Welcome to nsane.forums

Welcome to nsane.forums, like most online communities you need to register to view parts of our community or to make contributions, but don't worry: this is a free and simple process that requires minimal information. Be a part of nsane.forums by signing in or creating an account.

  • Access special members only forums
  • Start new topics and reply to others
  • Subscribe to topics and forums to get automatic updates

Search the Community

Showing results for tags 'mobile'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Found 109 results

  1. In some cases, like with 5.5-inch screens, AMOLED panels are now the cheaper option. AMOLED displays are popular for the pure blacks and energy efficient 'glance' displays they enable. Thus they are seen as a premium option for smartphone and laptop users, and AMOLED panels are only seen in really high-end TVs. However, thanks to competition and demand spurring greater production, prices are starting to become more competitive with TFT LCD panels, reports IT industry journal DigiTimes. According to the source report "The production cost for a 5.5-inch HD AMOLED panel has drifted to US$12.10 recently, compared to US$12.20 for a 5.5-inch HP LTPS LCD panel". This is a big change to the previous state of affairs where AMOLED panels had "much higher," prices due to the increased production costs. Thanks to the levelling off of prices and demand it's expected that AMOLED panels will be equipped on up to 50 per cent of smartphones by 2020. Back to the AMOLED panel pricing news, and there is hope that larger displays, not just those aimed at smartphones and tablets, will come down in price. LG Display's E4-2 fab, its second production line for AMOLED displays for TVs, will enter volume production in H2 2017, says DigiTimes. Thanks to the new production line AMOLED TV display production is set to more than double to 1.5 million units, say sources. Furthermore, several Chinese panel makers have been investing in AMOLED production facilities with output set to increase fivefold (comparing 2016 output to that estimated to come on line in 2018). View: Original Article
  2. Dual camera, faster A53 and Adreno 506 Qualcomm has four different phone tiers - the Snapdragon 800 as a premium tier, Snapdragon 600 for a high-end tier, Snapdragon 400 for a mid-tier and Qualcomm 200 mobile platform as an entry level tier. The company has already announced the Snapdragon 835 as its flagship product for this year. It also announced the Snapdragon 660 and 630 as well as the Snapdragon 205 for the entry level. Now the Snapdragon 450 is the first 14nm FinFET for high quality and cost effective designs. Qualcomm has more than 1900 designs based on the 400 series launched or in the works. This is a massive number that underlines the importance of this market. Some of the phones based on the 400 series include the HTC desire 510, the LG Lancet, the ZTE Speed, Marshall London, the Kyocera Hyrdo Wave, the Samsung Galaxy J5, the Moto G Play, Blu Life One, Oppo A33 and the Vivo Y35A. The Snapdragon 450 still uses eight Cortex A53 cores now clocked at 1.8GHz or 500 MHz faster than the previous Snapdragon 435 platform. The platform is software compatible with the Snapdragon 425, 427, 430, 435, 625 and 626. This will enable manufacturers to decrease the time to market and stay competitive. A 500 MHz higher clock can result with 25 percent higher CPU performance and up to 20 percent faster social app launching, up to 20 percent faster email launching, 15 percent faster to launch maps and over 10 percent faster launch of gaming apps. Due to the 14nm FinFET design, the battery life will get significantly better and you can expect four more hours at the end of the day compared to the Snapdragon 435. This is equivalent to 1.5 days talk time, eight days of music, 18 hours of video playback, 14 hours of streaming videos, seven hours of video capture or 15 hours of gaming. On top of that, Snapdragon 450 supports Quick Charge 3.0 technology that will let you charge your phone from zero to 85 in 35 minutes. This is up to 27 percent faster and 45 percent more efficient compared to the previous generation and now the platform supports a very popular USB Type C. Qualcomm location enables higher accuracy positioning with lower battery consumtion compared to a GNSS only solution. Adreno 506 brings up to 25 percent faster graphics rendering with up to 30 percent lower power. Gaming will definitely get faster. One way to think about the Snapdragon 450 is that most features from last year’s 600 series are inherited in the 400 series. The Snapdragon 450 supports quick charge 3.0, power management, improved speaker amp, touch, fingerprint and audio codec. The SoC supports Snapdragon X9 LTE modem and joins the large Carrier aggregation supporting family. The X9 LTE enables Cat 7 downlink speeds with up to 300 Mbps, and Cat 13 uplink speeds of up to 150 Mbps. The modem supports 2x20MHz carrier aggregation and some advanced compression features including the 64 QAM. From the connectivity point of view, the Snapdragon 450 supports 802.11ac with MU-MIMO (Multi User MIMO) a feature that can tremendously speed up wireless speeds when matched with a router supporting this feature. It is important to remember that Cat 6 with 300 Mbps speeds is available in 95 countries globally. More than 130 operators are investing in Cat 6 LTE. There are currently 194 commercially launched CA networks. The Snapdragon 450 supports dual camera setup, each supporting up to 13 megapixels and a single camera solution can take care of a 21 megapixel camera. The camera supports Real time Bokeh, a camera blur affect during camera preview and Qualcomm Clear sight, something we got to experience with the higher Snapdragon tiers. The SoC can combine the information from the Bayer/RGB sensor with a black and white sensor, resulting in improved sharpness in all lightning conditions, especially in low light. Snapdragon 450 supports 1080p @ 60 FPS with Full HEVC encode and decode that should enable smoother video capture and playback. This is an important step up compared to the Snapdragon 435 that supports 1080p @ 30 FPS. The Snapdragon 450 supports high quality audio recording with sound focus and ability to suppress unwanted noise from outside the field of view. The new platform also supports FHD+ screens at 60 FPS including the new and popular 18:9 aspect ratio. You can expect to see higher quality displays with extended power saving in the new Snapdragon 450 tier. If that is not enough, despite the usual fingerprint sensor, the Snapdragon 450 is the first to enable eye based authentication. This is a one stop integration for OEMs with liveness detection, real-time authentication and cutting edge performance. The platform supports USB 3.0, a speedy increase from the USB 2.0 with Snapdragon 435. Commercial sampling to customers is expected in Q3 2017 and in devices in Q4 2017. It will be, as always, up to Qualcomm customers to announce products. Fudzilla asked Kedar Kondap, a vice president of product marketing, about the price range of the Snapdragon 450 devices and you can expect to see the Snapdragon 450 based phones between $150 to $250. Kedar pointed out that it will be up to manufacturers to implement the features and higher quality components will dictate the price. US and European readers should be familiar with the very successful Moto G Play, a $/Euro 150 phone that launched with Snapdragon 400 series and did a good job. Of course some brands from China will be able to offer this phone for less than that as Xiaomi Redmi 4A powered by Snapdragon 435 is currently selling for 599 Chinese Yuan ( 77.35 Euro / $88.36). Imagine the possible successor to the Snapdragon 450, that will be a hell of a phone for less than $99 bucks, at least in China and India. View: Original Article
