Home News Page 3

News

If you bought a new Huawei phone, you can use the company's own solution to carry the personal data of your old phone. Huawei Phone Clone was developed for this. For some time it was difficult to transfer data from one device to another in the iOS ecosystem, and it was usually done by connecting to a computer. Now with...
Increased attention to real-world (AR) based games and applications is great. Over the last 6 months, Apple's enhanced reality applications developed with ARKit platform have been downloaded more than 13 million. Apple's last year announced the ARKit platform, which allows developers to build enhanced reality (AR) -based applications for the iOS operating system. The technology offered for use with iOS...
Georgi Guninski sent an email to Full Disclosure today, claiming that he will be retiring from the public security scene. Pre-meditating the question of why, he writes, if one needs to ask for a reason: got old, got somewhat tired. Georgi has made excellent contributions to the security community for some time now. He has released loads of exploits and his...
Last year I started working on the Web Backdoor Compilation (WBC). The idea behind the project was the following: A tool to aid penetration testers and web developers with security testing document management applications. Recently I made a pre-v2 release of the tool, which has received even more feedback then the previous version and the project just got even more...
Well what about security certifications? There are useful guides to certifications at about.com and dmiessler.com. Arguably, the better internationally known certifications listed are CISSP and SCNP. One recent addition into this arena is the Certified Ethical Hacker (CEH). Their course outline provides a very good background on what you should know as a security tester. Whether the content is...