Android 14 developer preview highlights multiple security improvements

0
[ad_1]

We take a look at what the Android 14 developer preview means for Android security moving forward.

Android developers have been given a taste of what’s to come in the next big step up in mobile land, thanks to Android 14 waiting on the horizon. The developer preview is a great way for those most familiar with the mobile operating system to see which changes they’ll enjoy and what ones they’ll have to endure.

As it happens, there’s quite a few security changes coming down the pipeline and developers will now be busy testing their apps. Not only are alarm permissions, system broadcasts, and language support experiencing alterations, but a wealth of security features will help ensure your device is as safe as can be.

Out with the old, in with the new

The biggest change is that old apps are on the way out. After a certain point, you will no longer be able to install them. These kinds of changes have been threatening to land for some time now, so developers will surely have been aware of this coming.

As Ars Technica notes, the current backward compatibility system allowed for older apps to still install but at the risk of malware developers simply targeting older Android versions.

Android 14, on the other hand, is simply bringing down the curtain and those old apps won’t install anymore. Now, don’t panic too much. Your favourite apps are almost certainly safe, especially if you’re still using them on a daily basis because there’s a strong chance they’re still being maintained and updated.

By “old apps”, we’re talking Android 6 and earlier which is a grand total of 8 years+. Given that apps not updated for two years have already started to be hidden from view on the Play store, there is a tiny chance you’ll be impacted by this. If you’re a side-loading hobbyist with a passion for ancient apps, then maybe this could cause you a few headaches. For most people, this is one of those changes you simply won’t notice. It’s a smart piece of house cleaning by Google and one which makes sense.

The first of what could be many security changes

Additional security features and alterations mentioned on the Android Developers Google blog are as follows:

Safer dynamic code loading

Dynamic code loading (DCL) introduces outlets for malware and exploits, since dynamically downloaded executables can be unexpectedly manipulated, causing code injection. Apps targeting Android 14 require dynamically loaded files to be marked as read-only.

Malware authors being hampered from malicious code injection can only be a good thing so this is good to see.

Runtime receivers

Apps targeting Android 14 must indicate if dynamic Context.registerReceiver() usage should be treated as “exported” or “unexported”, a continuation of the manifest-level work from previous releases.

Safer implicit intents

To prevent malicious apps from intercepting intents, apps targeting Android 14 are restricted from sending intents internally that don’t specify a package.

Both of the above have the intent of locking down data from other apps or the system itself. As Bleeping Computer points out, rogue apps and other malicious activities on an Android will have a much more difficult time if trying to intercept pieces of information intended for somewhere else.

A full rundown of what’s to expect (so far) can be seen on the official site. It’s worth noting that a complete reveal of what Android 14 will contain is not likely to be seen for some time yet, so all of this is subject to change to some degree.

Keeping your phone safe

This is all good news for the future, but what can you do in the here and now to keep harm at arm’s length?

  • Update your apps, and your device. Keep your Android device up to date, and allow your apps to update automatically. Depending on your version, you should be able to tell your device to update when connected to your Wi-Fi as opposed to taking a bite out of your roaming data.
  • Enable your lock screen. Whether you’re using a pattern, a PIN, a password, or even your thumbprint, it should be at the top of your list. Pay attention to how long your phone is unlocked before it reverts to the lock screen. This is a valuable window for criminals should you leave your phone unattended.
  • Enable the “find my phone” service. This, combined with the lock screen, will help keep your data safe in cases where you need to delete all data from the device remotely.
  • Install security tools on your phone. This will help provide you with maximum protection from rogue links, bad apps, and more.
  • Only download from official stores. Bad things do end up on there, but it’s still safer than allowing installations from unknown sources via third party websites.
  • Always read the reviews. You’ll not only gain insight into what the app is doing, but you’ll also make sure that the apps you’re using are still supported. This will keep you away from potentially exploitable software which has long since fallen into disrepair. Remember: there’s a two year expiry on abandoned apps before they’re removed from the Play store, so not everything put out to pasture will vanish right away.

Stay safe out there!


We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.


