Features: comprehensive page on security of major mobile technologies
Author: admin
Potential Threats to WAP phones
Features: This paper will review WAP, WAP Push, WML, and WMLScript and their ability to host malicious software. Exploits such as buffer overflows, authentication, and encryption schemes are outside the scope of this paper. Finally to detech such future threats,…
TULP2G
Features: Uses Microsoft .NET Performs forensic extracting and decoding of date store in electronic devices Plugins available to read data from mobile phones and Sim cards.
Analysis of 3G Mobile Security
Features: Online Page which is a report on 3G security
Neverbefore Bluetooth Intrusion
Features: Protect yourself again intruder using this manual learn how an attacker step by step gains access to symbian and bluetooth enable phones Takes control and even can steal call credit