|Choose Your View: Quick Bullet Points | Detailed Descriptions Android's newest major update is a special one — it's the tenth full version of the world's most commonly used operating system. The latest release, dubbed simply Android 10 (codename Android Q), was first showcas ...more
The transcribing app can be an invaluable tool, especially if you're a student or are in a profession that relies on audio journals or interviews. These apps can convert important recordings like lectures and meetings into text for you to carefully read through to better compr ...more
Clumsiness is the great equalizer when it comes to smartphones — it makes no distinction between the most expensive flagship handset and cheaper mid-range models. A hard drop onto pavement will usually result in a shattered screen, regardless of how pricey your device is. And ...more
Welcome back, my novice hackers! This new series on Bluetooth hacking was inspired by a recent episode of Mr. Robot (my favorite TV show). In episode 6, Eliot hacked the bluetooth keyboard of the police office in order to hack the prison and release his nemesis, Vera. This is ...more
Armis Labs has revealed eight vulnerabilities, called "BlueBorne", which put 5.3 billion Android, iOS, Windows, and Linux devices that use Bluetooth at risk. With it, hackers can control devices, access data, and spread malware to other vulnerable devices through networks. In ...more
If you're using a mobile device, it's a pretty safe bet that your apps are sending lots of information back and forth from their servers. To make sure there is no inappropriate data collection going on, it's worth setting up a web proxy to spy on this traffic, so you know exac ...more
As any informed PopSci reader will know, the iPhone is definitely a game-changing piece of hardware, but it's not without its problems. Chief among those nagging little imperfections, for me, was the recessed headphone hack that rejected any headphones but Apple's trademark gl ...more
Battery life is often a big problem with new smart phones. In this tutorial, learn how to change the settings on your brand new HTC EVO 4G so that the battery lives longer on the 4G network. Don't get stuck with a dead phone- check out this clip and keep it alive!
Want to control a friend's cell phone remotely and make "free" calls from it? In this hack how-to video, you'll learn how to hack Bluetooth-enabled cell phones with your Sony Ericsson or Nokia phone and the Super Bluetooth Hack—or "BT Info"—, a free program easily found throug ...more
By now, many of you may have heard about iPhone tracking and recording your location data, but is there anything else being extracted from cell phones without our knowledge? If you're a Michigan state resident, the answer is an alarming "maybe". Michigan's police department h ...more
As hard as you try to protect your valuable information with strong passwords and anti-doxing measures, there's nothing you can really do when someone else gives up your goods. And that is the case with the recent Global Payments breach. Global Payments is just one of the mid ...more
This is a great tutorial on cracking the iphone to record more than 30 seconds on the iPhone 3G's video camera. This is a hack of the previously still camera that comes stock with all of Apple's phones. Enable your iPhone to shoot video instantly and free! Download the iPhone ...more
This video describes how to increase battery life on most of the LG phones", for that first we have to enter into the service by typing the numbers "##77647269700" and then clicking the call button. Now it will ask for 6 digit "service code" to enter into the service. Just typ ...more
Hey iPhone jailbreakers! Did you jailbreak your 2G/3G iPhone and then update to firmware 4.1? Yeaah. Now you've got a shiny little brick, don't you. Well, this video will help you get free (again) from the clutches of those clever guys in Cupertino. Apple doesn't like people m ...more
In this clip, learn how to use PDA Net to tether your rooted Droid 3G smartphone to a WiFi network. By tethering your device, you will be able to use it as a portable, wireless modem for anything from other phones to computers to hand held gaming systems. Anything that is WiFi ...more
Call internationally from a cell phone This video by howtocallinternational.com demonstrates how to call any international number using a several cell phones, each phone uses a different method to dial an international number. The phone brands Nokia, Motorola, Sony Ericsson, ...more
This is the guide of how to cheat in my brute to gain Exp. much faster then the normal people. Click the link www.cheatengine.org to get cheat engine! Now go to this site: http://2345643.mybrute.com After you have cheat engine, create a char and fight the guy with stupid num ...more
Got a knack for speeding? Like running red lights? Believe or not, the police have better things to be doing than pulling you over, like catching real criminals. That's why more and more cameras are popping up at known speeding zones and on street corners—so the cops can clean ...more
JavaScript is one of the main programming languages that the Web is built on. It talks directly to your browser and exchanges information with it in ways that HTML simply cannot. With JavaScript, you are able to access browser cookies, website preferences, real-time actions, s ...more
Since its inception in 2007, the Pwn2Own computer hacking contest has been challenging the vulnerability of mobile phones and web-related software. In 2010, the fruit of two full days of hacking came down to the exploitation of the following web browsers: Safari 4 on Mac OS X, ...more
