Welcome to nsane.forums

Welcome to nsane.forums, like most online communities you need to register to view parts of our community or to make contributions, but don't worry: this is a free and simple process that requires minimal information. Be a part of nsane.forums by signing in or creating an account.

  • Access special members only forums
  • Start new topics and reply to others
  • Subscribe to topics and forums to get automatic updates

Search the Community

Showing results for tags 'Smartphone'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Found 115 results

  1. Your Samsung, LG, Xiaomi, or other Android smartphone could be pre-loaded with malware Despite being based on the very secure Linux kernel, Android isn't necessarily a very secure operating system. Unlike iOS which does a great job of shielding its users from installing apps from outside Apple's own App Store, it is far too easy to do so on Google's mobile OS. Also, there is nothing requiring manufacturers to issue device updates, meaning many users are forced to use outdated and vulnerable versions of the operating system. For the most part, however, Android users can remain safe by acting intelligently, such as only installing apps from the Play Store. Well, that might not be so true anymore. You see, it has been discovered that many models of Android smartphones -- from manufacturers such as Samsung, LG, and even Google's own Nexus line -- are being sold with malware pre-installed. This is particularly bad malware, as it can steal user information. Some devices even came pre-loaded with ransomware! "The Check Point Mobile Threat Prevention has recently detected a severe infection in 38 Android devices, belonging to a large telecommunications company and a multinational technology company. While this is not unusual, one detail of the attacks stands out. In all instances, the malware was not downloaded to the device as a result of the users' use, it arrived with it," says Oren Koriat, Check Point Mobile Research Team. Koriat further says, "According to the findings, the malware were already present on the devices even before the users received them. The malicious apps were not part of the official ROM supplied by the vendor, and were added somewhere along the supply chain. Six of the malware instances were added by a malicious actor to the device’s ROM using system privileges, meaning they couldn’t be removed by the user and the device had to be re-flashed." Check Point shares the following make and models of Android devices, plus the associated infected APK. Smartphone Malware APK Asus Zenfone 2 com.google.googlesearch Google Nexus 5 com.changba Google Nexus 5 com.mobogenie.daemon Google Nexus 5X com.changba Lenovo A850 com.androidhelper.sdk LenovoS90 com.google.googlesearch LenovoS90 com.skymobi.mopoplay.appstore LG G4 com.fone.player1 Oppo N3 com.android.ys.services OppoR7 plus com.example.loader Samsung Galaxy A5 com.baycode.mop Samsung Galaxy A5 com.android.deketv Samsung Galaxy Note 2 com.fone.player0 Samsung Galaxy Note 2 com.sds.android.ttpod Samsung Galaxy Note 3 com.changba Samsung Galaxy Note 4 com.kandian.hdtogoapp Samsung Galaxy Note 4 com.changba Samsung Galaxy Note 4 air.fyzb3 Samsung Galaxy Note 5 com.ddev.downloader.v2 Samsung Galaxy Note 8 com.kandian.hdtogoapp Samsung Galaxy Note Edge com.changba Samsung Galaxy Note Edge com.mojang.minecraftpe Samsung Galaxy S4 com.lu.compass Samsung Galaxy S4 com.kandian.hdtogoapp Samsung Galaxy S4 com.changba Samsung Galaxy S4 com.changba Samsung Galaxy S4 com.mobogenie.daemon Samsung Galaxy S7 com.lu.compass Samsung Galaxy Tab 2 com.armorforandroid.security Samsung Galaxy Tab S2 com.example.loader vivo X6 plus com.android.ys.services Xiaomi Mi 4i com.sds.android.ttpod Xiaomi Redmi com.yongfu.wenjianjiaguanli ZTE x500 com.iflytek.ringdiyclient It is important to note that the phones are not coming from the manufacturers with the malware installed. Instead, third-party retailers (or their suppliers) are pre-loading malware on the devices, which are sold to unsuspecting consumers. In other words, if you purchased your phone new from a trusted retailer like Best Buy, for example, then you should be fine. If you bought a phone from, say, eBay or Craigslist, you could be infected -- but it is not a guarantee. To make matters worse, the malware cannot be easily removed -- an app cannot do it, sadly. Check Point found that the phones must be re-flashed entirely, with a clean version of the OS. This is likely beyond the capabilities of the average consumer. Article source
  2. anyone interested to know more about latest samsung? after what samsung yet to face from note7, do you think this time it will fix the problem? Site: http://www.leaksamsung.com Sharecode[?]: /2017/02/probably-best-leak-of-samsung-galaxy-s8.html
  3. Try These Cool Android Smartphone Hacks And Get The Best Out Of Your Mobile Here are some of the best Android smartphone hacking Apps Android is undoubtedly the world’s most popular mobile operating system. With over 1.5+ billion plus users, Android is way ahead of iOS. Similarly, in Apps space, Android hacking apps are also increasing. Many of these hacking Apps are meant for pros but some can become useful to you also. With such hacking Apps, you can remove unnecessary bloatware utilizing most of the internal storage memory. While other times, such hacking App may help you remove irritating ads or allow you to access blocked system Apps. We bring you such hacking Apps which let you get the best out of your Android smartphone. Remember most of these Apps require a rooted smartphone to try them out. INCREASE RAM Root your phone. Download ROEHSOFT RAM EXPANDER from Google Play Store. Convert desired amount of SD card space into system swap RAM. This will make apps perform better when you have lot of storage area in your SD card. Wi-Fi WPS/WPA TESTER Download WIFI PS/WPA Tester App from Google Play Store. It let’s you analyze your WiFi security and others in the vicinity and attempts to hack their password It only hacks WPS enabled WiFi networks. REMOVE UNWANTED SYSTEM APPS OR BLOATWARE Root your android phone and Download sSystem app remover (ROOT) from Google Play Store. Remove many unwanted inbuilt Apps which you don’t think are necessary from internal storage of your Android phone.\ HACKING HUB Download the app Linux Deploy from Google Play Store. This installs Linux Operating system on your Android phone. Then use use Aircrack and other hacking Apps on your phone to hack WiFi and website passwords. FREE STUFF Root your phone Download and install BusyBox App from Google Play Store. Install modded Play Store from Lucky Patcher. With Lucky Patcher App you hack in-App purchases and get free stuff or game coins ACCESS BLOCKED CONTENT Download CyberGhost App from Google Play Store. Use it to connect to a VPN of a country of your choice. Now you can download apps from Google Play Store which are blocked in your country and also use websites like torrent websites blocked in your country. BATTERY LIFE Root your phone Download Greenify App from Google Play Store Hibernate many user and system apps. Greenify allows you to hibernate apps that won’t use battery and memory in background. So, you can save battery life and RAM. BUILD PROP EDITING Most of the Android smartphones out promise you 8MP images but in fact deliver only 6MP picture quality on 8MP camera. If you are facing a similar issue, you can solve it using this hack. This also requires a rooted smartphone. Download BuildProp Editor App from Google Play Store. Goto –>add entry Ro.ril.max.jpeg.quality. And set it’s value to 100 so it looks like Ro.ril.max.jpeg.quality = 100 Once done, your 8MP smartphone camera will deliver you 8MP images TUBEMOTE Download Tubemote from Google Play Store. Now you can download any and all online videos, not just from YouTube but any website in your desired resolution and quality at high speeds. You can also download just mp3 or m4a sound files from videos. ANDROID ID CHANGER Root your phone. Download Android Device ID Changer App from Google Play Store. Change your Android ID, which apps use to identify you and restart the phone. Your Android smartphone has a new Android ID. DRIVEDROID Download Drivedroid App from Google Play Store. Once installed, open the App and download LINUX.iso file from the dropdown menu. Burn this image on your phone and use it as CD or USB drive to boot your PC. KABOOM THE SELF DESTRUCTING APP Download and install Kaboom App from Google Playstore This App lets you control the photos and messages you post online. You can use this App to make the images and posts disappear at a set time. FAKE LOCATION Download Fake Location GPS App from Google Play Store Go to —> Settings Tap on Build Number 7 times to unlock Developer Options. Enable Mock Locations. Open Fake Location GPS app and set your location to any place in the world you wish. Source
  4. Android User Locked Out Of Google After Moving Cities Image Courtesy: Techworm An Android user has been locked out of his Google account apparently because he moved cities, according to a post on Reddit. The explanation offered by Google support staff was that since his address details differed, billing information with Google wasn't current and hence the user's purchases could look fraudulent. The user in question does not know for sure that this is the reason; during his interactions with Google support to find out why he had been locked out, he was told that When asked what he could do, he was initially directed by Google staff to a site where he had to scan his driver's licence and credit card and told that he would have to wait 24 hours to get his account unlocked. But after this time passed, he was told that the account would not be unlocked and Google would not tell him why. He was advised to abandon his old account and start a fresh one. However, this meant he could not use the credit card that he had used on the old account and would have to obtain a new one to continue using Google's services. All his previous purchases would not be transferred to the new account, he was told. An email he sent to Google support resulted in the following reply: Source
