БЛОГ

Archive for the ‘mobile phones’ category: Page 150

Aug 12, 2019

Pre-installed apps in 7 million Android devices found containing malware

Posted by in categories: cybercrime/malcode, mobile phones, surveillance

Security researchers from Google’s Project Zero team recently uncovered pre-installed apps in Android devices that either allowed remote attackers to carry out remote code execution, could disable Google Play Protect in devices, or could collect information on users’ web activities.

At the Black Hat cybersecurity conference in Las Vegas, Maddie Stone, a security researcher on Project Zero and who previously served as Senior Reverse Engineer & Tech Lead on Android Security team, revealed that her team discovered three instances of Android malware being pre-installed in budget Android phones in the recent past.

One such pre-installed app was capable of turning off Google Play Protect, the default mobile security app in Android devices, thereby leaving devices vulnerable to all forms of cyber attacks or remote surveillance. The Project Zero team also found an app pre-installed on Android phones that gathered logs of users’ web activities.

Aug 12, 2019

Samsung Galaxy Note 10 Hands On

Posted by in category: mobile phones

Samsung Galaxy Note 10 and Galaxy Note 10 Plus hands on.
dbrand — https://dbrand.com/unbox
Promo code: UNBOX
Deal: 20% off everything

This is my Samsung Galaxy Note hands on video. The Note 10 (Plus) represents Samsung’s top tier smartphone offering packing a 6.8-inch AMOLED display and up to 12GB of RAM.

Continue reading “Samsung Galaxy Note 10 Hands On” »

Aug 9, 2019

Android malware that comes preinstalled is a massive threat

Posted by in categories: cybercrime/malcode, mobile phones

The Android Security team’s former tech lead, who’s now a security researcher on Google’s Project Zero, breaks down why.

Aug 8, 2019

Manipulating brain cells

Posted by in categories: biotech/medical, engineering, mobile phones, nanotechnology, neuroscience

Researchers have developed a soft neural implant that can be wirelessly controlled using a smartphone. It is the first wireless neural device capable of indefinitely delivering multiple drugs and multiple colour lights, which neuroscientists believe can speed up efforts to uncover brain diseases such as Parkinson’s, Alzheimer’s, addiction, depression, and pain. A team under Professor Jae-Woong Jeong from the School of Electrical Engineering at KAIST and his collaborators have invented a device that can control neural circuits using a tiny brain implant controlled by a smartphone. The device, using Lego-like replaceable drug cartridges and powerful, low-energy Bluetooth, can target specific neurons of interest using drugs and light for prolonged periods. This study was published in Nature Biomedical Engineering.

“This novel device is the fruit of advanced electronics design and powerful micro and nanoscale engineering,” explained Professor Jeong. “We are interested in further developing this technology to make a brain implant for clinical applications.”

Aug 7, 2019

AT&T Workers Installed Malware on Company Network for Cash

Posted by in categories: business, cybercrime/malcode, mobile phones

For five years, several AT&T employees were conspiring with a Pakistani man to install malware on company computers so that man could unlock millions of smartphones subsidized by the carrier, according to federal investigators.

On Tuesday, the Justice Department unsealed an indictment against Muhammad Fahd for bribing AT&T employees at a call center in Washington state to pull off the scheme. According to the feds, Fahd allegedly paid more than $1 million in bribes to the AT&T employees during the conspiracy, which allowed him to fraudulently unlock more than 2 million AT&T phones from 2012 to 2017.

Fahd allegedly partnered with businesses that offered cell phone unlocking services in exchange for a fee. These unnamed business would then supply him with the IMEI numbers of the phones bound to AT&T’s network.

Aug 6, 2019

Scientists can now manipulate brain cells using smartphone

Posted by in categories: biotech/medical, genetics, mobile phones, neuroscience

A soft neural implant that can be controlled by a smartphone is capable of drug delivery and optogenetics. The technology could speed up efforts to uncover the causes of neurological and psychological disorders.

Aug 5, 2019

A Multimillionaire Surveillance Dealer Steps Out Of The Shadows… And His $9 Million WhatsApp Hacking Van

Posted by in categories: cybercrime/malcode, mobile phones, surveillance

He can hack your WhatsApp, find out where you are in 15 minutes and monitor your iPhone. But Tal Dilian says he’s one of the good guys. It’s badly-behaved governments who should be in trouble, not the $12 billion industry he’s come to represent.

Aug 5, 2019

Frozen heads and future fortunes: what is the cost of digital information?

Posted by in categories: economics, mobile phones

With a seemingly infinite amount of knowledge available to us at the tap of a smartphone, we all take digital information for granted. But when it can be replicated at zero cost, how do the economic laws of supply and demand work, especially in the context of using digital currency?

Aug 4, 2019

The Futuresist Cure: Notes from the Front Lines of Transhumanism

Posted by in categories: biotech/medical, computing, mobile phones, transhumanism

On the heels of my latest New York Times OpEd, which is in print today on page 4 of the NYT Sunday Review, I’m excited to share my brand new book: The Futuresist Cure: Notes From the Front Lines of #Transhumanism. It’s a collection of my best essays on the future, many re-adapted, and many which have helped shape our movement. It’s #FREE today on Amazon in #Kindle. Or get the paperback version. There’s a foreword by the late Jacque Fresco. Download the book for FREE today!


Enter your mobile number or email address below and we’ll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer — no Kindle device required.

Aug 3, 2019

How to Hack a Face: From Facial Recognition to Facial Recreation

Posted by in categories: cybercrime/malcode, information science, mobile phones, privacy, robotics/AI, surveillance

Given that going viral on the Internet is often cyclical, it should come as no surprise that an app that made its debut in 2017 has once again surged in popularity. FaceApp applies various transformations to the image of any face, but the option that ages facial features has been especially popular. However, the fun has been accompanied by controversy; since biometric systems are replacing access passwords, is it wise to freely offer up our image and our personal data? The truth is that today the face is ceasing to be as non-transferable as it used to be, and in just a few years it could be more hackable than the password of a lifetime.

Our countenance is the most recognisable key to social relationships. We might have doubts when hearing a voice on the phone, but never when looking at the face of a familiar person. In the 1960s, a handful of pioneering researchers began training computers to recognise human faces, although it was not until the 1990s that this technology really began to take off. Facial recognition algorithms have improved to such an extent that since 1993 their error rate has been halved every two years. When it comes to recognising unfamiliar faces in laboratory experiments, today’s systems outperform human capabilities.

Continue reading “How to Hack a Face: From Facial Recognition to Facial Recreation” »