In these text messaging how to videos for cell phone users, learn how to send text messages. It’s easy. Our expert will walk you through different types of mobile phones and the text features they have. Then learn how to use a numeric keypad to type in letters, numbers and sym ...more
Hack your way into unlimited money in Bloons TD! It's as simple as using Cheat Engine and playing the game. Just swap out a few numbers here, a few numbers there, and your ready for boundless money. This video tutorial teaches how to cheat money in Bloons Tower Defense 4 (12/ ...more
"Ahoy-hoy." If telephone titan Alexander Graham Bell had his way, we'd all be answering phones like Mr. Burns. Thankfully, frienemy Thomas Edison had enough sense to realize we weren't always on the briny. He preferred "hello" as our standard telephone greeting, which he is c ...more
Hello Hackers! Welcome to my 2nd Post: This is a tutorial explaining how to hack android phones with Kali. I can't see any tutorials explaining this Hack/Exploit, so, I made one. (Still ,you may already know about this) Step 1: Fire-Up Kali: Open a terminal, and make a Troja ...more
A huge chunk of my life revolves around my computer, and whenever I'm on my laptop and get a text message notification on my phone, I find it extremely distracting to stop whatever I'm doing to hunt it down. That's why I'm a big fan of text messaging via my computer. While we ...more
Welcome back, my hacker apprentices! Although there is a multitude of different hacker types, the one target they all share is the database. I often refer to the database as the hacker's Holy Grail, or the ultimate prize for an effective hack. That's because the database—alm ...more
Welcome back, my greenhorn hackers! Recently, I asked the Null Byte community what subject they would most like me to cover in future tutorials. Many of you cited scripting, and I decided it's best to cover this subject soon, so here goes. Any self-respecting hacker must be ...more
You'd think the ability to block calls from certain numbers would be built in to most phones by now, but that's certainly not the case with the iPhone. After dropping a few hundred bucks on a device, it'd be nice to be able to choose who you want to talk to, but beyond screen ...more
Confirmation numbers, grocery lists, addresses, and phone numbers are all things we need to quickly jot down on our phones, but the thing is, they're never extremely easy to access later. You have to figure out which app you wrote them in, meaning lots of needless searching an ...more
Are you constantly traveling? Well, as a Hilton HHonors member, you can enjoy special treatment at all of their hotels and resorts. It's free to register, but the difficulty lies in climbing up their membership level. To reach Gold elite status, Hilton HHonors requires that yo ...more
Until recently, brainwave-reading devices have pretty much only existed in science fiction. Sure, electroencephalography (EEG), the technology that powers these devices, has been used in medicine and psychiatry since the late 1800s, but diagnosing people's brains and reading t ...more
Welcome back, my greenhorn hackers! After the disaster that was Windows Vista and the limited and reluctant adoption of Windows 8 and 8.1, Windows 7 has become the de facto standard operating system on the desktop/client. Although the most valuable information to the hacker ...more
There isn't as much use for old-school four-function calculators anymore since we all have them on our cell phones now. If you've still got one lying around, you can hack it to play recorded sounds, use it to make a metal detector, or turn it into a custom name plate that says ...more
Watch this first 'tutorial'.FauxTo! Hoax! Con! May 28, 2008, this video was uploaded to YouTube illustrating the popcorn popping power of a circle of ringing mobile phones. Radiation. Amazing. Viral. Millions viewed. Back in 2006, BoingBoing, Diggers, and others had fallen fo ...more
Chrysaor, a zero-day spyware believed to have been created by the Israeli "cyber war" group NSO, is an even greater threat to Android phones than it ever was to iOS. Related to the Pegasus hack that recently affected iPhones, Chrysaor is malware that baits the user into insta ...more
While many people may use Bluetooth every day, the majority don't know how it works or that it can be hacked. Bluetooth hacking gives a clear window into the world of the target. Nearly every device has Bluetooth capabilities, and people store a great deal of personal info on ...more
The Stagefright exploit, which allowed for malicious code to be embedded in files on your device, is now very real in the form of Metaphor. Developed by software research company NorthBit, Metaphor is their implementation of exploits to the Stagefright library, and when execut ...more
Hear me out. No, really. Before you sharpen your pitchforks and give me anecdotal evidence of your Chinese restaurant syndrome, I think you need to know a few things about monosodium glutamate. First of all, it's a naturally-occurring chemical compound that can be found in any ...more
You were the chosen one, Snapchat! The new download numbers for the social media app show just how hard it will be to bring them back to the light after the rise of the Instagram empire. Last month we reported that Snapchat's Download numbers had fallen 16%, bringing the num ...more
RouterSploit is a powerful exploit framework similar to Metasploit, working to quickly identify and exploit common vulnerabilities in routers. And guess what. It can be run on most Android devices. I initially covered RouterSploit on Kali Linux and macOS (OS X), but this tuto ...more