[ad_2]
Source link

February 2023 update is rolling out to Samsung’s Galaxy A72

0
[ad_1]

Samsung is rolling out a new software update to the Galaxy A72. While the handset isn’t getting One UI 5.1 yet, it is picking up the latest security patch. The 2021 premium mid-range smartphone is jumping to the February 2023 SMR (Security Maintenance Release).

The latest security update for the Galaxy A72 is currently rolling out in Asia. To be precise, users in India are getting it. The updated firmware build number is A725FXXS5CWB2 (via). The rollout should expand to more markets in the coming days. While Samsung didn’t release the handset in the US, it arrived in Europe, Africa, Latin America, and Australia. As usual, users can check for updates from the Settings app. Go to the Software update menu and tap on Download and install.

This update brings more than 50 vulnerability fixes to the Galaxy A72. Samsung’s latest SMR patches seven Galaxy-specific vulnerabilities, including flaws in Secure Folder, Fingerprint TA, and Contacts and Phone apps. The remaining patches are part of Google’s latest ASB (Android Security Bulletin). The Android maker labeled five patches as “critical”. Some of these could lead to remote code execution if threat actors exploited the vulnerabilities in the wild.

Galaxy A72 may get Samsung’s One UI 5.1 update

Samsung launched the Galaxy A72 in March 2021 as its most expensive mid-range model of the year. The device arrived running Android 11 out of the box. It has received updates to Android 12 and Android 13 since then. The handset is also eligible for Android 14. Moreover, we also expect it to receive One UI 5.1. The new One UI version debuted with the Galaxy S23 series earlier this month. It recently rolled out to the Galaxy S22, Galaxy S21, Galaxy S20, Galaxy Z Fold 4, Galaxy Z Flip 4, Galaxy Z Fold 3, Galaxy Z Flip 3, and more. We will let you know if and when Galaxy A72 gets it.

One UI 5.1 brings a host of new features and improvements to these Galaxy devices. Samsung has added more camera features and a Shared Family Album to the Gallery app. It makes sharing photos and videos with up to six family members a breeze. The new One UI version also gives you more options while editing photos, including the ability to remaster downloaded GIFs. Samsung Notes supports collaboration during a Google Meet conference, while Samsung’s AR Zone and AR Emoji apps get some functional improvements. Last but not least, Bixby Text Call is available in English with One UI 5.1.


[ad_2]
Source link

Meta seemingly plans to lay off more people

0
[ad_1]

The coming weeks might be filled with tension as Meta job cut plans are still in motion. A few months ago, the company laid off over 11,000 of its workforce globally. Such layoffs have become a trend with most big tech firms around the world.

Twitter, Amazon, Zoom, Google, and many other tech firms have let go of a good amount of their staff. Most of these layoffs have occurred in recent times and now seem to be a trend in the industry. The rising economic uncertainty around the world has played a major role in some layoffs from big tech firms.

While other firms are working with their remaining staff, Meta has other plans. These plans will also put the jobs of a good amount of Meta’s staff at risk. A recent report carry some information on the possible next wave of Meta layoffs.

Possibilities of more layoffs loom around Meta’s workforce

In a recent report, the Financial Times claim that Meta is planning on a fresh lay-off process. According to this report, work at Meta seems to be slowing down anticipating the coming lay-off. But why will Meta be making plans to cut jobs after letting over 11,000 staff go a few months ago?

Sources claim that the company is planning to reconstruct its workforce. This reconstruction will not only affect how jobs are done but also the amount of staff Meta will need. The amount of staff to be impacted by this possible job cut is still unknown, but the firm has already let go of 13% of its global workforce.

The previous Meta job cut took a toll on every department in the tech firm. The company might also take a similar approach to this coming job cut. There is no clear statement from Meta as to the authentication of this new job cut.

Meta’s CEO did say that before the end of 2023, his company will become “a slightly smaller organization.” But, the company has held back from responding to the possibility of a fresh job cut. This leaves the public hanging on the fate of the current Meta workforce.