  3. This is the Essential Phone The Essential Phone, brought to us by the person who created Android, is finally ready for the spotlight. It’s an incredibly audacious and ambitious project, with an outlandish screen and the beginnings of a modular ecosystem. First, the Android phone basics: the Essential Phone costs $699 with top-of-the-line specs and features. As you can see above, it prominently features an edge-to-edge display that one-ups even the Samsung Galaxy S8 by bringing it all the way to the the top of the phone, wrapping around the front-facing selfie camera. It’s a unique take on a big screen that makes the phone stand out — and it’s smart, too. Often, the status bar at the top of an Android phone doesn’t fill that middle space with icons, so it’s efficient. The screen does leave some bezel at the bottom of the phone, but nevertheless it’s as close to the whole front of a phone being display as I’ve seen. Essential is launching the phone in the US to start, and it’s filled the phone with radios that should make it work on all major carriers, alongside usual Android flagship internals like a Qualcomm 835 processor, 4GB of RAM, and 128GB of storage. And because Essential seems to be hanging its hat on the idea of shipping phones without extraneous junk (the designers don’t even put a logo on the exterior), chances seem good that there won’t be a ton of extraneous software laded on to slow the phone down. Essential is clearly planning on releasing a very well-made phone: the screen looks promising, it has no annoying logos, and it is built with a combination of titanium and ceramic so it can survive a drop test “without blemish, unlike the aluminum competitor devices.” (Those would be Samsung and Apple, if you’re wondering.) But nice hardware isn’t all that hard to come by on Android phones, so the company is aiming to build an ecosystem of accessories. It starts with a magnetic connector and wireless data transfer. Essential will ship a 360-degree camera that can click in to the top of the phone, and the company will also offer a charging dock. Both connect to the phone with small metal pogo pins. They won’t entirely replace USB-C for most people, but Essential is clearly hoping that they could someday. peaking of ports, there is no traditional 3.5mm headphone jack — which is a bummer. We’re told that it will ship with a headphone dongle in the box. It’s possible that other audio accessories could be made that could clip on to the magnetic accessory port. The Essential Phone also has a good take on the dual-camera systems we’ve seen on other phones. Rather than use the second lens for telephoto or bokeh, it’s using it for a monochrome sensor, just like Huawei has been doing with the P9 and P10. That second sensor will be able to take in more light than a traditional color camera, meaning it can be combined with the regular 13-megapixel for better low-light shots. The front-facing camera is in line with current expectations, too: an 8-megapixel sensor that can also capture 4K video. All that sounds great, but it ignores some key facts in the smartphone space: Apple and Samsung have it pretty locked up right now. The pessimist might say that although this phone looks incredible, it is also likely to break upon the shoals of the phone market, the same rocks that have cracked every Android phone that doesn’t have the Samsung logo emblazoned on it: carrier support, consumer interest, and lack of true differentiation. But when it comes to cracking on the rocks, Andy Rubin claims that the Essential phone’s titanium and ceramic build is better able to withstand a drop test. Presumably, Essential’s grander ambitions are equally durable — it’s impossible to look at just this phone outside the context of Essential’s other announcements: the Essential Home speaker and its Ambient OS. Even if those ambitions don’t bear out, the Essential Phone itself is exciting on its own. It’s a simple, straightforward Android device that respects the user: it’s powerful, clean, and not entirely beholden to the business whims of the giant companies that currently control the mobile and smart home markets. If nothing else, it deserves our attention because it’s coming from Andy Rubin, who knows a thing or two about doing the right thing in the smartphone world. Source
  4. Almost all recent OnePlus smartphones are vulnerable to attacks that can downgrade the phone's operating system and expose the device to previously patched security flaws. Mobile security expert Roee Hay of Aleph Research discovered the vulnerabilities and reported the problems to OnePlus in January, but the company failed to address any of the issues. According to Hay, the vulnerabilities affect OnePlus models such as X, 2, 3, and 3T, running both OxygenOS and HydrogenOS, which are custom versions of the Android OS running on OnePlus phones. Attack is possible because of OTA update process via HTTP Hay says that an attacker can launch an attack and hijack the phone's Over-The-Air (OTA) update process, which is susceptible to man-in-the-middle (MitM) attacks because it's handled via HTTP instead of HTTPS. The researcher says that even if OnePlus OTA update packages are signed to prevent the installation from unauthorized locations, they aren't verified based on version or timestamp. This slip-up allowed Hay to install an older version of the OxygenOS or HydrogenOS, downgrading the phone to a previous OS version that was susceptible to previously patched security flaws. The video below shows Hay performing the OS downgrade attack. In addition, Hay also discovered that an attacker could also install OxygenOS on devices designed to support HydrogenOS, the precursor of OxygenOS. In some cases, installing the superior OS on an older product would lead to crashes or a permanent denial of service. Last but not least, Hay also installed another version of the Android ROM boot-up package on different OnePlus devices. For example, the OnePlus X ROM on a OnePlus One device and vice versa, causing again, a denial of service state due to hardware incompatibilities. Physical access attack is also possible Besides these scenarios that rely on performing a MitM attack on the OTA update, the Aleph Research expert discovered that an attacker with physical access to the device could also reboot the phone into Recovery Mode and sideload the OTA package that way. Unlike the MitM attack that was universal, this second attack vector only worked on OnePlus 3 and 3T models, and where the Secure Start-up feature is disabled. This is the second time Hay has taken the hammer to OnePlus security. Back in March, the researcher published another piece of research that showed how an attacker could hijack OnePlus 3 and 3T models with a malicious charger. Videos of those previous vulnerabilities being exploited — which OnePlus developers patched — are available below. Source
