Identity theft is a huge problem and one of he fastest growing crimes in America. A number of credit card companies now issue credit cards with embedded RFIDs (radio frequency ID tags), with promises of enhanced security and speedy transactions. But, on today's episode of Bo ...more
Remember the good ol' days when you actually had to swipe your credit or debit card to make a payment at the store? Now all it takes is a flick of the wrist to purchase goods with your card, thanks to RFID (radio-frequency identification) technology from Chase (blink), Visa (p ...more
Having trouble with The Heist 2? Well in this quick and easy tutorial by Trevor4Ever595 you can kiss your troubles goodbye. In this video Trevor4Ever595 shows you how to hack the credit amount so credit is no longer in your way to buying all the upgrades you need to fly throug ...more
So, a lot of people seem to be having trouble rooting their Motorola Droid X smartphone from Verizon Wireless using ADB (Android Debug Bridge). Well, there is an alternative for those having problems with the ADB version. You will need to have a Wi-Fi or Bluetooth widget handy ...more
Yes, the Droid X from Motorola can be rooted, and yes, you can do it at home. Just make sure you follow the directions precisely. If you succeed, you'll have a completely rooted smartphone. eFuse doesn't matter. If you want to expand your options on Verizon Wireless's Droid X, ...more
As hard as you try to protect your valuable information with strong passwords and anti-doxing measures, there's nothing you can really do when someone else gives up your goods. And that is the case with the recent Global Payments breach. Global Payments is just one of the mid ...more
This past Sunday, a group called Gnosis launched a massive hacker attack on Gawker media, one of the web's most popular blog networks (Lifehacker, Gizmodo, Jezebel, io9, Jalopnik, Kotaku, Deadspin and Fleshbot). 1.3 million registered users' passwords were compromised, and 188 ...more
Flash video. It's what all smartphone users have been waiting for. Why has it taken sooo long? And why is Apple still resistant? Here's the scoop, via Wired: "Adobe is releasing Flash Player 10.1 for mobile phones and desktops today. And it is piggy-backing on Google’s fast ...more
In this video, we learn how to find your IP address. First, start up your computer and open up your web browser. Next, you will type in the site: WhatIsMyIPAddress. Once you do this, you will be led to a new site which will load up your IP information at the top of the page. O ...more
As the image above suggests, it takes expertise (and perhaps sleuth) to actually hack into somebody's facebook account. But to steal a friend's password? If you're lucky, a simple mind game will do the trick. Read and learn: Image credit.
Don't you love those simple little tricks that just make life easier? Like quick solution for a pesky stripped screw? Apartment Therapy says, "Taking my father's advice, I unscrewed the hinge and placed a few pieces of toothpick in the screw hole. As I reinstalled the screw, ...more
T-Mobile's credit-checking system was recently hacked, and this one is about as bad as it gets. The names of 15 million customers, their date of birth and social security number, as well as driver's license numbers and additional information was illegally accessed, meaning the ...more
Researchers at the University of California, Riverside and the University of Michigan announced recently that they have developed a hack that works 92% of the time on Google's Gmail system on Android, as well as with the H&R Block app. In addition, this hack worked 86% of the ...more
Welcome back, my hacker apprentices! Although there is a multitude of different hacker types, the one target they all share is the database. I often refer to the database as the hacker's Holy Grail, or the ultimate prize for an effective hack. That's because the database—alm ...more
Welcome back, my greenhorn hackers! Recently, I asked the Null Byte community what subject they would most like me to cover in future tutorials. Many of you cited scripting, and I decided it's best to cover this subject soon, so here goes. Any self-respecting hacker must be ...more
As the level of data being generated grows exponentially, past the Information Age and into the coming Hyper-Information Age of immersive computing — as resistant as many of us are to the idea — personal data security is becoming a necessary consideration in our everyday lives ...more
Are you constantly traveling? Well, as a Hilton HHonors member, you can enjoy special treatment at all of their hotels and resorts. It's free to register, but the difficulty lies in climbing up their membership level. To reach Gold elite status, Hilton HHonors requires that yo ...more
Skype is a great way to stay in contact with friends and family over the internet, and people tend to share a lot in their chats, so why not try and find a way to hack it! Once a Skype account is hacked, you can view all conversations within the last three months, see how long ...more
Most of you already know that a zero-day exploit is an exploit that has not yet been revealed to the software vendor or the public. As a result, the vulnerability that enables the exploit hasn't been patched. This means that someone with a zero-day exploit can hack into any sy ...more