[ad_2]
Source link

Beware of this scam that uses apps listed on the App Store and Play Store; your money is at risk

0
[ad_1]
You might be surprised to find out that “pig butchering” is going on in the App Store and Google Play Store but no animals are being hurt. According to BleepingComputer“Pig butchering” is a scam that involves phony websites, malicious advertising, and more. By getting through the App Store and Play Store’s defenses, users have a false sense of security when installing these apps only to get bit in the ass.
Cybersecurity firm Sophos concluded that these attacks are designed to trick male Facebook or Tinder users into installing bogus apps by using fake female profiles with images stolen from other social media sites. These images portray a wealthy lifestyle with photos of exotic locations, five-star restaurants, and high-end retail stores. The fake apps promote phony investment scams.

The scam usually follows a particular script

The scam usually follows a particular script. The “woman” that the target is messaging says that she has an “Uncle” in the investment business and invites the target to install a particular cryptocurrency app on the App Store or the Google Play Store that will allow the target to trade cryptocurrency. After guiding the soon-to-be victim through the process of installing the “fake” app, the “woman” also helps the victim to make a deposit using the legitimate cryptocurrency app Binance and helps the mark transfer the sum to the fake app.

Sophos says that the malicious apps being used on the App Store are called “Ace Pro” and “MBM_BitScan” and “BitScan” on the Google Play Store. The apps allow the victim to withdraw small amounts from their accounts at first to gain the target’s trust but lock the account preventing the withdrawal of larger amounts.

To get through the App Store’s defenses. the bad actors involved in the scam submit an app signed with a valid certificate issued by Apple. This is a necessity for any app that appears on the iOS app storefront. Until the app gets Apple’s approval, it acts normal; once approval is received, the domain name is changed and the app connects to a malicious server.

While different vendor names appear for the iOS and Android versions of the fake apps, they connect to the same command and control server (which sends directions to malware-controlled systems), from a domain that seems to impersonate a legit Japanese cryptocurrency exchange called bitFlyer.

Use common sense and you should be able to avoid getting ripped off

Now you see who the “pig” is getting butchered. The “pig” is the victim who is drawn into the scam through lengthy conversations. By allowing a small part of the initial deposit to be accessible to the target, the latter trusts the entire process and has bought into the scheme. While we hate to continuously hit you over the head with this, you need to check the comments section of any apps that you plan to install on your devices from developers that you’ve never heard of. If you see any red flags, do not install the app and run away…quickly.

Also, if you’re on Facebook or Tinder and you’re approached by a wealthy female looking to get you to invest in cryptocurrency, do not engage in a conversation with this “woman.” And even if your hormones kick in and you can’t help yourself, what the hell are you doing investing your hard-earned money without doing some research first? And cryptocurrency is no stranger to the seedy, scammy world of investment ripoffs.

And because only a few victims get hooked (this is a high-yield ripoff that depends on a low percentage of success to make plenty of money for the attackers), there aren’t too many complaints about the apps. Still, if you use common sense and think with your brain instead of another part of the male anatomy, you should be able to avoid getting ripped off.


[ad_2]
Source link

Google Pixel Watch Review: It’s Almost The Best

0
[ad_1]

It took Google eight years to produce its own watch, after debuting Wear OS back in 2014. Which was originally Android Wear, then Wear OS by Google and now just Wear OS. So does it disappoint? Should you buy this over the Galaxy Watch 5? Let’s find out in our full review.

Amazing design

Despite the big bezels on the Pixel Watch, it still feels like a really well-designed, high-end watch. Which is interesting, coming from Fitbit and Google. Fitbit’s watches have never really felt or looked good or high-end. Google says that they made the watch to resemble a pebble. Which is rather fitting since Fitbit bought Pebble and Google bought Fitbit. And you can really see that in the watch.

We have the Obsidian color here, which is black all around. But there’s also warm gold and silver, which have the bottom half of the watch in silver and gold – or more like a hazel. So every color is going to look black, from head on. Which is perfectly fine. And that means that all of the bands, in many different colors will work perfectly with it.