  5. Plenty of people have been burned by Samsung, but that was mainly due to exploding Galaxy Note 7s. But now one guy has been burned hard on Twitter after trying to be funny and failing miserably. It all started when Samsung recently asked people to tweet the first pictures that they took with their Galaxy S8s. Many people politely did as requested, but there’s always one person who wants to ruin it for everybody else. In this case that person was @savEdward, who told Samsung that the first pic they took was in fact a picture of their genitalia. Unfazed by Edward’s attempt at humor however, Samsung shot back with a single hilarious emoji that spoke much louder than words ever could. See for yourself below. The moral of the story? Don’t mess with Samsung! Samsung recently asked people to send them the first pictures they took with their Galazy S8 It didn’t take long for the internet to show its appreciation Source
  6. MiniTool Mobile Recovery for iOS is a piece of iOS data recovery software. This tool supports recovering lost data, like photos, messages/imessages, contacts, call history, notes and etc files from iPhone (or other iOS devices), iTunes and iCloud backup. MiniTool Mobile Recovery for iOS has three recovery modules: “Recover from iOS Device”, “Recover from iTunes Backup File” and “Recover from iCloud Backup File”. You can choose a proper module according to the actual situation to recover the lost data.MiniTool iOS Data Recovery provides free iPhone data recovery service. No matter your files were lost due to accidental deletion, iOS upgrade failure, factory resettings or white apple, etc.. MiniTool Mobile Recovery for iOS will find and fully restore all files. LINK
  7. Hi Guys, I was wondering what Windows based File managers you guys are using for your andfroid devices i usued to use only Android Commander untill ddevelopment stopped now i use it alongside MobileGo. what are you guys using and does anyone know which is the closest to android commander, this was the best imho.
  8. A JavaScript file secretly loaded without your knowledge on a site, or app you load on your mobile device, can access data from various sensors and collect information needed to guess the passwords or PIN a user is entering on his device. This novel attack technique was discovered and explored by a team of scientists from the University of Newcastle in the UK, who say the script can collect data from around 25 sensors, which together, allow an attacker to infer what the user types on his device. Not all sensors are restricted by OS permissions The attack is successful because mobile operating systems do not restrict applications, such as browsers, from accessing all these sensors. The current built-in permissions model asks users to grant an app access to sensors such as GPS, camera, or microphone, but not to data from the phone's accelerometer, gyroscope, proximity, NFC, and rotation sensors. Due to lowering costs, these sensors are now becoming a common feature in modern smartphones, but mobile operating systems are lagging behind. Attack relies on malicious JavaScript code The four-man research team wrote a JavaScript file called PINlogger.js which accesses these ungoverned sensors and logs sensor usage data. If the user allows the browser or a tainted app to run in the background of his phone, while using another app, the PINlogger.js script will continue to collect sensor data. If at any point the user enters PINs or passwords, PINlogger.js records the data and sends it to an attacker's server. The more sensors the phone is equipped with, the more data the attacker has at his disposal to deduce what the user has typed. "It’s a bit like doing a jigsaw – the more pieces you put together the easier it is to see the picture," says Dr. Siamak Shahandashti, a Senior Research Associate in the School of Computing Science and one of the researchers that worked on the study. Attackers can guess PINs with a high degree of accuracy Just by listening to motion and orientation sensor streams, which do not require special permissions to access, researchers said that an artificial neural network they've trained was able to crack four-digit numerical PINs on the first try with a 74% accuracy based on the data logged from 50 user devices. The accuracy grew to 86% and 94% when the neural network was allowed a second and third try, respectively. Further, the algorithm coould also be adapted to handle full alpha-numerical characters. According to researchers, the entire point of their research was to raise awareness to the vast number of smartphone sensors which applications can access, and for which mobile OS vendors haven't yet included in their standard permissions model. Some browser vendors have implemented fixes The research team has also filed bug reports with several browser vendors. Following the team's reports, starting with Firefox 46 (April 2016), Mozilla has restricted JavaScript access to motion and orientation sensors to only top-level documents and same-origin iframes. Similarly, starting with iOS 9.3 (March 2016), Apple implemented a similar restriction for Safari. The issue remains unresolved in Chrome. In the future, researchers would like to see mitigations solutions at the OS level, rather than applications. The full research paper was published today in the International Journal of Information Security, and is entitled "Stealing PINs via mobile sensors: actual risk versus user perception." At the top of this article there is a video of PINlogger.js collecting sensor data from an iOS device. Source
  9. Nokia To Smartphone Owners: Malware Infections Are Far Higher Than You Think Nokia warns that mobile malware infections grew dramatically in the second half of 2016. Overall, the monthly smartphone infection rate averaged 0.90 percent, an 83 percent increase over the first half of 2016. Nokia no longer makes mobile devices but it's carving out a new business in mobile and Internet of Things security. Now new research from the unit is reporting a 83 percent rise in monthly smartphone infections in the second half of 2016. Two years ago Verizon challenged assumptions about the spread of mobile malware, reporting that just 0.03 percent of smartphones on its network were infected with 'higher-grade' malware. It was much lower than the 0.68 percent infection rate estimated in Kindsight Security Labs' biannual report. But a new report from Nokia, based on data from mobile networks that have deployed its NetGuard Endpoint Security, suggests infections are actually far higher. According to Nokia, the monthly rate of infections in mobile networks peaked at 1.35 percent in October, and averaged 1.08 percent in the second half of 2016. The average infection rate in the first half was 0.66 percent, translating to a 63 percent rise between the periods. It also measured monthly infections on smartphones and says the average rate was 0.9 percent in the second half, up 83 percent from 0.49 percent in the first half. Over the entire year, it says smartphone infections rose a whopping 400 percent. Nokia's data included around 100 million devices across Europe, North America, Asia Pacific and the Middle East. It says that 81 percent of infections were on Android