+

Tagged With / 'Mobile'



August 23, 2013

Magazine News Redaction Comments Off

Get Expert Skills on QR Code Hacking with Hakin9 Tutorials

Dear Readers, We are pleased to welcome you at the end of the summer period with a brand new issue. The issue that is supposed to be just a start in the area of QR code research. This is still a new topic and many people wouldn’t like to share their research and discoveries on […]

Read more


August 9, 2013

Magazine News Redaction Comments Off

Get Expert Skills on Hacking and Protecting Mobiles with Hakin9′s Tutorials!

ATTACK Mobile Phone Spying, Detection and Countermeasures By Akinfe Oluwafemi, CCNA, CCNA sec, A+ IT Tech, C|EH, E|CSA – Information Technology Too many people see their portable PC which the smartphone today certainly is still as a phone with a sense of phony security accordingly. Thus mobile security pruducts use is still in it’s infancy […]

Read more


July 2, 2013

Magazine News Redaction Comments Off

Learn Software Exploitation Techniques Step-by-step And Become A Hacker – A Beginners’ Guide to Software Exploitation

Dear readers, We are happy to present you with the third edition of Starter-Kit Project. We continue supplying you with the articles on the basics of hacking and exploiting. Although we realeased StarterKit Compendium (can be found here: https://hakin9.org/ exploiting-for-beginners-exploiting-software-compendium/) only two weeks ago, we decided to go on with the topic and provide you […]

Read more


June 19, 2013

Magazine News Redaction Comments Off

Exploiting for Beginners – Exploiting Software Compendium

Dear Readers, We are happy to supply you with second publication devoted to those of you who want to learn some basic hacking skills. Let us present Hakin9 StarterKit – Exploiting Software Compendium. This publication encloses basic articles on exploiting software that were published in our magazine this and last year. The articles address various […]

Read more


April 19, 2013

Magazine News Redaction Comments Off

Hacking for Beginners – 18 Articles on the Basics of Hacking and Exploiting

Dear Readers, I am happy to present you with this very first issue of our new project – Hakin9 Starter Kit. This issue will address various topics connected with IT Security. Although the line is mainly devoted to those of you who would like to start they journey with hacking, we strongly believe that each […]

Read more


December 7, 2011

Magazine Redaction 1 Comment

Hakin9 Mobile 1/11 (1)

Android Insecurities by Joey Peloquin The article will begin with a focus on what the author calls Offensive Mobile Forensics, an analysis technique that mimics the approach an attacker would take in the event they acquired a lost or stolen device. Readers will notice some stark differences between iOS and Android analysis. Next, the author […]

Read more

December 6, 2011


Carrier IQ tracking mobile behaviour – spyware?

Carrier IQ isn’t spyware as such. It does indeed collect and map geo-location and device (T-Mobile and other carriers in the US have confirmed the app is resident on some of their devices) specific data which includes SMS, MMS, search queries and a whole lot more from your smartphone. The main reason the media is […]

Read more


December 2, 2011

Magazine Redaction No Comments

Hakin9 12/11: TOR Project

Latest News From IT Security World By Armando Romeo, eLearnSecurity and ID Theft Protect Duqu: The Precursor Stuxnet Attack By Rebecca Wynn Duqu is essentially the precursor to a future Stuxnet-like attack. The threat was written by the same authors, or those that have access to the Stuxnet source code, and the recovered samples have […]

Read more

November 27, 2011


Free mobile apps collecting your device data

I’ve (Julian Evans blog) just completed some research of some free mobile apps across BlackBerry, iOS and Android. What I found didn’t surprise me, but it may surprise my readers. Free apps are really not that free – why? These so called free apps are collecting device and personally sensitive mobile data and sending it […]

Read more

November 17, 2011


The QR code mobile malware and phishing threat

QR codes (sometimes referred to as ‘tags’) which is an abbreviation for ‘Quick Response’ allows mobile users to use a smartphone’s camera to read a barcode (see image opposite – this is the QR code for my blog). A QR code can contain text and or a URL. You may have started seeing these on […]

Read more

November 16, 2011

Events Redaction No Comments

ISSE 2011 – 22-23 November, Prague

This year’s Information Security Solutions Europe (ISSE) conference will be held in Prague on 22-23rd  November. ISSE is the only independent, interdisciplinary security conference in Europe. World-leading industry experts will speak about a number of most actual topics in IT security. The topics include: cloud computing; mobile and wireless security; security management; identity and access […]

Read more

November 4, 2011


Android 4.0 Ice Cream Sandwich security enhanced

The Android 4.0 operating system, otherwise known as “Ice Cream Sandwich”, has been in the security news recently. Android 4.0 is possibly Google’s most secure operating system, to date, so to hear that Android 4.0 has added address layout randomization (ASLR) is good news for enteprise and mobile security for end-users (consumers included ) in […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa