Wordpress Security Services

Ehacking Tutorial

The Secret Life of SIM Cards

SIM or subscriber identity module is essential in mobile communication, SIM is a microchip or an electronic circuit that stores IMSI and other authentication and identification code. The foremost objective of SIM is to give the identification of its owner in the mobile communication network, it also carries the network signals that can hacked to control a mobile phone. How to hack into a SIM card is not the primary objective of this article, however we will study the structure of a SIM and exploitation process.

At DEFCON 21 talk, Karl Koscher and Eric Butler have presented their research and understanding regarding the said topic. Following is the abstract of what's discussed there:


SIM cards can do more than just authenticate your phone with your carrier. Small apps can be installed and run directly on the SIM separate from and without knowledge of the phone OS. Although SIM Applications are common in many parts of the world, they are mostly unknown in the U.S. and the closed nature of the ecosystem makes it difficult for hobbyists to find information and experiment.

5 Top Google Chrome Extensions For Anonymous Surfing

We can unquestionably say that Chrome is one of the popular web browser from the list of the web browsers, Google chrome has created its own place among the Internet users and you might be using it as your primary browser. Sometimes; while browsing internet you need to hide your identity because of online censorship or any other private work, there are mainly two ways to get anonymous one is by using VPN while the other is to use the proxy chaining technique.

Apart from the methods mentioned above, the anonymity status might be achieved by using extensions for Chrome and Addons for Firefox browser. But which is the best Google chrome extension to stay anonymous is the question of this article. Below are the top and the best Chrome extensions for anonymous surfing and you can use them to achieve your anonymity.

Chrome proxy helper

By default, Chrome use the system proxy setting (IE proxy settings on Windows platform ), but sometime we want to set proxy ONLY for chrome, not the whole system. Chrome proxy helper extension use Chrome native proxy API to set proxy, support socks5, socks4, http and https protocol and pac script, Fast And Simple.

MobiSec Mobile Penetration Testing

Mobile technology has changed the way we communicate; now smartphones and applications running on these phones are crucial for any organization. The corporate sector using the technology for their day to day operation, hence the risk and the hacking attacks have drastically increased; the purpose is understood, to steal information or damage everything. Now it a job of penetration tester to make the envirenment secure and for mobile devices and applications we have Mobisec.

The objective of a security researcher and penetration tester is to test the mobile environment and give a clean chit to the management regarding the security of the environment so that they can make it live and then thing goes on.  

What is Mobisec ? 

The MobiSec Live Environment Mobile Testing open source project is a live environment for testing mobile environments, including devices, applications, and supporting infrastructure. The purpose is to provide attackers and defenders the ability to test their mobile environments to identify design weaknesses and vulnerabilities.

Hack Gmail With 92 Percent Success Rate

A weakness in Android, Windows, and iOS mobile operating systems could be used to obtain personal information.

Researchers at the University of California Riverside Bourns College of Engineering and the University of Michigan have identified a weakness they believe to exist across Android, Windows, and iOS operating systems that could allow malicious apps to obtain personal information.

Although it was tested only on an Android phone, the team believes that the method could be used across all three operating systems because all three share a similar feature: all apps can access a mobile device's shared memory.

Creating an iOS Application Using Wordpress

With a whole lot of room for incessant innovation in Wordpress, the web development community is consistently striving to make WP spread its wings further.

And this is where the concept of using Wordpress to create mobile apps comes into existence. Yes, there are plugins and granted, they are great, but if you are willing to compromise control and let the third party tools dictate terms, you might as well go ahead with the likes of AppPresser and Mobiloud. 

But, when being in the driver's seat is on your agenda, segue on to the following partially plugin-assisted ways to create iOS apps using Wordpress:

NSA’s ‘MonsterMind’ Could Launch Cyber Counterattacks Against Hackers

As the story covered by infosecurity-magazine, A new cyber defense system being developed by the NSA could automatically launch counter-strikes against attackers who target the US, whistleblower Edward Snowden has claimed.

The MonsterMind project, still under development at the spy agency, features algorithms which would automatically scan vast chunks of metadata with the aim of picking out malicious traffic.