  5. No doubt smartphone plays a vital role in our life and no matter what age group you belong to and in what profession you are, you must be using it like 24/7. Am I wrong? Smartphone has eased our lives in numerous ways. Since the mobile technology has completely engraved into life, we spend a lot of time on smartphone and tablets. You can save anyone’s number, dial it anytime and can have video or audio conversation, with Instant messaging apps, you can stay in touch with the person you want all the time. Internet utility has made smartphone the gem. Search for anything, buy products online, play games, watch movies, listen to music, pay online bills, book your flight tickets and what not. You can do anything you can think of. With such advantages, do you ever wonder if you are losing something? Well, these smart devices are not so smart when it comes to our health. There can be many health problems and diseases from your loving smartphone or tablet. Not only that it affects our posture but while using smart devices we are exposing ourselves to constant radiations. Almost everyone is addicted to their smartphone and it is unknowingly destroying health in a number of ways that you need to know. Here are some health risks of mobile phone that you must know. Have a look. 15 Diseases you can get from your smartphone 1. Sleeping Disorder Somehow in the busy and hectic schedule, the favorite chatting and gossiping time for adults has turned out to be night-time where they can freely talk to their boyfriend/girlfriend or friends in general. Not only that even for social freaks, it is too hard to put phones away at night as to watch the one last video or read one more article or not to miss out something important. . But the only trouble with the technology is that it doesn’t match well with sleep. Using smartphone or tablet until late nights or getting awake in the middle of the night because of mobile’s ring or vibration are the factors that interrupt our the sleep pattern. Many times we wake up in the middle of the night and check our phone and if there is a notification or Facebook update we start checking it. Sometimes it even takes 1-2 hours off our sleep time. It has happened to me a lot of times. 2. Hearing Impairment You might have seeing people with the earphone plugged in so that they could enjoy their time and never get bored. Walking with earphone plugged in on roads, streets is risky. Even most of the people have the habit of talking on phones for hours. According to a study talking on phone for more than two hours can harm your health and impair your hearing. . 3. Eye problems The health hazard that every youth is suffering from. Smartphone is used to read e-books, web surfing, texting and chatting like from day time to late night. The small screen of smartphone and small font type puts strain on eyes especially when you to do this thing at night by keeping all the light of your room turn off. When you look at your smartphone screen with one eye, it makes the eye temporarily less sensitive to regular light other than other eye. This could cause dry eyes, pain, irritation, puffiness and reddening. 4. Skin Allergies Nowadays, smartphone comes with typical metallic body to make it look more attractive and shiny. These smartphone contain skin allergies from metals like nickel, chromium and cobalt which may cause a reaction on skin called allergic contact dermatitis. Even the smartphone carries much more bacteria than anything and that dirt may accumulate and cause breakouts on your skin. 5. Dark Spots Remember talking to your high school or college boyfriend/ girlfriend late at night until your phone burned your cheeks. Or playing games until your phone heats up or drains out all the battery? This overheating can cause major skin issues and can cause to dark spots. The solution is to don’t let your smartphone rub against your face for too long. 6. Heart Problems Radiations from the smartphone cause heart problems. The radiations caused by cordless devices including smartphone or tablet contribute to abnormalities in heart functions. 7. Infertility Spending too long on smartphone could risk your sex life and could cause infertility. According to studies, it has been proved that there is a clear relationship between cell phone radiation and decreased sperm count. It is true that male fertility is more susceptible to be damaged from smartphone. So, males must not keep smartphone in front pockets or belt loops because the radiation is little too close for comfort. 8. Text Neck Text Neck is term used by physicians and doctors to describe the spinal disorder that arises due to excess usage of smartphones. Long term use of smartphone brings forth neck pain which is directly related to spine and thus causes spinal disorder. 9. Back Pain Smartphone has been linked to eye health, stress and sleep problems, smartphone causes bad impact on spin and can contribute to back pain. Today, back pain is becoming more and more common among the younger generation. It causes repetitive strain injury. 10. Wrist Problems Another health hazard related to smartphone is wrist problem. How long you hold smartphone in your hand strains the wrist. Usually, people hold smartphone using three fingers. Retaining this posture for longer duration everyday creates pain in the wrist. 11. Numb fingers With the excessive use of smartphone or tablet, fingers of hands become numb and causes tingling sensation. The hand above elbow experiences slow blood circulation and can have long-lasting effects. So, if you are regular texting freak, you can protect yourself from numb fingers by keeping the smartphone away for at least one minute after every fifteen minutes of texting. 12. Text-walking Texting while driving or moving across the streets or road is the most life-threatening. With doing such stuff you are only risking your life. According to survey, several deaths have been attributed to using smartphone while walking. . 13. Infections Being parents, you might have noticed your kids using smartphone in restrooms also. You know that this thing must not be done at all. Smartphone not only is a valuable device for storing your important files and documents but also carries millions of infectious micro-organisms. 14. Addiction One of the most famous health hazards of smartphone is addiction and almost 30% of the smartphone users are addicted to their smartphone. It can seem if you keep checking your phone more often than it necessary. We keep on checking our smartphone even if there is no notification or call. 15. Nerve Damage With an increased risk of brain tumours from the use of smartphone, longer use of smartphone can cause brain cancer risk. Smartphone doesn’t affect your health day-to-day but causes long-term and incurable side effects. Final Words When it comes to smartphone or tablet, on the go lifestyles are increasingly demanding it. It is certainly convenient to have smartphone or tablet for almost everything like for business, entertainment or social networking right away from the blink of eye and right at your fingertips. But it is more important to take care of your health and to know how to protect yourself from health hazards of smartphone. As there is a saying, “Your safety is in your hands only.” Article source
  6. CatchApp Tool Can Siphon Encryption WhatsApp Messages From A Distance Israeli company claims it has developed CatchApp tool which can siphon encrypted WhatsApp data from a distance You may have seen in many Hollywood movies in which the main protagonist, an agent from the CIA or FBI placing his/her mobile besides the victim’s smartphone and copying data from it. Up to now, siphoning data from any smartphone just by being in its proximity was considered fiction but now an Israeli cyber surveillance company claims it has developed a sophisticated tool called CatchApp which can siphon off all WhatsApp chats, including encrypted communications, from phones within close proximity of a hidden Wi-Fi hacking device in a backpack. Haifa-based Wintego has released brochures for its CatchApp tool which it calls as a WhatsApp interceptor. Wintego promises that the Catchall App has an “unprecedented capability” to break through WhatsApp encryption and grab full data from a target’s account. It does so through a “man-in-the-middle” (MITM) attack; in theory, the traffic is intercepted between the app and the WhatsApp server and somehow the encryption is decoded by the device, though that may not be possible with the latest upgrades to the software’s cryptography. The company did not elaborate on how its CatchApp tool manages to decode/decrypt the WhatsApp encryption but Forbes has noted that the tool works on most versions of WhatsApp. The company has released the brochures of the App to advertise it to different police and law enforcement agencies around the globe. The CatchApp tool is a part of larger Wintego arsenal called WINT. According to the company, WINT hacking tool can fit into backpack. The company calls WINT a “data extraction solution” and says that it can can obtain “the entire contents of your targets’ email accounts, chat sessions, social network profiles, detailed contact lists, year-by-year calendars, files, photos, web browsing activity, and more” just by being near the victim’s PC/laptop/smartphone. It does that by acquiring login credentials for distinct accounts and then silently downloads “all the data stored therein”. Wintego claims WINT first gains access to a device by intercepting Wi-Fi communications, whether they’re open or private encrypted networks. WINT uses four separate Wi-Fi access points so it can track multiple targets and high-gain antennas to catch those at a distance. It’s small enough to fit into any backpack, said Wintego, so is ideal for stealthy operations. The details about Wintego dealings are top secret but reports indicate that it was founded by alumni of Verint, another Israeli firm. Verint itself was the top cyber surveillance tools supplier for America’s National Security Agency (NSA). According to Forbes, Yuval Luria acts as the face of the company, promoting the kit at major surveillance shows. He recently presented at the ISS World Training event in Prague (also known as the Wiretappers’ Ball), giving a talk on A Hybrid Tactical-Strategic Approach for Extracting Cyber Intelligence. Nhevo Kaufman appears to act as company chief, having set up the firm’s website back in 2011. Both the above tools are for sale only to police, law enforcement and spy firms but it is nowhere stated that the same can’t be bought by rogue actors. Source
