Google Android Adware Warning Issued To 8 Million Play Store Users

Google Android Adware Warning Issued To 8 Million Play Store Users

The Google Play Store hosted 85 apps ridden with adware, which were downloaded by 8 million users.Today is no different: Security researchers at Trend Micro have revealed that the Google Play Store hosted 85 app ridden with adware.

State-sponsored cyber spies targeting IoT - a warning from Microsoft

State-sponsored cyber spies targeting IoT - a warning from Microsoft

Back in April, Microsoft security researchers observed the infamous Russian-backed hacking group STRONTIUM (also known as Fancy Bear or APT28) compromising popular IoT devices (a VOIP phone, an office printer, and a video decoder) across multiple customer locations.

How to disable OK Google and Google Assistant on Android devices

How to disable OK Google and Google Assistant on Android devices

If OK Google or Google Assistant are active on your Android device but you are not using these tools, you may want to consider disabling those.Here is how you disable OK Google on your device:Open the Google application on the Android device.

Google Warning: Tens Of Millions Of Android Phones Come Preloaded With Dangerous Malware

Google Warning: Tens Of Millions Of Android Phones Come Preloaded With Dangerous Malware

Millions of shiny new Android smartphones are being purchased with dangerous malware factory-installed, according to Google's own security research team.Android is a thriving open-source community, which is great for innovation but not so great when threat actors seize the opportunity to hide malware in basic software loads that come on boxed devices.

Robocall blocking apps caught sending your private data without permission

Robocall blocking apps caught sending your private data without permission

But many of these apps, said Hastings, send user or device data to third-party data analytics companies — often to monetize your information — without your explicit consent, instead burying the details in their privacy policies.

Juul's app-connected e-cigarette keeps tabs on your vaping

Juul's app-connected e-cigarette keeps tabs on your vaping

The product, called the Juul C1, pairs with an Android-only app via Bluetooth and has been launched in the UK after a trial in Canada, as reported by The Financial Times.

Harpooned by Facebook

Harpooned by Facebook

As smart devices become an ever-larger part of our lives, we look at how Facebook and other companies gather information about their users and turn it into profits.Next, Nathan looks at how online gaming companies and Facebook are using big data to profit from people vulnerable to gambling addiction.

5G Is Here—and Still Vulnerable to Stingray Surveillance

5G Is Here—and Still Vulnerable to Stingray Surveillance

Pencils Up. The researchers disclosed the issues to the telecom standards body GSMA and hopes to work with carriers to encourage 5G implementations that apply security and data protections to the cell tower connection process as early in the interaction as possible.

What a No-Carrier Phone Could Look Like

What a No-Carrier Phone Could Look Like

You could flip the Cellular Modem Hardware Kill Switch (HKS) on your Librem 5 and still call or text from your primary phone number while at that coffee-shop WiFi. This would offer you the ability to have a no-carrier phone–in either form–that now you only have when on WiFi–which means no triangulation-location tracking from cellular towers.

Apple’s AirDrop and password sharing features can leak iPhone numbers

Apple’s AirDrop and password sharing features can leak iPhone numbers

In the event Wi-Fi password sharing is in use, the device is sending partial SHA256 hashes of its phone number, the user’s email address, and the user’s Apple ID.

Facebook funds AI mind-reading experiment

Facebook funds AI mind-reading experiment

"And by demonstrating a proof-of-concept using implanted electrodes as part of their effort to help patients with speech loss, we hope UCSF's work will inform our development of the decoding algorithms and technical specifications needed for a fully non-invasive, wearable device.

Everything Cops Say About Amazon's Ring Is Scripted or Approved by Ring

Everything Cops Say About Amazon's Ring Is Scripted or Approved by Ring

Photo: APAmazon’s home security company Ring has garnered enormous control over the ways in which its law enforcement partners are allowed to portray its products, going as far as to review and even author statements attributed to police in the press, according to emails and documents obtained by Gizmodo.

Amazon Alexa Accused Again Of Spying: Here Is Another Solution

Amazon Alexa Accused Again Of Spying: Here Is Another Solution

Read: Alexa Is Listening All The Time: Here's How To Stop It. Last week, various articles reported that Amazon responded to a letter sent by Senator Christopher Coons in late May, confirming that it maintains Alexa recordings indefinitely (unless a user manually comes in and deletes them).

The Neuroscientist Who's Building a Better Memory for Humans

The Neuroscientist Who's Building a Better Memory for Humans

Later, when Berger gave the memory task rats a drug that blocks memory formation, he used his device to electrically stimulate the brain with the pattern of pulses—the outgoing space-time code—predicted by his model.

Haven Has Landed - Download Now for iOS and Android

Haven Has Landed - Download Now for iOS and Android

Keep your data and your financial information safe when you shop, chat, and send cryptocurrencies privately using Haven. To celebrate the launch, this week you can enjoy special 50% off deals on name-brand electronics and gift cards in the official Haven store.

