Jump to content
Killersites Community

Search the Community

Showing results for tags 'mobile'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Entrepreneurship, Business and Marketing
    • Course: The Complete Entrepreneur
    • Social Media Marketing & Web Marketing
    • Entrepreneurship
    • Career Questions - Asked and Answered
  • Community Lounge and FAQ
    • Open Forum
    • New Members Forum - Start Here!
    • Forum Rules and Etiquette
    • Killersites Announcements
  • Web Design
    • Beginners Web Design
    • HTML/XHTML
    • CSS
    • Advanced Web Design
    • Business of Web Design
    • Web Design News
  • Software
    • StudioWeb
    • Dreamweaver
    • Photoshop
    • Miscellaneous Software
  • Programming
    • Python
    • Javascript
    • PHP
    • General Programming
    • Beginners Ruby
  • Miscellaneous
    • Cybersecurity
    • Blogs and CMS
    • Web Accessibility
    • Peer-to-Peer Reviews
    • Website Templates
    • Web Design Jobs
  • Archives
    • Beginners Web Design
    • Web Accessibility
    • CSS
    • Flash
    • ASP
    • Expression Web
    • Killersites University
    • Actionscript

Calendars

  • Community Calendar

Categories

There are no results to display.

Product Groups

  • Business & Entrepreneur Courses

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website


LinkedIn


Facebook


Twitter


AIM


Yahoo


Other


Location


Interests

Found 2 results

  1. Supreme Court Rules on Mobile Location Data: Get a Warrant https://www.databreachtoday.com/supreme-court-rules-on-mobile-location-data-get-warrant-a-11135
  2. Here I will be listing videos I come across on the subject of securit. There is now way to denote new one so you need to just keep coming back, I will add the dates as of all new ones: CIS / MS-ISAC (Center for Internet Security & Multi-State Information Sharing and Analysis Center) Sex, Lies and Mobile Devices: The Seedy Underworld of Mobile [in]security (58 min.) - You will be surprised and I hope disturbed by what all your "Devices" (some of those being devices you did not even know about) and what they are collecting about you and selling for their profit and you have no way to stop it anymore even if you know about it, and many times you will not! Assorted Media Blueborne - Android Take Over Demo (1:43) - This is a demo showing how in less than 2 min., using the BlueBorne attack, a pretend "Hacker" gets into a cell phone without the owners knowledge and activates the camera to watch her. The phone is an Android, put this attack is a Bluetooth vulnerability that affects ANY bluetooth device. It could also be your microphone or apps you use. does your phone sit where it can view your screen or your private activities? Does you Laptop sit open or is there a web cam on your PC and are these in your bedroom? Are sensitive files saved in a simple folder or are they at least in an encrypted container? [10/25/2017] Trape (10:33) - Trape is a so called people tracker. This video shows how to use it. Now this is a hacker tool, but I want you to understand how easy it is for you to be manipulated. I need but set this up and send you a link which you click and I have you. I can mess with you, I can get data about you. I can see all your social accounts id I want to stalk you. I just have to be creative and you have to be lazy just once. This tool creates the fake pages that look just like the originals. NOTE: The fake address for the victims is an IP address first, then the google address to fake you out. Remeber the top domain is always the first. [11/9/2017]
×