Blog

Latest news around the world

10

Feb'12

Malware scanning improved in Google Chrome 17

Google Chrome released it’s first stable (out of beta) release on the 8 February – Chrome 17. This has been …

Read More

08

Feb'12

Polymorphic Android malware requires HIPS analysis

Mobile application morphing isn’t something we have heard of on mobile platforms - however I did read an article on …

Read More

07

Feb'12

Remote locate lock and wipe your Apple iOS iPhone

If you own an iPhone, it’s imperative that you consider how you might protect your device and the personal information …

Read More

03

Feb'12

Mac OS X 10.7.3 update causing Lion problems

Mac OS X 10.7.3 was released yesterday with fixes to 51 vulnerabilities. Of the 51 total flaws, 40 were tagged by …

Read More

03

Feb'12

Chrome 17 beta Do Not Track (DNT) extension

A privacy advocate has developed a Chrome version of the Firefox Do Not Track extension (by adding the Do Not Track …

Read More

03

Feb'12

The Facebook likejacking browser vulnerability

Facebook JavaScript attacks using a known scripting vulnerability in browsers doesn’t appear to be going away very soon (as the …

Read More

03

Feb'12

How you might circumvent a mobile network

Mobile technology is evolving and as smartphone memory (including increased flash storage space), battery life and network performance improves, so …

Read More

03

Feb'12

Android architecture continues to expose concerns

The days of losing a phone and only losing your mobile contacts are long gone. Nowadays your smartphone is your …

Read More

26

Jan'12

How to securely delete Mac OS X files in Trash basket

Ever wondered whether your deleted files in the Mac OS X Trash basket are actually deleted forever? Well, let me …

Read More

26

Jan'12

The Mac OS X Quick Look Suspicious Package plug-in

One feature I really like about Mac OS X has to be the easily forgotten 'Quick Look'. It's a really …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013
GET A FREE EDITION!
Join our newsletter and receive for FREE, our premium edition “Brute Force and Supply Chain Attacks”
x