devices, 15 percent on Windows devices, and four percent on iPhones and other mobile devices. It notes that Windows share of infections it counted shrank from 22 percent in the first half of 2016. Although Nokia's report doesn't exclusively deal with Android, it offers a contrast to Google's assessment of malware infections in its Android Security 2016 Year in Review report, released earlier this month. Google reported Android device infections at 0.64 percent in the first quarter of 2016 growing to 0.77 percent in the second quarter, and then moving to 0.67 percent and 0.71 percent in the third and fourth quarters, respectively. Google's measure is based on the frequency it finds PHAs or potentially harmful applications during a "routine full-device scan" with its Verify Apps Android anti-malware service. Google said since 2014 infections on Android have been less than one percent. It also noted that users were 10 times more likely to download malware from outside Google Play than inside its store in 2016. While Nokia reports that infections on mobile networks are increasing, infections on fixed-line residential networks have been falling since the beginning of 2015, despite a bump in early 2016 due to a surge in adware. Source
  10. Call centers in Washington, DC, were affected by AT&T's 911 outage on March 8, 2017. The FCC reported preliminary findings of its investigation on the outage at the agency's March meeting. A network configuration error left thousands of AT&T customers around the country without access to emergency 911 service for five hours, the FCC said. AT&T's 911 service outage earlier this month affected thousands of customers across the country, according to a preliminary report from the Federal Communications Commission. On March 8, roughly 12,600 callers throughout the US were unable to reach 911 emergency dispatchers for five hours, Lisa Fowlkes, acting chief for the FCC's Public Safety and Homeland Security bureau, told commissioners at the agency's monthly meeting Thursday. AT&T told the FCC that it typically handles 44,000 calls through its 911 service each day. The outage occurred after AT&T had reconfigured its voice over LTE network, which transmits voice calls over the same network that handles its high-speed internet service. Some calls were rerouted to backup call centers. These calls were being manually forwarded to 911 operators, but when the volume of calls became too large, some calls were dropped, Fowlkes explained. This resulted in some customers experiencing busy signals when they tried to call 911. Public safety officials told the FCC that some calls continued to ring and went unanswered while other callers say they heard nothing on the line. A second AT&T 911 outage, caused by a hardware failure, occurred on March 11, which affected a smaller portion of calls, Fowlkes reported. The FCC said the two outages were unrelated. "We've done an extensive evaluation of the outage, which was caused by a system configuration change between our network and a certified 911 vendor, and we're taking steps to address the issue," an AT&T spokesman said in a statement. "We take our obligations to our customers very seriously and will continue to work with the FCC as it completes its report on the situation." The incidents come as problems with 911 service in Dallas this month may have resulted in the deaths of at least two people, one of whom was a six month infant. Initially it was believed T-Mobile may have been to blame, but the city of Dallas has since said the issue was not related to the mobile network, but was instead the result of large numbers of callers hanging up and redialing 911. FCC Chairman Ajit Pai had announced an investigation into AT&T's outage as it was happening on March 8. He said at the meeting that he takes seriously the agency's duty to protect the nation's communication system The FCC is continuing its inquiry into the incident, Fowlkes said. Source
  11. The interestingly named "Swearing Trojan" appears to be using fake mobile base stations in China to send phishing SMS messages to fool victims. If you're heading to China, you may want to watch out for legit-looking SMS messages from local carriers China Mobile and China Telecom. That's because the group behind the banking malware known as "Swearing Trojan" has been using fake mobile stations to masquerade as a real carrier and send phishing SMS messages that trick you into clicking on a malicious URL, according to security research group Check Point. While there have been reports that the authors behind the malware have been arrested, Check Point said it is still detecting the spread of the malware. Once installed, Screaming Trojan intercepts your bank's 2FA passwords, giving the malware authors access to your bank account. Besides fake mobile base stations, the malware also propagates via your contact lists, using seemingly real messages to get other victims to download the malware or fake "nude celebrity" scams to get victims to click on a malicious URL. Source
  12. Business reservations are coming to the selfie service. Instagram is looking to do more for advertisers than unveiling new filters, as the Facebook-owned service will soon allow users to use the picture sharing site to also book appointments with local businesses. The feature would allow the 8 million-plus businesses that use Instagram to attract customers to get more use out of social media network, according to Bloomberg. The new feature appears to be as straightforward as reserving a table for two at 7pm or squeezing in a trim at a local barber with simple interactions on the Instagram app - a boon to those looking for more customers than "likes." Instagram plans to roll out this feature in the coming months, with the service also reportedly giving some thought to adding reviews and other business-minded tools. Instagram head of business James Quarles says that 80% of the site's users follow a business of some kind, making it logical to have the service shift focus to local shops and not just Spring Break selfies and food pics. Additionally, these features effectively pit Instagram with other long-standing reference sites like OpenTable and Yelp, making it all the more interesting to see what direction Facebook takes its filter-flipping service going forward. Source