There’s a digital crown on the side, in the center. This can be used to navigate the OS as you might expect. It works well, but the scrolling speed does seem to be rather slow. Often times, I usually just opt to use my finger to swipe on the screen. There is also a button above the crown, but it’s on the lower half of the watch. It’s a bit out of the way, and this is really only used for recent apps, or you can hold for Google Assistant. I really wish one of those opened up Google Wallet, like it does for Apple Wallet on the Apple Watch.

On the bottom, it’s glass still, and has all of the sensors that you’d expect. It also has the wireless charging magnets there. Speaking of wireless charging, it can’t charge on anything but the Google Pixel Watch charger. Not even using Battery Share on the Pixel 7, it’ll start charging and immediately stop. The same thing when I put it on other Qi Wireless chargers, or the Apple Watch charger. That’s a major oversight for Google, in my opinion. Why can’t this charge, at least on the back of my Pixel 7 Pro? That’s a good way to get some extra juice when you’re on the go.

Finally, let’s talk about the bands here. They are basically copies of the Fitbit bands for their smartwatches. That’s not necessarily a bad thing, since Fitbit’s team was really the one in charge of this watch. But some of the bands just feel so cheap, for a $350 watch (or in the case of our review unit, a $400 watch). Like the Stretch band. It’s super thin, and it really felt like if you were walking and got it caught on something, the band would be destroyed. It also looks like you’re wearing a sock, not necessarily the look I’d want. But the Woven bands are a nice step up. Still lightweight, but a bit more classy than the leather bands that are pretty pricey.

Now, swapping out the bands is a bit odd. Like Apple, Google has also decided to go ahead and reengineer how to remove bands. So you press this button on the side of the band on the watch, then slide the band over, to remove it. The first couple of times, it’ll take a bit to get used to, as it is pretty strange. Hopefully you won’t be swapping bands everyday.

It’s a small watch

All that, and I didn’t even mention the size of the watch. It’s quite small. It’s a 41mm size watch, which is the same size as Apple’s smallest Watch, but when you put it on side-by-side with an Apple Watch, it is definitely looking smaller, but also thicker. That is likely due to the circular display here. Which, I know, a lot of people prefer, but the square display that Apple uses makes it more functional.

google pixel watch AM AH 04 1

For a lot of people, this small watch size is going to be a sigh of relief, as not everyone has huge wrists. This is definitely great for women too. But the flip side of that is, poor battery life. Which we’ll talk about next.

Battery life is 24 hours… if you’re lucky

So, when Google was on stage talking about the Pixel Watch, they mentioned that battery life was rated for up to 24 hours. And put a lot of emphasis in the “up to” part of that statement. While I’ve been using this watch for a little over a week, it really only hit 24 hours or more, twice. So I asked Google for some clarification on this.

Google informed me that the 24 hour number comes from the following use case: “AOD off, 240 notifications, 280 time checks, 50 minutes of tethered navigation (Google maps), 45 min LTE / GPS workout with downloaded YTM music, 5 min LTE phone call.” That’s pretty specific, especially on the notifications and time checks aspect.

google pixel watch AM AH 11 1

Always-on Display was off by default, so I kept it off for my testing here. I’m almost afraid to turn it on and see how long it’d last. Since some days it only lasted around 15 hours. The best way to conserve power is likely going to be to limit what notifications you get. Maybe just messaging apps and emails.

An interesting tidbit I did notice is that, once I set this up with LTE connectivity on Google Fi, battery life did improve. Now that could be a placebo affect, as I only used it a couple days without LTE. But still worth mentioning.

Wear OS 3.5 is so fluid

The Google Pixel Watch is running on Wear OS 3.5, which is only available for the Samsung watches (Galaxy Watch 4 and Galaxy Watch 5 series) and a Montblanc watch that’s super pricey. So this is the first time I’ve really used Wear OS 3.5. It’s also the first time in a few years I’ve used Wear OS. It’s still not as optimized as I’d like for a watch, but with the added RAM and more powerful processor, Wear OS 3.5 is so smooth and fluid.

