Book of the Month – Mobile Malware Attacks and Defense
As mobile devices becoming more and more sophisticated with their computing power and memory, the attackers are slowing shifting their focus from PC to these Mobile devices. Unlike earlier generation...
View ArticleBook of the Month – Android in Action
Lately I was looking for the best & latest book on Android programming and after stumbling through many of the Android books on Amazon I finally got exactly what I was looking for! . The [...]
View ArticleClubHack 2011 – The Exclusive Coverage
ClubHack 2011 ends in another great show and here is the exclusive coverage of finest moments from 5th edition of India’s first Hacker Con. . . This is my first appearance at ClubHack and I [...]
View ArticleStealing iPhone Backups using Metasploit
Introduction to iPhone Backups: iTunes is used to back up the iPhone data to a computer. iTunes backup makes a copy of everything on the device like contacts, SMS, photos, calendar, music, call logs,...
View ArticleAdvanced Malware Analysis Training Session 8 – Introduction to Android
Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) and our advanced malware training session on Introduction to Android This is part of our FREE ‘Advanced Malware...
View Article
More Pages to Explore .....