<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=User%3ASubho_Halder</id>
		<title>User:Subho Halder - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=User%3ASubho_Halder"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Subho_Halder&amp;action=history"/>
		<updated>2026-04-04T08:29:09Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Subho_Halder&amp;diff=166128&amp;oldid=prev</id>
		<title>KateHartmann: Creating user page for new user.</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Subho_Halder&amp;diff=166128&amp;oldid=prev"/>
				<updated>2014-01-20T20:34:24Z</updated>
		
		<summary type="html">&lt;p&gt;Creating user page for new user.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Subho Halder is a Mobile Security Researcher. Being the Lead developer and creator of AFE (Android Framework for Exploitation) he has done in-depth research and analysis on mobile platforms. He has been also listed multiple number of times in various Hall Of Fame for finding out critical Vulnerabilities in Google, Apple, Facebook, Microsoft, and many more. He has presented many talks and conducted workshops at conferences like BlackHat, Defcon, ToorCon, SysCan, ClubHack, NullCon, OWASP AppSec, RSA Conference and many more. He has also been working with private and government clients providing them Services as well as conducting Training related to Mobile Security, Exploit Development and WebApp Pen-testing.&lt;br /&gt;
&lt;br /&gt;
In his work with XYSEC, he is committed to perform VAPT and malware analysis. He is currently working on a secure BYOD solution for enterprises to mitigate the security risks which comes along BYOD implementation&lt;/div&gt;</summary>
		<author><name>KateHartmann</name></author>	</entry>

	</feed>