The Essential Phone didn't have a hot start when it was released back in August. A delayed release, poor camera performance, and high price tag led many to avoid the otherwise well-received device. But after a few software updates and price drops, it's now a steal of a deal.
While Black Friday shoppers found countless deals on all kinds of smartphones, one device was overtly left out of the price cuts — the iPhone X. Walmart was the only store to offer a promotion on the newest Apple device, and even then, it was difficult to find. Cyber Week appears to have repeated recent history, with only one store offering a special on the iPhone X, but it's not Walmart this time.
Those of you who have been a part of the Null Byte community for even a short while know that I sincerely and firmly believe that hacking is the most important skill set of the future.
Will the predicted apocalyptic date—December 21st, 2012—really be the end of the world? In this ongoing five-part series, we examine what would happen if zombies, nuclear weapons, cyber wars, earthquakes, or aliens actually destroyed our planet—and how you might survive.
As a Boy Scout, when the First Class rank is attained, a scout has learned all the basic camping and outdoors skills of a scout. He can fend for himself in the wild, lead others on a hike or campout, set up a camp site, plan and properly prepare meals, and provide first aid for most situations he may encounter. A First Class scout is prepared.
In this scientific video tutorial, undergraduate students in a forensic chemistry lab demonstrate a forensic DNA test to catch a criminal. Learn how to perform a forensic DNA test! Just like in CSI.
Welcome back, my fledgling hackers! As nearly everyone has heard, Target Corporation, one of the largest retailers in the U.S. and Canada, was hacked late last year and potentially 100 million credit cards have been compromised. Happening just before Christmas, it severely dampened Target's Christmas sales, reputation, and stock price (the company's value has fallen by $5B).
Uber's year is going from bad to worse, and they may be subject to a potential criminal probe in the ongoing Waymo legal battle.
As many of you know, I have been running a couple of series here on Null Byte about digital forensics called Digital Forensics for the Aspiring Hacker and Digital Forensics Using Kali. Although many readers have seemed to enjoy these series, just as many seem to be pondering, "Why should I study digital forensics?"
If you're like me, you probably have a wishlist of Android games you'd love to buy, except the high price tags keep you away. A few bucks can feel like a fortune in the Google Play Store — you just can't bring yourself to pay that much. Well, lucky for you, Google Play has some serious discounts this Cyber Monday. There won't be a better time to buy these games, until next year, of course.
Engineer Anthony Levandowski has officially been kicked off Uber's driverless program by a judge as the company's legal war with Waymo continues.
This is not essentially the next part in the series, but an expansion of previous part about why should you not use cryptocurrencies.
Flashing people in an oversized trench coat is both old-fashioned and exhausting (and also very illegal). But like the evolution from school-yard bullying to cyber-bullying, it seems as if the new trend is "cyber-flashing" (it's even has an official hashtag). In the U.K., police are now investigating what they are calling the first cyber-flashing case.
You're on your computer a lot, so it only makes sense that you download the best apps and software for it. The Official Cyber Monday Mac Bundle Ft. Parallels Pro & Luminar 4 is available for only three weeks at an additional 40% off the sale price of $69.99. Just use the promo code CMSAVE40 at checkout.
Apple continues to build its augmented reality hardware and software team in stealth mode. The latest addition comes via the hiring of a former DAQRI user experience designer and VR app developer.
By now, nearly everyone with any type of media access is aware that Sony Pictures Entertainment was hacked on November 24th. Although there can be many interpretations and lessons drawn from this audacious act, there is one indisputable conclusion: it and its ripples across the globe underlines how important hacking has become in our all-digital 21st century. As I have emphasized so many times in this column, hacking is the discipline of the future. From cybercrime to cyber intelligence to cy...
Michael Jackson appears to be more popular know than he ever was, which always seems to be the case with fallen pop icons. Not just his music either… we're talking about art. Since MJ's death, more and more artists are looking for ways to create their version of musical master, and you can draw him, too. With the help of this step-by-step drawing tutorial, you can have your own Michael Jackson masterpiece.
There's nothing more tedious, yet exciting, than watching surveillance cameras at work. They prey on the innocent and the unknowing. They protect businesses, workplaces, and homes. They catch criminals in the act, find hilarious anomalies, and are just darn cool when you're not the one that's supposed to be eavesdropping with them.
This how-to video is not for church-going makeup; the makeup look demonstrated is based on the deadly sin of wrath, and is as intensely theatrical as it sounds. The cosmetic products used to create this look are MAC's Full Coverage Foundation, Select Moisture Cover Concealer, Blot Powder, & Peach Invisible Set, Bat Black Cream Color Base, Black Black Pigment, Bat Black Cream Color Base, Dark Soul, & Softwash Grey Pigments, Burnt Burgundy, & Black Black Pigments, Boot Black Liquid Liner, Bat B...
