• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Author: Oleg Afonin

The BlackBerry We Lost: A Retrospective on One of the Best Mobile Operating Systems
Mobile

The BlackBerry We Lost: A Retrospective on One of the…

3 days ago14/09/2025Oleg Afonin2860
By 2017, the mobile OS market had effectively become a duopoly: Google versus Apple, with Android firmly outpacing iOS across most markets. But just a few years earlier, things looked different. Microsoft’s Windows Phone was doing reasonably…
CONTINUE READING 🡒
What Hackers Can Do with Your iPhone Passcode: Data Theft, iCloud Account Takeover, and Locking Your Other Devices
Mobile

What Hackers Can Do with Your iPhone Passcode: Data Theft,…

7 days ago14/09/2025Oleg Afonin3650
Over the past few months, we’ve written a lot about what’s new in iOS 11. “Now we’re really set!” we thought. We were wrong. With iOS 11, Apple not only introduced new security mechanisms but also weakened…
CONTINUE READING 🡒
Root Access on Recent Android Versions: What You Need to Know
Mobile

Root Access on Recent Android Versions: What You Need to…

1 week ago14/09/2025Oleg Afonin5250
We cataloged the most common ways to get superuser access on current Android builds; unpacked the differences between SuperSU, phh SuperUser, Magisk, KingRoot, and KingoRoot; tested various methods of hiding root; examined Android 7’s security model and…
CONTINUE READING 🡒
A Practical Guide to Stable Diffusion XL: Choosing Models, Refiners, LoRAs, and Styles
Security

A Practical Guide to Stable Diffusion XL: Choosing Models, Refiners,…

4 weeks ago13/09/2025Oleg Afonin5820
If you decide to run generative image models on your own machine, you’ll quickly hit a tough choice: there are many of them, and while their outputs are similar, they’re all a bit different. In this article,…
CONTINUE READING 🡒
Beyond the App Store: Installing Third-Party Apps on iOS Without Jailbreak
Mobile

Beyond the App Store: Installing Third-Party Apps on iOS Without…

4 weeks ago13/09/2025Oleg Afonin4750
Apple tightly controls what users can and can’t do with their devices. On iOS and iPadOS, that control borders on the absurd, to the point where a device’s rightful owner can’t freely install apps. In this article,…
CONTINUE READING 🡒
Which Operating System Is Most Vulnerable? Security Comparison of iOS, Android, Windows, Sailfish, and Tizen
Mobile

Which Operating System Is Most Vulnerable? Security Comparison of iOS,…

4 weeks ago13/09/2025Oleg Afonin3160
We often write about mobile OS security—publishing details on newly discovered vulnerabilities, outlining defensive weak spots, and explaining methods of compromise. We’ve covered surveillance of Android users, malicious apps baked right into firmware, and the uncontrolled exfiltration…
CONTINUE READING 🡒
TrueNAS CORE vs TrueNAS SCALE vs OpenMediaVault: Choosing the Right NAS Software
Security

TrueNAS CORE vs TrueNAS SCALE vs OpenMediaVault: Choosing the Right…

1 month ago13/09/2025Oleg Afonin7630
Despite the abundance of off‑the‑shelf NAS devices from major vendors, the urge to build and tune your own NAS shows no sign of fading. The options are dizzying: TrueNAS Core, TrueNAS Scale, openmediavault, specialized setups with Unraid…
CONTINUE READING 🡒
Unmasking Shingled Magnetic Recording in Western Digital and Seagate HDDs
Security

Unmasking Shingled Magnetic Recording in Western Digital and Seagate HDDs

2 months ago23/08/2025Oleg Afonin2480
Until recently, the savvy user—the kind who doesn’t mind spending a few days on forums—knew this as gospel: Seagate’s consumer drives use SMR (shingled magnetic recording), which is bad, and Western Digital’s don’t. Lots of people based…
CONTINUE READING 🡒
Why iPhone Performance Beats Android—Now and in the Future
Mobile

Why iPhone Performance Beats Android—Now and in the Future

2 months ago23/08/2025Oleg Afonin1330
Why is the iPhone 7 faster than the Samsung Galaxy S7, and the iPhone 8 faster than the Galaxy S8? What’s the “Apple magic”? Setting aside fanboy takes like “Android is better!”, let’s break down the factors…
CONTINUE READING 🡒
How Everyday Users Try to Hide Digital Evidence—and Why It Fails
Security

How Everyday Users Try to Hide Digital Evidence—and Why It…

2 months ago19/08/2025Oleg Afonin650
Most criminals are anything but professionals, so the data-hiding methods they use are pretty crude. Yet these methods often work—simply because the investigator may not have the time or expertise to run a thorough analysis. So what…
CONTINUE READING 🡒
Stable Diffusion XL: Generate AI Images Locally on Your Computer
Security

Stable Diffusion XL: Generate AI Images Locally on Your Computer

2 months ago10/08/2025Oleg Afonin2900
You’ve probably heard of Stable Diffusion—a neural network that generates images locally on your computer, with no cloud services or paid tokens. A new version just dropped: SDXL, short for “Extra Large.” In this article, we’ll install…
CONTINUE READING 🡒
How Phone Makers Ruin Android with Bloatware, Heavy Skins, and Broken Updates
Mobile

How Phone Makers Ruin Android with Bloatware, Heavy Skins, and…

2 months ago10/08/2025Oleg Afonin1330
In one of our previous pieces, we took a deep dive into why iPhones have been—and will continue to be—faster than current Android flagships. The article sparked heated debate and mixed reactions. So we decided to expand…
CONTINUE READING 🡒
Unlocking and Accessing Data on iOS Devices
Mobile

Unlocking and Accessing Data on iOS Devices

3 months ago22/07/2025Oleg Afonin2200
In this article, we will delve into what happens to an iPhone in a forensic lab. We will explore the feasibility of bypassing iOS security across different versions and what tools or methods might be needed in…
CONTINUE READING 🡒
Effective Erasure: Ensuring Fast and Irrevocable Data Destruction
Security

Effective Erasure: Ensuring Fast and Irrevocable Data Destruction

11.07.202511/07/2025Oleg Afonin1480
Destroying evidence and covering tracks is typically reserved for the less law-abiding individuals. However, today we’ll discuss how to securely erase data from various devices when you plan to sell, give away, or simply dispose of a disk, phone, or computer.
CONTINUE READING 🡒
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com