Google to Capture & Learn Our Emotions on a Smartphone Camera?

Google to Capture & Learn Our Emotions on a Smartphone Camera?

Since then, I’ve been keeping an eye out for patent filings from Google that used a smartphone camera to look at the expression of a user of that device in order to try to understand the emotions of that person better.

The Encryption Debate Is Over - Dead At The Hands Of Facebook

The Encryption Debate Is Over - Dead At The Hands Of Facebook

Facebook’s model entirely bypasses the encryption debate by globalizing the current practice of compromising devices by building those encryption bypasses directly into the communications clients themselves and deploying what amounts to machine-based wiretaps to billions of users at once.

Don’t Put Your Work Email on Your Personal Phone

Don’t Put Your Work Email on Your Personal Phone

When you add a work email address to your phone, you’ll likely be asked to install something called a Mobile Device Management (MDM) profile. MDM profiles, paired with device management tools, allow companies to track employee phones in a single dashboard.

Apple bleee. Everyone knows What Happens on Your iPhone

Apple bleee. Everyone knows What Happens on Your iPhone

If Bluetooth is ON on your Apple device everyone nearby can understand current status of your device, get info about battery, device name, Wi-Fi status, buffer availability, OS version and even get your mobile phone number.

How to test if your Bluetooth devices support BLE Privacy

How to test if your Bluetooth devices support BLE Privacy

Bluetooth devices, like Wi-Fi devices, support a privacy-enhancing technique that periodically randomizes the broadcasted address, which makes it harder to track them as their owners move about in the world.

Google wants to buy your face in return for a $5 gift card

Google wants to buy your face in return for a $5 gift card

It's been suggested that those taking part are being handed a Pixel 4 device prototype to collect the information - it's expected that the Pixel 4 will be the first device to offer Google's face unlocking.

Over 1,300 Android Apps Caught Collecting Data Even If You Deny Permissions

Over 1,300 Android Apps Caught Collecting Data Even If You Deny Permissions

The security model of modern mobile operating systems, like Android and iOS, is primarily based on permissions that explicitly define which sensitive services, device capabilities, or user information an app can access, allowing users decide what apps can access.

More information about our processes to safeguard speech data

More information about our processes to safeguard speech data

We’re focused on building products that work for everyone, and as part of this, we invest significant resources to ensure that our speech technology works for a wide variety of languages, accents and dialects. This is a critical part of the process of building speech technology, and is necessary to creating products like the Google Assistant.

New Attack Lets Android Apps Capture Loudspeaker Data Without Any Permission

New Attack Lets Android Apps Capture Loudspeaker Data Without Any Permission

Nitesh Saxena also confirmed The Hacker News that the attack can not be used to capture targeted users' voice or their surroundings because "that is not strong enough to affect the phone's motion sensors, especially given the low sampling rates imposed by the OS," and thus also doesn't interfere with the accelerometer readings.

Report: Israeli surveillance tool can silently collect all iCloud data for a targeted user

Report: Israeli surveillance tool can silently collect all iCloud data for a targeted user

Apple is facing a new security threat, thanks to developments in the spyware/surveillance tool sold by the Israeli firm NSO Group. Via the Financial Times, the Pegasus phone software now not only harvests data from the user’s onboard storage, but also all communications with the connected cloud.

Tales from the spam filter of an Android app developer

Tales from the spam filter of an Android app developer

I regularly get mail from various shady companies that obviously crawl Play for developer contact addresses in order to spam them with “lucrative business proposals”. Automatically crawling Google Play for contact addresses of fairly obscure apps and spamming their developers is actually child’s play.

Google and Amazon aren't the only companies taking heat for listening to your private conversations

Google and Amazon aren't the only companies taking heat for listening to your private conversations

ToyTalk, the company that powers the software in the doll, said in a statement to the Guardian the conversations recorded by the program were for improving the language-processing feature.

Middle East Dictators Buy Spy Tech From Company Linked to IBM and Google

Middle East Dictators Buy Spy Tech From Company Linked to IBM and Google

The device is one of several spy tools manufactured by a Chinese company called Semptian, which has supplied the equipment to authoritarian governments in the Middle East and North Africa, according to two sources with knowledge of the company’s operations.

Powerful FinSpy Spyware Found Targeting iOS and Android Users in Myanmar

Powerful FinSpy Spyware Found Targeting iOS and Android Users in Myanmar

Since some advanced functionalities require FinSpy to have root privileges on a targeted device, the implant doesn't work properly on iOS without jailbreaking, which can be achieved with physical access or remotely in combination with some zero-day vulnerabilities.

Keep Firefox from leaking your data all over the internet

Keep Firefox from leaking your data all over the internet

Among the threats Mozilla's Firefox web browser for Windows and MacOS can protect you from are trackers that gather your browsing history, cryptominers that secretly use your device's resources to mine cryptocurrency and fingerprinters that uniquely identify you based on your device, settings and apps.

More