Apple released the fourth public beta for iOS 12 to public beta testers on Tuesday, July 31, just one day after the company seeded the fifth developer beta to eligible users. Both releases are surprising, as Apple had appeared to stick to a two-week release schedule for the iO ...more
Electronic warfare tactics work by jamming, disrupting, or disabling the technology a target uses to perform a critical function, and IoT devices are especially vulnerable to attacks. Wireless security cameras like the Nest Cam are frequently used to secure critical locations, ...more
It's easy to run Kali Linux from a live USB on nearly any available computer, but many publicly accessible laptops and desktops will be locked down to prevent such use. School, work, or library PCs can be secured with a BIOS password, which is often an easily recovered default ...more
It's possible to stream a MacBook's entire computer screen without using Apple's Screen Sharing application and without opening any ports on the target device. A hacker with low user privileges on the backdoored Mac may be able to view a victim's every move in real time no mat ...more
If you're someone who shares your Hulu account with friends and family, let me be first to acknowledge you as a hero. That being said, heroes have messy profiles — your account quickly reflects the viewing habits of your shared users, making it difficult to keep your watch his ...more
Using Hydra, Ncrack, and other brute-forcing tools to crack passwords for the first time can be frustrating and confusing. To ease into the process, let's discuss automating and optimizing brute-force attacks for potentially vulnerable services such as SMTP, SSH, IMAP, and FTP ...more
Before you go ahead and delete your Facebook — don't lie, you've been thinking about it — consider this. Facebook offers users a wide variety of privacy options to mess with, which can help you find a little control over your information. We're not saying this solves Facebook' ...more
Apple released the sixth beta for iOS 11.3 on Friday, March 16. It comes as a surprise, considering the company released the fifth beta only four days ago — an unexpectedly short time between updates. This new beta, much like beta 5, appears to bring minor patches and bug fixe ...more
While installing the new Android 9.0 Developer Preview is fairly easy if you're using a Windows machine, it's a little trickier if you want to use macOS instead. To help you get the latest Android OS on your Google Pixel phone, we'll break down the whole process so using your ...more
If you're looking for an alternative iOS keyboard for your iPhone, look no further than Gboard. The Google-made keyboard is bursting with features like web search, Google Maps, GIFs, and more. Now, Gboard is adding a new feature that'll make it easier to find the perfect emoji ...more
Gboard is one of the best third-party keyboards available for iPhones, but you probably don't know everything you need to know about it to become a real Gboard pro and stop using Apple's stock keyboard for good. I've tried many third-party keyboards on my iPhone since they we ...more
Nova Launcher is one of the most popular apps on the Play Store thanks to its rich features and fluid navigation. But one downside that comes with this abundance of features is that much of Nova's functionality is lost on the masses. Fortunately, I've used Nova for several yea ...more
Nobody likes spam, and that's why email apps continue to vie for your digital attention by boasting about new ways to filter and reduce unsolicited messages. Outlook, an already fantastic client for focusing your cluttered inbox, has now joined in on the action, giving its use ...more
Apple's codec for photos and videos in iOS 11, HEVC (High-Efficiency Video Coding), as well as the container, HEIF (High-Efficiency Image File Format), result in a reduction in size for pictures and movies without sacrificing quality. Seems like a win-win situation, but Window ...more
Despite concerns with SafetyNet, Google actually cares about root. Every phone they sell has an unlockable bootloader, so you can toggle a setting and send a Fastboot command, then start flashing custom firmware right away. The Pixel 2 and Pixel 2 XL continue this tradition, a ...more
As smartphone users, we live in dangerous times. The value of phones continues to rise, making them prime targets for thieves. In 2015, the FCC estimated that one million phones are stolen each year, and with several devices starting to hit the $1,000 mark now, these numbers a ...more
Apple released the second version of its iOS 11.2 developer beta Monday, exactly one week from beta 1, then opened up the public beta version on Tuesday. While beta 2 has been available on iPhone X since Friday, Nov. 3, all compatible iPhones can now update to this version. T ...more
Hacking from a host machine without any form of proxying is reckless for a hacker, and in a penetration test, could lead to an important IP address becoming quickly blacklisted by the target. By routing all traffic over Tor and reducing the threat of malicious entrance and exi ...more
If you've ever wondered how to import your photos in Snapseed, then you've come to the right place. Snapseed is a wonderful photo-editing app and will provide you with many tools to take your photos to the next level. But you can't get to that next level if you don't know how ...more
When Gboard was released on iOS in May of 2016, it gave iPhone users more control over their mobile keyboard experience. Unlike the stock Apple keyboard, Gboard lets you customize the look of your keyboard and search Google directly from the keyboard itself. Now, Google has ad ...more
