Sunday 7 May 2017

Hack Any App Source Code ? Kisi Bhi App Ya Game Ka Naam Or Logo Change Karo Within 5Min

20 comments
Hello Guys , Welcome To Hax4Us
Hax4Us
Namaskaar Dosto Aaj Hum Baat Karne Wale Hai Ek Esi Application Ke Baare Me Jo Kisi Bhi App Ya Game Ka Source Code Hack Kar Sakti Hai Bina Kisi Special Programming Knowledge Ke ?

Yes , Iss App Ko Koi Bhi Use Kar Sakta Hai Iske liye koi special knowledge ki need nhi hai...

Name of application is APK EDITOR PRO ...


Ab Iss App ki help se hum kisi dusri app ka naam , icon ya logo , package name and or bhi bahut saari things modify kar sakte hai..

How To Use ?
Iske Use Ka ek simple demo video banayi hai jise aap niche dekh sakte hai.


Agar post me video nahi chal pata rahi hai to aap niche link par bhi click karke video dekh sakte hai.

Click Here To Watch 

How To Download ?
APK EDITOR PRO ko play store se ya niche link par click karke bhi download kar sakte hai.......

Click Here To Download 
Read More

Saturday 6 May 2017

Many Apps Using Ultrasonic Signals to Silently Track Android Users

2 comments
ultrasonic-tracking-signals-smartphone-apps
Thnx To THN
Your smartphone may have some apps that are continuously listening inaudible, high-frequency ultrasonic sounds from your surroundings and they know where you go, what you like and dislike — all without your knowledge.

Ultrasonic Cross-Device Tracking is a new technology that some marketers and advertising companies are currently using to track users across multiple devices and have access to more information than ever before for ad targeting.

For example, retail stores you visit, a commercial on TV or an advertisement on a web page can emit a unique "ultrasonic audio beacon" that can be picked up by your device’s mobile application containing a receiver.

This information helps advertisers to create your personalized profile and collect your interests by figuring out that both devices probably belongs to you, allowing them to target you with interest-based advertisements.

More & More Apps Have Started Using Ultrasonic Tracking Technology


In fact, while presenting research last week at the IEEE European Symposium on Security and Privacy, security researchers said they discovered 234 Android applications that ask permission to access your smartphone’s microphone to incorporate a particular type ultrasonic beacon to track consumers.
Moreover, the researchers found that 4 of the 35 retail stores they visited in Germany have ultrasonic beacons installed at the entrance.

According to investigators, SilverPush, Lisnr, and Shopkick are three SDKs that use ultrasonic beacons to send messages to the mobile device. While SilverPush allows developers to track users across multiple devices, Lisnr and Shopkick perform location tracking.

The researchers analyzed millions of Android apps and discovered few that were using the Shopkick and Lisnr SDKs, but there were much more that were using the SilverPush SDK.

Serious Privacy Concerns

ultrasonic-tracking-signals
Although cross-device user tracking technologies are currently being used for the legitimate purposes, it has already raised some serious privacy concerns.

Since an app requires no mobile data nor Wi-Fi connection, but only microphone access to listen to beacons, tracking works even when you have disconnected your phone from the Internet.

In fact, a team of researchers last year demonstrated that how ultrasonic sounds emitted by ads on a web page accessed through Tor can be used to deanonymize Tor users by making nearby phones or computers send identification information, such as location and IP, back to advertisers.
"The case of SilverPush emphasizes that the step between spying and legitimately tracking is rather small. SilverPush and Lisnr share essential similarities in their communication protocol and signal processing. While the user is aware of Lisnr location tracking, SilverPush does not reveal the application names with the tracking functionality," research paper reads.
In 2014, Snowden revelations disclosed that how spying agencies were tracking of This incident could also be another great example, showcasing how intelligence agency could use this ultrasonic cross-device tracking technology to track your movements across the country.


How can You Protect Yourself?


Since you can not stop ultrasonic beacons from emitting sound frequencies around you, the best way to reduce the chance of your smartphone listening for beacons and feed data to a third party is to simply restrict unnecessary permissions you have granted to the apps installed on your device.

In other words, use your common sense.

For example, Skype wants microphone access? Fair enough, as it is necessary for Skype to work as intended. But what about if an app for beauty or clothing store wants microphone access? No way.

To revoke such unnecessary app permissions, some Android phone manufacturers, like One Plus provide a feature called Privacy Guard that allowed its users to block unnecessary app permissions of certain apps on a smartphone that do not have anything to do with the primary function of the apps.

