STEP 1: Install Balena Etcher on your Windows or Linux machine
In order to analyze an IOS application (IPA) you will require an emulator or a jail broken IOS device. Here is a tutorial to sort you out with Jail breaking an IOS and installing the OWASP prerequisite tools:
After 2 hours of Googling, failed installations and probable malware infection on my Windows system i managed to Jailbreak an Apple Device and below is a guide to assist with the setup.
I am very fascinated by the cyberpunk age. A future world majorly reliant on technology and conflict between the ruling multinationals and the movement organisations fighting the system of oppression. Its a little bit like now but with more futuristic technology and people fighting for a common cause.
As much as the future world is depicted as a free for all and fight the ruling regime, it can also be depicted in 1984, George Orwell view of the world where people are controlled by a ruthless government using mind control to rule over the people and monitoring their movements.
We…
Before the COVID-19 outbreak, organisations had limited access to their internal environments and access was only granted to known individuals with badges or with “connections”. In the era of COVID-19, everything seems to be mutating to conform with the new way of life. As a result, Kenyan organizations are finding themselves transitioning their workforce to work from home therefore forcing IT departments to avail avenues for the employees to gain access to information.
Globally, the use of remote access technologies such as RDP (Remote Desktop Protocol) and VPN (Virtual Private Network) usage has skyrocketed by 41% and 33%, respectively, since…
Working from home, social distancing and self-isolation are some of the new buzz phrases that have arisen with the advent of the Corona Virus Pandemic, as people enforce measures to avoid contracting the highly contagious COVID-19 disease.
One of the earliest steps that many organizations took was to ensure that most personnel who are regarded are non-essential, work away from the office environment.
This of course means that each person would of necessity use their own devices, either laptops, desktop computers or phones and tablets to communicate with their colleagues, serve clients and submit reports.
And the organizations have had…
The Africa Cyber Immersion centre (ACIC) is a cyber security research, innovation and training facility