Welcome to Hack Only Evil ⚡ — where tech gets fun, clear, and creative!

I break down complex tech topics, scams, myths, and gadgets into easy, engaging videos. My goal isn’t just views — it’s to educate, entertain, and empower.

You'll find content on ethical hacking, digital awareness, tech history, cybersecurity tips, and more — all explained simply so you can learn and stay safe.

Not all videos are AI-generated. While I use tools like Veo 3 and AI narration, every idea is carefully planned, researched, and edited by me to ensure it's both valuable and fun.

🎬 All visuals, effects, and pacing are manually crafted using premium tools.

Always do your own research too — I aim for accuracy, but tech evolves fast.

If you're curious about how the digital world works — and want to protect yourself while enjoying the ride — subscribe and join the mission.


Affiliate links:

my.racknerd.com/aff.php?aff=16012



Hack Only Evil

Most people say “I have nothing to hide” when it comes to privacy
That belief is exactly what makes people easy targets online

This video explains why privacy is not about hiding crimes
It’s about control, predictability, and how small pieces of data are used to manipulate people

Scammers don’t hack devices first
They hack people

By understanding how data is collected, combined, and weaponized, you’ll see why “nothing to hide” is one of the most dangerous ideas in the digital age

If you use social media, apps, or the internet daily, this video is for you

Watch till the end and decide for yourself
Does privacy still matter, or is it already too late

https://youtu.be/3kmaRS5aDSU?si=yu29b...

1 month ago | [YT] | 4

Hack Only Evil

Most people think hackers target computers. They don’t. The real target is your phone. In this video, we break down how hackers spy on you, steal your identity, and take over your life using nothing but your phone number or a simple message. This is the truth most people never hear.

Watch how your device might actually be your enemy in disguise
https://youtu.be/shH-Gb4RNZ4

1 month ago | [YT] | 8

Hack Only Evil

Mark received a message on social media about a “high-paying remote job.” It looked legit—company logos, official emails, and even an “interview.”

He was asked to pay $150 for a “training kit.” Excited, he paid immediately. A week later, the company vanished. No job, no money.

Job scams like this exploit ambition and trust. Always verify company legitimacy, avoid upfront payments, and research reviews. Your dream job shouldn’t be your financial nightmare.

Share this story to warn others. Your support helps us keep scam awareness free for everyone.

#jobscam #hackonlyevil #scamalert #onlinesafety #cyberawareness

2 months ago | [YT] | 6

Hack Only Evil

How Ransomware Actually Locks Your Files

Most people don’t know their files can be kidnapped in seconds… literally.

Ransomware is a type of malware that encrypts your files and demands payment before unlocking them. Imagine waking up and every photo, document, and project is scrambled into unreadable code.

Here’s how it really works:

1. Infection
You open a fake attachment or unsafe link. The malware sneaks in quietly.

2. Encryption
It instantly scrambles important files using strong cryptography.

3. Ransom note appears
A message pops up demanding money—usually crypto—in exchange for a decryption key.

4. No guarantee
Even if you pay, many victims never get their data back.

5. Recovery is painful
Only backups or professional recovery tools can help.

Donors help keep this cyber education free for everyone. Your support helps reduce scams and protect more people online.
Follow & share for more.


#cybersecurity #ransomware #onlinesafety #dataprotection #techfacts #malwareawareness #cybereducation #scamalert #europeonline #securitytips

2 months ago | [YT] | 4

Hack Only Evil

5 Reasons Why Cyber Awareness Training Matters

The human brain is still the weakest link in cybersecurity.

1. Prevents phishing and social-engineering success.


2. Builds a culture of responsibility.


3. Reduces costly mistakes.


4. Increases compliance with regulations.


5. Turns employees into the first line of defence.



Cybersecurity starts with people — not firewalls.

Question: How often does your organisation refresh its cyber awareness training?

This free cyber education stays alive through those who support it.
Follow and share for more cyber wisdom.

#cyberawareness #training #infosec #securityculture #humanfirewall #cybersecurity #dataprotection #techlearning #onlinesafety #employeeeducation

2 months ago | [YT] | 9

Hack Only Evil

Scanner after losing a client 😂

2 months ago | [YT] | 5

Hack Only Evil

If you had to choose only one as the most dangerous online threat today, which would it be?

