Home Mobile

Mobile

Iris Scan to Validate Mobile Payments

Nowadays everyone is using mobile payment systems like Apple Pay and Samsung Pay. Payment systems like these uses bio-metric scans. The new bio-metric scan...

Exploring Vulnerabilities in HDMI

The HDMI (High Definition Multimedia Interface) standard has gained extensive market penetration. Nearly every piece of modern home theater equipment has HDMI support and...

Russia Demands Backdoor to Monitor Chats on Messaging App

Cyber security threats in Russia and its neighbors in the west are escalating. In the past few years, Russia violated many land borders by...

Is Apple’s iMessage Secure?

Apple Inc is the world’s largest information technology company, known by it’s outclass products and services. Apple with every release of its product, whether...

drozer – Security Testing Framework for Android

Unquestionably we can say that Android is one the leading mobile operating system, but nobody is secure; so Android also has vulnerabilities and there...

The Secret Life of SIM Cards

SIM or subscriber identity module is essential in mobile communication, SIM is a microchip or an electronic circuit that stores IMSI and other authentication and identification code....

MobiSec Mobile Penetration Testing

Mobile technology has changed the way we communicate; now smartphones and applications running on these phones are crucial for any organization. The corporate sector...

The Security Risk of Mobile Devices in the Workplace

Mobile devices have a huge range of benefits in the workplace – from increasing the productivity of employees by enabling them to keep working...

Android Security – Tips, Must-Have Apps & Possible Risks

While the biggest advantage of Android lies in its being open source, it also poses great danger because it leaves any device running on...

Mobile Internet Security Threats and Prevention

As the use of mobile devices continues to climb at astronomical rates, cyber criminals are customizing their attacks to specifically target mobile devices.  Over...

MiTM Attacks Against Mobile Devices

Normally when one thinks of MiTM (Man In The Middle) attacks over wireless802.11 protocols, thoughts of ARP Poisoning and Wifi-Pineapples come to mind. Traditionally...

Santoku Linux Mobile Forensic & Security Distribution

Santoku is a platform for mobile forensics, mobile malware analysis and mobile application security assessment. The free Santoku Community Edition...
- Advertisment -

Most Read

How to Install Android 9.0 On VirtualBox for Hacking

Android is the most used open source, Linux-based Operating System with 2.5 billion active users. Because of its wide range of application support, users...

Top 10 things to Do After Installing Kali Linux

Kali Linux is considered to be one of the best hacking distribution of this era, it is developed by Offensive Security to give an...

Become a spy in your own right with Xnspy Android spying app

Having become widely popular among parents and employers, spying apps have become quite the norm nowadays. Android spying apps have made it a lot...

e-Services Portals Potentially Expose Government Infrastructure to File-based Attacks

More and more users are embracing technology to perform their day-to-day activities. It’s not only private businesses that are forced to establish digital channels...