I’ve been wearing the Apple Watch for the last two years, which is why I’ve compared it a lot in this review. And it’s software is very smooth. Really no hiccups at all on it. But the Pixel Watch is even smoother than that. Which is very impressive to be honest.

Let’s start with the app. The Pixel Watch is a Wear OS watch, but doesn’t connect to the Wear OS app. Instead, it uses the Pixel Watch. Which once your phone sees the Pixel Watch, it’ll automatically download it so you can set it up. It’s a pretty simple app, but with Wear OS 3 and later, manufacturers have to make their own apps for Wear OS.

Right at the top of the app, you’ll find the Watch Faces and tiles. Followed by some other settings that you can adjust. There’s not many settings available in the app actually. Google has it sort of spread out for no real reason it seems.

But let’s talk about the watch faces. There aren’t many here, but since it is a Wear OS app, there’s plenty in the Google Play Store. The few that are here (around 19) are actually pretty good. Giving you some nice complications on the watch face like the weather, battery percentage, Fitbit stuff, and more. Most of them are black backgrounds, so that thick bezel doesn’t really stand out. Thanks to this being an AMOLED display.

Then there’s Tiles. This is a feature that I think Apple really needs to copy. Basically, full-screen widgets that sit to the side of the watch face. So you can swipe over to see things like the weather, or your Fitbit stats, YouTube Music, your next alarm and much more. It’s super useful, and better than loading up a full-on app.

As mentioned, the software is really good here. It’s still not perfect, and it’s going to be exciting to see how Google improves it over the coming months. Since it will be getting the quarterly feature drops like a Pixel smartphone, as well as yearly Wear OS updates. Which Google has said they want to start doing.

Fitbit integration gives Google a leg up over Samsung

When it comes to fitness tracking, no one does it as well as Fitbit. Part of this is because Fitbit has been around for so long and has so many trackers out there in the wild. Which allows them to collect data and improve features, also adding new features. Fitbit’s competitions and challenges are also better than just about everyone else. So having them on the Pixel Watch is awesome.

If you’ve used a Fitbit tracker, then you know what to expect from this Pixel Watch when it comes to fitness tracking. It’s basically the same experience. But it does not have Fitbit’s automatic workout tracking. Well, it does and doesn’t. With other watches, it’ll pop up and say “are you working out” and ask if you want to track it. On the Pixel Watch, it’ll automatically track any workouts longer than 15 minutes (by default, you can adjust this in the Fitbit app). But you won’t see the stats until after you’re finished. That’s fine for me, but some might want to see that on their wrist while they are working out.

Now, this does mean you need to download the Fitbit app, which the Pixel Watch app will tell you to do, in setup. You can easily sync your accounts together and start using Fitbit on the Pixel Watch. This also means that the Google Fit app is basically dead. That does suck for those that have been using it for years on other Wear OS watches. Google hasn’t said that Fit is dead, in fact it just got updated this week, but it basically is.

Fitbit is going to be exclusive to the Pixel Watch, at least for now. That’s going to be one feature that Google will have, to get you to use the Pixel Watch over a Galaxy Watch 5.

Should I buy the Pixel Watch?

That’s the question. Should you buy the Google Pixel Watch? This is a question that I’ve been struggling with for almost a week now. There’s so much to like about the watch, but a big issue is the battery life. Is it really that hard to give consumers a smartwatch that can last more than a day? The only real watches that can, are dumb or hybrid watches. Yeah there are some factors involved here like keeping it lightweight and small, which affects the size of the battery. But I don’t want to be tied to a charger all the time with my Pixel Watch.

It’s also fairly expensive. Since the Galaxy Watch 5 starts at $279 for a similarly sized model. That’s $70 less, and definitely has better battery life. But then, the Pixel Watch gives you the Pixel experience, as well as Fitbit, and will get quarterly updates with new features.

So my recommendation is, get the Pixel Watch if you’re okay with this battery life, and really, really want the Fitbit integration. If not, go with the Galaxy Watch 5, we reviewed that back in August and found it to be really impressive.