Snapchat has added three new features, letting you personalize your snaps more than ever. One of those is links, which was not allowed at all before. The other features allow for greater personalization of snaps, with both visual and auditory choices. The updates are being re ...more
Facebook, you either love it or you hate it ... or maybe you're indifferent. The point is, Facebook is everywhere, and the debate is still raging over whether or not it's actually, well, good. That debate may not exist for the various personalities of Facebook much longer, how ...more
Social engineering makes headlines because human behavior is often the weakest link of even well-defended targets. Automated social engineering tools can help reclusive hackers touch these techniques, but the study of how to hack human interactions in person is often ignored. ...more
Android has several features built into the platform that improve user experience but require extra attention to prevent a security breach. By modifying these settings, you can drastically reduce the possibility of someone exploiting your device or intercepting information. B ...more
Mobile gaming still isn't on par with video game consoles or PCs, but we've come a long way from Snake. Modern games running on the latest smartphones boast downright impressive graphics—even more so when you consider how compact the system has to be in order to fit in people' ...more
The iPhone 6s models introduced Live Photos in iOS 9, a cool new camera feature that takes a GIF-esque moving image every time you snap a pic, but the cool factor pretty much stopped right there. You couldn't take them on older iOS devices, share them with non-iOS users, or ev ...more
There's a common saying that separates cooks from bakers: baking is a science, while cooking is an art. When baking, one little misstep can alter the texture, taste, and consistency of any recipe. Yet it doesn't have to be a scary science—forget your not-so-happy high school ...more
So you're finally ready to head out on that big trip you've been planning for months, huh? It's an exciting time, but there are plenty of things you'll need to prepare before you head out. For instance, it's hard to imagine life without a smartphone these days, and with useful ...more
According to sources, Google has been working on a travel app for some time, and now it has a name: Google Trips. Google Trips aims to be the all-in-one place to go for travel information about your trip. It hasn't been officially announced, but from the leaks that have come o ...more
Live streaming has emerged as a major part of the way people share information. With celebrities and news/media personalities utilizing mobile live streaming effectively to reach thousands, the appeal has bolstered the fortunes of Twitter's Periscope and Facebook's Live. Now, ...more
At Apple's highly anticipated special event held today at their headquarters in Cupertino, California, it was announced that their latest software update, iOS 9.3, would be available to the public complete with several new additions. The most notable element of this announceme ...more
Playlists are more than just a list of songs that you enjoy listening to while in traffic or hosting a party—they're stories that illustrate who you are or your frame of mind at a certain point in your life. While some of my Spotify playlists are relatively short and expendab ...more
Even those of us most comfortable in the kitchen can be daunted by the idea of cooking for a whole houseful of people. Whether you have a large, well-equipped kitchen or a small one with just the essentials, it can prove to be quite a task to prepare food for a dozen or so peo ...more
Here on nullbyte we always hear mention of hacking being used to shut down power grids or attacking SCADA and other such cyber warlord activities, but ive never seen a TDos post come up. Telephony Denial of Service involves saturating call centers or carriers, especially emer ...more
Greetings all. I'm back with another informational review of the diversity of utilities for use in the sphere of hacking at your disposal. Today we are going to cover the insides of CUPP (Common User Passwords Profiler) in its entirety. The tool is very basic in nature, as th ...more
When I started to go to this site I found it fascinating and found myself coming here all day I have used a lot of the info I have gotten from here in my professional career and on my own. I currently am the VP of RND for a small IT company. I have been pushing toward Penetrat ...more
In the past, marking up an email attachment, like a PDF or photo, required either using a third-party app or leaving it to edit later on a computer. Now, thanks to a feature in iOS 9, email attachments can quickly be annotated on the go from within the actual email on your iPa ...more
When I first moved to Los Angeles, I rented a bed in a tiny studio. I was too broke to afford my own place, so all I had was a mattress in someone else's apartment. Unfortunately, this person had no interest in cooking, and therefore no kitchen equipment whatsoever. To make ma ...more
Returning your device to stock, whether it is because you need to sell it or just want to receive OTAs again, is not always a simple process. Since HTC has released countless variations of both the M7 and M8 HTC One, it can be a pain in the ass finding the right files and tool ...more
When I was a senior in college, I shared a two-bedroom, one bathroom, microscopic kitchenette suite with three other girls. We all loved to bake and cook but were fully aware that we were in for a crowded year. We needed to use space efficiently, which meant carefully picking ...more
