Hacking Attempts Search Results

How To: Add 2-Step Verification to Uber for Stronger Overall Account Security

If you've ever received an email from a sketchy address purporting to be Uber, asking you to sign in with your credentials, you might be a phishing target. Hackers use a fake login page from real-looking domains to trick you into giving up your account information, and while it's been an issue in the past, Uber is making it more difficult on cyber thieves with the addition of two-step verification.

News: What Is a White Hat Hacker?

In recent weeks, some people have been shunned from the Null Byte community because they expressed "black hat" aspirations. This is because Null Byte is the "white hat" hacker training/playground. Although most of us think we know what that means, it does beg the question; "Who and what is a white hat hacker?"

How To: Tutanota for Android, iOS, & Web Keeps Your Emails Private with End-to-End Encryption

In the wake of the NSA scandal and celebrity-photo hacks, lots of people scrambled to find more-secure ways to send text messages, share emails, and surf the internet. Known for their incredibly secure data networks, Germany's email services saw a remarkable increase in new users from across the world. Last year, we covered Sicher, a German app that lets you send and receive encrypted self-destructing messages on your smartphone.

How To: Make an infrared home alarm system

Kip "Kipkay" Kedersha is known for his intriguing and clever how-to and prank videos, even when he teams up with MAKE Magazine. He will show you how to tweak, hack, mod, and bend any technology to your hacking needs. No electronic device, gadget, or household item can stand the test of Kipkay's hacks and mods.

How To: Remotely Bug Hacked Bluetooth Headsets

Tinkernut presents the Bluetooth headset hack! This video shows one of the vulnerabilities of some bluetooth headsets. To prevent this vulnerability, it's best to invest a little more money into a more secure headset and making sure your headset is turned off when not in use. You can find all of the links and scripts used in this video, as well as find answers to questions you may have at the link below:

How To: Eavesdrop on a Bluetooth headset

Few Bluetooth users realize that Bluetooth headsets can be hacked or otherwise exploited to a remote attacker the ability to record and inject audio through the headset while the device is not in an active call. SANS Institute author and senior instructor Joshua Wright demonstrates, and explains, the security vulnerability in this how-to. For more information, including step-by-step instructions on how you can replicate this hack yourself, take a look.

How To: Make infrared goggles

Kip Kay of Make Magazine will teach you how to turn welding goggles into infrared goggles with the hack he outlines in this how-to video. The entire project only costs $10. To replicate this hack at home and build your own pair of steampunk infrared goggles, follow along with the steps in this video tutorial. Just don't look at the sun!

How To: Spin cotton candy in a bottle cap

This confectionery hacking how-to video demonstrates that, with an electric motor, juice lids, battery and sugar, you can make your own cotton candy machine. Don't wait for a carnival or fair to get your next taste of sweet, sweet cotton candy. Watch this video tutorial to see this hack in action and to learn how to build your own bottle-cap candy floss machine.

How To: Walkthrough The Legend of Dragoon on PS1: Part 15

In Hellena Prison, save the King from his execution… save the day in this level of The Legend of Dragoon for PlayStation. This video walkthrough takes you from where Dart and company are racing to the top of Hellena Prison to save King Albert from execution, they fight and defeat Fruegel, Lloyd steals the Moon Gem from Albert, Lavitz turns Dragoon in an attempt to help King Albert and gets slain, King Albert joins the party, they all go talk in Seles to where they travel to and explore the Bl...

How To: Hack Google

Learn how to hack Google with this amazing video. This video will teach you how to hack Google by using advanced search operators and esoteric search terms to find “hidden” files and mp3s quickly and easily; you'll also learn how to use Google to hack unprotected Internet-controlled devices like webcams and security cameras. For more information on Google hacking, and how to get started using these hacks yourself, take a look at this instructional video!