Security Audit

Our Web Application Pentest ( WAP) attempts to address the Owasp top 10 & SANS top 20 web application vulnerabilities and other exploitable loopholes of your web application . Along with it our WAP team also test web applications for Business logic flaws that can directly or indirectly effect the functioning of application.


We are here to help you solve your biggest query- where and how to start? CDI has brought various courses in Ethical Hacking in Chandigarh where all you technology lovers will be given the much needed push to move forward and create a niche for yourself in the field. From Beginner to Expert level we have many kinds of training patterns.

Call Us : +91-771045-0011 | +91-771045-0022

Android Trojan Alert! This Trojan is Stealing Your Money and Personal Details!     A Tordow named Android Malware has been discovered by security researchers of Kaspersky Lab. It is a banking Trojan because it is capable to identify the running programs of a financial application. This Tordow Trojan could get root level privileges of an infected android device to perform critical attacks. According to Security researchers of Kaspersky, Attackers are controlling this Trojan through

Beware Android users! “Godless” named Malware can Root your device Anonymously!   If you are using Android Lollipop or its earlier version, then your device is at risk. A new type Android Malware has been discovered by the security researchers of “Trendmicro”. The name of the malware is “Godless” and it is capable to root your device automatically. It could install third party malicious coded programs in your device to perform that operations, which c

LG On-Screen Phone Security Bypass Vulnerability lets attackers bypass the authentication and control Android phone. LG's Android smartphones are critically vulnerable. This recent vulnerability disclosure by a user with github handle "irsl", also included a PoC (Proof-of-Concept). LG On-Screen Phone Security Bypass Vulnerability According to the disclosure, LG's On-Screen Phone (OSP) application is open to a severe vulnerability (CVE-2014-8757) by which a malicious a