Design flaws in many routers can allow hackers to steal Wi-Fi credentials, even if WPA or WPA2 encryption is used with a strong password. While this tactic used to take up to 8 hours, the newer WPS Pixie-Dust attack can crack networks in seconds. To do this, a modern wireless ...more
If you've haven't had your fill of Apple's security issues in recent weeks, Siri is now the latest to join the slew of problems with the most recent version of iOS (7.1.1). The newest bug, discovered by Sherif Hashim, allows anyone to easily bypass passcode security measures ...more
Bitcoin continues to make chaotic waves in the finance industry, with one bitcoin currently worth about $1,250 as of this writing. What's great about bitcoin is that you don't need to shell out rent money to get in the game, because bitcoins can be bought in increments—basical ...more
Welcome back, my hacker novitiates! Finding vulnerabilities in systems can be one of the most time-consuming tasks for a hacker. There will be times, though, when you'll find yourself in a position that you know that a particular port represents a vulnerable application or se ...more
In most countries, there is one single emergency telephone number that allows you to contact local emergency services when in need of assistance. In the United States, that number is 911, which most of us know by the time we're able to speak, unless you're Buckwheat and Porky. ...more
They say a picture is worth a thousand words, but augmented reality is giving the United States Holocaust Memorial Museum the ability to add a few more poignant real words to its exhibits. The museum is testing a mobile app that will enable visitors to see more information ab ...more
In-N-Out Burgers on the West Coast is famous for their not-so-secret and secret menus, along with their cheap, no-fuss burgers. Pre-internet, you felt like you were actually part of a small, select club when you knew what secret menu items to order. But with the advent of the ...more
Back in March, Samsung partnered with Slacker Radio to create a streaming service called Milk Music. For those of us who don't own a Galaxy device, this news was a non-starter, as it was exclusive to Samsung's flagship line of phones and tablets. Since then, mods have made Mi ...more
Who am I? First let me introduce myself. I am Th3skYf0x, an -well lets call it experienced- hacker and i recently found this site and right after that i found this Null Byte "world" soo i thought... Why not teaching instead of doing nothing with my knowledge. Let me get one ...more
An accelerometer/gyro goes onto an Arduino board and transmits the angular motion of the skateboard via Bluetooth to a virtual reality game I made for Android phones and Google Cardboard. DIY Virtual Reality Skateboard Video: . This is a really fun and easy project that can b ...more
Want to stick it to your mobile carrier by porting your cell number to Google Voice? Now you can! On Wednesday, January 19th, Google Voice began allowing select users to transfer their personal numbers to Google Voice for a one-time fee of $20. Though the feature is still in ...more
Learn how to make a BlackBerry phone tell you its PIN and phone number. This clip will show you how it's done. Whether you're the proud owner of a BlackBerry smartphone or are merely considering picking one up, you're sure to be well served by this video guide. For detailed in ...more
In this clip, you'll learn how to add and activate phone numbers for call forwarding with the Google Voice app on a Google Android smartphone. For complete instructions, and to get started activating numbers on your own smartphone, take a look.
Have you ever found yourself calling up a company, only to be denied due to not calling from the number listed on your account? Thanks to a website called Spoofcard, this is no longer an issue! SpoofCard let's you spoof the number you are calling from, as well as modify your v ...more
Want to shoot video in low-light conditions with a HTC Evo 4G smartphone? Whether you're the owner of an HTC Evo 4G Android phone or just covet one, you're sure to enjoy this Evo owner's guide from HTC Evo Hacks, which presents a complete, step-by-step walkthrough of how to tu ...more
Want to mod your HTC HD2 Microsoft Windows smartphone to use wireless charging—without breaking your warantee in the process? It can be done! And quite easily at that. For complete details, and to get started modding your own HD2 phone to work with wireless chargers, watch thi ...more
Gmail has been the best free email client for a while, but now it's even better. It has added a Skype-like service by which you can call any number in the US or Canada from the US or Canada for free. This video will show you how fast and easy it is to use this new feature to c ...more
Getting tired of prank phone calls from blocked numbers? Check out this video to learn how to view a blocked phone number on any phone. Visit Trap Call to learn more about the service described in this how to video.
This clip demonstrates a pair of handy shortcuts for discovering the PIN and phone number of a BlackBerry phone. Whether you're the proud owner of a BlackBerry smartphone or are merely considering picking one up, you're sure to be well served by this official video guide from ...more
Ross Handler shows us how to block your cell phone number for outgoing calls. First call your provider and let them know you want all of your outgoing calls to not be registered onto some one else's caller I.D. They will gladly do that for you. But if you want to just block in ...more