Between sharp knives and slippery produce, basic meal prep can be an absolute massacre. Even the most professional knife-wielders don't stand a chance if they're working on unstable surfaces. Don't Miss: 10 Paper Towel Hacks for Your Kitchen & Beyond This tip is the very firs ...more
If you're looking to train yourself, and see how good at hacking you really are, I'd recommend Hack This Site. You've most likely already heard of it, but it's super fun to use and is also safe. You learn a lot, too, and there's no tutorials or anything. What you do is you pic ...more
Now that Apple's latest Worldwide Developer's Conference (WWDC) is over, you can sign up for the public beta version of iOS 9 for your iPad or iPhone. For the first time in their history, Apple made a beta version of their mobile OS available to the general public just a few m ...more
In an attempt to remain a mobile-exclusive app, Instagram doesn't let users upload photos or videos from their computer. On the Instagram web app, you can pretty much only like and comment on items in your feed, but what about all of those photos on your computer that scream # ...more
Just like skinning a cat, there's more than one way to sharpen a knife (disclaimer: while I advocate sharpening your knives daily, please don't ever even consider skinning a cat). There's a stone, for an uber-sharp finish; the underside of a mug, for an awesome makeshift sharp ...more
CyanogenMod has been building upon open-source AOSP apps for many years now. They've made improvements to apps like the stock SMS client, the stock Audio Mixer, and a whole slew of others. Recently, with the release of CyanogenMod 12, they've given the AOSP Gallery app a nice ...more
Serving as the primary tool of distribution for many websites, social media is how most of us catch up what's going on around the world. While there is a bunch of clickbait going around on Facebook and Twitter, there are plenty of genuinely interesting articles being shared. ...more
Video: . Project Overview Have any old school floppy drives lying around? Get hacking... and transform them into an electronic orchestra! This project uses a myRIO embedded controller and four floppy disk drives. The myRIO effectively plays the disk drives like musical instru ...more
Welcome back, my novice hackers! Reconnaissance is one of the most important preparatory steps to hacking. As I have emphasized many times before here on Null Byte, you must know the operating system, the ports, the services, the applications, and sometimes even the language ...more
Listen, I'm not disparaging using really good knives—they can literally change your life, or at the very least, the way you work in the kitchen. However, there are many cutting and slicing tasks where you're better off using a sturdy pair of kitchen shears rather than a chef's ...more
If you've done any root-level hacking or modding on any of your previous Android devices, you're probably well familiar with Rovo89's famous Xposed Framework. This tool allows you to customize pretty much any Android device to your heart's content without needing an unlocked ...more
It's that time of year where you need to break out the grill and cook food over red-hot coals, whether it's the beginning, middle, or end of summer. Even if you're not a grill master extraordinaire, you can use these hacks to fool your friends and family into thinking that you ...more
Welcome back, my hacker apprentices! Metasploit framework is an incredible hacking and pentesting tool that every hacker worth their salt should be conversant and capable on. In a previous post, I had provided you a cheat sheet of meterpreter commands. These commands are ess ...more
No matter your reason, if you want to hide what's on your computer screen from prying eyes, there are plenty of ways to do it. You can get a privacy filter, install a panic button for your browser, or just develop super fast reflexes. But all it takes is the right angle or a t ...more
The biggest complaint I have with my Nexus 7 is the lack of support for different types of media files. I have a lot of movies and music that I've downloaded off the web, in many different formats, and I want them on my tablet. Want to play that 1080p MKV file of your favorit ...more
Most of us have a designated spot where we like to charge our devices, but no one likes to look at a giant, tangled mess of cords. That's why inductive chargers are so awesome. They allow for wireless charging, and are a lot easier on the eyes. But what if you don't even want ...more
While websites may run smoothly without any noticeable vulnerabilities, there's always the looming threat that any background weakness in the site can be exploited by hackers. Once a site is compromised, it can be difficult to get it fixed without the proper help. Google has r ...more
Security is always a top priority for our smartphones. Leaving your phone at the bar or even at a friend's house can leave you open to hacks and lead to the loss of sensitive information. Beyond the lock screen, passwords don't always do enough to protect the information stor ...more
Ever since the release of iOS 6 for the iPhone in late September last year, people had been itching for the subsequent jailbreak. While the untethered jailbreak was released on Super Bowl Sunday this past February 3rd, many others couldn't wait and jailbroke their iPhones with ...more
Cassette tapes, much like the boombox, Walkman, and record player, aren't used much anymore. With the ability to put music on our smartphones, most of us don't carry tapes or CDs around because it now seems inconvenient. Looking for something to do with your old tapes? Instru ...more