[ad_2]
Source link

Malicious Reward Apps Trick Over 2 Million Android Users

0
[ad_1]

Heads up, Android users! Researchers have found numerous shady reward apps on Play Store targeting Android users. The malicious apps barrage users with tons of ads if they wish to cash out rewards, which never happens.

Malicious Reward Apps On Android

According to a recent post from Dr. Web, the researchers caught multiple malicious reward apps flooding the Google Play Store.

As explained, they observed a spike in the emergence of Android trojans and adware campaigns in December, including a dedicated adware campaign involving the Play Store.

The malicious apps impersonated fake reward apps, luring users with things like financial education, crypto markets, and company shares. Whereas some other apps also mimicked games and fitness applications.

The apps seemed harmless, seeking personal details from the users to serve the purpose. When provided, the app would then offer various app rewards, such as virtual coins, which the users could cash out.

But in reality, the apps would never allow them to cash out the rewards. Instead, they displayed numerous apps to the users first to meet the withdrawal requirement and then, to accelerate the withdrawal process.

Dr. Web has shared a detailed list of such malicious apps in its post, urging users to steer clear of them. Nonetheless, it seems that the apps successfully garnered a huge victim base as each boasts thousands of downloads.

Watch Out For Fake Apps

It is recommended to download apps from the official app stores, such as the Google Play Store for Android. But it doesn’t mean that all apps listed in these stores are reliable. While Google implements a robust vetting process before allowing apps, still, some sneaky adversaries succeed in ditching these reviews.

Many times, apps go rogue after establishing themselves first on the Play Store, garnering a substantial number of downloads. Therefore, the best practice to avoid falling victim to such scams is only to download apps from trusted developers.

Essentially, users should make it a habit to verify the developer first by checking its contact details and history before installing an app.

Moreover, users should also carefully review the permissions an app requires before randomly allowing everything. Any apps asking for unnecessary permissions are risky. For instance, a flashlight app has nothing to do with your device store. Similarly, a calculator app should not request access to your device’s camera and microphone.

The more users remain careful while downloading apps, even from the official app stores, the better they can avoid scams.

Let us know your thoughts in the comments.


[ad_2]
Source link

One in nine online stores are leaking your data

0
[ad_1]

A recent study reveals that while users are comfortable shopping online, a number of online stores are accidentally leaking shoppers’ highly sensitive data.

eCommerce security company Sansec has revealed it’s found a number of online stores accidentally leaking highly sensitive data.

After studying 2,037 online stores, the company found that 12.3 percent exposed compressed files (in ZIP, SQL, and TAR archive formats), which BleepingComputer noted appear to be private backups containing master database passwords, confidential admin URLs of stores, full customer data (PII, or personally identifiable information), and internal API keys on public-facing web folders without requiring authentication.

The Sansec Threat Research group also found multiple attack patterns coming from various IPs, suggesting that a number of threat actors have known about this online store flaw and are working to exploit it.

In a post, the researchers said:

“We have observed automated attacks against online stores, where thousands of possible backup names are tried over the course of multiple weeks. Because these probes are very cheap to run and do not affect the target store performance, they can essentially go on forever until a backup has been found.”

Sansec urges online web store owners to make sure sure they aren’t leaking sensitive data. Start checking if backup files are open to the public internet and, if they are, close them immediately, and investigate the store for any signs of compromise. The company recommends the following steps to site owners in the event of accidental exposure:

  • Check server logs for signs of backup file downloads.
  • Check for unauthorized admin accounts.
  • Change all passwords.
  • Implement two-factor authentication (2FA).
  • Ensure the remote database admin panel isn’t showing up on the public internet.
  • Run an eCommerce malware scanner.

Lastly, to avoid creating accidental data leaks on online shops, Sansec advises owners to deploy store code on a read-only file system, schedule frequent backing up of files, restrict access to backup files, and start monitoring for online data exposure.


We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.


[ad_2]
Source link

The Play Store is focusing more on notifications and offers

0
[ad_1]

A major part of an app’s experience is all of the minor updates and UI changes that the developers push to it. The Google Play Store is now different, as a new update puts more emphasis on notifications and options, according to Android Police. It’s a small update, but it could be a useful one.

