TOP MYSTERIOUS SECURITY CODES FOR ANDROID Secret Hack codes are those codes which are usually hidden from users for any misuse and exploit. As we all know android is very new platform and thus very few hack codes of androids are there on internet. Today i am sharing all the hack codes of androids cellphones that i know. And i surely hope you can’t find codes better than that. So friends let’s hack and explore our android Phones. I have tested these codes on my Phone Samsung Galaxy having an Android OS version 2.2. I am sure these will work on all previous versions. 1. Complete Information About your Phone *#*#4636#*#* This code can be used to get some interesting information about your phone and battery. It shows following 4 menus on screen: Phone information Battery information ( How to maximize or boost Battery life in android phones) Battery history Usage statistics 2. Factory data reset *#*#7780#*#* This code can be used for a factory data reset. It’ll rem...
Posts
Showing posts with the label TECHIE NEWS
- Get link
- X
- Other Apps
By
Unknown
-

Nemesis Bootkit -- A New Stealthy Payment Card Malware Another day, another stunning Malware – this time targeting banks, payment card processors, and other financial services. Security researchers have uncovered a sophisticated payment card malware that executes before the operating system boots, making the malware very difficult to detect and much less remove. The malware in question is part of " Nemesis " – a malware suite that includes all software programs for capturing screens, transferring files, injecting processes, logging keystrokes, and carrying out other malicious activities on the infected computers. Nemesis malware family has been seen in the past, targeting banks, ATMs, financial transaction processing, credit unions, and financial business service companies. Nemesis Bootkit Malware – Reappears even after Re-installation of the OS The malware with bootkit functionality has been in operation since early this year and has th...
- Get link
- X
- Other Apps
By
Unknown
-
CENSYS -- A NEW SEARCH ENGINE , POWERED BY GOOGLE If you consider the usability and security factors, the humble routers and modems installed in your homes and offices are one of most important devices. However, time and again, the manufacturers have taken the security issue for granted. According to the latest research by the Austrian company SEC Consult, more than 3 million modems and routers are vulnerable to online threats. This was uncovered with the help of a new search engine Censys , that is aimed to help the security researchers find such screwups. Notably, world’s biggest search engine Google is providing its infrastructure to power Censys. This search engine is free to use and part of an open source project. “We’re trying to maintain a complete database of everything on the Internet,” says Zakir Durumeric, the University of Michigan researcher who is leading the project. This search engine helped in unmasking the recent flaw reported in Dell compu...
- Get link
- X
- Other Apps
By
Unknown
-
TRUTH ABOUT JAILBREAKING AN IOS AND KEEPING YOUR DEVICE SAFE There has been a lot of mixed information and speculation in the media recently in regards to the HackingTeam leak and what it all means for iOS users. Do the surveillance tools the group has reportedly provided to governments and law enforcement present a risk to the average iPhone and iPad user? That’s a question we’ve been getting a lot, so I will attempt to present all of the facts based on the recently leaked documents detailing the HackingTeam’s tools, as well as my opinion on the impact of certain aspects for iOS devices. Advanced users will already be aware of what I am about to state, but for everyone else, here’s what we’re dealing with: The Fake Newsstand Item | There has been a panic over the “fake Newsstand item” app that is within the HackingTeam file dump. The application has a blank icon, and hides itself within the Newsstand folder, to make it as “invisible” as possible. It is...
- Get link
- X
- Other Apps
By
Unknown
-
HIDDEN SECRETS OF DARK WEB -- A REPORT WARNING: This explainer is for informational purposes only. We urge you not to try anything you read about here. If you get arrested because of this article, don’t come crying to us because we’ll probably just smugly point at this block of italicized text. Early this month, U.S. officials seized and shut down a hidden but sprawling online marketplace called Silk Road, known as the eBay of illegal goods and services. The underground site had been a hub of illicit drug sales—including nearly 13,000 listings for heroin, cocaine, methamphetamine, and other controlled substances, according to the FBI complaint . The currency of this particular frontier is the Bitcoin, itself a highly anonymous currency—a Bitcoin account has no name or personal information attached to it—it is only identified by a string of 27-34 alphanumeric characters. Shoppers on the Bitcoin-based marketplace could also find hacking...
