flaws in mobile applications that are relevant to the most globally used mobile platforms – Android, iOS, Blackberry and Windows Phone. It teaches a proven methodology for approaching mobile application assessments that prevent a variety of different attacks.

In recent years, security breaches have been increasingly taking the centre stage of many media headlines; with more and more major organisations falling victim to cyber attacks. Now more than ever, being aware of how to secure data is necessary. Mobile devices are so embedded in everyday life and the security of these devices affects people in a personal capacity, as well as in business.

It is with these principles in mind that The Mobile Application Hacker’s Handbook was created.

Tyrone Erasmus, head of the Mobile Practice at MWR InfoSecurity in South Africa, is one of the four   mobile security expert co-authors who has taken a highly technical approach to discuss the vulnerabilities that attackers can take advantage of. Erasmus, whose contribution focuses on the Android chapters, also shares recent cutting-edge research conducted by global information security consultancy, MWR InfoSecurity.

“As mobile apps are so widely used in today’s world, mobile is most definitely an emerging attack vector. As such, the more that is understood about it, the better chance we have at improving our security against those wishing to infiltrate it," he explained. "I’m happy to have had the opportunity to not only be a part of this book and research, but also be a contributing factor to teaching others how to better protect themselves against attack.”

As it stands, there are over a million apps in Apple’s App Store alone - yet there is a shocking lack of published material on the topic of mobile security. The Mobile Application Hacker’s Handbook sees to change this and be a positive movement to educating others in the topic of mobile security awareness.