Amazon

Search in HRJ Tricks

Ad

Related Posts Plugin for WordPress, Blogger...

Sunday, November 23, 2014

Spy Planes Equipped with Dirtbox Devices Collecting Smartphone Data

Spy Planes Equipped with Dirtbox Devices Collecting Smartphone Data
The U.S. government is reportedly using spy airplanes equipped with special military-grade snooping equipment to eavesdrop on cell phone information from millions of smartphone users in U.S, according to a new report...

Saturday, November 22, 2014

Darkhotel APT Malware Targets Global CEOs Using Hotel Internet

Darkhotel APT Malware Targets Global CEOs Using Hotel Internet
A seven-year-old cyber espionage campaign has targeted senior level executives from large global companies by using a specialized Advanced Persistent Threat (APT), zero-day exploits, and well-developed keyloggers to extract information from them when they stay in luxury hotels during their business trips...

Friday, November 21, 2014

Masque Attack — New iOS Vulnerability Allows Hackers to Replace Apps with Malware

Masque Attack — New iOS Vulnerability Allows Hackers to Replace Apps with Malware
Android have been a long time target for cyber criminals, but now it seems that they have turned their way towards iOS devices. Apple always says that hacking their devices is too difficult for cyber crooks, but a single app has made it possible for anyone to hack an iPhone...

Wednesday, November 19, 2014

Chinese Telecom Routes Russian Domestic Internet Traffic through China

Chinese Telecom Routes Russian Domestic Internet Traffic through China
Russian Internet traffic, including the domestic one, has continuously been re-routed outside the country due to routing errors by China Telecom, which could result in compromising the security of Russian communications...

Monday, November 17, 2014

More than 400 Underground Sites seized by FBI in 'Operation Onymous'

More than 400 Underground Sites seized by FBI in 'Operation Onymous'
The joint operation by authorities of the U.S. Federal Bureau of Investigation (FBI) and European law enforcement seized Silk Road 2.0, an alternative to the notorious online illegal-drug marketplace last week, and arrested 26-year-old operator Blake Benthall, but that wasn't the end...

Sunday, November 16, 2014

Microsoft to Issue 16 Security Patches and 60 Other Updates

Microsoft to Issue 16 Security Patches and 60 Other Updates
Microsoft has this time quite a big pile of security patches in its November 2014 Patch Tuesday, which will address almost 60 non-security updates for its Windows OS along with 16 security updates...

Dear Developer, This Is Why I Won’t Buy Your App

In my line of work, I get to test a lot of apps. I hunt for them, I judge their usefulness, I try them out, and then when I find an app works well enough or addresses a real problem, I review it for our readers. It sounds like a fun job and as I’ve continued to test and review more and more apps, I’ve picked up on tell-tale signs of what makes a good app. But I’m not overly clever to pick up on these signs; it’s a by-product of experience and where I can identify if an app is good or bad just by looking at the screenshots and reading a brief description, it isn’t a foolproof check. Developers are just as clever (if not more) at the game  than I am and they give me the slip. It’s times like this that the true test of a good app comes down to one thing, and one thing alone; features...

Saturday, November 15, 2014

Sleep Better Tells You How Well You’re Sleeping

Scientists still debate over why we sleep. There is no doubt that we need to sleep but the effects of sleep are simply amazing and worth every bit of research that is done about it. While scientists are figuring out the many mysteries of sleep, the REM cycle, why we dream, sleepwalk, talk in our sleeps, and that one time when Professor Utonium began robbing toy stores in his sleep, we wake up to the shrill call of our alarms wondering why it feels as though we haven’t rested at all. Sleep Better is an iOS and Android app by Runtastic, a popular name in heath and fitness apps, and it helps analyze your sleep patterns telling you how efficient your slumber was. Sleep Better integrates with iOS 8’s health app...

Friday, November 14, 2014

Oops! AppLock Uses A Volume Key Pattern To Prevent Access To Apps [Android]

Android Lollipop, when it finally rolls out to the masses, has a very interesting and exceptionally useful feature that lets you create guest accounts on your phone. This guest account has restricted access and is a great way to hand your device off to a child or a friend without fear of them poking around or deleting anything important. Until it rolls out, and it might be a considerably long time before it does for some devices, we will continue to keep our personal items safe some other way. Oops! AppLock is a free Android app that locks apps you select. The key to unlocking the apps and gaining access to them is what sets it apart. Where normally, users would fiddle with swipes or taps on the screen, codes, or patterns, this app unlocks from the volume keys...