  13. Google released a developer version of Android O, and here are some of our favorite features and why you should actually care. It's a fun day when the developer preview for an upcoming operating system is released. Whether you're a developer or not you get a sneak peek at upcoming features that may soon be coming to your phone. Google released Tuesday the developer version of its next Android OS currently called just O. Some of O's most exciting features are better battery life, easier controls for notifications and picture-in-picture video for both phones and tablets. There's no guarantee all these features will be in the full release some time later this year. 1. Battery life Improving the battery life is one of the biggest and most welcomed features of Android O. Similar to iOS, Android O will limit and manage what apps do in the background while multiple apps are open. This is one of those "behind the curtain" features that you'll appreciate even if you can't see exactly how it works. For example, if you are using Instagram but have Google Maps open in the background, location services will update the location less frequently for Maps to keep it from draining your battery as fast. 2. Notifications channels Notifications have always been one of the perennial strong features of Android. In O, you can group your notifications into channels or as Google describes it: "app-defined categories for notification content". So if you had a channel of apps that are all "news" related, you could interact and control notification settings for all the apps in the news channel at once. 3. Snooze notifications Sometimes as wonderful as notifications are, you just need them to be quiet for a little while. Android O gives you the ability to snooze notifications simply by sliding your finger across a notification and then selecting how long to snooze it for: 15, 30 or 60 minutes. 4. Picture-in-picture While we've seen picture-in-picture video for the iPad, we've yet to see it fully functioning on a phone. Android O brings the ability to keep a video playing while interacting with another app. To what extent this feature is incorporated by video apps like Netflix and HBO Now remains to be seen. But hopefully you'll be able to keep watching "Game Of Thrones" as you check the weather to see if winter is indeed coming. (Spoiler: It is.) 5. Lock screen shortcuts On the lock screen in Android Nougat there is a microphone icon for quick access to Google Assistant and a camera icon for quick access to take a picture. Android O will allow you to customize your lock screen with even more shortcuts. 6. Autofill system wide If you use a password manager app, Android O gives you easy yet secure access to it across your device via autofill. You will be able to select which password manager app you want to take advantage of a system wide autofill feature. This is similar to the way you can now select which keyboard to use across your apps on your phone. 7. Wide-gamut color What the heck is wide-gamut color? Exactly. While this feature might not mean much to you now, it's really about future proofing. As displays improve with newer phones and tablets, your apps will be able to take full advantage of all the colors and their subtleties. Just imagine how amazing all your cat pics will look. 8. HiFi Bluetooth audio Your phone will now be able to wirelessly stream higher quality audio. Obviously, to fully hear the higher quality depends on the quality of the audio recording and the speaker or headphone with which you're listening to it. This is a big plus for any audiophiles out there. 9. Keyboard shortcuts Good news if you use a keyboard with an Android tablet: Android O gives better support for developers to make navigation and shortcuts easier to use via a physical keyboard. Could this pave the way for Android laptops, and maybe Chromebooks? What's next for O? This is a very early build of Android O so we can't say what other features will be added in the future. It's so early, that we don't even know what sweet treat Android O is named after! Oreo? Oatmeal cookie? Orangesicle? We have a few guesses as to what O could actually be. We are bound to learn more in depth about the features we highlighted as well as any new ones at Google's annual software developer conference I/O, in May. Source
  14. Keep charging phones away from bathrooms A UK man plugged his iPhone into an outlet via an extension cord and appears to have rested the charger on his chest in the bath. Richard Bull was found dead in the bathtub. His wife found him with severe burns to his body at their home in London. As the Daily Mail reports, when police arrived at the scene they found an extension cord leading into the bathroom from the hallway. "We found an iPhone plugged into the extension cable and then the charger element in the bath," PC Craig Pattinson told an inquiry into Bull's death. He added: "The extension cable was on the floor and it appeared as though he had his phone charger on his chest and the part between the phone charger and the cable had made contact with the water." The inquest concluded that 32-year-old Bull's death was caused accidental electrocution. However, the coroner, a public official who investigates suspicious, sudden or violent deaths, said he was extremely concerned that people didn't realize that phones were as dangerous near water as, say, hairdryers. The coroner, Dr. Sean Cummings, told the inquiry: "They should attach warnings. I intend to write a report later to the makers of the phone." Apple didn't immediately respond to a request for comment. The Mail quoted Bull's brother Andrew as saying: "I live in the US and they say it can't happen, and that there is not enough electricity. But in the UK it is enough. You don't think there is enough electricity but there is." Source
  15. I am just copying the important chunks from this article The recent leaks reveal how, for years, CIA was busy hacking into many consumer electronics devices, including Wi-Fi routers, Samsung Smart TVs, iPhones and Android-powered devices. According to the documents, the agency employed specialized tools to exploit the security vulnerabilities in these devices and recorded videos, audio conversations, text messages, or anything that could help them keep tabs on the owners of those devices. According to WikiLeaks, many malwares and hacking tools were developed by EDG (Engineering Development Group), one of CIA’s own software development group, while some tools and applications were acquired from other government agencies or third-party dealers. The CIA dubbed these third-parties as their partners, and used codenames like SurfsUp, Peppermint, Anglerfish and Fangtooth. Forbes reported that these vulnerabilities are worth a lot in the market, i.e., over $1 million for every bug. Severity of the leaks: The malware created by CIA for hacking into users’ personal gadgets are so effective that they can safely bypass even the most popular security programs. Amongst Different OSs, Android Attracted the Most Exploits The popular Smartphone Operating System, Android, enjoys a major market share in the Smartphone industry. Perhaps, that’s what makes it one of the important targets for the Central Intelligence Agency. Amongst the many exploits reported by WikiLeaks, a good chunk of those exploits were especially developed to break into Android devices and applications. Chronos, purchased from Anglerish, exploits the security weaknesses of Android devices that are running on 4.0 Dugrito, another tool by Anglerfish, is a remote access exploit that hits devices running 4.0 – 4.1.2 Flamekimmer, a tool by SurfsUp, hits devices that use Broadcom Wi-fi chipsets, running OS 4.4.4 RCE bugs, by Anglerfish, Fangtooth, NSA and GCHQ, are remote access exploits that can be used for hacking into any device from anywhere Dragonfly, currently no information available except that it is a RCE bug for Android security exploits Sulfur, by Fangtooth, one of the most critical exploits that hits the kernel files of Android, leaking information remotely RoidRage, another tool that allows hackers to have remote access of the hacked device At first, WikiLeaks provided detailed information on these Android exploits by CIA but it later redacted the pages to prevent the actual codes from getting into the wrong hands.
