+

Tagged With / 'Android'

November 4, 2011


Android 4.0 Ice Cream Sandwich security enhanced

The Android 4.0 operating system, otherwise known as “Ice Cream Sandwich”, has been in the security news recently. Android 4.0 is possibly Google’s most secure operating system, to date, so to hear that Android 4.0 has added address layout randomization (ASLR) is good news for enteprise and mobile security for end-users (consumers included ) in […]

Read more

October 31, 2011

Hacking Data

Hacking Data 11/11

Latest News From IT Security World By Schuyler Dorsey, eLearnSecurity i ID Theft Protect As usual specialists from companies eLearn Security and ID Theft protect will share with us latest news from IT security world. Read it to up-date yourself. Secure Log Server With Rsyslog By Leonardo Neves Bernardo This article will discuss how to […]

Read more

September 28, 2011

Hack Apple

Hack Apple 10/11

In Brief By Schuyler Dorsey, eLearnSecurity i ID Theft Protect As usual specialists from companies eLearn Security and ID Theft protect will share with us latest news from IT security world. Read it to up-date yourself. Hacking Tools on iOS By Alexandre Lacan One day I was asked if the iPhone is a good phone. […]

Read more

September 15, 2011


Analysis of Zitmo

READ THE WHOLE ARTICLE by Dhawal Desai Over the time security space has seen a number of versions and variants of banking malware. With the increase in popularity and usage of smart phones, mobile attacks are becoming more frequent. Android platforms have been one of the most favorite targets of malware writers. To read the […]

Read more

September 15, 2011

Android

Hakin9 Extra – Android Security

Mobile Malware Analysis by Cory Adams With the emergence of the Android OS into the mobile market, nation state hackers and criminals alike are actively conducting attacks against the OS and its users for information gathering and financial gain. A high reward tool in an attacker’s arsenal is malicious software or malware, which allows information […]

Read more

September 14, 2011


SpitMo SpyEye toolkit targeting Android smartphones

The SpitMo SpyEye hacking toolkit app is targeting smartphones running on the Android operating system according to security vendor Trusteer. The SpitMo is primarily targeting banking web pages. When a user browses to the targeted bank a message is injected, presenting a ‘new’ mandatory security measure, enforced by the bank, in order to use its […]

Read more

August 23, 2011


The 2nd Android DevCon 2011

Event: The 2nd Android DevCon Date: November 6-9, 2011 Venue: San Francisco Bay Area, U.S.A http://www.andevcon.com The technical conference for software developers building or selling Android apps, arrives after a smashing debut in March, 2011 (nearly 1,000 attendees and 20 major sponsors).  It will offer one day of intensive workshops, followed by three days of […]

Read more

November 1, 2010


The Spyware Within You

Yes, today’s spyware though resides in your computer or mobile but it’s pretty much inside you. Whatever we do, wherever we go it’s stored in a computer or an embedded device like mobile phone. Author: RAJAT KHARE Source: Hakin9 11/2010 https://hakin9.org What you will learn… The new trendy Spear spyware About honeypots of spyware What you should know… […]

Read more

August 1, 2010


Mobile Malware – the new cyber threat – An analysis of the potential malware threat to mobiles

Mobile phone malware first appeared in June 2004 and it was called Cabir. The mobile-phone features at most risk are text messaging (using social engineering), contacts list, video and buffer overflows. GSM, GPS, Bluetooth, MMS and SMS will indeed be some of the attack vector to expect this year and beyond. Author: JULIAN EVANS Source: […]

Read more

February 1, 2010

Articles admin Comments Off

Movement on the Mobile Exploit Front

It did not take an industry expert to verify predictions of an everincreasing amount of vulnerabilities in device software: Nokia’s Curse of Silence issue should have convinced even the most stubborn of do-gooders. Author: Tam Hanna Source: Hakin9 2/2010 https://hakin9.org This article provides you with a short list of problems which have occurred recently and should […]

Read more

February 1, 2009


Safer 6.1

Microsoft’s Windows Mobile currently dominates the mobile computing market, and thus is under permanent attack from new (Google’s Android) and old (Symbian, Palm OS) competitors. In an attempt to keep its market position secure, Microsoft decided to tackle the topic of corporate device management. Author: Source: https://hakin9.org WHAT YOU WILL LEARN …. Understand the new features […]

Read more

December 1, 2007


Robot Wars – how botnets work

One of the most common and efficient DDoS attack methods is based on using hundreds of zombie hosts. Zombies are usually controlled and managed via IRC networks, using socalled botnets. Let’s take a look at the ways an attacker can use to infect and take control of a target computer, and let’s see how we […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa