Do you ever wonder how all these celebrities continue to have their private photos spread all over the internet? While celebrities' phones and computers are forever vulnerable to attacks, the common folk must also be wary. No matter how careful you think you were went you sent ...more
Identifying security software installed on a MacBook or other Apple computer is important to hackers and penetration testers needing to compromise a device on the network. With man-in-the-middle attacks, packets leaving the Mac will tell us a lot about what kind of antivirus a ...more
Hack your voicemail or answering machine with special information tones. Check this out. Hack phone voicemail to block telemarketers. Click through to watch this video on spike.com
Want to embarrass your friends? In this hack tutorial, learn how to hack someone's AIM "away message" to make it say something you'd like... In this video, "I am a loser" is used.
World of Warcraft is a super fun game, but as anyone who's ruling the game at level 80 (the level cap at the moment) will tell you, getting to 80 is a long and sometimes tedious journey. So why drudge along fighting bosses and other supernatural phenomenon for eighty levels w ...more
This tutorial will let you hack into a wide selection of web cams and online security cameras. The hack is actually quite easy, and is best done with a browser like Mozilla Firefox. Navigate to Google in your browser, and then type in "inurl:viewerframe?mode+refresh". This pie ...more
Whether you're a celebrity or someone with something to hide, Facebook allows you to keep your "friends list" private so you can protect the identities of your Facebook friends. But it only kind of protects them. There's a simple Facebook hack that lets you unravel entire net ...more
Want to control a friend's cell phone remotely and make "free" calls from it? In this hack how-to video, you'll learn how to hack Bluetooth-enabled cell phones with your Sony Ericsson or Nokia phone and the Super Bluetooth Hack—or "BT Info"—, a free program easily found throug ...more
Want to be able to hack into a computer remotely? This method takes a little extra time and cunning to set up, since you will need to first install the ShowMyPc program on your target computer. Once you have installed this program, however, you will be able to go to the websit ...more
Having the Internet on your phone is definitely handy. You can look up anything at anytime, and connect with friends in so many more ways. In this tutorial, learn how to use your PC and your Bluetooth enabled mobile phone to get free Internet on your cell phone and avoid buyi ...more
"Ahoy-hoy." If telephone titan Alexander Graham Bell had his way, we'd all be answering phones like Mr. Burns. Thankfully, frienemy Thomas Edison had enough sense to realize we weren't always on the briny. He preferred "hello" as our standard telephone greeting, which he is c ...more
In this video, we learn how to hack your Android phone. First, plug your phone into the USB to your computer. Now, search for telnet on your phone and install it onto your phone. Download this client to your phone from the Google Marketplace, then you can unplug your phone fro ...more
Check out this hacking video tutorial to learn how to hack a cell phone with a magnet. You can easily hack Verizon's Motorola RAZR mobile phone to bypass the user password. Turn off the MOTORAZR phone and then turn it back on. After the red Verizon introduction screen comes o ...more
Open up your mobile phone and solder on a light sensing resistor to make an alarm go off when the phone is in the light. Possible uses?
Kipkay teaches you how to make a USB cell phone charger and first you need a standard USB cable. Cut off one end of the cable and use a voltmeter to check which of the four wires has five volts.
By now, many of you may have heard about iPhone tracking and recording your location data, but is there anything else being extracted from cell phones without our knowledge? If you're a Michigan state resident, the answer is an alarming "maybe". Michigan's police department h ...more
You must have seen in movies, a person calls to another person and when the he picks up the phone, Boom! There is a bomb blast. So here is a video on how to convert a mobile phone into a bomb. The bomb is not exactly like the one in movies, but it can do your work. Please do ...more
Black lights come in all shapes and sizes, and they're useful in a variety of ways. They can help you spot fake currency, urine stains, interesting rocks, and deadly scorpions, and they can even help you view cool fluorescent artwork. Most black lights work using a filter or ...more
Want to mod your HTC HD2 Microsoft Windows smartphone to use wireless charging—without breaking your warantee in the process? It can be done! And quite easily at that. For complete details, and to get started modding your own HD2 phone to work with wireless chargers, watch thi ...more
Want to shoot video in low-light conditions with a HTC Evo 4G smartphone? Whether you're the owner of an HTC Evo 4G Android phone or just covet one, you're sure to enjoy this Evo owner's guide from HTC Evo Hacks, which presents a complete, step-by-step walkthrough of how to tu ...more
This video is specifically for the C530 Slate cell phone from AT&T, though this procedure will probably work on similar models of phone. You can hack, or jailbreak, your phone to allow you to use third party apps or switch to a different service provider. You will need a non-A ...more
Hello Elite Hackers! Welcome to my 3rd Post, which explains how to hack any account like G-mail, Facebook, etc. You can also use this technique to hack/spoof messengers like Facebook or WhatsApp etc. Step 1: Fire-Up Kali: I hope you know how to hack android and gain access t ...more
Watch this how-to video from the hidden camera series, "Do Unto Others," as Justin Heimberg demonstrates the best ways to prank people using your cell phone. Video: . This video includes such tricks as the "Myth Hater" and the "Jim Fartsville"—all of which you can use on your ...more
Want to get into both of the locked levels for the popular phone game Angry Birds? This video shows you how to access both of them when you're using a Droid phone. This is a very easy hack to replicate!
Welcome back, my newbie hackers! We've already saved the world from nuclear annihilation and covered our tracks afterwards, but the world is still threatened by a malicious, megalomaniacal dictator with missiles and nuclear weapons. We need to keep a close eye on him, so in ...more
The cell phone has come a long way. The very first "mobile devices" were made and used by the military in the late 1930s, with the first commercial mobile telephone service introduced by Bell in 1946. These devices were hardly what we'd call mobile today—some took up the whole ...more
Google Play has no shortage of Nintendo emulators: SuperGNES (Super Nintendo) Gameboy Color A.D. (Game Boy Color) My Boy! (Game Boy Advance) nds4droid (Nintendo DS) DroidEmu (SNES, NES, GBA, GBC, etc.) Those are just a few of what's available out there. The only problem with ...more
Video: . Recycle your hard drive into a hidden flash memory device that only you know how to turn on and use in secret. This DIY hack project allows you to recycle your broken hard drives back to life and turn them into something useful. So far, this project has several funct ...more
Some of us use our smartphones for almost everything. Manufacturers know this, so they try to make their devices as convenient as possible to use, but sometimes that convenience comes with a cost to security. The very same technology that allows you to easily share music with ...more
Welcome back, my hacker wannabees! Most of my recent posts have addressed using Metasploit’s Meterpreter and what we can do once we have embedded it on the victim’s system. This includes remotely installing a keylogger, enabling the webcam, enabling the microphone and recordi ...more
We've all been there... admit it. You sent a couple messages, but your friend had the "Read Receipts" option turned off in WhatsApp, so after a few minutes, you start wondering if they're away from their phone right now or just flat-out ignoring you. Well, there's a way to tr ...more
While iOS 12 is arguably the best iteration of Apple's mobile operating system yet, one major fault so far is security. On Sept. 26, Videosdebarraquito discovered a passcode bypass that gave access to contacts and photos from the lock screen. Apple has since patched that secur ...more
Russian phone customizer Caviar — you might have heard of the blinged-out iPhone 6s Pokemon GO phone they released a few months back — is taking on international relations with their newest product. To commemorate the G20 summit currently ongoing in Hamburg, Germany, Caviar i ...more
Hi guys, this is going to be kinda like a follow up to my previous post on hacking facebook with the remote keylogger. If you haven't seen that post I suggest you do. So like you can click here. Anyway let's move on. Even though people are the weakest form of security, some o ...more
Students have been passing notes in class for decades, so what's the big deal about sending a quick text message? Everybody does it, even your teacher was surely guilty of covertly communicating with his or her peers back when they were in high school. Don't Miss: How to Bypa ...more
Welcome back, my greenhorn hackers! As all you know by now, I'm loving this new show, Mr. Robot. Among the many things going for this innovative and captivating program is the realism of the hacking. I am using this series titled "The Hacks of Mr. Robot" to demonstrate the ha ...more
The awkward silence when you're adding someone's name and number to your contacts is worse than usual since you're meeting a new person and this is part of their first impression of you. So don't get labeled as clumsy or slow before you even get a chance to network with your n ...more
Back in 2010, iOS developer Daniel Amitay developed a camera security app for iPhones that used an unlock screen almost identical to that of the iPhone. The app was removed in mid-2011 (though, it eventually reappeared in early-2013, still available in the iOS App Store today ...more
There are more than 2 billion Android devices active each month, any of which can be hacked with the use of a remote administration tool, more commonly known as a RAT. AhMyth, one of these powerful tools, can help outsiders monitor a device's location, see SMS messages, take c ...more
When going out to eat with friends, it's inevitable that one person takes charge at the end of the meal to split the bill. They whip out a pen and begin asking everyone what they ordered, carefully dividing, adding, and subtracting on the back of the receipt for everyone to us ...more
If you need to hack an Android device, try a remote administration tool. Known more familiarly as a RAT, there are open-source RATs that are barebones and exorbitantly priced RATs that are more polished. There are also low-cost and polished RATs that aren't intended to be RATs ...more
A massive leak appeared the web today, and it's got some huge security implications for every iPhone on the market. On the plus side, it also has some potential for enabling deep-level modifications and jailbreak tweaks. GitHub user ZioShiba posted the iBoot source code for i ...more
