Menu

Blog

Archive for the ‘mobile phones’ category: Page 74

Jun 1, 2022

SideWinder hackers plant fake Android VPN app in Google Play Store

Posted by in categories: cybercrime/malcode, mobile phones

Phishing campaigns attributed to an advanced threat actor called SideWinder involved a fake VPN app for Android devices published on Google Play Store along with a custom tool that filters victims for better targeting.

SideWinder is an APT group that’s been active since at least 2012, believed to be an actor of Indian origin with a relatively high level of sophistication.

Security researchers at Kaspersky attributed close to 1,000 attacks to this group in the past two years. Among its primary targets are organizations in Pakistan, China, Nepal, and Afghanistan.

May 30, 2022

Smart films facilitate human-machine interaction

Posted by in categories: cyborgs, entertainment, mobile phones

Imagine this: A smooth touchscreen display placed on top of a thin silicone polymer film suddenly generates the feeling of a tiny raised button under the user’s finger. Or how about the idea of wearing that same polymer film like a second skin? If used to line an industrial glove, the film can provide valuable feedback by gesture recognition and by sending tactile signals, such as pulses or vibrations, to the wearer. The research team led by Professor Stefan Seelecke of Saarland University will be at this year’s Hannover Messe, the industrial trade fair running from 30 May to 2 June, where the team will be demonstrating how smart tactile surfaces are now being used as novel human-machine interfaces.

Seelecke’s research team at Saarland University are using thin silicone films to give surfaces some very novel capabilities. The technology, which is able to create the sensation of a tactile “button” or “slider” on flat glass display screens, is literally bringing a new dimension to touchscreen interactions. The is able to change shape on demand to create the feeling of a raised button or a key on the surface of the display that the user can then use, for example, to navigate around a page or to enter data.

“Using this technology, we can make the user interfaces of smart phones, information screens or household devices more user friendly,” said Seelecke, who heads the Intelligent Material Systems Lab at Saarland University. If a user feels a pulse or vibration under their fingertips, they can then respond by tapping the screen. And because the user also experiences the slight resistance that we feel when we press a ‘real’ button or switch, they know that their response has been successful. For the blind and partially sighted, this sort of physical feedback is not a gimmick, but hugely valuable in their day to day lives.

May 25, 2022

Tri-Cities Scientists ‘Magically’ Mining Metals From Water

Posted by in categories: mobile phones, sustainability, transportation

May 23, 2022

“Fly ash” contains rare earth elements needed for electronics

Posted by in categories: mobile phones, satellites, sustainability

The United States’ reliance on China for rare earth elements could soon come to an end, thanks to a new process that pulls the valuable metals from the ash left over when we burn coal.

Why it matters: The 17 rare earth elements aren’t actually rare — they’re all more common than gold, and one is more abundant than copper. But getting our hands on them is difficult because they’re widely dispersed in Earth’s crust and hard to extract through mining.

Continue reading “‘Fly ash’ contains rare earth elements needed for electronics” »

May 22, 2022

Google: Predator spyware infected Android devices using zero-days

Posted by in categories: government, military, mobile phones, surveillance

Google’s Threat Analysis Group (TAG) says that state-backed threat actors used five zero-day vulnerabilities to install Predator spyware developed by commercial surveillance developer Cytrox.

In these attacks, part of three campaigns that started between August and October 2021, the attackers used zero-day exploits targeting Chrome and the Android OS to install Predator spyware implants on fully up-to-date Android devices.

“We assess with high confidence that these exploits were packaged by a single commercial surveillance company, Cytrox, and sold to different government-backed actors who used them in at least the three campaigns discussed below,” said Google TAG members Clement Lecigne and Christian Resell.

May 22, 2022

Device that stores liquid sunshine could one day power your phone

Posted by in category: mobile phones

A system for trapping sunlight as thermal energy within molecules and then converting it to electricity could be a portable replacement for batteries.

May 18, 2022

More than 200 apps on Play Store with millions of downloads are stealing users’ passwords and sensitive information

Posted by in categories: cybercrime/malcode, finance, mobile phones

Researchers at Trend Micro identified a set of mobile apps available on the Google Play Store performing malicious tasks in the background, including stealing user credentials and banking details from Android users. Some of these apps have nearly 100,000 downloads, so the scope of the problem is considerable.