  16. Your Samsung, LG, Xiaomi, or other Android smartphone could be pre-loaded with malware Despite being based on the very secure Linux kernel, Android isn't necessarily a very secure operating system. Unlike iOS which does a great job of shielding its users from installing apps from outside Apple's own App Store, it is far too easy to do so on Google's mobile OS. Also, there is nothing requiring manufacturers to issue device updates, meaning many users are forced to use outdated and vulnerable versions of the operating system. For the most part, however, Android users can remain safe by acting intelligently, such as only installing apps from the Play Store. Well, that might not be so true anymore. You see, it has been discovered that many models of Android smartphones -- from manufacturers such as Samsung, LG, and even Google's own Nexus line -- are being sold with malware pre-installed. This is particularly bad malware, as it can steal user information. Some devices even came pre-loaded with ransomware! "The Check Point Mobile Threat Prevention has recently detected a severe infection in 38 Android devices, belonging to a large telecommunications company and a multinational technology company. While this is not unusual, one detail of the attacks stands out. In all instances, the malware was not downloaded to the device as a result of the users' use, it arrived with it," says Oren Koriat, Check Point Mobile Research Team. Koriat further says, "According to the findings, the malware were already present on the devices even before the users received them. The malicious apps were not part of the official ROM supplied by the vendor, and were added somewhere along the supply chain. Six of the malware instances were added by a malicious actor to the device’s ROM using system privileges, meaning they couldn’t be removed by the user and the device had to be re-flashed." Check Point shares the following make and models of Android devices, plus the associated infected APK. Smartphone Malware APK Asus Zenfone 2 com.google.googlesearch Google Nexus 5 com.changba Google Nexus 5 com.mobogenie.daemon Google Nexus 5X com.changba Lenovo A850 com.androidhelper.sdk LenovoS90 com.google.googlesearch LenovoS90 com.skymobi.mopoplay.appstore LG G4 com.fone.player1 Oppo N3 com.android.ys.services OppoR7 plus com.example.loader Samsung Galaxy A5 com.baycode.mop Samsung Galaxy A5 com.android.deketv Samsung Galaxy Note 2 com.fone.player0 Samsung Galaxy Note 2 com.sds.android.ttpod Samsung Galaxy Note 3 com.changba Samsung Galaxy Note 4 com.kandian.hdtogoapp Samsung Galaxy Note 4 com.changba Samsung Galaxy Note 4 air.fyzb3 Samsung Galaxy Note 5 com.ddev.downloader.v2 Samsung Galaxy Note 8 com.kandian.hdtogoapp Samsung Galaxy Note Edge com.changba Samsung Galaxy Note Edge com.mojang.minecraftpe Samsung Galaxy S4 com.lu.compass Samsung Galaxy S4 com.kandian.hdtogoapp Samsung Galaxy S4 com.changba Samsung Galaxy S4 com.changba Samsung Galaxy S4 com.mobogenie.daemon Samsung Galaxy S7 com.lu.compass Samsung Galaxy Tab 2 com.armorforandroid.security Samsung Galaxy Tab S2 com.example.loader vivo X6 plus com.android.ys.services Xiaomi Mi 4i com.sds.android.ttpod Xiaomi Redmi com.yongfu.wenjianjiaguanli ZTE x500 com.iflytek.ringdiyclient It is important to note that the phones are not coming from the manufacturers with the malware installed. Instead, third-party retailers (or their suppliers) are pre-loading malware on the devices, which are sold to unsuspecting consumers. In other words, if you purchased your phone new from a trusted retailer like Best Buy, for example, then you should be fine. If you bought a phone from, say, eBay or Craigslist, you could be infected -- but it is not a guarantee. To make matters worse, the malware cannot be easily removed -- an app cannot do it, sadly. Check Point found that the phones must be re-flashed entirely, with a clean version of the OS. This is likely beyond the capabilities of the average consumer. Article source
  17. A team in Japan has used the processing power of citizens' phones and computers to find a cure for neuroblastoma. Now, it's focusing on childhood cancer. Japanese scientists want your help to cure cancer. No, they don't want your money -- they want the processing power of your phone. The Smash Childhood Cancer project utilises people's phones and computers to run drug simulations, which would take thousands of years to run on a single computer. Akira Nakagawara and his team at the Saga-ken Medical Centre Koseikan developed the system, which they call the World Community Grid, in 2004 alongside IBM. "Computing processing that would require 55,000 years to be done by a single ordinary computer was finished in just two years," claimed Nakagawara of previous work, reports Asahi Shimbun. After discovering potential treatments for neuroblastoma, Nakagawara and his team are now using the World Community Grid to focus on battling other types of childhood cancer. Approximately 300,000 children every year are diagnosed with cancer, causing 80,000 deaths. If you wish to take part in the project, all it takes is registering on this site and downloading an app. From there, your device, be it your phone or PC, will donate some processing power to run these medical simulations during its downtime. Source
  18. How To Use Facebook Messenger Without A Facebook Account You Can Now Use Facebook Messenger Without A Facebook Account, Know How With over one billion users worldwide, Facebook Messenger is now one of the biggest messaging platforms worldwide. In order to have a Facebook Messenger app on your device, you need to have an active Facebook account. However, there are a lot of reasons that many people may not want to use Facebook but only the Messenger app. For instance, Facebook staples like pyramid schemes, political debates, and pointless status updates can fill some users with rage and using such a social media site is a big no-no for them. Similarly, there are users who are not interested in keeping up with friends online and rather catch up over a cup of coffee or on the phone instead of through liking each other’s perfect social media posts. But, what about those people who want to keep in touch with certain people who are not on any other platform except for Facebook Messenger. In such a scenario, is it possible to use Facebook Messenger app without having an active Facebook account? Yes, it is. You can stay in touch with your friends via Facebook Messenger, by following the steps below: Open Facebook’s deactivate account page. Ignore the photos of the people who will apparently miss you and scroll to the bottom. The last option says you can continue using Facebook Messenger even if you deactivate your account. Make sure this is not checked and just leave it as is. Scroll down and hit Deactivate. Now, your Facebook account will be deactivated. All your Facebook data will be safe until you are ready to log in again. Go ahead and open the Messenger app using your old Facebook credentials on your smartphone or log in via the website on your PC. You will notice that you can continue chatting with all your friends without losing any of your data. Please note that your deactivated Facebook account doesn’t get reactivated, if you are using Messenger. Your friends will only be able to contact you via the chat window in Facebook or the Messenger app. If you want to use Messenger and don’t have a Facebook account, then follow the instructions mentioned below: Download Facebook Messenger on iOS, Android, or Windows Phone. Open the app and enter your phone number. Tap Continue. You will get a code via SMS to confirm your number. Once you have done that you can key in phone numbers of your friends and start messaging them. Source