- Get link
- X
- Other Apps
By
Unknown
-
FACTS & MYTHS ABOUT DARK WEB -- AN INFOGRAPHIC We here at The Happy Drone are intrigued by the concept of the Deep Web (or Deepnet or the Invisible Web), a Web largely obscured from public view. The Deep Web, generally, is the part of the Web that is not visible to search engines; this may include dynamically generated web pages (that don’t exist until a query is made, for example), restricted access sites (where a password is required) or contextual pages, that vary their content depending on a range of factors (such as the IP ranges of users.) But the Deep Web is perhaps best known for its markets, its deep black markets in ideas and goods. Using the Tor browser, one can access directories such as the Hidden Wiki , where users can obtain paid assassins, “cheese pizza” (figure it out), or drugs, lots of drugs. Many of these sites are real (just look at reviews of drugs obtained via Silk Road , the Ebay of the underground drug trade), while others are clearly fak...
- Get link
- X
- Other Apps
By
Unknown
-
SECURITY BUGS GENERATED BY THE POPULAR PROGRAMMING LANGUAGES If we start investigating the root cause of the increasing vulnerabilities in CMS platforms like WordPress and Drupal, we’ll find that the root cause is their scripting language PHP. So, in order to find the languages that spawn most software bugs, security firm Veracode has analyzed 208,670 applications in the past two years and released the results. The study methodology uses a unique metric called Flaw Density per MB. This measures the number of security issues found in each MB of source code. The report suggests that about 86% of the applications written in PHP have at least on XSS vulnerability and 56% of them have at lease one SQL injection bug. Below is the list of top 10 programming languages that generate most software security bug: Classic ASP – with 1,686 flaws/MB (1,112 critical flaws/MB) ColdFusion – with 262 flaws/MB (227 critical flaws/MB) PHP – with 184 flaws/MB (47 critical flaws/MB) ...
- Get link
- X
- Other Apps
By
Unknown
-
ALL "DEEP WEB" LINKS TO WEBSITE AND DEEP PORTAL IN 2015 -- 2000+ LINKS LINK OF ALL DEEP WEB (DOWNLOAD HERE IN PDF FORMAT) Hidden Wikis The Hidden Wiki – The original Hidden Wiki (after Matt’s), owned by ion. Created January 2009. Went down for a while but it’s back up now. A bit outdated. Hidden Wiki Mirror – An exact mirror of ion’s Hidden Wiki. Updated on a fairly regular basis. HackBloc’s Hidden Wiki Mirror – An editable up-to-date Hidden Wiki. Generally free from vandalism. Old THW Mirror – Hasn’t been updated for 8 months. Older THW Mirror – An old Hidden Wiki mirror. Outdated. Directories OnionBookmark – Keep bookmarks private or share with public. TORDIR – Categorized link list of Tor, user submitted. Also a PM service. Onion Url Repository – Small list of Onionland links. Also hosts a forum. Sites Deep Web – A small list of onion links. Core.onion – Simple onion bootstrapping. TORLINKS ...
- Get link
- X
- Other Apps
By
Unknown
-
TOP SORTS OF THING ON DARK WEB If you already didn’t know, let me tell you this again the web that you can access with your average browser is only around 10-15% of the internet, the rest is known as the ”Deep Web”.to learn more about "Deep Web", go to below link: About "DEEP WEB" 10. Credit Cards Ever wanted to get loads of money to spend? Here’s the place for you. There are people willing to steal credit card information for the right amount. 9. Porn The deep web is full of all sorts of creepy fantasies. I’d rather not go into the details but trust me whatever it is you are looking for you definitely find it. Also there’s a guy who broadcasts a live hidden webcam show of his own sister, so if you’re into that kind of stuff. 8. Hacking There is a whole bunch of sites where you can find people to hack anything for you, be it is your ex’s account or a top secret government website. These guys are up for anything. 7. Thieves/ Burglars ...
- Get link
- X
- Other Apps
By
Unknown
-
ABOUT DEEP WEB -- AN INFOGRAPHIC The Deep Web , Deepnet , Invisible Web , Hidden Web are search terms referring to the content that is not indexed by standard search engines, because we all know only the things that are shown to us i.e., called as “ surface web ” it is of about 19 TB which is only a mere part of the original world wide web.The greater part is hidden down with a size of about 7500 TB and guess what?, It’s still expanding. One of the main problem in deep web is that it can’t be generally crawled by search engines web crawlers .In an surface web the sites are being indexed and can be found later on while searching but when it comes here it is not possible to index them. For performing the entry into deep web one must have Tor Browser installed in his machine. Tor Browser In order to get access to deep web one must be anonymous and to stay that way must install the tor browser. It uses a Peer-to-Peer connection. T...
