• ISO certification consultants Delhi, India, IT Consultancy Services –  ICPL

    ISO 9001:2008

    Quality Management System

  • ISO 14001:2004 Certification - Environmental Management System –  ICPL

    ISO 14001:2004

    Environment Management System

  • OHSAS 18001:2007 Certification, Occupational Health and Safety -  ICPL

    OHSAS 18001:2007

    Occupational Health and Safety

  • ISO 27001:2005 Certification, ITSMS Certification –  ICPL

    ISO 20000-1:2011

    Information Technology Service Management System

  • ISO 22000:2005 Certification, food safety management system –  ICPL

    ISO 22000:2005

    Food Safety Management System

  • Network Penetration Testing, IT Security Services –  ICPL

    ISO 27001:2005

    Information Technology Security Management System

  • ISO 13485:2003 Certification, Quality Management System for Medical Devices – ICPL

    ISO 13485:2003

    Medical Devices

Mobile Application Security Testing


Technology is changing at incredibly fast pace. It started with a mainframe, desktop, laptop and now mobile devices. Mobiles devices are not just a cellular phone but a full feature computer system. Number of mobile users are much higher than computer users and thus businesses started delivering services via mobile applications. These applications are similar to computer applications and hence are vulnerable to attack. Mobile application security testing is a practice of identifying vulnerabilities in mobile applications.

Why should i spend in mobile application security testing?

Mobile applications are not different from standard computer applications and most of the business have already started delivering service using mobile applications to customers. Often mobile applications are not designed in secure way and thus susceptible to various attacks which may allow attacker to steal sensitive data.

Our Methodology

Indicium uses an approach based on emerging industry standards, such as those defined by the Open Web Application Security Project (OWASP), which include the OWASP Top 10. We examines security risks and usability weaknesses that are common in a mobile computing environment, including

  • Application permissions model
  • Encryption APIs
  • Security of network communications and data transmissions
  • Residual data analysis of local storage and caching (passwords, usernames, PII, and other sensitive data)
  • Ability of user to protect the device and lost device scenarios
  • Insufficient authorization from mobile client to back¬end systems
  • Session hijacking
  • Security of device backup mechanisms



Indicium deployed most competent resource to provide us with the network security assessment through VAPT and the assessment report was found very professional with in-depth analysis and gap closure consultation which helped HCL Services Ltd to secure it’s networks and servers from intrusions.

Mr. G.G. Rao (CIO)
View All