How to Root any Android device with Root Genius

Fastest and Easiest way to Root any Android device with Root Genius

Root Genius the quickest and easiest Root tool for Android devices

You want to root your Android smartphone to make your phone faster, remove bloatware, increase battery life, allow it to run more apps, custom software and ROMs which allow complete control over every aspect of your device by allowing superuser and admin level permission.

However, rooting isn’t for everyone. If you don’t know what a command prompt is or you have trouble handling .zip files, please do not use root tool. Also rooting can void your phone’s warranty so please make sure you follow instructions to the letter. Also, always backup your data before you proceed to root your Android smartphone or tablet!

Root Genius is one click root tool designed to work on Windows computer. It helps user to root their Android smartphone and tablet in single click. Here, we are going to guide you how to use Root Genius to root any Android smartphone or tablet.

Requirements: If you are using any Antivirus Application on your computer then disable it first then after follow the below tutorial.

How to use Root Genius to root any Android Device ::

  • Step 1: Enable USB Debugging on your Android Smartphone. To enable USB debugging, Open Settings > Developers Option > USB Debugging > Tick to Enable.
    (Developers Option is hidden for Android 4.2.2 or above, to show this option Go to Settings > About Phone > Built Number (Tap on it for 5-8 times).
  • Step 2: Download and Open Root Genius Application on your Windows Computer.
  • Step 3: Once Root Genius Application is launched, connect your Android device to the computer (with USB Debugging enabled).
  • Step 4: Once Your Smartphone is connected successfully to the computer, Root Genius will automatically detect your Android Device.
  • Step 5: Now, Click on the “Root Now” or “Root it” button to begin the rooting process.
  • Step 6: Now, Root Genius will automatically “Root” your Android Device and install the KingUser Application.
  • Step 7: Now your Android Device is Rooted. To check whether your phone is rooted correctly, open Applications Menu, there you will be able to see a new app installed, called KingUser. If this app exist then it means you have successfully rooted your device.

Before rooting Keep in Mind:
* No data loss process: Your Android Phone Data like contacts, pictures, videos, music etc will be not affected with this method but kindly take a backup to be on the safer side.
* Warranty Void: Your Android Device Warranty may be Void after following the above tutorial.
* How to unroot: To unroot your Device, Open KingUser on your Device > Settings > Remove Root Permission.
* Credits: Root Genius Application was created by SJRoot (Developer).
* If you have tried the above tool to root your Android device, please let us know if it works or not with your Device Model Name.

Download Root Genius v1.8.7 from here or here.

Kaspersky Lab hacked; hackers plant malware related to Duqu on the network

Kaspersky Lab hacked; hackers plant malware related to Duqu on the network

Kaspersky Lab breached, hackers plant a Duqu related ‘almost invisible’ malware

The world’s leading cyber security solutions provider, Kaspersky Lab has revealed that its systems have been breached by unknown hackers. The hackers then went on to plant a malware related to the dreaded Duqu family on its networks.

Kaspersky says that the hack attack was so sophisticated that it was almost impossible to find that the networks had been breached. Eugene Kaspersky, the company’s CEO described the attack as “almost invisible” and said the software was so sophisticated it could have cost $10m “maybe more” to build it and support it.

According to Kaspersky, the attack on it used three previously unknown zero-day vulnerabilities to breach its systems, and left very few traces in the aftermath. The malware was spread in the Kaspersky network through MSI (Microsoft Software Installer) files which are commonly used by system administrators to deploy software on remote Windows computers.  Interestingly the breach didn’t leave behind any disk files or change system settings, which made the hack detection extremely difficult.

Kaspersky security team detected the breach in the “early spring”, and described it as “one of the most sophisticated campaigns ever seen”. It says that from the looks of the attack, it seems to be meticulously planned and carried out by the same group that was behind the 2011 Duqu attack. The sophistication of the malware indicates that this may be a state sponsored campaign.

The malware was discovered when Kaspersky security team was testing a new antivirus product on its own network. Kaspersky said that all the three zero days exploited by the hackers to gain entry into it systems have been patched by Microsoft since the attack. The last remaining zero-day (CVE-2015-2360) was patched by Microsoft on 9 June (MS15-061) after it was reported by Kaspersky.

“Spying on cybersecurity companies is a very dangerous tendency,” said the company’s chief executive Eugene Kaspersky. “The only way to protect the world is to have law enforcement agencies and security companies fighting such attacks openly. We will always report attacks regardless of their origin,” he added.

