phone

50 Arrested In Smartphone Spyware Dragnet


















phone

Aastra IP Telephone Crypto Failure

The Aastra 6753i IP telephone uses 3DES encrypted payloads in ECB mode to pass configuration files, allowing for modification to the phone's set up.




phone

Aastra IP Telephone Hardcoded Password

The Aastra 6753i IP Telephone suffers from a hardcoded telnetd administrative password.




phone

Design And Implementation Of A Voice Encryption System For Telephone Networks

This whitepaper goes into detail on design and implementation details for performing voice encryption on telephone networks. Written in Spanish.




phone

Jolla Phone URI Spoofing

Jolla Phone with Sailfish OS versions 1.1.1.27 and below suffer from a telephone URI spoofing vulnerability.





phone

Cisco IP Phone 11.7 Denial Of Service

Cisco IP Phone version 11.7 denial of service proof of concept exploit.





phone

Apple iPhone 4 Passphrase Disclosure

Apple iPhone 4 with iOS 4.3 (8F190) suffers from a passphrase disclosure vulnerability that allows all local processes access to it.




phone

Checkview 1.1 For iPhone / iPod Touch Directory Traversal

Checkview version 1.1 for iPhone / iPod Touch suffers from a directory traversal vulnerability.




phone

iPhone/iPad Phone Drive 1.1.1 Directory Traversal

iPhone/iPad Phone Drive version 1.1.1 suffers from a directory traversal vulnerability.




phone

iPhone Forensics On iOS 5

This is a brief whitepaper discussing how to perform forensics on iOS 5 on the iPhone.




phone

IPhone TreasonSMS HTML Injection / File Inclusion

IPhone TreasonSMS suffers from html injection and file inclusion vulnerabilities.




phone

Forensic Analysis Of iPhone Backups

This article explains the technical procedure and challenges involved in extracting data and artifacts from iPhone backups.




phone

Air Transfer Iphone 1.3.9 Arbitrary File Download

Air Transfer Iphone version 1.3.9 suffers from remote denial of service and unauthenticated file access vulnerabilities.




phone

WordPress Windows Desktop And iPhone Photo Uploader File Upload

WordPress Windows Desktop and iPhone Photo Uploader plugin suffers from a remote shell upload vulnerability.




phone

Symantec Mobile Encryption For iPhone 2.1.0 Denial Of Service

Symantec Mobile Encryption for iPhone version 2.1.0 suffers from a denial of service vulnerability.




phone

Visual Voicemail For iPhone IMAP NAMESPACE Use-After-Free

Visual Voicemail for iPhone suffers from a use-after-free vulnerability in IMAP NAMESPACE processing.




phone

iPhone iMessage Malformed Message Bricking

An issue exists where a malformed iMessage can brick an iPhone. A method in IMCore can throw an NSException due to a malformed message containing a property with key IMExtensionPayloadLocalizedDescriptionTextKey with a value that is not a NSString.





phone

Will mobile phone penetration maintain African momentum?

Sub-Saharan Africa is the world’s fastest growing mobile phone market, but how can telecoms companies make the most of the huge opportunities the region provides?





phone

Mara's Phones makes African manufacturing a priority

Having opened new production facilities in Rwanda and South Africa, Mara Phones is looking to alter Africa's mindset from being a 'consumer' to being a 'manufacturer'. 




phone

Best headphones for running or working out

BEST DEALS ON HEADPHONES:


The only thing more important to runners than their sneakers is a quality pair of headphones and a killer playlist. Running without music is like some form of medieval torture: it sucks. And cheap, crappy headphones just aren't going to cut it.

When shopping for a quality pair of headphones to wear while running, you'll want to look at a few key factors: Are they sweatproof/waterproof? Will they stay in your ears? Are the volume controls easily accessible? If you answer no to any of these questions, then you know the headphones aren't going to work. Read more...

More about Running, Headphones, Bluetooth Headphones, Mashable Shopping, and Culture
IMAGE: Amazon

BEST FOR WORKOUT TRACKERS

Bose SoundSport Pulse Wireless

While sound quality and flexibility are always good features, a great pair of headphones will do more than that.

$129 from Amazon

IMAGE: Amazon

BEST MID-PRICED WIRELESS OPTION

Jabra Elite 45e

The Elite 45e headphones are an example of quality at an affordable price.

$86.53 from Amazon

IMAGE: Amazon

BEST TRULY WIRELESS EARBUDS

Bose SoundSport Free Wireless

These truly wireless ear buds can charge while you're using them, and the app can help you locate them in the event that they fall out.

$199 from Amazon

IMAGE: Amazon

BEST BUDGET WIRED HEADPHONES

JBL Endurance RUN

These are the kind of headphones you buy in multiples so you don't have to fret once you've inevitably lost a pair.

$19.95 from Amazon

IMAGE: Amazon

BEST NO-FRILLS OPTION

ROVKING Sport Headphones

These super-cheap headphones have an earhook design that keeps them on your ears, and are also sweatproof.

$14.99 from Amazon

IMAGE: Amazon

MOST FIT OPTIONS FOR WIRED HEADPHONES

Sony MDRXB510AS/B

These Sony earbuds offer multiple sets of covers and hooks to hold the earbuds securely in place.

$29.99 from Amazon

IMAGE: Amazon

BEST AUDIO QUALITY FOR WIRED HEADPHONES

Bose SoundSport

Bose SoundSport are a great set of headphones to buy when the clarity of audio really matters to you.

$99 from Amazon

IMAGE: Amazon

BEST OVER-EAR OPTION

Levin Bluetooth 4.1 Wireless Headphones

The Levin Bluetooth 4.1 Wireless Headphones deliver an affordable and reliable option for anyone who prefers over-ear headphones.

$29.99 from Amazon




phone

Your Phone and Your Face: Anchoring Users to Real Identities




phone

Your Phone and Your Face: Anchoring Users to Real Identities




phone

Your Phone and Your Face: Anchoring Users to Real Identities




phone

Your Phone and Your Face: Anchoring Users to Real Identities




phone

Your Phone and Your Face: Anchoring Users to Real Identities




phone

Your Phone and Your Face: Anchoring Users to Real Identities




phone

Your Phone and Your Face: Anchoring Users to Real Identities




phone

Your Phone and Your Face: Anchoring Users to Real Identities




phone

Your Phone and Your Face: Anchoring Users to Real Identities