fbpx
Home IOS (Apple)

IOS (Apple)

iOS Penetration Testing Lab Environment

Damn Vulnerable iOS App (DVIA) is an iOS application that is damn vulnerable. Its main goal is to provide a platform to mobile security...

How to fix iOS Text Message Bug, which crashes iPhone with malicious message.

Apple Inc. is currently working on fixing the latest bug which allows the attacker to crash the iPhone with a single text message. According...

iOS 8.3 Fixes some major Security Vulnerabilities

Apple users are buzzing and talking about the new emojis which came with the iOS update. But what they don't know is Apple also...

Apple fixes FREAK Security Bug with latest iOS Update

Apple has fixed the FREAK security flaw in its iPhone's and iPad's with the release of iOS 8.2. A Security researcher team told the...

Apple’s Mac OS X and iOS tops the List of Most Vulnerable Operating Systems

According to a report published by the a top security firm GFI, it came to light the Apple's Mac OS X and iOS tops...

Samsung Galaxy S5,iPhone 5s and Nexus 5 Hacked at Pwn2Own Competition

In HP's two day competition named Pwn2Own which took place in Tokyo,Japan. Smartphones such as iPhone 5s ,Samsung Galaxy s5 and Nexus 5 using...

iSniff GPS WiFi Sniffing Tool

iSniff GPS passively sniffs for SSID probes, ARPs and MDNS (Bonjour) packets broadcast by nearby iPhones, iPads and other wireless devices. The aim is...

Apple Releases Patches for Shellshock Vulnerability

Bash bug aka shellshcok bug has shocked the IT community and it has also created an alarming situation for the organizations running Unix and Apple MAC...

Should Apple Credit Card Feature be Trusted

P { margin-bottom: 0.08in; } After the photo scandal in which prominent Hollywood stars such as Jennifer Lawrence private pictures were stolen by...

Creating an iOS Application Using WordPress

P { margin-bottom: 0.08in; } With a whole lot of room for incessant innovation in Wordpress, the web development community is consistently striving to make WP spread...

OWASP iOSForensic – Forensic Analysis

P { margin-bottom: 0.08in; } At times, you need a tool to conduct the forensics analysis; in order to investigate and recover the information found in digital...

5 Security Apps To Help Protect IPhone Apps

Smart iPhone practices like carefully vetting apps before you download can help keep your phone safe. However, security goes far beyond making careful choices:...
- Advertisment -

Most Read

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...