This Null Byte is the first part in a mini-series on the art of Social Engineering. I will be teaching you how to effectively defend yourself against it. What is Social Engineering? Social Engineering is the art of hacking humans. It's when a person is manipulated into doing ...more
Hello friends. This is actually my first how to. In this tutorial I'll be teaching how to simply copy someone's WhatsApp pictures gallery into your computer, in an automated way. It is just an example of how easy is to steal data from someone's smartphone. I am covering Whats ...more
Using just a small sticky note, we can trigger a chain of events that ultimately results in complete access to someone's entire digital and personal life. Imagine arriving home one night after work and there's a Post-it note on your apartment door with the website "your-name- ...more
Despite the security concerns that have plagued Facebook for years, most people are sticking around and new members keep on joining. This has led Facebook to break records numbers with over 1.94 billion monthly active users, as of March 2017 — and around 1.28 billion daily act ...more
Apple's Contacts app just got its biggest update ever. Since the first iPhone in 2008, there have only been minor upgrades here and there to how you manage and interact with contacts. That changes with iOS 16. The last major feature Contacts received was emergency contacts th ...more
Vonage is a very cool and inexpensive way to have a home phone, but unfortunately it requires a little box to be near your phone at all times. In this two part tutorial, learn exactly how to hack your Vonage phone and route it to your central telephone box to distribute your V ...more
Learn how to add send someone's contact information via SMS text message on a BlackBerry phone. This clip will show you how it's done. Whether you're the proud owner of a BlackBerry smartphone or are merely considering picking one up, you're sure to be well served by this vide ...more
In this case modding video tutorial, you'll learn how to install a cigarette lighter-style 12-volt accessory outlet into a PC case. Charge your cell phone and other accessories directly from your case with the hack outlined in this video. For detailed, step-by-step instruction ...more
How many of you have or know people who have a smartphone? There's a lot of you, right? Well, depending on how most of you use those smartphones, there could be all kind of sensitive information stored on it, and that doesn't just mean sensitive personal information, but it co ...more
We've all seen the popcorn cell phone video. Now, we have the exclusive inside into how those videos were created. A microwave magnetron is strapped covertly to the bottom of the table. Then the prank is ready. Gather the phones and wait for the exciting reactions.
In this tutorial, learn how to access your phone's data network to enable free tethering on your new HTC EVO 4G. By tethering with your EVO you can connect up to eight other devices to your phone and use it as a wireless modem. This hack works with any EVO and will allow you t ...more
Enjoying the many benefits of Facebook Places? But what if you want to check in somewhere you're not? Your smartphone can automatically detect your geographical location, preventing you from just checking in just anywhere, but like all technology… it's a long way from perfect, ...more
Want to make a phone call on an iPhone 4 running Apple's iOS 4.1, but don't know its passcode? Not a problem. In this clip, we learn a simple trick that will allow you to bypass the lock screen entirely and permit you to view the phone's contact list and place phone calls to a ...more
Have you ever been in a situation when you needed to remember something real important, but you didn't have you didn't have your trusty cell phone or other electronic savior with you? Enter the Remember Pen! Kipkay shows you another glorious and simple hack, and with this on ...more
So, a lot of people seem to be having trouble rooting their Motorola Droid X smartphone from Verizon Wireless using ADB (Android Debug Bridge). Well, there is an alternative for those having problems with the ADB version. You will need to have a Wi-Fi or Bluetooth widget handy ...more
This is actually quite amazing. If you own an HTC DROID ERIS cell phone, then that cardboard container it came in can be turned into that tiny, but terrific Google Android Bot. The Android Bot logo is known across the world now, and it's odd that their box can be broken down p ...more
Looking for instructions on how to do USB tethering with a Samsung Vibrant smartphone? You're in luck. This free video tutorial will see that you need everything you need to know. (Note, however, that this hack will require you to download the free Samsung Kies application.) F ...more
If you are having a difficult time getting someone's phone number this is the how to video for you. Watch and learn ten easy tips to getting a phone number and maybe even a date.