  7. Trend Micro Offers $250K to Hack iPhone in Pwn2Own Contest A new iteration of the P2wn2Own mobile hacking contest takes aim at iOS and Android. The mobile Pwn2Own hacking contest is back for 2016, this time offering top prize of $250,000 to any security researcher who forces an Apple iPhone to unlock. The Pwn2Own contest has undergone a bit of a transition as Hewlett Packard Enterprise sold the Zero Day Initiative (ZDI) group that sponsors the event to Trend Micro earlier this year. The browser edition of the Pwn2Own event was held in March and was jointly sponsored by HPE and Trend Micro. The mobile Pwn2Own 2016 contest being held next month will be the first time a Pwn2Own event doesn't benefit from HPE sponsorship. "To us, it's still Pwn2Own," Brian Gorenc, senior manager of vulnerability research at Trend Micro, told eWEEK. "We always hope each contest brings us something new we haven't seen before, but if you've seen the contest, it should look very familiar." During the 2016 Pwn2Own browser event, which was held at the CanSecWest conference in Vancouver, ZDI awarded a total of $460,000 in prize money to researchers for publicly demonstrating new zero-day exploits in web browsers. The mobile Pwn2Own event will be held Oct. 26-27 at the PacSec Security Conference in Tokyo, and the total available prize pool is set to top $500,000. For the 2016 mobile event, ZDI is asking researchers to target three specific mobile devices: the Apple iPhone 6x, the Google Nexus 6p and the Samsung Galaxy Note7. Across all of the targeted devices, ZDI is tasking researchers with a number of challenges. The first is to obtain sensitive information from a device. ZDI is awarding $50,000 to those who exploit a device to get access to sensitive information on the iPhone or the Google Nexus. A researcher who is able to get sensitive information off a Galaxy will be awarded $35,000. Another challenge at mobile Pwn2Own 2016 is to install a rogue application on a targeted device. A $125,000 prize will be awarded for the installation of a rogue app on the iPhone; on the Google Nexus, the reward is $100,000; and on the Samsung Galaxy, $60,000. "Each phone will be running the latest operating system available at the time of the contest, and all available patches will also be applied," Gorenc said. "This can lead to some late nights as ZDI researchers update phones in the days leading up to the contest, but we feel it's best to have the latest and greatest targeted." Gorenc said all of the targeted devices will be in their default configuration. On iOS, that means Pwn2Own contestants must target Safari, as this is the default browser and most common, realistic scenario for users of that device. In the past, Pwn2Own contestants have demonstrated many WebKit browser rendering engine related vulnerabilities. WebKit is the core rendering engine behind Safari and has many components that are also used in Google's Chrome. "The threat landscape shifts so much from contest to contest that it's hard to predict what component will be targeted," he said. "WebKit will likely make an appearance, but we're hoping to see some new techniques and research as well." For the installation of the rogue application, Gorenc said that ZDI has no requirements for the app. "We will leave it up to the contestant to express their creativity during the public demonstration," he said. iPhone Unlock The biggest single prize at the mobile Pwn2Own 2016 event goes to the researcher who is able to successfully force an iPhone to unlock. The challenge of unlocking an iPhone has been a hot topic in recent months. The FBI reportedly paid as much as $1.3 million to bypass the iPhone lock screen. And Apple started its own bug bounty program, with a $200,000 prize, while security firm Exodus Intelligence will pay a top prize of $500,000 for an iOS zero-day flaw. Gorenc believes offering $250,000 for an iPhone unlock exploit is a good size prize. "We feel this amount is not a bad payday for what will clearly be a significant amount of research needed to accomplish this hack," he said. "Along with the money, the researcher will get the recognition that comes with winning Pwn2Own." In the end, Gorenc said, it's the marketplace that will let ZDI know if $250,000 is a fair price; he's optimistic that someone will actually attempt to publicly force an iPhone to unlock. "Finally, by reporting this through ZDI, the bugs will actually get fixed by the vendor," Gorenc said. "That's better than some of the alternatives." Source
  8. Is It A Good Idea To Charge Your Smartphone Overnight? Will Charging Your Smartphone Overnight Damage It? Here’s What You Should Know There are chances that many of us plug in our smartphone for charging while going to bed at night, so that you do not have a fully drained device or low battery while rushing to work or travelling, etc. If you think that charging your device overnight is a good idea, you may want to think again. If you plan to upgrade your smartphone every two years, leaving your device to charge overnight will not do much damage to your battery. Experts say majority of the time those people are not going to notice much damage to their smartphone batteries before they start wishing for a new device. However, frequent charging does damage the lithium-ion batteries in our smartphones. And it’s not because they can be overcharged, said Edo Campos, a spokesman for Anker, which produces smartphone chargers. “Smartphones are, in fact, smart,” Mr. Campos said. “They know when to stop charging.” In other words, smartphones are designed to understand when the battery is at capacity, and should at that point stop absorbing additional electrical current. According to a report by The New York Times, Android smartphones and Apple iPhones are equipped with chips that protect them from absorbing excess electrical current once they are fully charged. Theoretically, any damage from charging your smartphone overnight with an official charger, or a trustworthy off-brand charger, should be negligible. The report stated that most smartphones use technology that allows their batteries to charge faster, but this process leads to lithium-ion and lithium-polymer batteries rusting faster. If a user wants to preserve the life of their lithium-ion battery beyond the typical lifetime of a smartphone – usually two years – they can try using a charger made for a less-powerful device, stated the report. Source
  9. Explosive Start for Samsung Galaxy Note 7: More Phones Catch Fire While Charging Buy a Note 7, and get a free fireworks show in your bedroom If you’re an iPhone user, and you know what we’re talking about already, try not to smile too much because this is getting serious, and it involves severe damage that could actually lead to people getting injured. You'd better put firemen on speed dial A report that has recently reached the web reveals that a Samsung Galaxy Note 7 caught fire while charging, even though the owner was using the USB Type-C charger that Samsung itself included in the box. From the photos posted by the owner, it’s very clear that the phone exploded on the left side, but why it happened is yet to be disclosed. Obviously, Samsung has all the reasons in the world to be worried, so they have already contacted the owner to offer compensation and investigate. And now it seems that Samsung has even more reasons to be worried because it turns out that a similar explosion impacted not one, not two, but several Galaxy Note 7s. Photos and reports that have reached the web in the last few hours seem to point to similar cases, but it’s worth mentioning that we can’t tell exactly how many they are at the moment. Also, it’s hard to say whether some of the photos that have been posted lately and that allegedly refer to different cases are actually showing the first Note 7 that caught fire. A report coming from BusinessKorea reportedly has a new case of an explosive Note 7, and it includes information that confirms Samsung is aware of the problem and is now investigating. “There was another explosion of the Galaxy Note 7. It was my friend’s phone. A Samsung employee checked the site and he is currently in talks over the compensation with Samsung. You should use its original charger just in case and leave the phone far away from where you are while charging,” the aforementioned source writes citing someone who also got to see fireworks in their bedroom thanks to the explosive Note 7. Happening with original Samsung charger In most of the cases, owners who claim that their Note 7s caught fire say they used the genuine charger that Samsung offered in the box, so if this is true, the Koreans might really have a big problem here. There are people out there who have already decided to hold onto their purchases just because they’re afraid the Note 7 can explode for them too. And as compelling as Samsung’s buy-a-Note-7-get-a-free-fireworks-show offer might seem to be, the Korean firm is on thin ice right now. And it’s not all because of the damages that its explosive device could cause, but also because Apple is getting ready to take the wraps off the iPhone 7 in exactly one week. The Note 7 is a direct competitor to the iPhone 7, and it’s pretty clear that these reports are hurting its sales. For more evidence of exploding Notes, you can check out the gallery below, as well as the video after the jump - they claim to be from separate cases, but as mentioned, this cannot be confirmed right now. And, Timothy, you'd better stop smiling, you do know that this happened with some iPhones too, don’t you? Source
