Rumor has it that a gang of hackers—or possibly, one lonesome individual—holds the power to remotely wipe millions of iPhones and iCloud accounts, unless Apple coughs up some ransom money by April 7.
Google has done it again—they've pushed another broken OTA update for the Nexus 6. Except this time, it almost completely softbricks your Nexus 6 instead of just screwing up Android Pay and SafetyNet. Apps are force-stopping left and right, making the phone practically unusable.
Dutch filmmaker Anthony Van der Meer published his 2015 thesis short from Willem de Kooning Academy in South Holland online in December 2016. It's a brilliant piece of work that managed to be touching, alarming, and informative at the same time. His documentary, which already has over 6 million views on YouTube, covered the journey made by a stolen smartphone and how the theft and ensuing tracking affected all parties involved.
Kryptowire, a company specializing in mobile security solutions, released a report on Tuesday, November 15 that exposed firmware in a number of Android devices that was collecting personally identifying information (PII) and uploading it to third-party servers without users' knowledge.
The Pixel XL reportedly uses the same exact display panel as the Galaxy S7 Edge, but according to third-party testing, Samsung's flagship gets at least ten percent brighter than Google's. The same can be said of the regular Pixel, which tops out just shy of its bigger brother's brightness rating.
NMAP is an essential tool in any hacker's arsenal. Originally written by Gordon Lyon aka Fydor, it's used to locate hosts and services and create a map of the network. NMAP has always been an incredibly powerful tool, but with it's newest release, which dropped mid-November of last year, they've really out done themselves.
If you've ever rooted an Android device in the past or installed a custom recovery, you're surely familiar with the term "unlocked bootloader." But if all of this sounds like gibberish to you, some major changes in Android have made it to where you should definitely get familiar with the concepts.
Step 1: What Exploit Development Is and Why Should I Be Interested on About This Topic
With over 10,000 possible combinations, a four-digit passcode may seem secure, but it's fairly easy for someone to crack your code—no matter how clever you think it is. Luckily, there are many other options for securing your iPhone's lock screen—especially if your running iOS 9.
Samy Kamkar, the security researcher known for the MySpace Worm and his combination lock cracking skills (using an online calculator), is back—and this time, he's after your credit cards!
Those of you who have been a part of the Null Byte community for even a short while know that I sincerely and firmly believe that hacking is the most important skill set of the future.
Welcome back, my tenderfoot hackers! A number of you have written me telling me how much you enjoy the Mr. Robot series on USA Network. I am also a huge fan! If you haven't seen it yet, you should. It may be the best show on TV right now.
Welcome back, friends! Many times, businesses, friends, and family will lock their zip files with a password to keep their files secure. It is reasonable, and understandable. Well, thanks to hackers, there are many ways to get past this wall of security.
With each day that dawns, there is a new, major hack that makes the news headlines. If you are paying attention, there are usually numerous hacks each day and far more that never make the news or are kept private by the victims. Every so often, a hack is so important that I feel compelled to comment on it here to help us learn something about the nature of hacking and IT security. This is one of those cases. Last week, the U.S. Office of Personnel Management (OPM) revealed that they had been ...
Keeping expensive mobile devices safe and secure is a priority for most of us, but the process of repeatedly unlocking a phone or tablet can seem like a pointless task. This leads to disabling the lock screen altogether, especially when in a safe place (e.g., home, office, car, etc.).
Most of you already know that a zero-day exploit is an exploit that has not yet been revealed to the software vendor or the public. As a result, the vulnerability that enables the exploit hasn't been patched. This means that someone with a zero-day exploit can hack into any system that has that particular configuration or software, giving them free reign to steal information, identities, credit card info, and spy on victims.
Each day, we read about another security breach somewhere in our digital world. It has become so commonplace that we hardly react anymore. Target, J.P. Morgan, iCloud, Home Depot, and the list goes on and on.
Welcome back, my budding hackers! When we are looking for ways to hack a system, we need a specific exploit to take advantage of a certain vulnerability in the operating system, service, or application. Although I have shown you multiple ways to exploit systems here in Null Byte, there are still many more exploits available that I have not yet shown you.
There's a lot of personal information residing on your phone, possibly even more than on your computer, so it's only a matter of time before someone tries to access it.
Welcome back, my fledgling hackers! The database is the hacker's "pot-of-gold," as it contains information that is very valuable to both the business and the hacker. In this, the second of my series on hacking databases, we're on the "hunt" for Microsoft's SQL Server. Although far from the most commonly used database (Oracle hold's that title), Microsoft's SQL Server is very often found in small-to-medium sized businesses. Even a few big businesses use it.
Welcome back, my greenhorn hackers! Continuing with my Wi-Fi hacking series, this article will focus on creating an invisible rogue access point, which is an access point that's not authorized by the information technology staff and may be a significant security vulnerability for any particular firm.