The hackers targeted only the security research servers and ignored Kaspersky’s sales, marketing and legal departments, because they seemed to be interested in the Kaspersky’s research.

The firm said that the hack attack did not affect any of company’s products, technologies and services.

Malware posts NSFW images on FB Timeline and angers Facebook users

NSFW images posting malware attack leaves Facebook users red-faced

NSFW images posting malware attack leaves Facebook users red-faced

An attack caused by a malicious software (malware) which resulted in flooding of Facebook newsfeeds and timelines with NSFW videos and images has left hundreds of Facebook users across India embarrassed, requiring them to explain to their relatives and friends that they had nothing to do with it. On Wednesday, many of the users told TOI that they have not logged into their FB accounts fearing that the X-rated material might flood their posts and messages.

According to the cybercrime cell of Agra police, which claims to have noticed the attack first, was caused by a virus from the Kilim malware family, which has in turn led to such incidents elsewhere across the globe. “It began with a message on social media which stated ‘watch urgent, because it is your video’,” said cybercrime cell in-charge Nitin Kasana. “Every time someone clicked on the link, their entire timeline and inbox was spammed with NSFW material.”

Kasana added that the message contained a shortened ow.ly link that provided instructions to victims to go to another URL claiming it to be the Amazon Web Services page, which in turn led them to a malicious website (videomasars.healthcare). “This was used by crooks to verify the platform used by the victim, such as the desktop computer or mobile phone, and direct them to a different path depending on their machine,” Kasana said.

“Mobile users were redirected to affiliate pages that contain various offers, while desktop users were asked to download a file from a folder containing the malware. The file pretended to offer a collection of NSFW videos. The malicious file was a downloader for the Facebook worm, which comes in the form of a Chrome extension and additional binaries. The last part of the attack was to spread among the victims’ Facebook friends, by sending the lure message,” Kasana added.

The users are left embarrassed due to the attack. Immediately, many of them called their relatives and friends and alerted them not to click on the images or links as they had offensive material. Atul Verma, a Facebook user, told TOI, “I had to call and message over 50 people to inform them that my account has been hacked. I requested them not to open any files containing weird links. It was disgusting.”

Rakshit Tandon, cyber expert speaking to TOI warned, “One should be extremely careful and inspect any link, specially shortened URLs, before clicking on them. Several thousands of Facebook accounts were subjected to the spam attack globally, including some parts of India, via NSFW malware, which unleashed massive quantities of violent and NSFW images across users’ newsfeeds.”

Tandon advised that one should immediately reset his social network account password, take off all the Facebook apps from Facebook they are aware of, remove any extensions that is not needed from their web browser by going into Setting/Options. “Finally, every user should mark unknown links as spam, so that Facebook can take it down automatically,” he added.

Police officials said TOI that the cybercrime unit is in contact with Facebook’s headquarters in the US. However, a reply with more additional details from Facebook would take some time.

This Simple Text Message Can Crash and Reboot Your iPhone

iphone-crash

A newly discovered bug in Apple’s iOS mobile operating system has emerged this evening that lets iPhone users crash another user’s iPhone by just sending a tiny string of text characters in a message.
The bug is related to the Messages app and the notification system used by iPhone and iPad devices and appears to work only if there is iPhone to iPhone communication.
A string of particular Arabic characters (see the image above) used in the text message causes the iPhone to continuously crash when a certain text is received and — reportedly in some cases — causes the iPhone to reboot without notice.

How to Crash an iPhone with a Message:

iPhone users who receive the string of text characters with Messages open would not be able to go back to other conversations without crashing the app, but…
…if the string is received while the iPhone is on the lock screen, users would be unable to open the Messages app entirely, or in some cases, the text could cause the iPhone to reboot without any notice or explanation.

People Exploiting Bug to bother others:

Users have already started using this forbidden string for the evil purpose. After appearing first on Reddit, the weird string of text characters has been started exploiting by people, sending the text to other iPhone users to block them from seeing Messages from other recipients.
The bug does not occur accidentally since the string of characters is a very specific set of Unicode characters, and many have fallen victims to this new Unicode character bug.

Some Workarounds to Undo the Effect:

However, there are several workarounds that can undo the damage. The effect can be undone by sending another message (any normal text) to the person who sent you the malicious string, canceling out the initial strand.
Another option is to send the person who sent the the string a message using the share sheet by simply pressing the “share” button in other apps, or send yourself a message via Siri, or ask Siri to “send a message” to whoever sent it.

