hack

Google Glass labs reveals wink camera and always-on listening mode

Google Glass is still very much in the early stages, and obviously a developer platform with tons of features we may or may not see on the final product. Now that the wearable technology is getting in the hands of thousands of developers we're learning a few more tricks. Things such as wink options to snap photos, and even an "always-on" listening mode that makes using Glass much easier.

Google Glass gets ClockworkMod Recovery as the hacking continues

When the folks at Mountain View released Google Glass to developers it was quickly discovered that the wearable computing glasses were extremely easy to hack. This wasn't by accident, and Google made no efforts in securing Glass, especially since they are only for developers, for now. Fast forward to today and we have an unofficial ClockworkMod Recovery up and running on Glass.

New Samsung GALAXY S 3 lockscreen bypass discovered

Over the last month or so hacks that bypass the lockscreen for some Samsung smartphones have been identified. Another lockscreen bypass has now been identified that allows access to PIN-secured Galaxy smartphones by unauthorized users. The exploit uses a combination of key presses and commands to bypass the lockscreen.

GALAXY S 4 gets uniform “no” from top hack CyanogenMod

The most famous and widely-used customized user interface for Android devices - CyanogenMod - has been declared a no-go for the brand new Samsung GALAXY S 4. This will come as a relatively large blow for Samsung if they do seek the Android hacker bid - or dollar, rather - as such a lack of support for the device from the developer community (hacker community) will result in a distinct lack of fun for those that call hacking their home. In other words, this essentially means Samsung will be selling phones to those that are happy with the way the phone works out of the box.

PSA: Evernote security breach – protect yourself ASAP

This past weekend Evernote became the latest to post a security notice. The company had said they "discovered and blocked suspicious activity" on the network and as a result -- all Evernote users were required to perform a password reset. The methods by which Evernote handled this issue seemed to have been good, though there were some complaints.

Galaxy Note II ‘hack’ briefly exposes homescreen and apps

A recently discovered security flaw shows how you can gain brief access to the homescreen of a Samsung Galaxy Note II running Android 4.1.2. This flaw can be used regardless of which method you are using to secure your handset. That is to say it will work against the pattern locks, PIN locks and even Face Unlock. But while that may sound on the scary side, we will also point out that this flaw has limited use.

ClockworkMod Superuser app released as an open-source beta

Koushik Dutta has released his latest app. We suspect many will be familiar with that name, he is associated with ClockworkMod and also recently released Carbon. On Carbon, he is responsible for the backup app, not the Twitter app. We can put that bit aside though because this latest app deals with the ClockworkMod side. The app is called ClockworkMod Superuser and it has been released as beta 0.

Using FROST to attack a Galaxy Nexus

Let us offer this warning up front, while this is possible, it is certainly not something that the average user necessarily needs to be worried about happening. To begin with, the phone that is the subject of the attack ideally needs to have an unlocked bootloader. And well, many in the Android world likely realize that unlocked bootloaders are not something that is commonly found. First though, we are getting ahead of ourselves. This involves a pair of researchers from Erlangen University in Germany, a Galaxy Nexus smartphone, a cold boot attack and a tool called FROST.

Some Samsung handsets vulnerable to factory wipe hack

It looks like there's bad news on the Samsung front today, as it's been discovered by security researchers that a single line of malicious code can factory wipe a handful of Samsung smartphones. This means that clicking on a link can automatically trigger your phone to wipe itself with no warning and no way to stop it. The exploit was detailed at the Ekoparty security conference using a simple USSD code. It can be sent from a website or be pushed to the phone with NFC, as well as be triggered by a QR code.
1 2 3 4 5 6 7 8 9 10 11