  10. Tonight Mr. Robot is Going to Reveal ‘Dream Device For Hackers’ Mr. Robot is the rare show that provides a realistic depiction of hacks and vulnerabilities that are at the forefront of cyber security. This is the reason it’s been the most popular TV show of its kind. Throughout season 1 and season 2, we have seen that connected devices are the entry point of choice of Elliot and fsociety to breach networks and traditional security controls. Pwn Phone On Mr. Robot Show In this week’s episode, Elliot uses a Pwnie Express Pwn Phone, which he describes as “a dream device for pentester,” to run a custom script he has written to take over someone else’s phone. Security pros have long know about the Pwn Phone as a powerful mobile platform for penetration testing and security assessments, so it is not surprising to see it on Mr. Robot. The coolest part is that Pwnie Express is giving away a Pwn Phone, just like the one used in the show. The Pwn Phone is a mobile pentesting device that makes it incredibly easy to evaluate wired, wireless and Bluetooth networks. It is built on Kali Linux that comes pre-packaged with over 100 built-in and ‘one-click’ tools, and it can run third-party scripts. The Pwn Pad exists for security pros who want a tablet version, and it’s also available via the Android Open Pwn Project. The Pwn Phone is the latest in a series of connected device hacks on Mr. Robot that have included a Femtocell, a Raspberry Pi, and Bluetooth sniffers, along with the hack of an E-Corp exec’s connected home and the crucial meltdown of E-Corp’s data center by using a connected HVAC system. These are real threats that are being exploited by criminals to gain unauthorized access and steal data from companies today. In the past, Pwnie has made it clear that they do not condone the criminal use of penetration testing tools and devices. But pentesting is important, and having the tools to do it properly is part of that process. Sometimes you need to break things to find and fix serious security vulnerabilities in the devices and networks that permeate nearly every facet of our daily lives. The bad guys have every tool available to them; white hats should be equally well-equipped. And as for what Elliot does in the show? He’s a pretty well-established gray character. Is he good? Or is he bad? Either way, it was pretty cool. Source
  11. New W3C Proximity Sensor API Can Be Used for User Fingerprinting New W3C API brings new fears regarding user privacy As mobile devices evolved, so did their technical capabilities. Nowadays, when you lift your phone to your ear, the screen usually goes dark because the device uses the camera to tell if you've put it next to your ear. Rear and back cameras, movement sensors, accelerometers, and many other high-tech sensors can let a smartphone, tablet, or Internet of Things device know where you are in the room, or where are other objects like walls, doors, etc.. Because most of these sensors provide API interfaces, the W3C has begun work on a generic JavaScript-based API that will let websites query your device, and tell it how far are nearby objects. The W3C describes this new feature as below: New W3C API could be used for user fingerprinting Lukasz Olejnik, security & privacy technology engineer for the French Institute for Research in Computer Science and Automation (INRIA), and a W3C "Invited Expert" claims that this new API might pose a threat to user privacy in the future. Olejnik claims that threat actors can use (malicious) code embedded on a website to leak information about the phone's user and his behavior. He says that this data could be used to fingerprint users, a technique in which advertisers might also be very interested in using. An attacker could use the W3C Proximity Sensor API to gather information about how the user interacts with the device, the frequency at which he interacts with it, interaction patterns, or mechanics for holding the device in different positions, close to his head, or the distance from his face. Olejnik: There's no need for verbose distance results The problem, he says, comes from the fact that the new Proximity Sensor API allows two query modes. One that uses "near" and "far" distance indicators, and one that uses verbose data, in centimeters (cm). Olejnik says that there's no need for the second. "Is there a need to provide a verbose proximity readout at all?" he writes on his blog. "For example, is providing readouts of proximity (distance) value up to 150 cm necessary?" Besides limiting access to verbose data, the INRIA researcher also recommends that the Proximity Sensor API should also be subject to user permissions. The device must ask the user for this data, and they should be able to review what websites accessed this API and how often. Olejnik's criticism, which is dated August 8, has been taken into account. The latest version of the W3C Permission Sensor API features support for browser permissions, according to a draft dated August 26. The verbose distance results have been kept. Work on the W3C Proximity Sensor API is still ongoing. Source
  12. WhatsApp Is To Hand Your Phone Number To Facebook Roses are red, violets are blue, Facebook knows all that you think, say and do WhatsApp has updated its terms and privacy policy for the first time in four years as part of parent company Facebook’s plans to generate cash through app users' data. While WhatsApp has been a separate service from Facebook since its acquisition for $16bn two years ago, the companies are now going to enjoy a cosier relationship. If you’re a WhatsApp user you can expect the app to soon export more of your information to Facebook as the megacorp seeks to bleed some revenue from businesses by allowing them to advertise to you, without using third-party banner advertisements and spam. This will not affect the privacy of the content of users’ messages. As WhatsApp integrates the Signal messaging protocol, messages are protected with end-to-end encryption. “We won’t post or share your WhatsApp number with others,” the business stated today, “including on Facebook, and we still won’t sell, share or give your phone number to advertisers.” This suggests that WhatsApp might yet offer itself as a platform for business to contact you through, but the company itself has announced that “by coordinating more with Facebook, we'll be able to do things like track basic metrics about how often people use our services and better fight spam on WhatsApp.” That sounds lovely, of course, until the statement continued: “And by connecting your phone number with Facebook's systems, Facebook can offer better friend suggestions and show you more relevant ads if you have an account with them. For example, you might see an ad from a company you already work with, rather than one from someone you've never heard of.” Users are not able to opt out of this data sharing, although you can choose not to allow to be shared for the purpose of improving their experience with advertisements and product experiences on Facebook. WhatsApp is seeking to integrate features that regularly take place over SMS at the moment: "Whether it's hearing from your bank about a potentially fraudulent transaction, or getting notified by an airline about a delayed flight, many of us get this information elsewhere, including in text messages and phone calls. We want to test these features in the next several months, but need to update our terms and privacy policy to do so." Source Related Alternate Source Articles: WhatsApp to Share Your Data with Facebook — You have 30 Days to Stop It Use WhatsApp? Get ready to receive marketing messages from firms WhatsApp to give users' phone numbers to Facebook for targeted ads WhatsApp to share your user data with Facebook WhatsApp to share user data including phone numbers with Facebook WhatsApp does about face, will serve ads in Facebook-owned app WhatsApp to Share User Phone Number with Facebook For Advertising Block WhatsApp from sharing (most) data with Facebook
  13. The Future Of Android Likely Means The Death Of Android Opinion - Android has a lot of problems, and Google knows this, and is already making plans for the death of Android. On the face of it, Android seems like a very successful platform. It's the operating system that powers 85 percent of the new smartphones shipped, and, along with iOS, has decisively crushed the competition. But Android is also plagued by dogged problems that Google can't seem to solve. First off, there's the issue of fragmentation, which means that developers have to create software that will work reliably on many hundreds of different devices from dozens of manufacturers. Sure, developers could just focus on devices from the big players - and some, such as Salesforce, are already doing just that - but that defeats the purpose of having a platform in the first place. Then there's the update problem. Google has a yearly release schedule in place for Android, but it takes the new version a good part of a year to break the 10 percent usage mark. And it takes about four years for a release to fully penetrate the ecosystem. Four years is a crazy long time in tech. While Google is speedy at getting new releases onto its Nexus hardware, it can take months for owners of Android devices from other manufacturers to start seeing the update. And many never see the update. In fact, outside of buying a Nexus device, the easiest way to get your hands on a new Android release is to buy a new device. And you wonder why Android smartphone sales are so buoyant. So, dominant market share aside, it's clear that Android has suffered from some extremely severe problems. Many of the problems facing Android come down to it being open source. Android is all about being open, which means that once Google has released a new version, the OEMs and carriers are free to tinker with it to their heart's content. That then results in both the fragmentation (OEMs loading the code onto any and every device form factor they can think of), and the problems with updates (Google can't push Android direct to devices because heavens knows what modifications and tinkering have been done, both cosmetic and structural, to the code). Another problem with Android