Social Security Search Results

News: White House Hacked by Russian Hackers!

Yesterday, April 7th, it was revealed that the United States White House had been hacked by allegedly Russian hackers. According to reports, the Russian hackers used social engineering/phishing to get a foothold in the U.S. State Department and then pivoted from that system/network to the White House. Although the White House said no confidential information was compromised, the President's appointment calendar and other information were. Attribution or "blame" for the hack was made more diff...

CES 2015: Solar-Powered WakaWaka Is a Light & Charger That Helps You Be More Socially Conscious

With over 1.5 billion people on this planet without electricity, it's hard for those of us in developed nations to even fathom how anyone can read, write, repair, or do anything else that we take for granted without any lights. While some of our First World problems pale in comparison, they remain issues nonetheless, one of the biggest being constant battery drain from portable electronics.

How To: Get 90 Days of Google Play Music for Free (Instead of Just 30 Days)

When it comes to subscription-based music streaming services, the conversation doesn't go much further than Spotify and Google Play Music (previously called "All Access"). Both services are essentially the same aside from slightly different catalogues and social options, and they both run ten bucks a month for unlimited music streaming and offline track saving (although Spotify does have a free, ad-supported service).

Hack Like a Pro: How to Hack the Shellshock Vulnerability

Welcome back, my hacker novitiates! Every so often, a MAJOR vulnerability appears that makes millions of systems vulnerable to attack. The most recent, named Shellshock, basically leaves every Mac OS X, Linux, and UNIX system on the planet vulnerable. As nearly two-thirds of all web servers on planet Earth run one of these operating systems (primarily Linux), that's a whole lot of systems out there waiting to be harvested.

Hack Like a Pro: How to Create a Nearly Undetectable Covert Channel with Tunnelshell

Welcome back, my rookie hackers! Most often, the professional hacker is seeking protected information from the target system or network. This might be credit card numbers, personally identifiable information, or intellectual property (formulas, plans, blueprints, designs, etc.). Most of my Null Byte guides have been focused on getting into the system, but this only begs the question—"what do I do when I get there?"

News: Cast Aereo Live TV Using Your Chromecast

Gaining major consumer support and the ire of Big Cable, Aereo today announced support for the Chromecast through it's Android app. A revolution for cord-cutters, Aereo lets you record and stream live broadcast TV on your computer, smartphone, tablet, or media streaming player (Apple TV, Roku, and now Chromecast).

News: New Features and KitKat Compatibility Added to HTC Backup for Your HTC One

If you are using the the AT&T variant of the HTC One, you are well aware that the carrier opted not have the HTC Backup app pre-installed on the device. Luckily for us, HTC said "screw it" and put the app on Google Play, allowing anyone with an HTC One, regardless of carrier, to be able to download and use the app—if you're an AT&T customer, grab the app and let's take a quick walkthrough (again, the rest of us on other carriers should have the app already).

How To: Make Your Own Smartphone Camera Stand

This is how I made my smartphone camera stand using everyday items laying around in my garage. This is also a great rainy day project for anyone who uses a smartphone for their youtube or social media videos. It cost me almost nothing to build since I already had most of the items. This is a great project for anyone looking to start out on since it is really simple. It literally took me only 10 minutes to build.

News: How to Win a Trip to Explore Antarctica (Sponsored)

Air New Zealand is looking for a spokesperson for the Antarctica: No Ordinary Place, No Ordinary Assignment project, a two-week adventure in Antarctica, where the chosen candidate will join National Geographic photographer Jason Edwards to document environmental issues and important research being conducted by research teams sponsored by Air New Zealand and Antarctica New Zealand.

Hack Like a Pro: How to Install BackTrack 5 (With Metasploit) as a Dual Boot Hacking System

Welcome back, my hacker novitiates! Many of you have written me that you're having difficulty installing and running Metasploit on a variety of platforms. No matter if you're using Mac, Linux, or Windows, I strongly recommend you install BackTrack as your secondary OS, a virtaulization system, or on an external drive. This particular Linux distribution has many hacking and security tools integrated—including Metasploit.