Internet Security Blog - Hackology

Root Phone by Installing Android VM

Obtaining Android Root access gives additional features but It is at times not that simple and comes with the risks aswell. How about if you can get root access on your phone without actually rooting your device or going through all the long...

Google’s Keyboard Cursor slide – Best Hidden Feature

[sociallocker] All Smartphone users have experience to the situation where we are typing a message or email on our phone, notice a typo big enough that it needs to be fixed. The process of correcting our mistake involves our big fingers to tap at...

Zong Injecting Shady Code in User Web Traffic

Few months back it was Ufone injecting code into users web traffic by replacing Google Analytic Code. This time its Zong, a Cellular Company in Pakistan Owned by China Mobile performing even more unethical activity by injecting Malware code into...

Category - Technology