- Get link
- X
- Other Apps
By
Unknown
-
WEIGH OF AN ENTIRE INTERNET WEB -- A REPORT source: geekboy.co The data we upload on the web, the information we share, the chats we do with our friends and every other key typed and every mouse click – everything makes the internet a more vast and complex place. And, they also continue to make our internet a “heavier” place. So, how much does the internet weigh? How much would all the data on the internet at any one moment weigh? I was watching random videos on YouTube and I came across this amazing video on Vsauce, a YouTube channel. The video describes and calculates the weight of the internet, after taking the inspiration from reports that indicate that each book loaded onto Amazon Kindle e-reader makes the tablet slightly heavier. There are lots of theories on the internet that calculate the weight to be as small as a fat strawberry- and some claim it to be as light as a teeny grain of salt. Using Einstein’s formula e=mc², Professor John...
- Get link
- X
- Other Apps
By
Unknown
-

KEMOGE -- A LATEST ANDROID MALWARE TO ROOT ANY ANDROID PHONE Google Android has been a primary concern of the attackers. Counting from a simple text message that could hack an Android phone remotely to the Stagefright bug making Billion users vulnerable. Now, the latest is the ' Kemoge Malware ' that has made its debut as an Adware on the Android mobile phones, allowing third-party app stores to fetch your device's information and take full control of it. Security researchers from FireEye Labs have discovered that Kemoge malicious adware family is spreading in 20 countries around the globe. Also, the origin of the Adware's attack is suspected from China. What is Kemoge? The name given to the malicious Adware family is because of its command and control (C2) domain: aps.kemoge.net. Kemoge is an Adware in the disguise of popular Apps; it has circulated in such numbers because it takes the name of popular apps and repackages ...
- Get link
- X
- Other Apps
By
Unknown
-
ALL VERSION OF MICROSOFT WINDOWS AFFECTED WITH A CRITICAL VULNERABILITY -- A REPORT Microsoft has rolled out six security updates this Patch Tuesday , out of which three are considered to be " critical, " while the rest are marked as " important. " Bulletin MS15-106 is considered to be critical for Internet Explorer (IE) and affects absolutely all versions of Windows operating system. The update addresses a flaw in the way IE handles objects in memory. The flaw could be exploited to gain access to an affected system, allowing hackers to gain the same access rights as the logged-in user. A hacker could " take advantage of compromised websites, and websites that accept or host user-provided content or advertisements ," the advisory states. " These websites could contain specially crafted content that could exploit the vulnerabilities. " Therefore, the dependency here is that an IE user must knowingly click on the malici...
- Get link
- X
- Other Apps
By
Unknown
-
ANDROID APP TO CHECK VULNERABILITIES IN YOUR ANDROID PHONE Android VTS (Vulnerability Test Suite) new android vulnerability scanner which helps users to scan their android phone for vulnerabilities. Android VTS is free to use and released only for Android at present. This application is created by NowSecure, a company that provides mobile security solutions. You can download and install VTS for Android on your android phone by clicking this link. VTS for Android application is open source and you can contribute or review the source code at GitHub . This tool scans a list of major bugs in Android phone: ZipBug9950697 Zip Bug 8219321 / Master keys Zip Bug 9695860 Jar Bug 13678484 / Android FakeID CVE 2013-6282 / put/get_user CVE_2011_1149 / PSNueter / Ashmem Exploit CVE_2014_3153 / Futex bug / Towelroot CVE 2014-3847 / WeakSauce StumpRoot Stagefright bugs x509 Serialization bug PingPong root – CVE-2015-3636 All reports stays on your device and i...
- Get link
- X
- Other Apps
By
Unknown
-
HOW MUCH YOUR DATA WORTH AT DARK WEB???---AN INFO Ever wondered how much your stolen data could be worth? A new report reveals the market value of all the most common types of stolen data available for sale to criminals on the dark web . The "Hidden Data Economy ” report by Intel Security Group’s McAfee Labs draws on years of close work with law enforcement, and ongoing monitoring of online platforms, communities and marketplaces where stolen data is hidden and sold – such as Alphabay and Crypto Market. The report provides examples of how different types of stolen data are being packaged, and offers an illustration of average prices for different types of data. A few examples include: Average estimated price for stolen credit and debit cards: $5 to $30 in the US; $20 to $35 in the UK; $20 to $40 in Canada; $21 to $40 in Australia; and $25 to $45 in the European Union Bank login credentials for a $2,200 balance bank account: $190 Bank login credentia...