Welcome back, my fledgling hackers! Hacking has a long and storied history in the U.S. and around the world. It did not begin yesterday, or even at the advent of the 21st century, but rather dates back at least 40 years. Of course, once the internet migrated to commercial use ...more
Equifax reported on Sept. 7 that it discovered a breach on July 29 which affects roughly half of Americans, many of whom don't realize they have dealings with the company. Hackers got away with social security numbers, addresses, and driver's license numbers, foreshadowing a " ...more
Remember the future? It was supposed to be flying cars, 3D virtual worlds and pill-form meals. And the hologram. That Star Wars relic. Now look what happened! Holograms are commonly slapped on our drivers' licenses and credit cards. That's it. No magic. No Obi-Wan Kenobi! T ...more
Welcome back, my hacker novitiates! Finding vulnerabilities in systems can be one of the most time-consuming tasks for a hacker. There will be times, though, when you'll find yourself in a position that you know that a particular port represents a vulnerable application or se ...more
Building a secret spy bookcase is not as difficult as it may sound. Who wouldn't want a secret lair all to themselves? Learn how to make your own. Instructables member nylanan provides simple plans for a hidden door. Check it out: Another example from flickr member agmk (unf ...more
Before many games make it to the US-based iOS App Store, they get "soft launched" in a smaller country to get real-world testing for bugs. It's a pilot program, so to speak, as countries like Vietnam or the Philippines have far fewer iPhone users than the US, thus offer a more ...more
I'll give Samsung credit where it's due—the stock keyboard on the Galaxy S5 is actually pretty nice. There's a dedicated number row that resides at the top (something that the Google Keyboard needs a hack to achieve), and various settings exist to make switching between langua ...more
In the weeks before Apple officially released iOS 8, consumers were abuzz over rumors that a new feature would password-protect your photos and text messages from prying eyes. Unfortunately, this ended up being untrue, though we did cover some alternatives to protecting your i ...more
People who know that I am a professional hacker often ask me what they can do to make their computers and personal information safe from people like me. The answer, of course, is that nothing will make you completely safe, but there are a number of measures any computer user c ...more
Epic Duel can be an epic game, but you can get to the top quicker with an age old secret: cheating! If you follow this video and grab Cheat Engine 5.6, you'll be able to give yourself more credits, more quickly than actually earning them. Come on, life is short, why work hard, ...more
IMVU is a 3D avatar chat, instant messenger, and dress up game. Get help with all of your IMVU avatar needs with these IMVU tips and tricks! Watch this video tutorial to learn how to earn credits easily on IMVU (09/28/09). Description of the application directly from IMVU: I ...more
I feel sorry for all of you homeowners stuck in snow right now. The snowy, blizzard conditions effecting most of the country is causing some serious headaches across our nation. And it's not just the cold weather I'm talking about. I'm talking about ice dams— something that mo ...more
You know it's crazy out there when governments start blocking social websites like Facebook, Twitter and even YouTube. But that's what happened in Egypt, when tens of thousands of anti-government protesters took to the streets on Tuesday (January 25th) in hopes of ending Presi ...more
Gamble your life away in Las Vegas Slots on Facebook. And learn how to hack it with tricks and cheats. Watch this video tutorial to learn how to earn more daily credits in Las Vegas Slots on Facebook. Description of the app on Facebook: Are you feeling lucky today? Play Las ...more
Screw the airplane man. Ticket prices are too high. Competitive consumer choices are pretty much nonexistent. And need I go into the pain of being crammed into those tiny seats, elbow-to-elbow, thigh-to-thigh with a perfect stranger? Even your average Richie Rich winces at the ...more
This video provides detailed instructions on how to hack into the game credits of 'Shopping Cart Hero 2'. The first step in this process is to complete the first level of the game in order to gain in-game funds. The instructor then shows how to use a cheat engine when buying a ...more
If you want to enter the police station armory in Detroit while playing Deus Ex: Human Revolution, you either need to have enough credits to afford it, or you need a high hacking skill. This video from Game Front will allow you to skip both of those requirements by giving you ...more
Christmas decorations aren't cheap. From outdoor lighting to fir trees, decorating for the holidays can break the bank. That's where ingenuity comes into play, like hacking battery-operated Christmas lights, modifying lighting patterns and building Christmas tree ornaments fro ...more
Geekosystem has generously assembled a handy list of 10 foods you can allegedly make in a coffee maker. Sounds kinda grimy to me, but my own mother passed this link along, so if mom thinks it's kosher, I'll give it a try. Here are the ten (click through to Geekosystem for len ...more
Yep, it's that easy. From Re-Nest: "To quiet the sound of a leaky faucet, simply tie a string around the neck of the faucet and allow it to catch the drips on the way down. This will allow your pipes to continue to flow freely and give the water something to cling to. Think ...more
