Google Glass is still very much in the early stages, and obviously a developer platform with tons of features we may or may not see on the final product. Now that the wearable technology is getting in the hands of thousands of developers we're learning a few more tricks. Things such as wink options to snap photos, and even an "always-on" listening mode that makes using Glass much easier.
Google Glass to developers it was quickly discovered that the wearable computing glasses were extremely easy to hack. This wasn't by accident, and Google made no efforts in securing Glass, especially since they are only for developers, for now. Fast forward to today and we have an unofficial ClockworkMod Recovery up and running on Glass.
Evernote became the latest to post a security notice. The company had said they "discovered and blocked suspicious activity" on the network and as a result -- all Evernote users were required to perform a password reset. The methods by which Evernote handled this issue seemed to have been good, though there were some complaints.
Samsung Galaxy Note II running Android 4.1.2. This flaw can be used regardless of which method you are using to secure your handset. That is to say it will work against the pattern locks, PIN locks and even Face Unlock. But while that may sound on the scary side, we will also point out that this flaw has limited use.
ClockworkMod and also recently released Carbon. On Carbon, he is responsible for the backup app, not the Twitter app. We can put that bit aside though because this latest app deals with the ClockworkMod side. The app is called ClockworkMod Superuser and it has been released as beta 0.
Galaxy Nexus smartphone, a cold boot attack and a tool called FROST.
recently discovered that essentially allowed hackers multiple ways to completely wipe your Samsung Galaxy S III (and other Galaxy devices) using a simple line of code all remotely. This means they could erase your entire device with ease. Today however Samsung has released a statement to ease the minds of the millions and millions of owners.
Samsung front today, as it's been discovered by security researchers that a single line of malicious code can factory wipe a handful of Samsung smartphones. This means that clicking on a link can automatically trigger your phone to wipe itself with no warning and no way to stop it. The exploit was detailed at the Ekoparty security conference using a simple USSD code. It can be sent from a website or be pushed to the phone with NFC, as well as be triggered by a QR code.