hack Stories October 16, 2015

There are several Nexus devices that just don’t support Android 6.0 Marshmallow, and that fact has left some owners of ancient technology very unhappy. But this is Android, of course, and there’s nothing keeping developers from tinkering with Google’s open source OS. Specifically, owners of the 2012 Nexus 7 should rejoice in this case: It’s definitely at your own risk, but you can now install an early and hacky unofficial build of Google’s latest version of Android on your phone. Here’s how to do it… expand full story

hack Stories October 8, 2015

Samsung has said that a hack at LoopPay reported in the New York Times did not compromise any of its customer data. LoopPay’s technology forms part of the company’s electronic wallet offering, Samsung Pay.

Samsung Pay was not impacted and at no point was any personal payment information at risk. This was an isolated incident that targeted the LoopPay office network, which is a physically separate network from Samsung Pay. The LoopPay incident was resolved and had nothing to do with Samsung Pay … 

expand full story

Deal: Get Pixelbook at 25% off: $750!

hack Stories October 1, 2015

The number of vulnerabilities found in Android’s Stagefright just grew, and this time devices from as far back as Android 1.0 are vulnerable to attack. This first vulnerability, affecting almost every Android device, is in “libutils” — and that’s just one of the vulnerabilities recently discovered by Zimperium. Another vulnerability was found in libstagefright that makes Android devices running software versions later than 5.0 vulnerable as well… expand full story

hack Stories June 2, 2015

It’s widely speculated that LG is working to bring WiFi support to the LG G Watch R in some future release of Android Wear, but in the most recent official release, 5.1.1, the smartwatch is notably left out. Being left out of a feature isn’t an unsolvable problem for the XDA Developers community, though, as it appears one developer has put together a hack for enabling WiFi on the round smartwatch from LG… expand full story

hack Stories May 21, 2015

A multinational government group known as the Five Eyes intelligence alliance – the spy group comprising Canada, the U.S., Britain, Australia and New Zealand – planned to hack Android phones by compromising both Google and Samsung app stores. The plan was revealed in newly-released Snowden files dating back to 2012, reports CBC News.

Five Eyes specifically sought ways to find and hijack data links to servers used by Google and Samsung’s mobile app stores [trying] to find ways to implant spyware on smartphones by intercepting the transmissions sent when downloading or updating apps.

The alliance planned to begin by analyzing traffic to the stores to identify the Internet usage habits of targets (such as which apps they used), but the ultimate goal was to plant spyware that would enable them to extract data from targeted smartphones, or even to take control of them …  expand full story

hack Stories March 16, 2015

PSA: Samsung’s Galaxy S6 has been rooted by Chainfire

Chainfire has announced this afternoon that the first two models of the Samsung Galaxy S6 have been added to the CF-Auto-Root repository. Specifically, you’ll find that CF-Auto-Root for both the SM-G920T and SM-G925T are now available, otherwise known as the T-Mobile Galaxy S6 and S6 Edge. CF-Auto-Roots for other devices in the S6 family are surely imminent…

As per Chainfire’s Google+ post:

Either way, the first CF-Auto-Root’s for the S6 family are up: SM-G920T and SM-G925T – the T-Mobile US S6 and S6 Edge.

Only very minor modifications were necessary [to the existing CFAR script]. The S6 CFAR has been tested on a real device, and root was achieved. Further information? I have none, I wasn’t there in person.

All completely expected, but perhaps nice to know regardless.

Before actually rooting though, consider that KNOX will likely be tripped, and there’s a good chance untripped KNOX will be required for phone based payments.

If you want to download the CF-Auto-Root, be sure to head over to the repository: http://autoroot.chainfire.eu/. It’s probably not going to be useful for many yet, because the Galaxy S6 hasn’t even shipped for most. And in the case that you don’t have any need for a root at all, you’re probably in the majority.

Powered by WordPress.com VIP