by Joey Peloquin

The article will begin with a focus on what the author calls Offensive Mobile Forensics, an analysis technique that mimics the approach an attacker would take in the event they acquired a lost or stolen device. Readers will notice some stark differences between iOS and Android analysis. Next, the author will discuss exploits on the Android system. Lastly, the article will wrap up with a discussion regarding mobile malware, which is far more pertinent due to the ongoing mobile malware epidemic facing Android mobile devices.

Phun with PhoneGap
by Mike Haworth

PhoneGap now (Apache Callback) allows web developers to use their current skills to build mobile apps, instead of having to learn Java for Android or Objective C for iPhone. The advantage to developers is they now have a means of bundling web apps and selling them in the AppStore or Android market. PhoneGap achieves this by providing framework on which a mobile application can be built from HTML and JavaScript.

Apple iOS security in the enterprise
by Oliver Karow

This article will describe the security mechanisms available on iOS with its strength and weaknesses, and show how a company can adopt this mechanisms to keep up with the latest security threats, targeting mobile devices.

The Hacker: A once innocent identity is now an identity in crisis
by Carla Hough

I touch on the early generations of computer scientists, engineers and software developers, who were and are a rich and diverse culture. This paper explores how this identity has been eroded by malicious individuals, cyber criminals, organized crime, and rogue nations.

Android security – ZITMO malware
by Prashant Verma

We have computers and we also have viruses, worms and malwares. We have Smartphone and we have malwares there too. Oh yes! You read it right. The shift of the hacker community’s attention towards Smartphone has been alarming. They are increasingly being attracted towards the mobile platforms and the transactions happening through the mobile platforms. Today phones are not just the phones; they are mini computers in your hand. Your Smartphone could do pretty much anything a computer can do.

Android Trojan Geinimi
by Dhawal Desai

This malware has been identified as another variant of the most popular Geinimi, which targeted a significant number of Android Phone users. The Trojan was originally used as a package namely “com.geinimi”, but over the period of time the variants took more advanced obfuscated form.


April 19, 2022
Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

1 Comment
Oldest Most Voted
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.

What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4


We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.