Thursday, November 13, 2014

What To Do If Android Device Is Not Listed After ADB Devices Command

A good while ago, we did a post on what ADB is and how to install it. If you’re even slightly adventurous with your Android device, you probably know what ADB is and why it’s so important. Overclocking? Xpose? Custom ROM? Rooting? It’s only possible after you have ADB installed on your desktop. Now, installing it is pretty simple and you need only read our guide to confirm it yourself but installing it is really the easy part. As you start on your journey to rooting an Android device, learning the terminologies, and downloading the seriously large files needed to modify your device, you will also encounter the many odd errors that occur seemingly without reason or cause. Some of these errors effectively stop you from going ahead with whatever you’r doing and you end up looking for a solution to them instead. One such problem is when the adb devices command executed in the Command Prompt doesn’t list your device when previously, it did so. Here’s a quick solution to fix it...

Wednesday, November 12, 2014

Here Are Some Security Improvements In Android 5.0 Lollipop

Android Lollipop was rumoured to roll out on November 3, 2014. The new Nexus devices are now available and those who get their hands on one will be among the first to use the stable Lollipop OS. Android updates are not like iOS updates; they roll out over extended time periods that are months long, and they aren’t made universally available to all devices running Android. Many device owners will wait a considerably long time for an update to become available. This is a given when you decide to use Android but with Lollipop, there is more excitement and anticipation surrounding this release and you may be wondering why this update, of all the others, is such a big deal. The shortest answer we can give you is Security. Android Lollipop is big on it and we’re detailing just what the new security features are...
Android-Lollipop

Tuesday, November 11, 2014

Pilot Reader: Read & Save Tech News Catered Specifically To You

There are hundreds of ways to keep up with news; Twitter, Reddit, RSS, Newsletters, and whatnot. The demise of Google Reader certainly opened and enriched this particular niche and new apps and services are still developed to this day. Pilot Reader is an iOS and Android app that caters to people interested in technology news. The app is free and very Tinder-like in its functionality. Not only does it curate technology news but it also learns to recognize what you like and save, to give you more relevant news. Like Tinder, you can swipe an item right to save it, and left to dismiss it...

Friday, November 7, 2014

AirHopper — Hacking Into an Isolated Computer Using FM Radio Signals

Hacking into an Isolated Computer Using Just FM Radio Signals
In order to secure sensitive information such as Finance, many companies and government agencies generally use totally secure computer systems by making sure it aren't connected to any network at all. But the most secure systems aren't safe anymore...

Thursday, November 6, 2014

Facebook Now Accessible Via Tor Anonymous Network Using .Onion Address

Facebook Now Accessible Via Tor Network Using Official .Onion Address
If you are fan of the largest social networking site Facebook, but also want to remain anonymous while using your Facebook account, then there is really a Good news for you...

Wednesday, November 5, 2014

'The Pirate Bay' Co-Founder Found Guilty in Denmark's Largest Hacking Case

The co-founder of The Pirate Bay torrent site Gottfrid Svartholm Warg (Anakata) and his 21-year-old Danish co-defendant have been found guilty by a Danish court of hacking into systems operated by American IT giant CSC and illegally downloading files. It was the biggest hacking case ever conducted in the history of Denmark...

Sunday, November 2, 2014

Verizon Wireless Injects Identifiers to Track Mobile Customers’ Online Activities

The Nation's largest telecom operator 'Verizon Wireless' is tracking its customers' mobile internet traffic by adding a token to Web requests traveling over its network, in order to facilitate targeted advertising even if a user has opted out of their Customer Proprietary Network Information (CPNI) options...

Saturday, November 1, 2014

Samsung 'Find My Mobile' Flaw Allows Hacker to Remotely Lock Your Device

Samsung 'Find My Mobile' Flaw Allows Hacker to Remotely Lock Your Device
The National Institute of Standards and Technology (NIST) is warning users of a newly discovered Zero-Day flaw in the Samsung Find My Mobile service, which fails to validate the sender of a lock-code data received over a network...