Hacking Mobile Phones, PDA & Handheld Devices

10 Reasons not to Buy an iPhone

Hacking Mobile Phones, PDA & Handheld Devices Internet Security Whitepapers

The iPhone looks cool, but if you're a serious business user, there are other, less expensive cell phones that provide better functionality. And even if you're not a business user, unless you have plenty of money lying around and absolutely must have the latest neat gadget as soon as it comes out, I'd recommend waiting for version 2 of the iPhone, which, we hope, will cost less and fix at least a few of these issues.

Advanced Hacking Techniques: Implications for a Mobile Workforce

Hacking Mobile Phones, PDA & Handheld Devices Internet Security Whitepapers

Laptops are being deployed within enterprises at an increasing rate, mostly because of the flexibility and convenience they provide employees, and in turn, the productivity gains they provide for the companies. It's impossible to go anywhere today without seeing people working outside the traditional office setting on their laptops - at the local coffee shop, while lounging in the park, standing at their kitchen counters, waiting at airport gates, and working in their hotel rooms.

FoxHole Manual

Hacking Mobile Phones, PDA & Handheld Devices Internet Security Whitepapers System Hacking

The FoxHole is designed for the advanced users who want full control over the filesystem of their phone. They can also use it to store their files in a secure manner. The FoxHole is not an encrypting software. It creates a virtual drive from multimedia files and can store the user’s sensitive files in these multimedia files. It works with the so-called steganography methods (data hiding techniques). While the traditional data-hiding techniques can store only very little data (they use only one store-file) it was time to develop a technology that enables the user to handle more files together. Thus came the idea of a virtual drive that can be seen as a newly created drive under the name Hole. This data-storing methods only modify, but not demage the original files. For example an audio file remains seemingly untouched. But many rewriting can seriously degrade the quality of multimedia files.

Hacking iPhone

Hacking Mobile Phones, PDA & Handheld Devices Internet Security Whitepapers

Hacking Leopard - Tools and Techniques for Attacking the Newest Mac OS X. Mac OS X delivers the highest level of security through the adoption of industry standards, open software development and wise architectural decisions. Apple engineers designed Safari to be secure from day one.

How to Install AppTapp 3.0 Beta Into Iphone 1.1.1 in 50 Meticulous Steps Without Any Command-Line

Hacking Mobile Phones, PDA & Handheld Devices Internet Security Whitepapers

This document was generated by trial and error from a fellow enthusiast. There could be faulty information and research described in this document. The author acknowledges that the information is likely to become obsolete, and thus, deprecated, shortly after publishing, due to software updates, improvements and further lock-downs and hacks.

iPhone Hardware Unlock

Hacking Mobile Phones, PDA & Handheld Devices Internet Security Whitepapers

iPhone also needs to be jailbroken before gaining write access to upload the needed software to it. Use iBrickr this seems to be the easiest (Windows) method so it will be used in this example of unlocking. First of all please make sure that the Apple iPhone is updated to the latest firmware.

Mobile Handset Security: Securing Open Devices and Enabling Trust

Hacking Mobile Phones, PDA & Handheld Devices Internet Security Whitepapers

Security threats against mobile devices come in many shapes and forms. As the complexity of devices increases and mobile operating systems become more open, numerous new attack vectors are presented to a wider audience. The possibilities for attacking handsets should theoretically increase greatly. Attacks on mobile phones have been occurring for many years; however as traditional device operating systems and software have been of a proprietary design, attacks have been dealt with in-house by individual companies and there has been limited external exposure to the issues.

Mobile Malware: Threats and Prevention

Hacking Mobile Phones, PDA & Handheld Devices Internet Security Whitepapers

In this paper, I discuss vulnerabilities in smart phones based on Windows Mobile. Most of these vulnerabilities are also found on the Windows Mobile PDAs. Because the Symbian OS is similar in many ways to Windows Mobile, Symbian phones may also suffer from these problems. Based on detection data from McAfee Avert® Labs, we’ve seen rapid growth in mobile malware, and we foresee a continuation of this trend for the rest of the year. What are the primary reasons for increased threats?

Protecting Mobile Data and Increasing Productivity

Hacking Mobile Phones, PDA & Handheld Devices Internet Security Whitepapers

Today's smartphones and Personal Digital Assistants (PDAs) offer as much processing power and memory as PCs had a few years ago. Many of these mobile devices improve employee productivity by allowing employees ready access to needed information. While the devices may increase productivity and efficiency, they also bring new risks to organizations as confidential corporate and personal data can be lost when the device is misplaced or stolen. Other risks come in the form of malware infections, spam, and hacking of mobile devices.

Real World Security Threats: The Anatomy of a Mobile Hack

Hacking Mobile Phones, PDA & Handheld Devices Internet Security Whitepapers

The increasing mobility of the enterprise workforce poses significant security challenges for the global enterprises. With mobile workers accessing corporate resources from a variety of networks, including Wi-Fi hot spots, hotel broadband, and home broadband, the need for a comprehensive mobile workforce security strategy is no longer an option, it's a necessity.