is that it's based on Linux, and Linux is both old and plagued by legal issues. The Linux kernel was never designed for smartphones and IoT devices, and yet here we are shoe-horning it onto these devices. Sure, the kernel's been furiously tweaked, but tweaking can only go so far, especially when you're trying to optimize power consumption or when a platform that can run in real-time is required (the Linux kernel isn't real-time, and instead uses a scheduler). Also, all that legacy code is the perfect breeding ground for bugs and vulnerabilities. The legal issues, specifically intellectual property licensing issues, are a real thorn in the side for those making Android devices. Companies such as Microsoft pulling in billions of dollars in licensing fees from Android hardware OEMs, which eats into the already razor-thin profit margins. A totally new, built from the ground-up platform could free OEMs from being shackled to expensive patent licensing deals. And Google is working on new platforms. Take, for example, Project Fuchsia. Sure, it's early days, but it's clear that Google is looking to an era beyond the Linux kernel, and the end of the Linux kernel ultimately means the end of Android. This operating system not only could be built from the ground up so as to be optimized for today's devices, but it would also be free from IP headaches. It could also be modular in nature allowing for it to be customized for different applications - from the desktop and laptops to smartphones and even small IoT devices - allowing for a truly unified platform. Google could license this platform to hardware developers, as opposed to using the open source model. Licensing would give Google greater control over the hardware that Android was loaded onto. No more junk that can barely run the OS. No more devices being released running years-old releases with no hope of an update. This would truly be a platform for the 21st century. Don't expect this to happen anytime soon as operating systems take time to develop. But equally, don't think that Android is going to be around forever. Android has some serious shortcomings that Google is well aware of, and the fact that it isn't making much effort to fix these issues is perhaps the strongest evidence - along with the company's declared interest in developing new platforms - that such work is ongoing. How long until we see an Android replacement? I'd guesstimate something in the region of five years, but a company such as Google has the resources to make it happen much quicker. But it could also lose interest in the idea and decide that Android is good enough as it is. Source
  14. Everyone has a smartphone these days and while processors have often got more efficient over the years, and software tweaks have been made to conserve battery life, many heavy users still struggle getting more than a day’s use out of their phone. However, that could start to change from next year, as a new technology has been developed that promises to power devices ranging from smartphones to electric cars for longer periods of time. This new promising battery technology is being developed by SolidEnergy Systems, which is led by researchers at MIT. They have developed a battery that replaces the common anode material we are used to with a much thinner, high-energy lithium-metal foil that can hold more ions. As Techspot points out, previously there has been issues with using lithium metal due to higher resistance and temperature constraints. However, a new liquid electrolyte solution has been formed, which allows these batteries to run, without worrying about minimum operating temperatures. Essentially, these new batteries from SolidEnergy can hold two times the energy density of what we have now, so batteries could either shrink while maintaining current performance, or you could squeeze more juice out of a similarly sized battery. These new batteries are currently heading for a 2017 release, and from there, SolidEnergy will be moving on to wearables. View: Original Article
  15. Hi guys, I am thinking of getting a a new smartphone, and a friend who works in tech recommended to me the elephone p9000. I just wanted to ask, does anyone have any experience with this or other phones from Elephone? A friend recommended it, but I never heard of this company before. On another note, this phone has a type-C connector, my laptop has usb 3.0. Can I plug a usb type-c into a usb 3.0 or do i need an adapter? thx in advance!!
  16. See Through Walls With Your Smartphone Using This 3D Sensor This sensor will let you ‘see’ through walls like Superman Vayyar Imaging, a 3D-imaging sensor company based in Israel has developed a new 3D-imaging sensor for Android smartphones that allows your device to peer right through walls revealing everything from structural foundations to pipes, to wiring, and even unwanted pests hiding between rooms. Called the Walabot DIY, all you need to do is just download the Walabot DIY app from the Google Play Store, connect the accessory to your smartphone’s USB port, and hold it against a wall. Since, it is a consumer-friendly product; it doesn’t require any training to use. The sensor can also magnetically attach to the back of your smartphone, which allows you to use the two devices single-handedly, leaving your other hand free to operate the app. This gives you a more visual representation of what’s discovered, its placement, what it’s made from, and its distance. Walabot DIY says it can see up to four inches deep into walls made of drywall or even cement. “Walabot instantly turns a smartphone into a powerful 3D-imaging system at your fingertips,” company officials said. “Our advanced technology lets people see all kinds of things hidden in the world around them, adding yet another dimension to the way people use smart devices today,” they said. While the Walabot DIY is more expensive than Walabot Maker version, it could prove the usefulness of Vayyar’s 3D imaging technology. It also gives makers and inventors around the world the opportunity to develop content that takes advantage of the 3D imaging sensor technology. One can not only make use of the existing apps, but can also create their own apps. “Walabot’s technology is simple and intuitive, so people with any level of experience can use it to enjoy and better the world around them,” the company said. “Walabot makes highly sophisticated imaging technology approachable, affordable and usable for everyone,” said Raviv Melamed, CEO and co-founder of Vayyar Imaging, a 3D-imaging sensor company based in Israel. The Walabot DIY uses sophisticated algorithms to detect the radio emissions and reflections of different objects. It studies the data to figure out in real-time what kind of object is hiding behind a typical wall. You can use it to see through tables as well, but not metal objects and other types of barricades. “It can help the blind avoid obstacles, sense — and alert you — if your mother or father has fallen in the shower, help your robot become autonomous, and much more,” Melamed said. “The idea is to take the guesswork out of remodeling,” said Melamed, in an interview with VentureBeat. “You don’t want someone punching a hole in your sewer pipes by accident. It’s like real Superman vision.” According to Melamed, Vayyar’s devices can tell you a lot more about what’s behind a wall. In a demonstration shown to VentureBeat, one can see what’s behind the wall on the screen of the smartphone by just pairing it with the Android smartphone and activating the app. The data is presented in a raw form or an analysis of that data as calculated by Vayyar. As there are some interruptions in displaying what is behind a piece of a wall, you have to move it over the wall slowly. However, you can get a 3D image of an entire room’s walls in just few minutes. Melamed said it will make it a lot simpler to locate a leak in a pipe, or just drill into a wall without the fear of hitting a pipe or electrical wire, hang pictures in a gallery, or mount shelves. “We can get it to 5 millimeters accuracy,” Melamed said. “You’ll know what’s inside a wall in a few minutes.” Besides the above, Walabot DIY is also considered ideal for the construction worker, home renovator, and DIY enthusiast. Walabot DIY is compatible with all Android smartphones 5.0 and higher and comes with USB OTG. After the Walabot DIY app is downloaded via Google Play and completes a short standardization process, it can be used to scan the wall. Images of the wall are then placed on the screen of the smartphone. Walabot DIY also features a flexible sensitivity setting for optimal standardizations on particular renovation and construction projects. This offers two sensing modes and can effortlessly snap photo screenshots for use in offline analysis. Melamed also demonstrated how Walabot DIY can identify the pattern of your breathing. In other words, it has applications for examining your sleep patterns and other uses in health, safety, and quality of life. While the technology is still in its initial stages, it could shoot more demand for augmented reality applications, he said. The Walabot DIY is now on sale in the U.S. for the limited special price of $200 (which is later expected to rise to $300). Source
