Mobile Hacking

Download
File
Hakin9_EN_TBO_01_2015 (1).pdf

Dear Readers,

We would like to introduce a special The BEST OF issue made by Hakin9. This time will deal with Mobile Hacking.  Moreover, we added some articles on Digital Forensics.

Enjoy reading, Hakin9 Team

contact us at [email protected]

If you are not a subscriber and want to buy this magazine click here

Download Preview


TABLE OF CONTENTS

    • Digital Forensics With Kali Linux  by V.P.Prabhakaran

 

    • School Security: How to Build and Strengthen a School Safety Program by Paul Timm

 

    • Book Review by Aby Rao

 

    • Acunetix Web Vulnerability Scanner  by Michael Ortega

 

    • The BYOD Mobile Security Spectrum: A Functional Taxonomy for Risk  by Winn Schwartau

 

    • Location Dependent Attacks on Mobile Services by Nitin Goplani

 

    • How to Elevate to Domain Admin the easy way!  by Umair Vayani

 

    • Low Tech Hacking by Navneet Sharma

 

    • Security In Wireless Sensor Networks – Major Attacks, Encryption, Algorithms And Security Protocols 54 by Deivison Pinheiro Franco

 

    • Approaches For Computer Forensics In Virtualized Environments Live And Dead Analysis Techniques  by Deivison Pinheiro Franco

 

    • Forensics On Smartphones – A Technique For Apprehension, Acquisition, Examination and Analysis Of Evidences In Android Operating Systems by Deivison Pinheiro Franco

 

    • Web Application Level Approach against the HTTP Flood Attacks IOSEC HTTP Anti Flood/DoS Security Gateway Module  by Gökhan Muharremoğlu

 

    • How to Set Up Apache Web Server with Secure Configuration  by Davor Guttierrez

 

    • Web Servers Analysis Under DoS Attacks  by Predrag TaSevSki

 

    • Developers’ Challenge Results – ESC India 2012  by Jason Masters Global Product Manager

 

    • Learn and test yourself with Hack Defense  by Estera Godlewska

 

    • jhead  by Mervyn Heng

 

    • Mobile Phone Spying, Detection and Countermeasures by Akinfe Oluwafemi

 

    • SIM Card Hacking by Anupam Sharma

 

    • Windows Phone 8 Application Penetration Testing Essentials  by Wouter Veugelen

 

    • Mobile Network Traffic Analysis  by R. Milad Hosseni

 

    • Mobile Kids Safety What Do You Need To Know When Your Kid Is Using A Mobile Phone  by Dalibor Vlaho

 

    • When is a Tablet Safer Than PC?  by Farzad Ghafourian

 

    • Interview with Akinfe Oluwafemi  by Julia Adamczewska

 

    • Interview with Dalibor Vlaho by Julia Adamczewska

 

    • Mobile Device Security  by Prashant Verma and Sreenarayan

 

    • Virtualization Security  by Amar Wakharkar

 

    • Android Mobile Security  by Vinay Gayakwad

 

    • The Ultimate Hat Trick that Worked over the Last Couple of Thousand Years  by Zsolt Nemeth

 

    • Interview with Scott Gordon  by Aby Rao

 

    • Interview with Arun Sood  by Zsolt Nemeth and Jeffrey Smith

 

    • Android Forensics by Manish Chasta

 

    • Data Handling on iOS Devices  by Dominic Chell

 

    • An overview of Web Application Security Issues by Julian Evans

 

    • Movement on the Mobile Exploit Front  by Tam Hanna

 

    • Mobile Malware – the New Cyber Threat An analysis of the potential malware threat to mobiles  by Julian Evans

 

    • Mobile Web: Privacy Keeping and Exploitation Methods  by Mauro Gentile

 

    • Mobile Malware Analysis  by Cory Adams

 

    • Analysis of ZitMo (Zeus in the Mobile)  by Dhawal Desai

 

    • Android Security – ZITMO Malware  by Prashant Verma

 

    • Android Trojan Geinimi  by Dhawal Desai

 

    • Does your BlackBerry Smartphone have Ears?  by Yury Chemerkin

 

    • Tag: You’re infected! QR Codes as attack vectors  by Tim Kulp

 

    • Smartphones Security and Privacy  by Rebecca Wynn

 

    • Pen testing on Android Setting up a lab  by Thomas Cannon

 

    • Apple iOS Security in the Enterprise  by Oliver Karow

 

    • Lawful Interception on Mobile Telecom Service  by Ted Chao

 

    • When Developers API Simplify User-mode Rootkits Developing  by Yury Chemerkin

 

    • How To Develop In Android?  by Duygu Kahraman

 

    • Bluetooth Hacking Tools  by Dennis Browning

 

    • A Bits’ Life  by Tomasz Bolesław CEDRO and Marcin Armand Kuzia

 

    • Android Security  by Bhadreshsinh Gohil

 

    • Android Hacking Made Easy – What You Can Do To Limit Your Exposure  by John Lear

 

    • Weak Wi-Fi Security, Evil Hotspots and Pentesting with Android  by Daniel Dieterle

 

    • Build Secure Android Applications with ITTIA DB SQL  by Sasan Montaseri

 

    • Decompiling Android Workshop  by Godfrey Nolan

 

    • Android OS Getting Started with Customizing Your Own Rom  by Kellen Razzano and Ed Sweetman

 

    • How to Research an APK by Nathan Collie

 

    • AppUse Android Pentest Platform Unified Standalone Environment  by Erez Metula

 

    • How to Provide Strong Authentication for Your Users by Roman Yudkin

 

    • Quantum IQ How the Worlds Military’s Intend to Capitalize on the Future of Mobile and Neuroscience Technologies  by Jere Simpson

 

    • Mobile Antivirus Is a Myth  by Ken Westin

 

    • An interview with Omar Khan the Co-CEO of NQ Mobile  by Marek Majewski

If you are not a subscriber and want to buy this magazine click here


Download
File
Hakin9_EN_TBO_01_2015 (1).pdf

(15 views)
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

4 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
pitoyalatortrix
7 years ago

Hola me gustaría un articulo sobre tools kali linux, para realizar un ataque a redes wifi

Kiu Chong
8 years ago

hi

Branyovagree
9 years ago

Post Comment

Samrai Network
9 years ago
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.

What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.