Half Sized Blog Element (Single Author Style)

Half Sized Blog Element (Multi Author Style)

August Issue of Hakin9: Securing the Cloud – Free Download

August issue of Hakin9: Securing the Cloud

New issue of Hakin9 magazine already available!

Inside:
Prey: A New Hope by Mervyn Heng
An introduction to Reverse Engineering: Flash, .NET by Nilesh Kumar
Web Malware – Part 1 by Rajdeep Chakraborty
Cyber warfare with DNSbotnets by Francisco Alonso
Search Engine Security and Privacy by Rebecca Wynn
Securing the Cloud: Is it a Paradigm Shift in Information Security? by Gary Miliefsky
Radio Frequency-enabled Identity Theft by Julian Evans
Intelligence Monopolies by Matthew Jonkmann
Special Report: Capturing the New Frontier: How To Unlock the Power of Cloud Computing by Mike Armistead

iPhone Jailbreaking: Security Concern or Not?

For those who are not familiar with the term jailbreak, it is freeing a device from the constraints imposed by the vendor. It normally requires the installation of software on a computer that will allow it to be installed on the device thus breaking it wide open for access and full modification as well as access to third party non-approved software.

August Issue of Hakin9: Securing the Cloud – Free Download

August issue of Hakin9: Securing the Cloud

New issue of Hakin9 magazine already available!

Inside:
Prey: A New Hope by Mervyn Heng
An introduction to Reverse Engineering: Flash, .NET by Nilesh Kumar
Web Malware – Part 1 by Rajdeep Chakraborty
Cyber warfare with DNSbotnets by Francisco Alonso
Search Engine Security and Privacy by Rebecca Wynn
Securing the Cloud: Is it a Paradigm Shift in Information Security? by Gary Miliefsky
Radio Frequency-enabled Identity Theft by Julian Evans
Intelligence Monopolies by Matthew Jonkmann
Special Report: Capturing the New Frontier: How To Unlock the Power of Cloud Computing by Mike Armistead

iPhone Jailbreaking: Security Concern or Not?

For those who are not familiar with the term jailbreak, it is freeing a device from the constraints imposed by the vendor. It normally requires the installation of software on a computer that will allow it to be installed on the device thus breaking it wide open for access and full modification as well as access to third party non-approved software.