  17. Verizon Fingered In Android Bloatware-For-Cash Cram Scandal Report says carrier offered to pre-install apps for moolah Verizon has reportedly approached app developers about pre-installing their software on customer handsets in exchange for cash. A report from Ad Age cites marketing industry execs who say that, since late last year, they have been approached by the nation's largest carrier with offers to install their mobile apps on millions of handsets for a per-install fee. The report claims that Verizon would charge the developers $1-2 per install and that the apps would appear on the home screen of Android devices on the Verizon network. Customers would be able to remove the apps from their handsets if they so choose. The report alleges this has been a sticking point for advertisers and developers, who worry they could be charged for users who never activate their apps. Verizon said it has no comment on the report. Apple iPhones, however, would not be included in the deal, thanks to the iron grip Apple keeps on iOS software via the App Store. Rather, the apps would be bundled with new Android devices. Verizon says it has more than 110m mobile connections on its network in total. In its last quarter, the wireless business was credited with bringing in more than $21bn in revenues, though returns have been slipping, which could explain why the carrier is now looking at other cash streams. The deal, while the first of its kind for a mobile carrier, would hardly be unprecedented. PC vendors regularly make such deals with software vendors to offer their products pre-installed on new systems. Such "bloatware" has long been an annoyance for consumers who are then tasked with the time-consuming task of removing the unwanted software from their own machines and, in many cases, those of friends and family as well. From the sound of things, Verizon's planned bundles would be far easier to remove, though still likely an annoyance for many Android users who chose the Google-backed smartphone platform in part because of the freedom it gives users to customize their smartphones and tablets as they see fit. Source
  18. Nokia Taps Former Rovio Man Rantala To Market Relaunch Maker of phones nobody has bought in years hires ex-boss of game nobody has played in years The relaunch of the Nokia mobile brand will include the man who once ran mobile games maker Rovio. HMD global Oy, the parent company of Nokia, said that longtime executive Pekka Rantala will become chief marketing officer of the company, effective immediately. Most recently the chairman of Jot Automation, Rantala is best known for his stint as the chief executive of Rovio and its famed Angry Birds franchise. Rantala stepped down from that job in December of 2015 following a failed effort to expand its marketing reach. Rantala is no stranger to Nokia. Prior to leaving for Rovio, he spent 17 years working in the Finnish phone giant's marketing, sales, and operations departments, eventually becoming senior VP of global marketing. HMD said that as chief marketing officer, Rantala will first oversee the building of Nokia's marketing and communications teams as well as the hiring of "brand specialists" to help lead the charm offensive in Nokia's efforts to re-introduce itself into the consumer mobile space. "There are very few opportunities like this, to work with a global brand with the power to touch hundreds of millions of people every day," Rantala said of his appointment. "It is a privilege to work with this unique brand, to engage with the millions of dedicated Nokia phone fans around the world and create a generation of new ones. We are going to bring together a new team of talented people who can build something incredible." The relaunch of Nokia under the care of HMD was formally announced in May of this year, but has been widely anticipated for much longer. The plan calls for HMD, which is run by Nokia alums, to release Android tablets and handsets with the Nokia branding while using the old device sales channel bought back earlier this year from Microsoft, which will continue to sell handsets under the Lumia banner. Source
  19. New Forensic Tool Will Recover Data From Smartphone RAM, Encrypted Or Not Encryption or not, your smartphone data will now be easily recovered with this forensic tool If you remember the hullabaloo created over Apple being asked by FBI to unlock a locked iPhone 5c belonging to a terrorist. The news generated such hype and opinions that it was dominating world tech news for almost a week before FBI quietly contracted an Israel-based firm to unlock the terrorist’s iPhone. Now FBI or for that matter, any law enforcement agency does not have to go anywhere to recover data from locked or encrypted smartphones as researchers have developed a new forensic tool which recovers data from smartphone RAM called Retroscope. The researchers from Purdue University have developed a new tool to recover information stored in smartphone’s volatile memory could give investigators important clues to solve criminal cases. Instead of trying to unlock the encrypted smartphone’s hardrive, which holds information after the phone is shut down, the researchers instead thought of delving in RAM which is volatile. It is generally thought that the contents of RAM (Random Access Memory) are gone as soon as the smartphone is shut down but the researchers found that they could recover surprising amount of data from the RAM even if it was switched off. The team’s early research resulted in work that could recover the last screen displayed by an Android application. “We argue this is the frontier in cyber crime investigation in the sense that the volatile memory has the freshest information from the execution of all the apps,” said lead researcher Dongyan Xu. “Investigators are able to obtain more timely forensic information toward solving a crime or an attack,” Xu noted. Building on their research, Xu said, it was discovered that apps left a lot of data in the volatile memory long after that data was displayed. RetroScope makes use of the common rendering framework used by Android to issue a redraw command and obtain as many previous screens as available in the volatile memory for any Android app. What is more important for the law enforcement agencies is that Retroscope requires no previous information about an app’s internal data. The screens recovered, beginning with the last screen the app displayed, are presented in the order they were seen previously. “Anything that was shown on the screen at the time of use is indicated by the recovered screens, offering investigators a litany of information,” Xu said. During testing, RetroScope was able to recover anywhere from three to 11 previous screens in 15 different apps, an average of five pages per app. The findings were presented during the USENIX Security Symposium in Austin, Texas. “We feel without exaggeration that this technology really represents a new paradigm in smart phone forensics,” he said. “It is very different from all the existing methodologies for analysing both hard drives and volatile memories,” Xu noted. Source Alternate Source - Forensics tool nabs data from Signal, Telegram, WhatsApp
  20. Canonical Makes It Easy to Port Native iOS and Android Apps to Ubuntu Mobile OS They are introducing the React Native framework It appears that Canonical love web developers, and they always keep them in the loop with all the tools needed for the perfect job. After introducing support for the Cordova framework, which is very well supported on Ubuntu Linux and has received a lot of attention from web developers, today Canonical promise to offer full support for another great framework, namely React Native. "Application development for mobile and desktop using web technologies is becoming increasingly popular. If you are one of these developers then Ubuntu has a great choice of frameworks you can use to create new apps," says Richard Collins, Ubuntu Mobile Product Manager at Canonical. "The Webapps team at Canonical is always focused on ensuring the right frameworks are available to developers." The best web development framework for Ubuntu convergence For those not in the known, React Native is a web development framework that can be used for building native mobile apps using JavaScript and React. It's based on ReactJS, a web-friendly declarative programming model, and has been designed from the ground up to offer an extra layer of system performance by using native UI (User Interface) components and system APIs for delivering a deeply integrated UX. However, Canonical's main reason for the introduction of the React Native framework in Ubuntu Linux is to continue its convergence vision and to allow mobile application developers to be able to port existing iOS and Android applications written with React Native to the Ubuntu mobile OS. Of course, developers can also build Ubuntu native versions of any existing ReactJS webapp. The React Native Ubuntu source code is available for download today. Support for packaging apps as Snaps and publish them on the Snappy Store is also available. Source
  21. How to Play Pokémon Go On Your PC/Laptop Catch Pokemon with Pokemon Go on your PC/Laptop without ever leaving your desk, but it’s a little bit messy. If you are not living under a rock, you must have heard about Nintendo and Niantic’s gaming sensation, Pokémon GO, which is based on augmented reality. Pokémon GO requires gamers to walk around their neighborhood with the smartphones to capture Pokémon nearby. For now, Nintendo has not released this game for Windows devices. However, you can play this game on your Windows 10 PC using Android emulator such as Bluestacks. Since you can’t carry your Windows PC, you can use Fake GPS to fool the Pokemon Go on Windows PC/laptop that you are actually moving around. Even if you have Android smartphone or iOS device, if you want to collect all the Pokémons without leaving your desk, then the following may be your solution. Step by step guide to install Pokemon Go on your PC or Laptop Files to Download Download and Install BlueStacks App on your computer. The installation is simple and you simply need to follow the on-screen instructions to complete the setup. Once the program is installed, don’t launch it yet. We will have to download a few more files before we get started. Download KingRoot APK and LuckyPatcher APK. These apps will be used to gain Root access on BlueStacks player and then install our app as a system app. Download Mock Locations (fake GPS path) and Developer Options Tool APK. Finally, download the latest version of Pokémon GO. You can save all these files anywhere, however, Mock Locations should be saved in the Documents folder on your PC. Getting BlueStacks Player Ready for Pokémon GO. Open BlueStacks Player and wait for it to initialize. Once that’s done, navigate to the Android tab and from the left sidebar click on APK to install KingRoot APK. Once the app is installed, you will find it in the apps section. Run it once to gain root access on the