HAKIN9 MOBILE 2/2012

Download
File
sdsfszd56df1.pdf

Handling on iOS Devices

With over half a million apps in the App Store, Apple’s trademark slogan “There’s an app for that” is bordering on reality. We use these apps for online banking, social networking and e-mail without really knowing if they’re communicating and storing our personal data securely. With Apple controlling over 52% of the mobile market [1], iOS apps are becoming more closely scrutinised in a world where the security of our personal data is paramount. In the last year, MDSec’s consultants have performed an increasing number of security assessments of iOS applications and their supporting architecture where data security is paramount, specifically the retail/business banking sector.

by Dominic Chell


When developers API simplify user-mode rootkits developing

This is a series of articles about shell extensions that enhance high-level features of any operation system. However, such possibilities not only enrich platform but simplify developing trojans, exploits that leads to the new security holes. Mostly this kind of extensions are known as user-mode rootkits.

by Yury Chemerkin


Android Forensics

Smartphones are changing the IT and Communication landscape vastly. A Smartphone can do almost every good thing a computer can do. Today most of the corporate employee access and manage their official e-mails through the e-mail client installed on their Smartphone. Right from booking movie tickets to making fund transfers, all e-commerce and online banking transactions can be done using a Smartphone. With high speed of 3G, Smartphones are getting more popular specially among working professionals and students.

by Manish Chasta


Social Engineering

Ever walked into a shop planning on buying a product, but after talking to the salesman

leaving with a more expensive product that has more options than you needed?

Ever listened to a politician and thought during his or her speech: ‘that’s a pretty good

idea’, but the next day you realize what all the downsides are to his or her statement?

And ever kept buying that one person drinks because you thought it would get you somewhere, but suddenly the person in question left and you didn’t even get a phone

number?

by Ruben Thijssen


A Bits’ Life

Have you ever wondered what makes all these devices around you alive? I might have to give you a bit of bad news – this is not a black magic of any kind, neither any supernatural powers, not even the Jedi Force; it is just a simple set of interesting ideas, well described with a language called science and technology.

by Tomasz Bolesław Cedro & Marcin Armand Kuzia


Download
File
sdsfszd56df1.pdf

April 19, 2022
Subscribe
Notify of
guest
1 Comment
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Sky faith
7 months ago

I appreciate you getting this done to me so quickly. Thanks for your help.
I got access to my husband iPhone i got all his text messages, call details, WhatsApp details, Facebook messenger. I’m so sad he is cheating on me. I’m sending all evidence to my lawyer. that will used in court against him. contact: [email protected], or text him or WhatsApp +1 (602) 562‑6646. he ready to help anytime contact him for your hacking jobs.…

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.