Download a popular, legit app from the Google Play Store. Decompile it. Add malicious code. Repackage the app. Distribute the now trojan-ized app through third-party Android app sites. This is how advertising malware Ewind, what Palo Alto Networks calls "adware in applications' clothing," infects Android users.
Rumor has it that a gang of hackers—or possibly, one lonesome individual—holds the power to remotely wipe millions of iPhones and iCloud accounts, unless Apple coughs up some ransom money by April 7.
Seldom in recent history has a cyber security event caused so much media stir (maybe because it happened to a media company?) and international relations upheaval. Cyber security breaches seem to take place daily of major corporations, but the Sony hack seems to have captured the American imagination and, for that matter, the whole world's attention.
This video tutorial is for educational purposes only. See how to pick a normal lock with a tension allen wrench and a small screwdriver.
One day, you may find yourself in an emergency situation where you need to undo the chain lock of your home's front door, or somebody else's front door. Maybe someone forgot the unlock it when exiting the back door. Maybe you're grandfather is having a heart attack. Maybe your wife is cheating on you. Whatever the reason, it's fairly simple to break in by undoing the chain lock.
People like Ralphige and The Jerky Boys have elevated prank phone calls to an art. Here’s how you can get in on the fun.
Most of you already know that a zero-day exploit is an exploit that has not yet been revealed to the software vendor or the public. As a result, the vulnerability that enables the exploit hasn't been patched. This means that someone with a zero-day exploit can hack into any system that has that particular configuration or software, giving them free reign to steal information, identities, credit card info, and spy on victims.
To obtain a work permit, you must first have a job offer from a Canadian employer. To get a job offer, you can apply directly and send your resume to a perspective employer, use an employment agency, or post your resume on employment websites. Next, you must have a labor market opinion. To get an LMO, you have to fill out some forms and submit some supporting documents. This process can take from a few weeks to 6 months to complete. After the LMO is approved, you must then apply for a work pe...
This is an electronic travel authorization system used to gain travel authorization to the United States. There are certain countries that fall under a visa waiver program, meaning that you do not need a visa to enter the US to visit. In that case you use the ESTA system. The countries that qualify in the VISA waiver program include Andora, Australia, Austria, Belgium, Brunei, The Czech Republic, Denmark, Estonia, Finland, France, Germany, Hungary, Iceland, Ireland, Italy, Japan, Latvia, Lich...
Nexus is a pre-approved trusted traveler program that allows approved people expedited travel between Canada and the US. The card is available to US and Canadian citizens or permanent residents who travel by air or land between the two countries. Anyone traveling between the two countries must have their own Nexus card including babies. The Nexus card is considered a privilege by both the US and Canadian governments. You must have a clean record with both the Canadian Border Services and The ...
In recent weeks, some people have been shunned from the Null Byte community because they expressed "black hat" aspirations. This is because Null Byte is the "white hat" hacker training/playground. Although most of us think we know what that means, it does beg the question; "Who and what is a white hat hacker?"
The final chapter of Christopher Nolan's Batman trilogy is here, The Dark Knight Rises, and if you're anything like me, it made you want to immediately don a cowl of your own and run around punching criminals. Don't forget though, one of the most awesome aspects of Batman is his never-ending supply of crazy gadgets. Unfortunately for most of us, we don't have a billion dollars, nor Morgan Freeman, so we'll just have to make do with some good old-fashioned DIY tricks. Read on for a rundown of ...
CyberTimez and the Wounded Warrior Program, using the Vuzix M300 monocular smartglasses, are teaming up to help supply veterans with little to no sight. The overarching goal here is helping these injured service members to find a new level of independence in a sight driven world.
As you all know, Anonymous have declared cyber war on ISIS and have already proven what they are capable of and whats to come.
Welcome back Hackers\Newbies!
Hello I have now asked for help a few times, so I figured I should contribute with what I can offer as of right now, which is many valuable sites if you need to look someone up.
You've seen security cameras everywhere in the public space. How many are there? Where are they? This is information that can be difficult to come by. It's not just criminals that are interested in information on this. It's your fundamental human right to be able to go about your daily life without being monitored and watched at every step. You might think that these cameras are for safety, and they can certainly help make people feel secure. Then it automatically follows that these people sh...
Before lead was removed from gasoline, lead from car exhaust got into the air, was breathed in by kids, lowered their IQs, and increased crime rates (there is a very strong correlation between IQ and criminal behavior).
In recent light of Obama's assertion of executive privilege over important documents concerning the Fast and Furious operation, here's a brief article concerning this controversial power.
Alright guys sorry for the delay, lets just get to it: » Pelosi Says Holder Contempt Charge About Suppressing Vote.
Mostly all hackers like to have a laugh. We like to have fun! We like to troll. And maybe, even cause some havoc once in a while. But, while we do this, we must always stay in the line of the law.