In this Windows 8 Tutorial I will show you how to adjust the automatic maintenance settings. The automatic maintenance settings deals with thing such as software updates, security scans and system diagnostics. If the settings in your automatic maintenance settings panel in Windows 8 are not set at a time your computer is on it want run the maintenance unless you set the option that to wake up your computer up at the scheduled maintenance time.
Welcome back , my fledgling hackers! Lately, I've been focusing more on client-side hacks. While web servers, database servers, and file servers have garnered increased protection, the client-side remains extremely vulnerable, and there is much to teach. This time, we'll look at inserting a listener (rootkit) inside a PDF file, exploiting a vulnerability in Adobe's Reader.
Do you ever wonder how all these celebrities continue to have their private photos spread all over the internet? While celebrities' phones and computers are forever vulnerable to attacks, the common folk must also be wary. No matter how careful you think you were went you sent those "candid" photos to your ex, with a little effort and access to public information, your pictures can be snagged, too. Here's how.
It's no secret that there's a lot of surveillance going on these days. It's easier than ever to end up in a database, and even former government agents are speaking out about the atrocious amount of spying being done against our own citizens. They've targeted our laptops, cars, IP addresses, and now they're coming for our iPhones. AntiSec hackers managed to get their hands on a list of over 12 million Apple UDIDs (Universal Device IDs) from an FBI computer, and they published 1,000,001 of the...
Get super high XP in Modern Warfare 2This tutorial is about winning the Modern Warfare game. There is no nuke boosting and no cheating. You need 6 people to follow you. Killergod23 introduced this technique. Set your killsteaks to predator missile, harrier strike and chopper gunner or AC130 to maximized kills and your XP. Unlock these first for high XP. You have 2 minutes before you have to bomb. Wait until one minute is left before you plant the bomb. Planting at one minute will extend the t...
This video shows Nikon Autofocus setting for action. Getting started on setting up the AF for action.
Need to cut back on the sodium? Limiting your daily salt intake can help prevent major diseases. Here's how to cut the sodium out from your diet.
Shed extra weight safely and effectively with these tips. You Will Need
Learn how to do medicine ball power press toss ups for height. Presented by Real Jock Gay Fitness Health & Life.
If you follow designer Tory Burch then you probably know that her high class and trendy clothing and accessories are also extremely high priced, costing upwards of thousands of dollars.
In this video we learn how to make a hip hop beat in FL Studio. First, load up your drum sounds from the browser to the interface. After this, change the hits on the drums to make the beat sound different. Edit how high the volume is on the snare drum and then change the ghost kick so it's not too loud either. Once you have this figured out, add in the high hat and the shaker patterns. Once you have these added in and you like the volumes that they are at, you will have your very own hip hop ...
In this video, we learn how to use high voltages using the Wimhurst machine. First, you must have a spinning wheel, double ended brushes, collecting combs, leyden jars, adjustable electrodes, and small metal plates. Once you connect all these together, you will notice the brushes on either side are perpendicular to each other and the wheel spin in opposite directions. Spin the wheel and then listen to the sound it makes. The plate will then charge with different electrons and create positive ...
Want to whip up a delicious breakfast that's also low in fat and high in fiber? "Delicious" and "healthy" don't seem like they'd go together in the same sentence, but they certainly do when it comes to this recipe.
Download an app that will play Bejeweled Blitz for you and score high! Check out this video tutorial to learn how to hack Bejeweled Blitz (04/02/10).
In this video, we learn how to cut your own hair high and tight. Make sure you don't miss any spots by your ears, and make sure the sides are cut evenly. If you have bangs in the front, cut from the back to the front using a shaver. If you want to get rid of your bangs, cut from the front to the back. When you're done, feel the back and make sure it feels completely even. On the razor, there's an adjustment lever, so you can use this to make different feel from the bottom to the top of your h...
In this video, we learn how to get a girl to like you. The ideal man for a woman is confident and makes the girl feel like she has earned you. You should come from a mindset of high value. You should never let the woman be the challenge for you, you should be the challenge for you. If you have a lot of women friends and date a lot of women, this will make her realize that you are in high demand. Don't let the woman think that she has control of you, so make sure you don't stick with one girl ...
In order to create a Cleopatra inspired makeup look, you will need the following: lipstick, eyebrow pencil, blush, bold eye shadows, and false eyelashes.
Whether you're a high level athelete who's recently hit a muscle gain plateau or a wannabe UFC fighter looking to make it in the big leagues, this video provides everything you need to formulate an effective fat-burning strength training program. While cardio is always a must in any exercise regimen, strength training helps build and drastically strengthen muscle, meaning your body can more effectively perform work.