3 min readMOBILE HACKINGUsing MultiBlue to Control Any Bluetooth Mobile DeviceWe recently began an exploration of ways to hack using the Bluetooth protocol. As you know, Bluetooth is a protocol that connects near...
4 min readMOBILE HACKINGUkraine/Russia War: Mobile Phones and Networks Weaponized to Target on Both Sides Welcome back, my cyberwarriors! In our digital age, we are blessed with many digital wonders. Among these is the mobile phone. The mobile...
5 min readMETASPLOITMetasploit Basics, Part 13: Exploiting Android Mobile Devices (Updated)Welcome back, my budding hackers! The growth of the mobile device market has been dramatic over the past 10 years. From its birth in 2007...
3 min readDIGITAL FORENSICSDigital Forensics, Part 10: Mobile Forensics (Android)Over the past decade or so, the growth of the mobile market has been the fastest growing segment of the IT industry. We now have portable...