The Google Play Store has a section for your notifications and all of the offers that are available. However, people just don’t see them. You often go to the Play Store to hunt down your next favorite app, not check your notifications. Because of this, we often miss out on useful information. Google wants to change this with a new UI tweak.

The Play Store focuses more on notifications and offers

This change is a minor user-facing one, but it could actually change the way that people use the Play Store. Before the change, you’d see the search bar span the entirety of the top of the screen. You’d see the voice search button and the profile button housed in it.

After the change, you’ll see a few differences. Firstly, the search bar won’t stretch across the whole screen. It’ll run about three-quarters of the way across the screen. The profile button will sit on the right side of the screen outside of the bar. Lastly, you’ll see a new notification bell icon in between the search bar and the profile button.

The icon will show you how many new notifications you have. Tapping on it will open up a new page with two tabs at the top. The first tab shows you all of your notifications. These will be app recommendations, pre-registered games ready to download, and others. The next tab will show you all of the offers available. These will be sales and events that apps are having to entice people.

This change is rolling out now, so you should see it within the next couple of days if you don’t see it yet. We were able to see this change on a company Pixel 6, so there’s a good chance that you’ll see it.


[ad_2]
Source link

Android app warnings issued to millions

0
[ad_1]

There is nothing quite as motivating as downloading a new fitness app to help kick off a new healthy habit – something many of us routinely do every January. However, Android users have been warned that several extremely popular fitness apps could pose a threat to their phone security and should be deleted immediately.

Three apps in particular have been exposed as potential phishing/malware scams. These apps initially promised customers rewards in return for being active; however, users were then unable to withdraw rewards and found themselves caught in a never-ending cycle of ads. In addition to this, the apps also appeared to have been accessing sensitive data from users’ phones.

We all know the importance of being vigilant about the apps we install on our devices and the access we grant to our personal data. However, worryingly for customers, all three of these Android apps were highly rated on the Google Play store (rating 4 out of 5 stars on average) and, subsequently, had together amassed over 20 millions downloads before the alarm was raised.

Official advice from Android is for users to delete any of the following apps with immediate effect:

Lucky Step – This walking tracker app proved extremely popular, with over 10 million downloads. The free-to-download app enticed users by converting steps taken in the real world into virtual ‘lucky coins’. The coins could then be exchanged for various rewards. However, any action in the app would lead to an advert, which users had to watch before they could move on to the next task.

WalkingJoy – Having amassed 5 million downloads, this app claimed you could earn up to $135 just by winning tickets from taking steps, spinning a wheel, and playing in-game slots. However, the app was filled with ad walls, which meant that users would have to watch endless adverts to access mini-games to earn tickets (which then could not be cashed out).

Lucky Habit – A free to download health tracker app with over 5 million downloads offering earning through activity, tracking, and in-game playing. Users are invited to hit all their ‘goals of the day’ and earn coins by doing activities such as stretching, drinking water, brushing their teeth or watching the news. Users could also earn coins by playing in-game slots; however, all activities required watching adverts before they could be completed.

In addition to these three apps, information has been released about several other dangerous apps for Android users to look out for. These have been classified as ‘command and control’ apps (meaning they can spread malware to your phone during an attack). The apps include:

  • Happy Step (a clone of Lucky Step)
  • King Blitz
  • Lucky Clover
  • Lux Fruits Game
  • Jewel Sea
  • Unlimited Score
  • Seven Golden Wolf Blackjack
  • Reflector
  • Golden Hunt

A common theme that some of these apps share is in-app casino-type games, such as slots or blackjack. Users are reminded that games like these can carry extra risks, as players may be asked to link the account to a credit card, debit card, or bank account. Chris Evans, a spokesperson for Casinos.win, an iGaming affiliate marketing site, warns of the potential dangers associated with unregulated sites and apps.

Evans said: “We put a lot of effort and time into researching the safest places for players to enjoy iGaming online. Privacy and security are of the utmost importance. It is all too easy to unintentionally fall prey to a phishing scam or mistakenly download malware. We would encourage all users to research apps and websites, read reviews from a variety of sources, and only download from trusted sites.”

