Use Android Device Manager’s Guest Mode to Find Your Friend’s Phone

Use Android Device Manager's Guest Mode to Find Your Friend's Phone

Android: If you’re not using the Android Device Manager to help find your lost phone, we highly recommend it. What happens when you actually lose your phone, though? Thanks to a guest mode in the Android app, you can use your friend’s phone to find your own.

The Android Device Manager app allows you to quickly locate, lock, or wipe your other devices. However, you can also use the guest mode to allow someone else to quickly log in and find their device. This makes it much easier to help a friend find their phone, as the only alternative is to log in to their own account from a laptop, which may not be as easily accessible. In any case, if you’re not using ADM to track your phone in case of an emergency, it’s highly recommended you set it up now.http://ift.tt/1SN3RZQ…

Android Device Manager | Google Play Store

via http://ift.tt/1IUhuE4

Find out if your mobile is vulnerable with Stagefright Detector App for Android

Stagefright is a critical Android vulnerability that attackers can exploit using specifically prepared Multimedia Messaging Service messages (MMS). What makes the vulnerability particularly troublesome is that it can be exploited passively on devices. All that it takes is to sent a prepared MMS to a device running Android to get system or media privileges on […]

Ghacks needs you. You can find out how to support us here or support the site directly by becoming a Patreon. Thank you for being a Ghacks reader.

The post Find out if your mobile is vulnerable with Stagefright Detector App for Android appeared first on gHacks Technology News.

via http://ift.tt/1NchIXY

Dreamify: transform photos using Google’s Deep Dream algorithm

Dreamify is a free Android application that transforms photos or images on the device into art. Google revealed Deep Dream, a neural networks research project, back in June 2015, and an unforeseen side effect of that was huge interest in the generated images. People from all over the world wanted to know how they could […]

Ghacks needs you. You can find out how to support us here or support the site directly by becoming a Patreon. Thank you for being a Ghacks reader.

The post Dreamify: transform photos using Google’s Deep Dream algorithm appeared first on gHacks Technology News.

via http://ift.tt/1N3j8Gz

Simple Text Message to Hack Any Android Phone Remotely

Own an Android phone? Beware, Your Android smartphones can be hacked by just a malformed text message.
Security researchers have found that 95% of Android devices running version 2.2 to 5.1 of operating system, which includes Lollipop and KitKat, are vulnerable to a security bug, affecting more than 950 Million Android smartphones and tablets.
Almost all Android smart devices available

via http://ift.tt/1OwPyr2

RollJam — $30 Device That Unlocks Almost Any Car And Garage Door

We have talked a lot about car hacking.
Recently researchers even demonstrated how hackers can remotely hijack Jeep Cherokee to control its steering, brakes and transmission.
Now, researchers have discovered another type of car hack that can be used to unlock almost every car or garage door.
You only need two radios, a microcontroller and a battery, costing barely under $30, to

via http://ift.tt/1TeeaGz

Kali Linux 2.0 Released — Download Most Powerful Penetration Testing Platform

Offensive Security, the creators of Swiss army knife for Security researchers, Penetration testers and Hackers have finally released the much awaited and most powerful version of Kali Linux 2.0.
Kali Linux 2.0 (Codename ‘Kali Sana’), an open-source penetration testing platform brings hundreds of Penetration Testing, Forensics, Hacking and Reverse Engineering tools together into a

via http://ift.tt/1J1Wvk0

Mobile batteries become prime target for hackers

 Batteries have become a new security risk for smartphone users, with a group of security researchers saying they are able to transmit personal data to hackers.

Lukasz Olejnik, Gunes Acar, Claude Castelluccia and Claudia Diaz have written a paper outlining the risks, saying a piece of software used in the HTML5 web language transmits data such as how much power is still left in a battery so websites using the code can save power while browsing.

Tags: 

via http://ift.tt/1ICXtyJ

Tech Firm Ubiquiti Suffers $46M Cyberheist

Networking firm Ubiquiti Networks Inc. disclosed this week that cyber thieves recently stole $46.7 million using an increasingly common scam in which crooks spoof communications from executives at the victim firm in a bid to initiate unauthorized international wire transfers.

via http://ift.tt/1N6sTDJ