Android

Android 4.0 Ice Cream Sandwich security enhanced

The Android 4.0 operating system, otherwise known as “Ice Cream Sandwich”, has been in the security news recently. Android 4.0 is possibly Google’s most secure operating system, to date, so to hear that Android 4.0 has added address layout randomization…

Hacking Data

Hacking Data 11/11

Latest News From IT Security World By Schuyler Dorsey, eLearnSecurity i ID Theft Protect As usual specialists from companies eLearn Security and ID Theft protect will share with us latest news from IT security world. Read it to up-date yourself….

Hack Apple

Hack Apple 10/11

In Brief By Schuyler Dorsey, eLearnSecurity i ID Theft Protect As usual specialists from companies eLearn Security and ID Theft protect will share with us latest news from IT security world. Read it to up-date yourself. Hacking Tools on iOS…

Analysis of Zitmo

READ THE WHOLE ARTICLE by Dhawal Desai Over the time security space has seen a number of versions and variants of banking malware. With the increase in popularity and usage of smart phones, mobile attacks are becoming more frequent. Android…

Android

Hakin9 Extra – Android Security

Mobile Malware Analysis by Cory Adams With the emergence of the Android OS into the mobile market, nation state hackers and criminals alike are actively conducting attacks against the OS and its users for information gathering and financial gain. A…

SpitMo SpyEye toolkit targeting Android smartphones

The SpitMo SpyEye hacking toolkit app is targeting smartphones running on the Android operating system according to security vendor Trusteer. The SpitMo is primarily targeting banking web pages. When a user browses to the targeted bank a message is injected,…

The 2nd Android DevCon 2011

Event: The 2nd Android DevCon Date: November 6-9, 2011 Venue: San Francisco Bay Area, U.S.A http://www.andevcon.com The technical conference for software developers building or selling Android apps, arrives after a smashing debut in March, 2011 (nearly 1,000 attendees and 20…

The Spyware Within You

Yes, today’s spyware though resides in your computer or mobile but it’s pretty much inside you. Whatever we do, wherever we go it’s stored in a computer or an embedded device like mobile phone. Author: RAJAT KHARE Source: Hakin9 11/2010 https://hakin9.org What you…

Movement on the Mobile Exploit Front

It did not take an industry expert to verify predictions of an everincreasing amount of vulnerabilities in device software: Nokia’s Curse of Silence issue should have convinced even the most stubborn of do-gooders. Author: Tam Hanna Source: Hakin9 2/2010 https://hakin9.org This…

Safer 6.1

Microsoft’s Windows Mobile currently dominates the mobile computing market, and thus is under permanent attack from new (Google’s Android) and old (Symbian, Palm OS) competitors. In an attempt to keep its market position secure, Microsoft decided to tackle the topic…

Robot Wars – how botnets work

One of the most common and efficient DDoS attack methods is based on using hundreds of zombie hosts. Zombies are usually controlled and managed via IRC networks, using socalled botnets. Let’s take a look at the ways an attacker can…