BlueStacks Player. In the same way, install the Lucky Patcher app and run it. When prompted for Root Permissions, accept and close the app. Now to install the Location Spoofer app, open Lucky Patcher you just installed and then click Rebuild & Install at the bottom. Here, navigate to SD Card –> Windows –> Documents and click on the Mock Locations app to install it. Make sure you select Install as a System App when asked by Lucky Patcher. Install Developer Options Tool APK normally and turn the option off, if you see it turned on. Also, open up the Settings menu in BlueStacks and under location settings, make sure High Accuracy is selected. Finally, install the Pokémon GO app to start playing the game. Playing the Game Finally, when everything is set, open Lucky Patcher and launch the Mock Locations app. After the app is launched, click and hold on two locations on the map (the area which you want to explore in Pokémon GO), which then get selected. Next, click on the Play button. You will be asked to select a speed and here, give 4 kmph with 1 hour as a constraint modifier and start the path. Your Android device will now get your device location from the app which is the key ingredient to playing the Pokémon GO game. Now launch the Pokémon GO game, log in using your Google account and start playing the game. The avatar will follow the path you have given in the Mock Location app and you can collect Pokémons, take items from PokéStops and also do gym battles. Please make sure you turn off the AR (Augmented Reality) mode and play the game in a virtual environment. Conclusion So, that was all folks, you can now play Pokémon GO on your PC. Do ensure you don’t do big jumps on the map or you might get banned for location spoofing. Also, turn off the location of Windows PC if you are getting location errors while playing the game. But if you have a big park in your surrounding and it’s safe out there, I would insist you try the game there. It’s a lot more fun that way. Source
  22. Pokémon GO — 6 Important Things You Should Know Before Playing this Game Pokémon GO launched just two weeks ago, and people have been getting crazy to catch 'em all. Users, on an average, are spending more time engaged with the new Pokémon GO app than any other apps like Snapchat. But, before downloading and playing Nintendo's new location-based augmented reality game, users are required to keep the following points in their minds: 1. Unofficial Pokémon GO app might contain Malware Since Pokémon GO is currently available in only a few countries, many third-party gaming websites are offering tutorials due to huge interest surrounding the app, recommending users to download the APK from a non-Google Play link. Users need to "side-load" the malicious app to install the APK by modifying their Android core security settings, which allows their device's OS to install apps from "untrusted sources." However, researchers have discovered that many of these online tutorials are linked to malicious versions of the Pokémon GO app that install a backdoor, called DroidJack, on victim's phones, enabling hackers to compromise their device completely. 2. Protect Privacy While Using Pokémon GO If you're playing Pokémon GO, then forget about your privacy. Since this augmented reality game requires your GPS location and a data connection (either WiFi or cellular data), you can not expect your privacy to be secured while playing this game. However, still, users can avoid playing in locations where they do not want to be tracked. Also, don't use your personal Gmail account to log in, as this links your personal information including your GPS location and Pokémon GO activity. Either use a burner Google account. For this, create an all new Google account, with nothing in it, and use this account to sign into Pokémon GO as well as other apps that you may find doubtful. Although the security hole has been patched, previous versions of Pokémon GO app required extensive permissions to your Google account, so make sure your app is up to date. 3. Beware of Pokémon GO-themed Malicious Apps on Google Play Store Yes, malicious Pokémon Go apps have even made their ways into the official Google Play Store. Researchers from popular antivirus firm ESET have spotted at least three fake Pokémon Go apps on the Google Play Store. Of them, the one titled "Pokemon Go Ultimate" posed the biggest threat to Android users. Pokemon Go Ultimate renames itself "PI Network" and deliberately locks the screen of the victims’ devices immediately after being installed, rending the devices unusable. The only ways to get the infected phone unlocked are to remove the device's battery or reboot the device via the Android Device Manager. Even after restarting the device, the app removes itself from the device's app menu, but still continues to run in the background and silently clicks on porn advertisements in an attempt to generate ad revenue for its creators. The worse: Researchers say that the malicious app is just one step away from being Ransomware. Although Google has removed the fake Pokémon GO app, users who had already downloaded the app would need to uninstall PI Network manually through their device's application manager. The rest of the two fraudulent Pokémon apps produced fake security messages in an attempt to trick users into paying for an antivirus service that actually does not exist. Currently, all three apps seem to be removed from Google Play, but be on guard: more are likely to show up in the coming days. So, before head out to catch 'em all, just make sure you are downloading the legitimate Pokémon Go app. Here're ESET's full advisory and security recommendations. 4. Go catch Pokémon, But Just Watch Out! It's less than two weeks since the launch of Pokémon GO, and the Nintendo’s game is fueling public safety fears after the first major car crash in Auburn, New York. Later it was revealed that a 28-year-old car driver was reportedly playing "Pokémon GO" and got distracted, thereby ran his vehicle off the road and crashed into a tree. Another case reported by the San Diego Union-Tribune involved two men apparently playing Pokémon GO were rescued after falling off a 90-foot ocean bluff in California Wednesday afternoon. The victims are fine, but that's not the point. The point here is that do not put your or others lives in danger. Don't play the game while walking, driving and biking. The Auburn Police Department has also released an advisory to remind drivers to use "common sense" while catching Pokémons and keep their eyes on the road at all times. Here're some important points that players must keep in their minds: Do not use the Pokémon GO app when you are operating a motor vehicle or bicycle. Do not trespass onto private property when trying to catch a Pokemon. Be aware of your surroundings when searching for Pokémon and do not just stare your phone without knowing hazards around you, like roadways, drop-offs, and waterways. Always use caution when sharing your locations — strangers can see your location data. Travel in groups in public/well lit areas. In simple words: don't be a dumb crap; grow up! 5. Pokémon GO: Crimes, Robberies, Deaths & Other Problems The game craze has been blamed for several robberies of distracted smartphone players. Pokémon GO sends players out to capture the virtual Pokémon characters that are superimposed in parks, streets, stores as well as inappropriate locations like the Holocaust Memorial Museum, 9/11 Memorial, and Arlington National Cemetery, as reported by CNN. Across the America, the gamers have been drawn down dark alleys and into dangerous neighborhoods in search of the Pokémon characters, only to be targeted by criminals. So, Pokémon fans need to be a little more vigilant while playing the game, because your life and your money are more important to an imaginary character. 6. Pokémon GO Cheats, Hacks, Punishment and Bans Since Pokémon GO has taken the world by storm with gamers of all ages joining in with the Pokémon catching fun, players are making use of Pokémon hack and cheats to catch Pokémons with fewer efforts. This augmented reality game requires gamers to walk around homes, parks and local surroundings to find new Pokémon, as well as achieve goals like hatching incubating eggs. One can find the most common Pokémon in the distance of 2km eggs, with the rarest ones in the 10km eggs. This means you are required to walk a lot if you want to advance in the game. So, players are using tricks like placing their phones on a record player or tieing their phones with a fan in order to increase their walking distance in no time at all. In fact, tech-savvy players are spoofing their GPS locations with rooted and jailbroken devices, so that they can catch Pokémon without physically going to locations where the imaginary characters are actually located. However, before using these cheats, players should be aware of the fact that they can be banned for up to five hours from playing the game. Even worse, cheaters are being punished by encountering wild Pokémon characters, which runs away from them. Although the company, as of now, is not imposing harsher punishments or bans, some rumors claim that Niantic could completely block players after a certain number of temporary bans. So, we advise users to walk and find their favorite Pokémon characters as guided by the map. Play the game the right way. Gotta catch 'em all! Source