  19. Nokia's Return to Smartphone Business Confirmed for 2017 An official slide from the company has spilled the beans Apparently, an official slide from Nokia's Capital Markets Day presentation has just leaked online and the folks over at NPU have been quick to report on it. The slide show Nokia's main topics for the next two years and the current one. While in 2016 Nokia focused on the launch of its incredible OZO VR camera, Withings acquisition and licensing its phone brand to HMD, the next two year will be even more exciting for the Finnish company. For example, in 2017 Nokia plans to strengthen its presence in the VR market, but it remains to be seen how it will be able to do that. Another important topic for Nokia fans, the comeback of the company to the smartphone business is happening next year as well. The Finnish giant notes in the presentation slide that “Nokia brand's return to smartphones” is to take place in 2017. Moreover, the company plans to expand patent licensing in mobile, automotive and consumer electronics during the same year. As for 2018, Nokia is going to work towards licensing its own VR technology, and hopes to grow considerably in remote patient care in Digital Health. The Finnish company also mentions that it will continue the patent licensing growth and diversification throughout 2018 as well. If you're a Nokia fans, 2017 is definitely going to be a very interesting year for you. At least two Android smartphones are expected to be unveiled in the first half of the year, but these won't be the only handsets Nokia will launch in 2017. The only thing that remains to clarify is when exactly the first Nokia-branded smartphones in a long while will be officially unveiled. Some bet on Mobile World Congress, which is scheduled to take place at the end of February, while other are more pessimist claim the first Nokia smartphones won't be announced until April/May. Source
  20. Hi All, Just wondering if Nokia with Canonical makes Ubuntu Touch Devices, does people love it and buy to help support Ubuntu Touch development? My wish is that Nokia should join hands with Canonical to make Ubuntu Devices. If that happens, all lazy s/w app giants will create apps supporting Ubuntu Touch platform. I'm calling s/w app giants as lazy bcoz if they would've supported Ubuntu Touch earlier, the OS could've been overtaking Android & Windows Phones(or Windows 10 Mobile) by now. All Nokia & Ubuntu/Linux fans(incl. myself) or devs out there, please suggest Nokia to create Ubuntu Devices in future ASAP. Please vote and provide feedback in comments(if any). Members please note that I'm referring to the future and not now. I'm not a fool to ask for/suggest a change in the first year of re-emerged Nokia. @steven36 & @teodz1984: Please read the desc carefully before providing comments.
  21. MyPhoneExplorer is a freeware phone management software, useful for those who need to explore their phones. It works with Sony Ericsson and Android mobile phones (running Android 1.6 or higher). This application can connect to mobile devices using an USB cable, wifi, infrared or Bluetooth connections. As soon as a connection has been established, you can perform all kind of actions (listed at features section below) related to backup, explorer and personal information manager. It works with almost all Microsoft Windows versions in both ways: portable or installer. Linux users can run this software using the Wine emulator (tested with Ubuntu Linux version 12.10). Features: sync your mobile phone with other Desktop based apps such as Microsoft Outlook (including Express), Mozilla Thunderbird, Sunbird, Lotus Notes, Google Mail and others. sync your calendar entries with Microsoft Windows Calendar, Rainlendar, Tobit David, Google Calendar and net shared calendars. bidirectional filesync with the phone set your phone clock based on atom time. enhanced "Filebrowser" (you can use it to move and rename files and also for the management of the external storage) and "Control Phone" feature. manage and edit profiles, SMS, memory status, phone monitor, call lists, handle calls, automatic photo sync, create your own backups using a WiFi, USB-Cable or Bluetooth connection. it work with a large collection of mobile phones especially those from Sony Ericsson and those that runs Android 1.6 or higher edition. the only limitation applies to low-cost phones which does not have a PC-interface and the Symbian based (examples: W950i, W960i, G700, G900, P1i, M600i) that require the PC-Suite to be MyPhoneExplorer 1.8.8 released 2017-01-03 Sync for contacts and notes with plain vCard/vNote-files (local or on a remote server) Sync with internal Sync-database - this makes it possible to sync several devices to each other MyPhoneExplorer Client is launched automatical when you connect via WiFi, the phone wakes up from standby also automatically Better compatibility with Windows 10 Better compatibility with Android 6 Backup wizzard revised many bugfixes and alot smaller enhancements Website: http://www.fjsoft.at/en/home.php Download: 7.81 Mb Android Client: https://play.google.com/store/apps/details?id=com.fjsoft.myphoneexplorer.client .paf Portable: 5.19 Mb Site: https://www.datafilehost.com Sharecode[?]: /d/ddabaee6
  22. Android User Locked Out Of Google After Moving Cities Image Courtesy: Techworm An Android user has been locked out of his Google account apparently because he moved cities, according to a post on Reddit. The explanation offered by Google support staff was that since his address details differed, billing information with Google wasn't current and hence the user's purchases could look fraudulent. The user in question does not know for sure that this is the reason; during his interactions with Google support to find out why he had been locked out, he was told that When asked what he could do, he was initially directed by Google staff to a site where he had to scan his driver's licence and credit card and told that he would have to wait 24 hours to get his account unlocked. But after this time passed, he was told that the account would not be unlocked and Google would not tell him why. He was advised to abandon his old account and start a fresh one. However, this meant he could not use the credit card that he had used on the old account and would have to obtain a new one to continue using Google's services. All his previous purchases would not be transferred to the new account, he was told. An email he sent to Google support resulted in the following reply: Source
