List/Grid Tag Archives: Security

Samsung Galaxy Note 7 : Long-Term Verdict

Samsung Galaxy Note 7 : Long-Term Verdict

Re-Presenting, the unbeaten challenger, in the silver corner! The Bigger, Better, Faster, Meaner, Brighter, Louder; The Samsung Galaxy Note 7! In the “Phone + Tablet = Phablet” world, size does… Read more »

Web Apps Vs Native Apps – Winner Hybrid Apps

Web Apps Vs Native Apps – Winner Hybrid Apps

You have an idea for an app which you wish to develop yourself or get it done through a developer. Or probably you already have a popular website and the… Read more »

Top 5 USB Hacks that PWN You

Top 5 USB Hacks that PWN You

A USB based dongle can go long way in terms of screwing you, your data, and even your life. Every other day we come across a new device that exposes… Read more »

Wirelessly Hack unlock Car without Key Fob

Wirelessly Hack unlock Car without Key Fob

Its time for revelation of various hacks from your home security system to cars which rely on wireless key locks, as the BlackHat 2014 conference kicks-off. At this year’s BlackHat… Read more »

MythBuster: Do you need Antivirus on Android?

MythBuster: Do you need Antivirus on Android?

If you’ve been reading the web or browsing through news articles about Android, chances are you’ve come across a number of articles that claim Android is vulnerable to X attack,… Read more »

4 Tips for Smartphone Security

4 Tips for Smartphone Security

When it comes to our mobile phones, most of the news tend to be about advancements. A major new mobile phone comes out every few months, new software updates seem… Read more »

Sync Files Securely with BitTorrent Sync [Dropbox Alternative]

Sync Files Securely with BitTorrent Sync [Dropbox Alternative]

We all have some sort of cloud sync/ cloud storage service that we heavily rely on for syncing files across computers, devices. Whether it be Dropbox, Google Drive, MS Skydrive,… Read more »

What Google Can’t Find, Shodan Can [Search Connected Devices]

What Google Can’t Find, Shodan Can [Search Connected Devices]

When we don’t find it on Google, we declare it doesn’t exist. But as per Founder Shodan, that statement is not essentially true. He believes that when something is not… Read more »

Read, Extract WhatsApp Messages backup on Android, iPhone, Blackberry

Read, Extract WhatsApp Messages backup on Android, iPhone, Blackberry

WhatsApp is undoubtedly no.1 Messaging service on mobile devices having its presence across Android, iOS, Blackberry, Windows phone. Users around the globe exchange billions of messages over WhatsApp. ¬†However, the… Read more »

Remotely Hack any Cisco VoIP Phone

Remotely Hack any Cisco VoIP Phone

Ever year hackers research and reverse engineer mainstream electronics and commercial products in the market. At 29C3, security researchers from Columbia university demoed what they call to have achieved Hacking… Read more »

Hack Open Hotel Room Door Locks

Hack Open Hotel Room Door Locks

Everytime you checkin into a hotel, you are presented with a smartcard which would become key to your Hotel Room door locks for your duration of stay. Have you ever… Read more »

How to Hack WhatsApp Messenger | Build WhatsApp API Client

How to Hack WhatsApp Messenger | Build WhatsApp API Client

Desktop IMs have long been our favorite mode of communication. But with time, their significance has definitely come down. Smartphones taking large part of our daily life, IM services like… Read more »

Java 0-Day Exploit Code, Prevention Explained

Java 0-Day Exploit Code, Prevention Explained

Once in a while a new exploit or vulnerability arises that affects every single PC on the internet and within a span of few hours, it spreads across the globe…. Read more »

Unlock, Bypass, Recover Android Screen Lock Pattern

Unlock, Bypass, Recover Android Screen Lock Pattern

We know the pain you can go through when you forget Android Lockscreen pattern. Truth be told, Android’s Lockscreen pattern provides high security, even FBI has trouble unlocking it. From… Read more »

How to Hack Open/Unlock Office Door

How to Hack Open/Unlock Office Door

In movies, geeks would pitch-in and attach a PDA to the door that sweeps the magnetic field patterns against the doors or analyze the lock code in matter of seconds…. Read more »

© 2017 Geeknizer. All rights reserved. XHTML / CSS Valid.
Designed by taranfx.