New malware masquerades as a ride-sharing app

Share this

An update to the venerable Faketoken.q Android malware has made it easier for the program to steal your credit card information from ride-sharing apps. Faketoken attacks Russian ride-sharing apps by overlaying text boxes on the credit card information pages that can capture your credit number and other important information. Kaspersky writes: After getting onto a smartphone (judging by the malware icon, Faketoken infiltrates smartphones through bulk SMS messages with a prompt to download some picture) and installing the necessary modules, the Trojan hides its shortcut icon and starts background monitoring…

Share this
Read More

With iPod discontinuation, what are the alternatives?

Share this

Smartphones have largely replaced portable media players for most people. It’s been a few years since Apple bothered to update its iPod touch, and it’s been even longer since any other company try to offer a good Android-powered alternative to Apple’s touchscreen media player. Apple is now abandoning its traditional iPod because most people with smartphones now use them for everything. However, many current smartphones – including Apple’s – don’t have FM, and none has a DAB radio. Worse, smartphones need regular app updates and sometimes annual operating system upgrades. You…

Share this
Read More

Google secretly recording users through mobile devices

Share this

Did you know that Google has been recording you without your knowledge? Some of your most intimate conversations might be sitting in a Google data centre somewhere. Just talking is enough to activate the recordings – but thankfully there’s an easy way of hearing and deleting them. The technology giant has effectively turned millions of its users’ smartphones into listening devices that can capture intimate conversations — even when they aren’t in the room. The company quietly records many of the conversations that people have around its products. The feature…

Share this
Read More

Globaldata: Artificial Intelligence (AI) more crucial for IoT than Big Data insights

Share this

Artificial intelligence won’t solve every problem, but its current applications are already fundamentally reshaping the way we do business and collect data. While the development of the internet of things has revolutionized heavy industry, online shopping, localized data collection and virtually every other aspect of modern life and business, innovators are still struggling over the future of the IoT, and how they’ll get there. While many see big data as the driving engine behind the IoT, savvy investors and entrepreneurs have shown that the real power behind the interconnectivity phenomenon…

Share this
Read More

Hackers Threaten ‘Game of Thrones,’ as HBO Confirms Cyberattack

Share this

HBO has been the latest target of a cyber-attack. HBO confirmed on Monday that the network had been the target of a cyberattack, as an anonymous hacker boasted about leaking full episodes of upcoming shows along with written material from next week’s episode of “Game of Thrones.” The hack was announced to media via an anonymous email which claimed 1.5 terabytes of data from secure HBO networks was accessed, according to Entertainment Weekly. Unaired episodes of “Ballers” and “Room 104” may have been published online, and the hacker vowed more…

Share this
Read More

Microsoft launching a new AI startup program in Paris

Share this

Microsoft is making efforts to give space for the new start-up ventures that are going make changes for the coming years. The Tech giant is set to focus on artificial intelligence. More and more startups are trying to grasp the AI field and most are new startups. This will certainly create a major impact on the AI startups. This may lead to Microsoft to start their new program for AI at the Station F. Microsoft has had a startup accelerator in the Sentier neighborhood for a few years now. When…

Share this
Read More

Over 36.5 million Android users get infected by Judy Malware

Share this

A new malware named ‘Judy’ has been found in over 41 apps on the Google Play Store, and it has infected between 8.5 million to 36.5 million users. This is according to a report from security research firm Check Point, which discovered the malware and alerted Google. The search giant has started removing these infected apps from the Play Store. According to researchers from Check Point, the apps were available on the Play Store for years, but have been clean and virus-free for most of the time. It appears that…

Share this
Read More

Microsoft Patches 56 Vulnerabilities

Share this

Microsoft has released an urgent update to stop hackers taking control of computers with a single email. The unusual bug, in Microsoft anti-malware software such as Windows Defender, could be exploited without the recipient even opening the message. Researchers working for Google’s Project Zero cyber-security outfit discovered the flaw at the weekend. The fix has been specially pushed out hours before the software giant’s monthly Tuesday security update. The update CVE-2017-0290 addresses a vulnerability that could allow remote code execution if the Microsoft Malware Protection Engine scans a specially crafted file.…

Share this
Read More

Android Wear 2.0 on Huawei Watch is finally here

Share this

Android Wear 2.0 has finally rolled out to the original Huawei Watch. Despite its popularity and the fact that it was one of the few models to support the new software’s extended beta program, it has only now gotten the final release. Of course, there’s no official word as to why it has taken about three months to finalize the software for Huawei’s last generation smartwatch, but it is very likely due to its new Huawei Watch 2 as to why things got pushed back a bit. Android Wear 2.0…

Share this
Read More

Google Docs phishing attack is fixed

Share this

Google Docs users were hit by a widespread phishing attempt everywhere being spammed with what appeared to be malicious invitations to log on to their Google accounts. Unlike your garden-variety cyberattack, many of the telltale signs that could tip off that something was awry are absent. What made this attack so tricky to detect was that it took advantage of Google’s legitimate tool for sharing data with responsible third-party apps. Since the bogus invitation was being routed through Google’s real system, nothing was misspelled, the icons looked accurate, and it’s hard to know something’s…

Share this
Read More