This Simple Message Can Crash Skype Badly and Forces Re-Installation

skype-crash-text

Just last week iPhone and iPad users were dealing with an iOS text bug that caused the app to crash and iPhones to reboot, now a similar bug has been found that takes out Skype — the popular video chat and messaging service.
Yes, Microsoft-owned Skype VoIP client is also affected by a bug that crashes almost every single version of the Skype client on both desktops and mobile phones with a single message containing just eight characters.
Also:
The impacts are so bad that it requires a re-install in order to get things working hitch-free again.

Just Send ‘http://:’ and Crash Skype

If a user receives a message during a conversation on Skype containing the text string “http://:” (without the quotes), it reportedly crashes Skype when running on Windows, Android, or iOS operating system, according to reports on Skype forums.
However, Skype app for Mac and the modern touch-optimized version of Skype app for Windows 8.1 are reportedly unaffected by the bug.
The nasty bug was first reported by a user, who goes by the handle Giperion, who noted that sending “http://:” would crash the Skype app endlessly for the sender of the message containing the specific text string, as well as the receiver.
On the forums, a spokesperson for Skype has confirmed the existence of the bug and written that they are “aware of the problem and are working to provide a resolution.”
VentureBeat tested out the bug on Skype for Android, Windows, and iOS and confirmed that it works, saying, “Skype for Android and iOS both fall into endless crash loops.”

Skype crash Bug is more annoying than iOS crash bug:

The bug is actually more annoying than the iOS crash bug, as there is no simple workaround to the problem like in the case of iOS bug where you have to just another message to cancel out the initial strand.
Deleting your chat history also won’t work, as Skype re-downloads this data from the cloud every time you start the app. Thus, it will spot the troublesome string of characters and crashes the app all again.

Workaround – Install Older version of Skype


Until now, there is just one best workaround in forums to overcome the problem is to ask the people who sent you the text message to delete it, and then to install an older version of Skype, which is bug-free, instead the new version.
Hopefully, the company will release a full fix for the bug quicker than Apple.

Android M vs Android Lollipop: A visual comparison

Android M vs Android Lollipop: A visual comparison

A little less than a year after Android Lollipop was announced at I/O 2014, Google took to the stage just five days ago and made its successor, Android M, official. Mind you, like before, we’re talking about nothing more than a developer preview — hence the M name — and we’re told to expect three updates to the build within that window.

In short, technically speaking, none of the features you see in Android M right now are certain to stay. That means Android Pay may go, Now on Tap may be reverted, and even the new app permissions system might get scrapped. Of course, the far more likely scenario is that most of what we have already will be a part of Android M’s commercial release, save for a few tweaks and changes. That’s precisely why we wanted to take a side-by-side look at M and compare it with the now older Android Lollipop build.
Quite a bit has changed in Android M already, despite it being mostly focused on the user experience. Various settings menus have been tweaked or completely reworked, some apps have benefited from extra functionality, and a few essential interface elements have changed their underlying behavior — like the app drawer and widgets panel. For the most part, we feel Google is making changes for the better, but feel free to see for yourself and disagree.
Android Lollipop always on left; Android M always on right.

Android M vs Android Lollipop: A visual comparison

1. Lock screen

Shortcut for Phone replaced by a shortcut to Google Now
Lock screen

2. App drawer

App drawer now vertical, with a ‘Favorites’ dock on top and a search function.
App drawer

3. Notifications panel

Notifications panel now includes a quick toggle to trigger DND mode on and off.
Notifications panel

4. DND mode

DND mode is no longer activated by lowering volume all the way down — instead, you do it through the notifications panel.
DND mode

5. Widgets pane

Like the app drawer, the widgets pane has also gone vertical.
Widgets pane

6. Google Now

The Google Now inquiry screen now includes the four apps from your ‘Favorites’ dock found within the app drawer.
Google Now

7. Calculator

Calculator’s functionality slightly expanded.
Calculator

8. Clock

Brighter white used for the font within the Clock app’s settings menu; new feature lets you set a start day for the week.
Clock

9. New contact

New contact creation window re-worked. Tapping on ‘More Fields’ reveals the rest.
New contact

10. Google Keep

New note creation changed from the Material Design-esque circle to a more standard bar. This change will probably be reverted.
Google Keep

11. Google Maps

Google Maps has seen some improvements — upon initial location lock, the app now pushes a small bar containing your current location to the bottom. When looking around any area on the map, the app now gives ‘Around X’ suggestion, which reveals…
Google Maps

12. Google Maps’ new ‘Around X’ feature

Suggestions including restaurants, leisure, museums, sports, etc.
Google Maps' new 'Around X' feature