  23. Screenshots: Changelog: v6.8.5.BETA_B1610021: Fixed uploading to Mega cloud. Links: Homepage XDA Homepage Skin Gallery Download - QR Code Mirror
  24. Trend Micro Offers $250K to Hack iPhone in Pwn2Own Contest A new iteration of the P2wn2Own mobile hacking contest takes aim at iOS and Android. The mobile Pwn2Own hacking contest is back for 2016, this time offering top prize of $250,000 to any security researcher who forces an Apple iPhone to unlock. The Pwn2Own contest has undergone a bit of a transition as Hewlett Packard Enterprise sold the Zero Day Initiative (ZDI) group that sponsors the event to Trend Micro earlier this year. The browser edition of the Pwn2Own event was held in March and was jointly sponsored by HPE and Trend Micro. The mobile Pwn2Own 2016 contest being held next month will be the first time a Pwn2Own event doesn't benefit from HPE sponsorship. "To us, it's still Pwn2Own," Brian Gorenc, senior manager of vulnerability research at Trend Micro, told eWEEK. "We always hope each contest brings us something new we haven't seen before, but if you've seen the contest, it should look very familiar." During the 2016 Pwn2Own browser event, which was held at the CanSecWest conference in Vancouver, ZDI awarded a total of $460,000 in prize money to researchers for publicly demonstrating new zero-day exploits in web browsers. The mobile Pwn2Own event will be held Oct. 26-27 at the PacSec Security Conference in Tokyo, and the total available prize pool is set to top $500,000. For the 2016 mobile event, ZDI is asking researchers to target three specific mobile devices: the Apple iPhone 6x, the Google Nexus 6p and the Samsung Galaxy Note7. Across all of the targeted devices, ZDI is tasking researchers with a number of challenges. The first is to obtain sensitive information from a device. ZDI is awarding $50,000 to those who exploit a device to get access to sensitive information on the iPhone or the Google Nexus. A researcher who is able to get sensitive information off a Galaxy will be awarded $35,000. Another challenge at mobile Pwn2Own 2016 is to install a rogue application on a targeted device. A $125,000 prize will be awarded for the installation of a rogue app on the iPhone; on the Google Nexus, the reward is $100,000; and on the Samsung Galaxy, $60,000. "Each phone will be running the latest operating system available at the time of the contest, and all available patches will also be applied," Gorenc said. "This can lead to some late nights as ZDI researchers update phones in the days leading up to the contest, but we feel it's best to have the latest and greatest targeted." Gorenc said all of the targeted devices will be in their default configuration. On iOS, that means Pwn2Own contestants must target Safari, as this is the default browser and most common, realistic scenario for users of that device. In the past, Pwn2Own contestants have demonstrated many WebKit browser rendering engine related vulnerabilities. WebKit is the core rendering engine behind Safari and has many components that are also used in Google's Chrome. "The threat landscape shifts so much from contest to contest that it's hard to predict what component will be targeted," he said. "WebKit will likely make an appearance, but we're hoping to see some new techniques and research as well." For the installation of the rogue application, Gorenc said that ZDI has no requirements for the app. "We will leave it up to the contestant to express their creativity during the public demonstration," he said. iPhone Unlock The biggest single prize at the mobile Pwn2Own 2016 event goes to the researcher who is able to successfully force an iPhone to unlock. The challenge of unlocking an iPhone has been a hot topic in recent months. The FBI reportedly paid as much as $1.3 million to bypass the iPhone lock screen. And Apple started its own bug bounty program, with a $200,000 prize, while security firm Exodus Intelligence will pay a top prize of $500,000 for an iOS zero-day flaw. Gorenc believes offering $250,000 for an iPhone unlock exploit is a good size prize. "We feel this amount is not a bad payday for what will clearly be a significant amount of research needed to accomplish this hack," he said. "Along with the money, the researcher will get the recognition that comes with winning Pwn2Own." In the end, Gorenc said, it's the marketplace that will let ZDI know if $250,000 is a fair price; he's optimistic that someone will actually attempt to publicly force an iPhone to unlock. "Finally, by reporting this through ZDI, the bugs will actually get fixed by the vendor," Gorenc said. "That's better than some of the alternatives." Source
  25. Is It A Good Idea To Charge Your Smartphone Overnight? Will Charging Your Smartphone Overnight Damage It? Here’s What You Should Know There are chances that many of us plug in our smartphone for charging while going to bed at night, so that you do not have a fully drained device or low battery while rushing to work or travelling, etc. If you think that charging your device overnight is a good idea, you may want to think again. If you plan to upgrade your smartphone every two years, leaving your device to charge overnight will not do much damage to your battery. Experts say majority of the time those people are not going to notice much damage to their smartphone batteries before they start wishing for a new device. However, frequent charging does damage the lithium-ion batteries in our smartphones. And it’s not because they can be overcharged, said Edo Campos, a spokesman for Anker, which produces smartphone chargers. “Smartphones are, in fact, smart,” Mr. Campos said. “They know when to stop charging.” In other words, smartphones are designed to understand when the battery is at capacity, and should at that point stop absorbing additional electrical current. According to a report by The New York Times, Android smartphones and Apple iPhones are equipped with chips that protect them from absorbing excess electrical current once they are fully charged. Theoretically, any damage from charging your smartphone overnight with an official charger, or a trustworthy off-brand charger, should be negligible. The report stated that most smartphones use technology that allows their batteries to charge faster, but this process leads to lithium-ion and lithium-polymer batteries rusting faster. If a user wants to preserve the life of their lithium-ion battery beyond the typical lifetime of a smartphone – usually two years – they can try using a charger made for a less-powerful device, stated the report. Source