Budget Hack's cheap Wifi range extender works off of the age old concept of adding tin foil to your TV's rabbit ears. The materials are cheap, and the project is relatively easy (if you're willing to pick up some soldering skills). You Will Need: Two milo tins or similar F- ...more
TSA agents are having a little too much fun, it's time for the rest of us to join in. More complicated (and more promising) than the see-thru video trick, Jeri Elsworth gives instructions for building your own hand-held TSA see-thru scanner with a $3 feed horn and some (admitt ...more
In this next tutorial, you'll be finding out how to perform a terminal double hack in the game. This is pretty difficult to achieve, but will give youa shot at double credits. Basically, you will need to exit and re-enter at the right moment. The moment takes place right afte ...more
Aram Bartholl over at F.A.T. is pretty pissed because MoMA is discriminating against internet artists. As most New York-based working artists know, MoMA offers annual membership for only $35 (compared to the standard rate of $75) to artists who can provide "credentials" that p ...more
Thanksgiving is less than a week away! We know - Thanksgiving can be a mess - too many relatives, too many dishes to cook, and too many things to do. At least no one can complain there's too much food to eat. This week, we'll show you how you can make your life easier with som ...more
Null Byte is looking for forum moderators! Last Friday's mission was to accomplish solving HackThisSite, basic mission 9. This mission delves a little further into Unix commands and remote directory traversal (which is just a fancy term for going through folders blindly). Th ...more
Welcome to another Community Byte announcement from Null Byte! The goal of the Community Bytes is to teach people in a co-operative, hands-on manner. Learning from experience and immersing yourself in a subject is the best way to learn something foreign to you, so that is exac ...more
We've covered a variety of life perks, short cuts, and cheats (35 to be exact), but what about your health? Neatorama has compiled a list of "tricks" to staying healthy and keeping off the pounds. Click through for all fifteen weight loss hacks; my five favorites below. 1. D ...more
This weekend, hackers broke into the servers of the popular shoe shopping site Zappos, giving them access to the personal information of 24 million Zappos customers. The user data taken included names, email addresses, billing and shipping addresses, phone numbers, the last fo ...more
I've been pretty straight forward with my praise for Batman: Arkham City. But the thing I like most of all are all of the side missions in the game. One of the cooler, and darker, ones is entitled Identity Thief. No, you don't go after some nerd that hacks people's credit card ...more
The Internet is full of crooks just waiting and waiting for the chance to steal your information. One way that people are getting into your system these days is with fake or rogue applications. These viruses sneak themselves onto your PC either through hacked websites or when ...more
For the coffee addicts, Redditor therewillbesnacks shares a wealth of insider tips for cheating the Starbucks system. A dollar here, a dollar there- it all adds up. Below, a few highlights from the thorough posting: "If you and a friend are out and want a Frappuccino, ask for ...more
Movies like to show hackers breaking passwords with fancy software and ludicrous gadgets. The reality of busting passwords open is much more mundane. Simple as it may sound, most passwords are broken purely by guesswork. Check out this infographic from ZoneAlarm, as well as th ...more
Hallelujah, a miracle tool has been released to the world. This Windows/Mac tool is called Spirit and it enables you to jailbreak any iPhone, iPod Touch or iPad quite easily. And Gizmodo is all over it, with an in-depth guide on exactly how to do it. Some of you may be hackin ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our moderators and contrib ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. More amazing community contributions this w ...more
Hello readers again! Sorry about the long wait (scary computer problems). Today I am going to talk to you about security problems on Wizard101. I have recently encountered many security flaws on Wizard101, including hacking, frauding and other crazy things. Wizard101 is the ta ...more
Oh, LifeHacker, we love you. You've brought us so many handy HowTo's: Hack Wireless Internet, Bypass Blocked Websites, Convert a Laptop Into a Projector, Watch TV & Movies on the Web For Free, 10 Must-Know Google Privacy Settings, and more. And now, another great one: LifeHac ...more
Anonymity is very important to many internet users. By having your "e-identity" exposed online, you can be stuck with a number of unwanted issues, such as: Privacy invasion. Internet tracking. Exposure to being hacked. However, what if we wanted to spend money anonymously? T ...more
We've talked about the deep web before, but we never really covered the details of what's out there. It occurred to me that a nice list of resources would be very helpful to all of you anons out there. Think of this like a helpful brochure to the hidden web. However, I should ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. First off, thanks to all of our moderators ...more