Mobile Device Security
by Prashant Verma

A lot of speculations these days are on the mobile devices and the security features they provide. The mobile phone and tablet usage has picked up on account of the numerous benefits, not to mention the comfort at fingertips and that too on the move. The number of free Wi-Fi hotspots in the cities is also going up – an additional incentive for the users to posses’ tablets to be connected and remain updated. The pace, at which Smart phones and tablets are being sold, is equally complemented by the availability of applications in the various market places or app stores and the increasing number of attacks. A study by McAfee predicts more mobile attacks and fewer PC attacks in 2012.

Virtualization Security
by Amar Wakharkar

Virtualization Security is the need for rapidly growing Virtualized environment. This document tries to explain various factors affecting virtual security, security concerns associated with full virtualization Technologies for server and desktop virtualization, and to provide recommendations for addressing these concerns.

Interview with Scott Gordon
by Aby Rao

Bring your own device (BYOD), is gaining a lot of steam these days, why is that the case?
Many employees use their personal devices at home, work and on the road. In addition, organizations need to provide network access to contractors and guests, who often arrive with their own personal devices. Although these devices are ultimately connecting to the network and introducing risk, IT Security must consider the productivity gains to be had. Security policies and practices need to be acceptable, unobtrusive and efficient for both users and IT, while fortifying necessary security mechanisms. What’s important is to have real-time visibility and control over your network and the mobile devices connected to it, as well as a flexible way to enforce security policy. So we define BYOD as the extent to which an organization denies, tolerates, sanctions and endorses the use of personal and mobile devices on their network and the technical controls to manage operational risks.

Android Mobile Security
by Vinay Gayakwad

Android’s profound impact on the mobile market has made it a prime target for criminals. And the operating system, which powers over half of the 60.5 million smart phones sold worldwide in the third quarter of 2011, is less safe than its rivals. Juniper Networks’ Malicious Mobile Threats Report shows that Android malware instances increased by 400% between 2009 and 2010, while other platforms remained relatively secure, due mainly to fewer cybercriminals trying to break through their defenses, and in some cases, to stronger security features.


Interview with Arun Sood
by Zsolt Nemeth and Jeffrey Smith

What do you see as the future of cyber security?
Today we are mostly focused on Information Assurance – primarliy technology and policy issues. I think that there needs to be more focus on human factors, low cost solutions, and policy. In addition, Attribution deserves much more work.

The Ultimate Hat Trick that Worked over the Last Couple of Thousand Years
by Zsolt Nemeth

This tutorial will help you understanding the concept of trojan, dangers created by them, how they can come to your computer, how do they destroy you and your data. We will discuss that how many types of trojans exist and how they are attached to other applications (wrappers). And finally we’ll disclose the most important issue: detection of trojan on your system, some common symptoms and prevention to safeguard your data.


April 19, 2022
Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.

What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4


We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.