13. Google Maps’ new ‘Around X’ feature

You can filter results by the time of date, if you want to.
Google Maps' new 'Around X' feature

14. Phone app

The Phone app has seen some small tweaks with the tab indicators — instead of text, those have been reverted to icons.
Phone app

15. Phone app

The call log looks different, too.
Phone app

16. Phone app

The settings menu of the Phone app has also been re-organized, with more options available at a first glance instead of buried within submenus.
Phone app

17. Settings

A new ‘Google’ menu has been added to the root Settings menu, containing all the options previously available with the stand-alone Google Settings app.
Settings

18. Dark theme for the settings

A new setting, available through Developer options, allows you to set the theme to Light, Dark, or Automatic. As you can guess, you’re looking at Dark, while Light looks alike to what we have in Lollipop already. Automatic switches between the two depending on the time of day.
Dark theme for the settings

19. SystemUI tuner

New ‘SystemUI tuner’ setting within Developers options spawns a submenu inside the root Settings menu. It allows you to customize the quick toggles within your notifications panel.
SystemUI tuner

20. Sounds & notifications

The Sounds & notifications menu has seen some small changes, the most interesting of which is the switch to a non-white background. This extends to all submenus within the root Settings menu.
Sounds & notifications

21. Internal storage

Storage section now dubbed Internal storage; new gray background also seen.
Internal storage

22. Apps menu

The apps menu has also been re-worked — horizontal tabs, for example, are gone.
Apps menu

23. Apps menu #2

But that’s not all — the new menu now includes many more options, including the ability to easily set your default apps for various categories.
Both screenshots from Android M.
Apps menu #2

24. Apps menu #3

App permissions have also been revamped, and you can now easily control which apps have access to what, and revoke that privilege at will.

Both screenshots from Android M.

Apps menu #3

25. Apps menu #4

Lastly, a new ‘Memory’ tab lets you monitor the needs of your apps.
Apps menu #4
  • Show menu
  • Home
  • News
  • Android M vs Android Lollipop: A visual comparison

Android M vs Android Lollipop: A visual comparison

Posted:02 Jun 2015, 03:37, by Chris P.

Tags:

Android M vs Android Lollipop: A visual comparison
A little less than a year after Android Lollipop was announced at I/O 2014, Google took to the stage just five days ago and made its successor, Android M, official. Mind you, like before, we’re talking about nothing more than a developer preview — hence the M name — and we’re told to expect three updates to the build within that window.

In short, technically speaking, none of the features you see in Android M right now are certain to stay. That means Android Pay may go, Now on Tap may be reverted, and even the new app permissions system might get scrapped. Of course, the far more likely scenario is that most of what we have already will be a part of Android M’s commercial release, save for a few tweaks and changes. That’s precisely why we wanted to take a side-by-side look at M and compare it with the now older Android Lollipop build.
Quite a bit has changed in Android M already, despite it being mostly focused on the user experience. Various settings menus have been tweaked or completely reworked, some apps have benefited from extra functionality, and a few essential interface elements have changed their underlying behavior — like the app drawer and widgets panel. For the most part, we feel Google is making changes for the better, but feel free to see for yourself and disagree.
Android Lollipop always on left; Android M always on right.
Android Pay

27. Network settings reset

A new option is available within the Backup & reset menu: Network settings reset. This will reset your WI-Fi, cellular data, and Bluetooth settings.
Network settings reset

Sony Is About to Dramatically Improve the Playstation 4

Sony Corp. PlayStation 4 As Game Console Goes On Sale In U.S.
Bloomberg—Getty Images A logo sits on the front of a Sony PlayStation 4 (PS4) games console, manufactured by Sony Corp., in this arranged photograph taken in London, U.K., on Friday, Nov. 15, 2013.

It could solve one of gamers’ biggest gripes

A better version of the Playstation 4 may be on the way. A new FCC filing appears to reveal two new versions of Sony’s popular PS4. One of the new models would be the first to come with a 1-terabyte hard drive inside. That’s twice the size of the current drive.

With users increasingly opting to purchase software digitally, built-in drives can fill up quickly. A triple-AAA title can easily reach 30 gigabytes to 40 gigabytes.

Forum users have noticed that the new Playstations are different in several other ways, as well. They are slightly lighter and use less power than the most recent PS4 revisions. That is likely the result of a more efficient design. But the systems appear to lack support for 5 gigahertz WiFi, something gamers have been clamoring for.

MORE: Nintendo Just Revealed a Ton of New Games

The revamped consoles are likely to be revealed on June 15 at Sony’s E3 2015 event.