In total, the analysis revealed the detection of 200 malicious applications that hide code from dangerous malware variants, capable of putting users of the affected devices in serious trouble.

Continue reading “More than 200 apps on Play Store with millions of downloads are stealing users’ passwords and sensitive information” »

May 18, 2022

Rise of Cyborgs, Exoskeleton Super Human Strength, Transhumanism, Neuralink, Live forever

Posted by in categories: cyborgs, education, mobile phones, neuroscience, transhumanism

The concept of Transhumanism has been around for a long time, but it actually looks like it’s starting to happen. In today’s video, we will look at how humans are already merging with machines and what will come next. IPhone wireless charging cases — https://amzn.to/3bz0oRg.
IPhone Backup — https://amzn.to/3w8Usbj.
Wireless Earbuds — https://amzn.to/2ZTjwau.
IPhone Bargains — https://amzn.to/3jXvCGb**** Gears and Equipment we use****
1. Fully Automatic Espresso Machine — https://amzn.to/3bdHcbr.
2. Perfect Desk Chair — https://amzn.to/2ZlMNd2
3. Wireless Mechanical Keyboard — https://amzn.to/3pA71Lw.
4. Wireless DTS Headphone — https://amzn.to/3juz2Qv.
5. Vocal Microphone — https://amzn.to/2XEDsN4
6. UltraWide Monitor — https://amzn.to/3jyteWg**** Free Handy Tools YOU must try ****Tubebuddy – https://bit.ly/3y0SOc6
In-depth channel/video analysis, SEO statistics, Channel optimizationHere at Future Now we aim to bring you the most informative, fascinating and engaging Technology videos on YouTube.🔔 Subscribe To Our Channel: https://bit.ly/3nRoVH8
Copyright Disclaimer:
Under section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, education and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use. *DISCLOSURE*
We are affiliated, but not sponsored by any product featured in this video.
Some links in the description are affiliate links to products, which means if you click on them and buy the product, we will receive a small commission.
Not being sponsored allows us to keep our own opinions and provide product reviews without bias. From the millions of products, we appreciate your support.#Exoskeleton #Cyborg #Transhumanism

May 18, 2022

Teslas are susceptible to hacking due to bluetooth locks, cybersecurity firm says

Posted by in categories: cybercrime/malcode, mobile phones, transportation

Teslas are among the most susceptible vehicles to be hacked due to their Bluetooth locks, cybersecurity firm NCC Group said. The cars can be remotely unlocked and controlled by hackers that can exploit a vulnerability in the Bluetooth system’s security, the group said.

NCC Group researcher Sultan Qasim Khan was shown in a video opening, then driving a Tesla using a small relay device attached to a laptop. The device bridged a large gap between the Tesla and the Tesla owner’s phone, Reuters said.

“This proves that any product relying on a trusted BLE connection is vulnerable to attacks even from the other side of the world,” NCC said in a statement. BLE means Bluetooth Low Energy, and is a technology utilized in vehicles and Bluetooth locks that will automatically unlock or unlatch when an authorized device is nearby. While it is a convenience feature, it is not immune to attacks, which was the point of NCC’s experiment.

May 16, 2022

Artificial intelligence is becoming sustainable

Posted by in categories: mobile phones, robotics/AI, sustainability, transportation

A research group from Politecnico di Milano has developed a new computing circuit that can execute advanced operations, typical of neural networks for artificial intelligence, in one single operation.

The circuit performance in terms of speed and paves the way for a new generation of computing accelerators that are more energy efficient and more sustainable on a global scale. The study has been recently published in the prestigious Science Advances.

Recognizing a face or an object, or correctly interpreting a word or a musical tune are operations that are today possible on the most common electronic gadgets, such as smartphones and tablets, thanks to artificial intelligence. For this to happen, complicated neural networks needs to be appropriately trained, which is so energetically demanding that, according to some studies, the that derives from the training of a complex can equal the emission of 5 cars throughout their whole life cycle.

Page 74 of 231First7172737475767778Last