A) Romance scams ❤️
B) Investment scams 💰
C) Identity theft 🛑
D) Fake business pages 🛒

Defend your answer.
No wrong answers—this is based on what you’ve seen or experienced personally. Let’s discuss in the comments.

3 months ago | [YT] | 7

Hack Only Evil

DON'T BUY THIS PRODUCT!!

Please don't buy this product from TEMU!!

This is Crelendar company on TEMU, selling android devices.
According to Their description, they said the phone is 12gb ram (4+ 8 extended)
And the Storage is 512gb

I bought this phone, thinking it was true 🤔.
And the price was affordable, so maybe I thought it was a new company, and I love phones with large storage, I had my doubts but I need proof too.

To cut the story short.

I installed termux on it and nethunter (I used them for my recons since my PC got stolen)
The phone lags a little but I didn't really suspect because everything in the phone was showing the true size and RAM they said, including xender, cpuz etc.

I installed some tools in my nethunter, and sent some files in the phone, I tried installing another tool and it couldn't install, saying not enough space; available 200mb. I was surprised, I thought it was the allocated memory that was given to termux, I never knew It was the entire storage.
I began finding how to fix it, still thinking I had enough space like extra 400gb left 😹.

I checked my other redmi phone, and used the same command, it showed me my full memory 100gb. Then I thought 🤔, that means this one was the entire storage. I wanted not to believe it at first because I just couldn't accept it.
Anyways, I checked it with the command and it was showing 50gb. Wow 😹.

In recent years I've encountered fake phones with fake storages etc but those ones I don't need to even dive deep to find the original size, I just used xender and other few apps to check, but this one they edited it perfectly.

Now, I thought 🤔, if the storage could be faked, the ram as well is.
I searched on how to check the real RAM and voila;
The real RAM was 3gb ram. The extended is likely fake. Because no phone with 12gb ram will have 50gb storage.

Now, I checked the processor etc
The company said their GPU is Mali G71
Meanwhile the real one is Helio P23(Media Tek )

In summary,
If they can lie and fake these, how am I even sure that they haven't put any backdoor firmware, or hidden malware sending data silently.
I pray they didn't if not I'm cooked 😹.


The real storage is 50gb
Ram 3gb
Cores still 8(not even sure because I don't believe anything they said again 😹)
GPU Media Tek


I decided to post this in case you were planning on buying any of these products, I'm not saying you shouldn't buy, but what they showed isn't actually what is there. That's not a good start for a company (that's if they intend to stay long).

Mind you, they also have the mini one , they said it's 4gb ram. I have that one too, because when I bought this one, that one was given free as a gift 🎁.
So, be careful of the cheap phones you buy or want to buy. I always like trying new companies to see if they are trying, but seems all are not serious, that's why the top ones always stay on top because they give quality products. I guess I'll just have to manage it like that, till I get a new good tab or PC.

Tell me your experience from the gadgets you've bought before.

From finding how to increase my nethunter storage, I found This.
Stay safe guys.
Your one and only Friend.
Hackonlyevil.

3 months ago | [YT] | 6

Hack Only Evil

Which of the following situations should raise the most suspicion?
a) A friend suddenly messages asking for money urgently
b) A new Wi-Fi network appears named “Free Fast Internet”
c) A message from your bank asking you to verify your PIN via link
d) All of the above

3 months ago | [YT] | 6

Hack Only Evil

A small business owner received a call from someone claiming to be from her bank’s “security team.” The caller said her account showed “suspicious transfers” and needed quick verification. The voice was calm, professional, even used her full name and branch details.
He asked her to “confirm” her bank app login PIN — “just for verification.” Something about his tone felt urgent, so she gave it. Within minutes, she was locked out of her account.
She later discovered the scammer had cloned her bank’s phone ID — a trick called spoofing.
The painful part? She almost blamed herself until she learned how real the call sounded.
Lesson — banks never ask for PINs or OTP codes over the phone. Always hang up and call the official number yourself.


Would you have trusted that call if the number matched your bank’s? Share your gut reaction below.

3 months ago | [YT] | 4