iOS Penetration Testing Lab Environment
Damn Vulnerable iOS App (DVIA) is an iOS application that is damn
vulnerable. Its main goal is to provide a platform to mobile security...
How to fix iOS Text Message Bug, which crashes iPhone with malicious message.
Apple Inc. is currently working on fixing the latest bug which allows the attacker to crash the iPhone with a single text message. According...
iOS 8.3 Fixes some major Security Vulnerabilities
Apple users are buzzing and talking about the new emojis which came with the iOS update. But what they don't know is Apple also...
Apple fixes FREAK Security Bug with latest iOS Update
Apple has fixed the FREAK security flaw in its iPhone's and iPad's with the release of iOS 8.2. A Security researcher team told the...
Apple’s Mac OS X and iOS tops the List of Most Vulnerable Operating Systems
According to a report published by the a top security firm GFI, it came to light the Apple's Mac OS X and iOS tops...
Samsung Galaxy S5,iPhone 5s and Nexus 5 Hacked at Pwn2Own Competition
In HP's two day competition named Pwn2Own which took place in Tokyo,Japan. Smartphones such as iPhone 5s ,Samsung Galaxy s5 and Nexus 5 using...
iSniff GPS WiFi Sniffing Tool
iSniff GPS passively sniffs for SSID probes, ARPs and MDNS (Bonjour) packets broadcast by nearby iPhones, iPads and other wireless devices. The aim is...
Apple Releases Patches for Shellshock Vulnerability
Bash bug aka shellshcok bug has shocked the IT community and it
has also created an alarming situation for the organizations running
Unix and Apple MAC...
Should Apple Credit Card Feature be Trusted
P { margin-bottom: 0.08in; }
After
the photo scandal in which prominent Hollywood stars such as Jennifer
Lawrence private pictures were stolen by...
Creating an iOS Application Using WordPress
P { margin-bottom: 0.08in; }
With
a whole lot of room for incessant innovation in Wordpress, the web
development community is consistently striving to make WP spread...
OWASP iOSForensic – Forensic Analysis
P { margin-bottom: 0.08in; }
At times, you need a tool to conduct
the forensics analysis; in order to investigate and recover the
information found in digital...
5 Security Apps To Help Protect IPhone Apps
Smart iPhone practices like carefully vetting apps before you download can help keep your phone safe. However, security goes far beyond making careful choices:...
Most Read
What Makes ICS/OT Infrastructure Vulnerable?
Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...
Everything You Must Know About IT/OT Convergence
What is an Operational Technology (OT)?
Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...
Understand the OT Security and Its Importance
This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...
What is Deepfake, and how does it Affect Cybersecurity?
Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...