  23. How To Play Pokémon Go – Beginner’s Tips Not sure which team to join? Don’t know the difference between a regular Poké Ball and a Great Ball? And where do these Pokémon hang out? Read on. Pokémon Go has taken the world by storm and all you need to play it, is a smartphone and a willingness to get outside. Millions have downloaded Pokemon Go, a new augmented-reality game that has them wandering the streets looking for virtual monsters. And as the game soared on the top of download charts, it has also propelled game maker Nintendo on a wild two-day stock spike, adding $7.5-billion to its market value. How do I get started? First things first, you’ll need to install the Pokémon Go app, available in iOS and Android in the United States, Australia, and New Zealand. If you’re not in those areas, hang tight, as Niantic is rolling out to other regions as time goes on. Once you’ve been logged in, you’ll get a brief introduction by the dreamy Professor Willow, who’ll give you an introduction to the game, and walk you through catching your choice of the three starter pokémon — either a Charmander, Squirtle, or Bulbasaur, which should all be familiar to Pokémon regulars. After that though, the game pretty much leaves you on your own, aside from a small tips section that mostly explains basic map icons. But there are three basic parts to play Pokémon Go: catching pokémon, visiting pokéstops, and gym battles. How do I catch pokémon? Catching pokémon works mostly like you’d expect: you simply walk around with the app open on your phone, which will buzz when pokémon are nearby. Tap on the pokémon on the map, and you’ll switch to the catching interface. The color of the ring surrounding the pokémon helps determine how easy it is to catch — green is easiest, yellow intermediate, and red the most difficult. GOING FARTHER AFIELD MAY RESULT IN DIFFERENT OR RARER POKÉMON Pokémon are found at different CP (Combat Power) levels, which more or less determines how powerful the pokémon will be. To raise a pokémon’s CP, you’ll need two resources: stardust, a generic item you obtain with each pokémon that you catch, and the pokémon’s specific candy, which can be obtained by catching duplicates of the pokémon you want to level up. For example, to level up a Zubat’s CP, you’ll need stardust and Zubat candies. Similarly, to evolve your pokémon, you’ll need to use more of that pokémon’s candies, which will also dramatically raise the CP of that pokémon. As your character level increases, you’ll encounter higher level pokémon in the wild and be able to level up the CP level of your pokémon more. Different pokémon are found in different places — so while one location might be infested with Zubats, going farther afield may result in different or rarer pokémon. What are pokéstops? Pokéstops are important landmarks, marked on the map at significant (usually) nearby locations. Visiting pokéstops is the primary way of getting items. When you’re close enough to a pokéstops to activate it, the map icon will expand into a spinning pokéballs icon, allowing you to tap on it to obtain items, such as pokéballs, potions, revives, and eggs (which can be hatched by walking around). You can also activate lure modules at pokéstops, which are marked by a swarm of hearts on the map, increasing the likelihood of pokémon appearing there. Some items, however, can only be purchased with pokécoins, which can be earned by fighting in gym battles or bought as in-app purchases. How do I level my character up? You can earn experience from nearly every activity in the game — catching pokémon, fighting at a gym, visiting pokéstops — which in turn levels up your character. You’ll also be gifted items when you reach a new level. Additionally, once you reach level five, you’ll be given the chance to choose from one of the three color-coded factions: red Team Valor, yellow Team Instinct, and blue Team Mystic, and have the opportunity to battle other trainers in gyms. What are gyms? BATTLING IN GYMS ALSO GIVES YOUR POKÉMON XP Gyms are in-game locations that are typically tied to major real-world areas — such as the Bryant Park Fountain or Times Square — where you can battle other trainers. If a gym is held by your faction, you can select a single pokémon and train against other members of your team, raising the amount of prestige points associated with the gym. The higher the prestige, the more pokémon that can be stationed at the gym, which in turn grants higher daily bonuses of stardust and pokécoins that can be earned. If there’s an open spot at a gym, you can add one of your pokémon to help hold down the fort. Gyms held by one of the two rival factions, however, need to be battled for. If you and your fellow members defeat the pokémon stationed there, you can lower the gym’s prestige and eventually return it to a neutral level. It can then be claimed by your faction and a pokémon can be left there to fight against new challengers. Battling in gyms also gives your pokémon experience and raises their CP and HP. How do I battle? Battling in Pokémon Go is like a simplified version of the classic Game Boy game. Pokémon face off one-on-one, and can use one of two attacks — tapping on the enemy pokémon to do a low-damage light attack, and tap-and-holding to unleash a special attack once your meter has filled. Additionally, you can dodge enemy attacks by swiping left and right. Battles continue until one of the pokémon has fainted. And of course, standard pokémon damage type rules are in effect: water pokémon are effective against fire types, fire against grass, etc. Pokémon can be healed or revived using potions and revives that you can obtain from visiting pokéstops. What are the different items, and how do I get them? Pokéball / Great Ball / Ultra Ball — Pokéballs are your bread and butter tool for catching pokémon. Great balls unlock at level 12 and are better at capturing pokémon, while ultra balls, which unlock at level 20 are even more useful for high-level pokémon. All three can be obtained at pokéstops once you’ve reached the right level, and regular pokéballs can be bought with pokécoins from the Store. Potion / Super Potion / Hyper Potion — Potions allow for pokémon to be healed in between battles. Revives — Allow for revival of pokémon that have fainted in battle. Lucky Egg — An item that doubles the experience you gain in the next half-hour after use. Can be obtained at pokéstops or bought using pokécoins from the store. Razz Berries — A higher-level item obtained starting at level 8, Razz berries can be used on higher level pokémon to help prevent them from running away. More can be found at pokéstops once they’ve been unlocked. Egg Incubator — Egg incubators are used to hatch eggs, which can contain rare pokémon. You’re given one incubator for free that has unlimited uses, while additional, three-use incubators can be found in pokéstops or bought with pokécoins. Eggs hatch after being incubated for a certain walking distance that depends on the specific egg (usually between two to five kilometers). Lure Module — A temporary use item that can be applied to a pokéstop that increases the chances of encountering wild pokémon at that pokéstop for all nearby users. Can be found at pokéstops or bought using pokécoins form the store. Incense — A temporary use item that increases the likelihood of encoding wild pokémon for the user of the item for the next half-hour after use. Can be found at pokéstops or bought at the store with pokécoins. Tips and Tricks: Buy an external battery! Pokémon Go can be a huge battery drain on your phone, since the app needs to be running constantly. There are no pokémon centers in Pokémon Go, so revives and potions remain the only way to heal injured or fainted pokémon. Wait to evolve pokémon until you’re at least level 10 — the boost you receive in CP from evolution is tied to your character level, and the higher your level, the greater will be the gain. Hopping on a bicycle is a fun, fast way to hatch pokémon eggs quickly. Make sure to stay hydrated when catching pokémon outside. Consider turning off the augmented reality interface — it’s fun to see pokémon in the real world, but the camera consumes more battery life and constant movement can make pokémon more difficult to catch. Be smart and make sure to always be aware of your surrounding and people nearby. Pokémon Go relies on Google Maps data — try downloading the maps directly from Google to cut down on battery use and data consumption. Source
  24. Ubuntu Touch OTA-12 Launches Today with Biometric Authentication for Meizu PRO 5 New Libertine Scope will be available for converged devices Yes, the moment you've all been waiting for its almost here, as Canonical is about to unleash the long-anticipated Ubuntu Touch OTA-12 update, which should start appearing as a phased update during 24 hours, at 12 pm UTC/GMT, on Wednesday, July 27, according to Łukasz Zemczak's latest landing email announcement. "Good news! OTA-12 passed final testing and will be released tomorrow around UTC morning. We will, of course, proceed with phased updates as always, with the update appearing on all user devices in ~20 hours since the release," said Łukasz Zemczak, Canonical Foundations. "Big thanks to everyone working on this milestone!" Here's what's new in Ubuntu Touch OTA-12 According to the release notes, Ubuntu Touch OTA-12 brings quite some goodies, despite the fact that Canonical initially stated that it would be more about bug fixes than new features. Release highlights include fingerprint reader (biometric authentication) support for the Meizu PRO 5 Ubuntu Edition smartphone, which we reviewed earlier this month, as well as complete MPRIS support for playlists. There are also lots of convergence improvements, such a new Libertine Scope for devices that support Ubuntu convergence, displaying the X apps that are installed, animated mouse cursors, on-screen-keyboard support for X apps, and support for maximizing windows both horizontally and vertically. On the other hand, the Messaging app received support for forwarding messages. Ubuntu Touch OTA-12 also updates many core applications, such as the Oxide video player, which is now at version 1.15, and the Web Browser, which gained touch-selection improvements, zoom support, consistent page headers across its user interface, better loading time for the new tab view, the ability to load only the current tab when restoring a session, and support for displaying a hovered hyperlink URL in an overlay. Last but not least, the keyboard now supports colored emoji, some new handy toggles were added to various indicators, and it looks like users will be promoted for location permission when launching Scopes that need location services for the first time. Of course, numerous bugs have been squashed in the OTA-12 update, so check out the official release notes for more details. Source