phone

Mon
14
Oct
John Lister's picture

Android Malware Changes Own Icon to System Apps

Malware creators are using new tactics to avoid their malicious Android apps being exposed. The scam involves hiding and even disguising apps as legitimate ones once they've been installed. Fake Apps Receive Fake Praise It's a twist on a ... well-established scam in which malware is distributed through apps that appear to perform a basic function such as reading QR codes, or turning the camera flash into a flashlight. Thanks to a host of bogus rave-reviews in the Google Play store, the only way to spot something is amiss is that the apps will ask for specific access permissions that are clearly ... (view more)

Wed
02
Oct
John Lister's picture

Major VOIP Security Flaws Discovered in Android

Researchers say they discovered eight security flaws in the way Android handles voice calls through the Internet. Unlike most such bugs which involve specific apps, these problems were with Android itself. The good news is that the researchers ... reported all of the bugs to Google while carrying out the project and most have now been fixed. However, it does raise concerns about the development and design of the system itself. (Source: github.io ) The researchers looked at the three latest Android versions (7, 8 and 9), specifically addressing the components that allow Voice Over Internet ... (view more)

Thu
23
May
John Lister's picture

Apple Vows Clearer Information on Slowed Phones

Apple has promised to warn users when a software update could slow down their iPhone or decrease battery life. It follows concerns from a government agency. The effects of iOS updates on phone performance has long been a controversial topic for ... Apple. Critics accused it of deliberately limiting the performance of older phones to encourage users to upgrade to newly released handsets, with some even producing what they called "diagnostic evidence." Apple has always denied this accusation. It says reduced performance such as decreasing battery life may simply be the cumulative effect ... (view more)

Wed
15
May
John Lister's picture

Researchers: Android Bloatware a Security Risk

Unwanted pre-installed software on Android devices often poses privacy and security risks according to a new study. That's because the so-called "bloatware" often by-passes Google's vetting process. One of the key selling points, or big drawbacks - ... depending on your perspective - of the Android operating system is that phone and tablet makers can customize their own devices, through the user interface and the apps that appear when a new device is first powered on. That's different from systems such as Apple, where both the hardware and software are controlled by the same company . The study ... (view more)

Thu
02
May
John Lister's picture

Report: Most Of World Now Online

More than half of the world's population now has Internet access according to newly-published estimates. The figures also suggest there are more mobile phones than people worldwide. The estimates come from the International Telecommunications Union ... (a specialized agency of the United Nations), and the World Bank. (Source: itu.int ) While most of the figures relate to subscriptions, the overall Internet use number is for individual people. The estimate has 51.2 percent of people online as of the end of 2018, with dramatic growth in Internet access in Africa helping reach this milestone. ... (view more)

Wed
13
Mar
John Lister's picture

Apple Wants To Block Police Phone Tracking

Apple wants to patent a technology that would make it harder for police to track people's location through their phone. The technology wouldn't make messages and calls secret, but rather make it harder to prove who owned the phone in question. The ... patent is for end-to-end encryption for the mobile subscriber identification number (MSNI). That's part of a longer number that also identifies the country and mobile network a phone is registered to What's important here is that the MSNI identifies the specific handset. Police could then force a mobile carrier to hand over the ... (view more)

Tue
26
Feb
John Lister's picture

New Energizer Phone Has Beast of a Battery

Energizer has made a smartphone that is not surprisingly all about the battery. Though to be fair, it's got six times the capacity of some leading models. The few people who've seen the phone say it's bordering on impossibly big, but that it does ... provoke debate about the way phones suck up electricity. The Android-based handset is called the Energizer Power Max P18K Pop. It has a battery capacity of 18,000 mAh. To put that into context, it's three times more than a Motorola phone that's specifically marketed around long battery life. It's also around six times more than many flagship Android ... (view more)

Thu
14
Feb
John Lister's picture

Popular VPN App Laced with Malware, Steals Data

Security researchers have warned a notorious piece of malware has returned to Android. It's in disguise, posing as a legitimate and popular VPN application. Researchers at the security firm Bitdefender have dubbed the malware as "Triout," which was ... first spotted last August. It's a particularly nasty piece of malware as it carries out multiple hostile acts. (Source: bitdefender.com ) These include recording phone calls, reading incoming SMS messages, taking pictures and videos, and collecting location data such as GPS coordinates. Triout is designed to operate without being detected ... (view more)

Tue
29
Jan
John Lister's picture

Malware Makers Set Sights On Motion Sensor

An extremely creative form of malware on Android devices uses motion sensors to help stay undetected. It's designed to combat one of the key methods used by malware scanning tools. Trend Micro says it found the malware hidden in two Google Play ... Store apps named "BatterySaverMobi" and "Currency Converter," which claimed to provide functions as their names suggest. (Source: arstechnica.com ) Once installed, the apps downloaded malware in the background, then used a fake system update message to trick the user into giving permission to install it. The malware, named " ... (view more)

Wed
16
Jan
John Lister's picture

Court Rules Against Forced Fingerprint Unlock

A judge says police can't force a suspect to unlock a phone with a fingerprint or other biometric measure, including a suspect's face . It's the latest step in the way privacy laws interact with technological changes. This ruling came from a federal ... judge in a court in California and involved a review of a search warrant request. The case involved two suspects allegedly using Facebook Messenger to trying to extort a victim by threatening to publish an embarrassing video. (Source: gizmodo.com ) The police wanted permission to not only search a location where they believed they would find the ... (view more)

Pages

Subscribe to RSS - phone