Skip to main content

Articles

Fun with Call Forwarding

posted onJanuary 9, 2005
by hitbsecnews

Note: The information within this article is published for INFORMATION PURPOSES ONLY. The use of any or all of the following information can be considered defrauding the phone company. You have been warned.

By: Ninja

X2 Free SMS Exploit

posted onJanuary 9, 2005
by hitbsecnews

Note: The information within this article is published for INFORMATION PURPOSES ONLY. The use of any or all of the following information can be considered defrauding the phone company. You have been warned.

By: Ninja

Okay guys, now for the exploit. We all remember the old straw
trick to make free phonecalls? Well the phone company patched
it up so it detects if that trick is being used. However, the
patch doesnt check when using the SMS feature on the newer X2
phone.

Securing the (Increasingly) Mobile Client

posted onNovember 1, 2004
by hitbsecnews

Note: This article first appeared over on our affiliate site EBCVG. The original article can be found here.

By: James L. Bindseil

Enterprise deployments of notebook PCs, tablet PCs, and PDAs continue to grow by leaps and bounds. In fact, researcher Gartner Inc. recently predicted that, by the year 2010, 80 percent of key business processes will involve the exchange of real-time information involving mobile workers.

Phreak interviews - Avatar235

posted onNovember 1, 2004
by hitbsecnews

By: decimalz

First of all, thank you for agreeing to this interview. Extra
big thanks to Ezekial who help set it up. If you dont want to answer
please just reply with N/A. Just a quick questionnaire.

Where did the original idea of an amalgamation group stem
from? Were you inspired from (an)other groups?