Of course, this list of apps is nowhere near comprehensive, and more potential security risks are being identified every day. One site suggests that there may be at least a further 200 dangerous apps which could potentially be stealing money from users’ bank accounts. These apps vary wildly in content, ranging from 4K camera apps to beauty filters, astrology apps, and even some messenger apps.

The controversy doesn’t stop there. Another extremely popular app which has come under scrutiny in recent months is TikTok. With over 3 billion downloads, TikTok is one of the most popular apps on the planet; however, as each day passes, more warnings hit the headlines. There are several countries which have gone so far as to ban the TikTok app completely, citing pornography, security, inappropriate content, and even, ‘leading the youth astray’, as justification. Due to security concerns, several states in America have clamped down on federal agents accessing the app on work phones. There has been much talk about the app’s association with the Chinese Communist Party (CCP), and the access to secure and private information that they may be privy to – the app is owned by the Chinese company, Bytedance, who are required by law to share all the data they collect with the CCP.

Whatever the potential threat from TikTok, it is clear that as apps become more sophisticated, so too will their counterparts – phishing, malware, spyware and viruses. The best customers can do to limit their security risks, allay their privacy concerns, and protect from unwanted charges, performance issues and misleading information, is to remain vigilant and up to date. Risks can be minimised if apps are downloaded from trusted sources like the Google Play Store, and if users read the terms, conditions and permissions carefully before installing a new app.


[ad_2]
Source link

Netflix finally revealed what it is going to do to stop you from sharing accounts

0
[ad_1]
You’ve probably heard about the plans that Netflix has to prevent account sharing. The streaming platform has been slowly building up to that goal through a series of announcements, and even feature releases, like the one that allows users to transfer their profile to a standalone account (wink-wink, nudge-nudge).Well, the time is nigh and Netflix has released the final guidelines on its help site. The plan revolves around the service trying to define a “home address” through your IP, device ID and your overall activity pattern. Then it will use that information to establish whether the user accessing the account is actually the account owner.

So how is that going to happen? Through an arduous verification process, of course! It may get triggered each time that you try to watch Netflix from a new device or location, and it involves the sending of the codes through the emails and the texts, and then you need to input them correctly on time and… ugh.

Well, at least security concerns have not been raised yet, but nowadays that’s always just a matter of time.
 

What is the impact of Netflix’s new account rules?

The process itself wouldn’t be an issue, if it happened once. But Netflix wants to make sure that you are indeed the account holder and that you are the only person using the account, so it may prompt you to do this “periodically”.

These changes will have a heavier negative impact on two groups of people: those that travel often and those who use a VPN.

You see, due to the unique disposition of hardcore film watchers, they prefer to watch content on a big screen. As such, if it so happens that they are about to travel, they wouldn’t be able to take the TV along with them, as it is probably huge. Hence, every time that they try to watch Netflix while away from home, they will likely get bombarded with verification requests.

The second group is also likely obvious: VPNs change your IP and location. This will mess up Netflix’s attempts to get a grasp on your “home address”, which will also result in a sequence of verification requests.

Guess that infamous VPN promotion tagline of being able to “conveniently watch territory-exclusive content” just got outdated effective immediately.
 

Is Netflix’s verification process going to be annoying?


The level of annoyance of this process will highly depend on the algorithm that Netflix has implemented. On its help site, the company states that the service should be smart enough to recognise if you are an owner of multiple homes, so only time will tell if the aforementioned examples truly end up becoming as much of a bother as they can be.

There were rumors that Netflix was about to let extra users stay, as long as the account holder was willing to pay extra too, but now that the rules are out, we can confirm that this is no longer part of the plan. And in all honesty, these new rules are not a big deal, but it’s just the type of minor annoyance that really gets people’s gears grinding.

This isn’t much of a silver lining, but at least Netflix won’t go out of its way to punish users who are switching locations and devices often, at least for now. As long as you are willing to bear with the verification process, you can move about as often as you like.


[ad_2]
Source link