Navigate to Settings → Personal → Privacy → Privacy Guard. Now select any from the list of apps and edit unnecessary permissions you have granted it.

A similar feature has been included in Android 7. Navigate to Settings → Apps → App Permissions. Now edit the privileges you’ve granted each app.

For iOS 10 users: Go to Settings → Privacy → Microphone to see which apps have requested access to it, and which apps you have granted it to.

Read More

Beware! Don't Click that Google Docs Link You Just Received in Your Mail Otherwise Account Will Be Hacked

46 comments
google-docs-oauth-phishing-email
Thanx To THN
Did someone just share a random Google Doc with you?

First of all — Do not click on that Google Doc link you might have just received in your email and delete it immediately — even if it's from someone you know.

 people all around the Internet, especially journalists, are receiving a very convincing OAuth phishing email, which says that the person [sender] "has shared a document on Google Docs with you."
Once you clicked the link, you will be redirected to a page which says, "Google Docs would like to read, send and delete emails, as well access to your contacts,asking your permission to "allow" access.

If you allow the access, the hackers would immediately get permission to manage your Gmail account with access to all your emails and contacts, without requiring your Gmail password.
But How? The "Google Docs" app that requests permissions to access your account is fake and malicious, which is created and controlled by the attacker.

You should know that the real Google Docs invitation links do not require your permission to access your Gmail account.

Anything Linked to Compromised Gmail Accounts is at Risk


Once the app controlled by the attacker receives permissions to manage your email, it automatically sends same Google Docs phishing email to everyone on your contact list on your behalf.

Since your personal and business email accounts are commonly being used as the recovery email for many online accounts, there are possibilities that hackers could potentially get control over those online accounts, including Apple, Facebook, and Twitter.

In short, anything linked to a compromised Gmail account is potentially at risk and even if you enabled two factor authentication, it would not prevent hackers to access your data.

Meanwhile, Google has also started blacklisting malicious apps being used in the active phishing campaign.
"We are investigating a phishing email that appears as Google Docs. We encourage you to not click through & report as phishing within Gmail," Google tweeted.
This Google Docs phishing scheme is spreading incredibly quickly, hitting employees at multiple organizations and media outlets that use Google for email, as well as thousands of individual Gmail users who are reporting the same scam at the same time.

If by anyhow you have clicked on the phishing link and granted permissions, you can remove permissions for the fraudulent "Google Docs" app from your Google account. Here’s how you can remove permissions:

  1. Go to your Gmail accounts permissions settings at https://myaccount.google.com and Sign-in.
  2. Go to Security and Connected Apps.
  3. Search for "Google Docs" from the list of connected apps and Remove it. It's not the real Google Docs.
Stay tuned to our Facebook Page for more updates ! Stay Safe!


Update: Google Docs Phishing Scam Hits Nearly One Million Users

Google said that the last night's Google Docs phishing campaign affected "fewer than 0.1%" of Gmail users, which means nearly one million people were affected by it, handing over their email access to attackers.
Read More

Now Hacking Is Easy / Android Me 200kb Ka Linux ? App Overview "Turmex" Size Only 200kb

9 comments
Hello Guys , Welcome To Hax4Us
Hax4Us 
Dosto Aaj Hum Baat Karenge Ek Esi App Ke Baare Me Jo Aapko Ek Linux Environment Provide Karati Hai Aapke Android Mobile.

Esa Kya Special Hai Isme ?

Yes ,Dosto I know ki Linux ko android me install karne ke liye play store me kayi popular apps hai jese LINUX INSTALLER , DEPLOY etc but Dosto ye apps Linux to install kardeti hai but uske liye minimum 1.5 GB se 2 GB aapko expense karna padta hai and install hone ke baad 4 GB tak space spare leta hai....

But dosto ye app TERMUX only 200kb ki hai and ye koi additional data ni maangti ....

How To Install ?

Dosto Simply ise play store ya niche given link se download kare and meri video deke.

Video Me Kya Hai ?

Dosto Video mene complete overview diya hai , kese install kare and ek hacking tool bhi install kar ke dikhaya hai ....

So Watch And Enjoy Linux In Android Size Only 200kb.


Agar Post Me Video Play Nahi Ho Rhi Hai To Aap Niche Link Pe Click Karke YouTube Par Video Dekh Sakte Hai .

Click Here To Watch Video 

Post Achi Lagi To Comment Jarur Kare .
Read More