+

Tagged With / 'mobile devices'

August 23, 2013

Magazine News admin Comments Off
Hakin9_07_2013-1

Get Expert Skills on QR Code Hacking with Hakin9 Tutorials

Dear Readers, We are pleased to welcome you at the end of the summer period with a brand new issue. The issue that is supposed to be just a start in the area of QR code research. This is still a new topic and many people wouldn’t like to share their research and discoveries on […]

Read more

August 9, 2013

Magazine News admin Comments Off
Hakin9_EXTRA_02_2013-1

Get Expert Skills on Hacking and Protecting Mobiles with Hakin9′s Tutorials!

ATTACK Mobile Phone Spying, Detection and Countermeasures By Akinfe Oluwafemi, CCNA, CCNA sec, A+ IT Tech, C|EH, E|CSA – Information Technology Too many people see their portable PC which the smartphone today certainly is still as a phone with a sense of phony security accordingly. Thus mobile security pruducts use is still in it’s infancy […]

Read more

April 26, 2013

Magazine News admin Comments Off
Hakin9_03_2013-1

Hacking Android – 80 Pages of Experts’ Tutorials

Dear Hakin9 Readers, Android is a Linux-based operating system designed for mobile devices such as smartphones and tablet computers. At the beginning, it was developed by Android Inc. and later in 2005 bought by Google. Latest research has shown that Android users become more and more threatened by malware. A number of attacks rises every […]

Read more

April 25, 2013

Magazine News admin Comments Off
Hakin9_03_2013-1

Android Hacking – Free Download

Full version of the issue with 29 complete articles can be found here ANDROID SECURITY Android Security By Bhadreshsinh Gohil Bhadreshsinh Gohil has a Master of Engineering in Computer Engineering – specialized in IT Systems and Network Security. Android, as we are all aware, is a Linux-based operating system which was initially developed by Android […]

Read more

December 7, 2011

Hakin9 Mobile Cover

Hakin9 Mobile 1/11 (1)

Android Insecurities by Joey Peloquin The article will begin with a focus on what the author calls Offensive Mobile Forensics, an analysis technique that mimics the approach an attacker would take in the event they acquired a lost or stolen device. Readers will notice some stark differences between iOS and Android analysis. Next, the author […]

Read more

December 2, 2011

TOR Project

Hakin9 12/11: TOR Project

Latest News From IT Security World By Armando Romeo, eLearnSecurity and ID Theft Protect Duqu: The Precursor Stuxnet Attack By Rebecca Wynn Duqu is essentially the precursor to a future Stuxnet-like attack. The threat was written by the same authors, or those that have access to the Stuxnet source code, and the recovered samples have […]

Read more

October 17, 2011

Hakin9 Botnet

Hakin9 Extra – Botnet 05/2011

A study of a Botnet creation process and the impact of a DDoS attack against a web server by Stavros N. Shaeles and Ioannis D. Psaroudakis Over the following paragraphs we are going to describe in steps, the procedure of setting up a botnet in order to execute our DDoS attack. The purpose of building […]

Read more

September 15, 2011

Android

Hakin9 Extra – Android Security

Mobile Malware Analysis by Cory Adams With the emergence of the Android OS into the mobile market, nation state hackers and criminals alike are actively conducting attacks against the OS and its users for information gathering and financial gain. A high reward tool in an attacker’s arsenal is malicious software or malware, which allows information […]

Read more

June 2, 2011

Articles admin Comments Off

Wireless ad hoc Network and its Vulnerabilities

A mobile ad-hoc network (MANET) is a self configuring infrastructure-less network, consisting of mobile devices, connected via wireless links. Each device in MANET can move independently from others in any direction, and therefore change its links very frequently. Each device on MANET must forward data unrelated to its own use and therefore serve not just […]

Read more

June 1, 2011

Magazine admin Comments Off
Insceure Acces Control

Insecure Access Control 06/2011

Latest News From the IT Security World by Armando Romeo, eLearnSecurity ID Theft Protect A Hole in Your Access Control! by Ali Al-Shemery A couple of days ago I was called out to a do a security audit on a company’s internal network security and its access control. The audit was asked to be done […]

Read more

April 1, 2011

Free Issues Magazine admin Comments Off
Mobile Security - Hakin9 04/2011

Mobile Security – Hakin9 04/2011

Passware Forensic Kit 10.3 – reviewMICHAEL MUNT SpyShelter Application – reviewDAVID KNIFE How to use NetcatMOHSEN MOSTAFA JOKARNetcat is a network utillity for reading and writing network connections that support TCP and UDP protocol. Netcat is a Trojan that opens TCP or UDP ports on a target system and hackers use it with telnet to […]

Read more

April 1, 2011

Articles admin Comments Off

Smartphones Security and Privacy REBECCA WYNN

All the threats that attack your enterprise computer centers and personal computer systems are quickly encompassing mobile devices. Comments

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa