Find, Lock and Reset Stolen Phone using Find my Device App

You have landed here because you probably lost or precious phone and finding ways on how to find lost or stolen phone. You may have read on our previous post on how to recover data on a broken iphone. Now, we are going to share to you on how to find, lock and reset lost of stolen phone remotely.

Losing a phone especially in your unconscious manner is one of the most terrible experiences one could ever experience. There are a lot of factors why someone lose their mobile phones. It might be because of your own recklessness and left your cell phone unattended anywhere. And worse, when it is stolen by someone without you noticing it.

Probably you have come across with this article because you have recently experienced losing your mobile phone or you’ve become a theft victim. It is not eat easy, right? Especially when the phone you have just lost is a gift from your special someone or a kind of phone that will cost you a bloody sweat before you acquire a new one. Instead of wasting your time mourning and thinking how clumsy you are why not arm yourself with information that you could do right now.

how to find lost or stolen phone

Google’s Find My Device, previously known as Android Device Manager, can be your best tool in locating your stolen phone. Its features work similarly to other locator services like Lookout and Samsung’s Find My Mobile but you can easily get this app especially on android devices.

Here are the Top Ways to Recover your Lost / Stolen Phone

In this article I will tell you how to lock, find and reset your stolen phone easily using Google’s Find My Device App:

After a few hours of noticing that your phone is missing, there still a big chance that you could still find it through the help of Google’s Find My Device. You can still do it even though you do not have the app installed in your lost phone.

How to Find Lost or Stolen Phone

You can do this in three ways:

Before that there are requirements to meet before this process to work. Here they are:

  • The missing phone should be connected to the internet.
  • The missing phone should location (GPS) turned on.

1
From a computer

As long as you have logged in to your Google account, you can always find your lost phone through the use of a personal computer. All you need to do is to grab your computer with strong internet connection and open Google chrome.

  • Then, simply type “Where’s my phone” in the address bar.
  • The engine will generate your searches and will automatically load a mini “Find my Device” window inside the search of results.
  • Sign in to find your phone.
  • This will bring up the Find My Device site and immediately start tracking your lost device.

2
From an Android Phone

Not everyone own a personal computer at home but that is not a problem. Aside from computer, if you had another android phone you can use it in locating your lost mobile .Simply download and installed the “Find my Device App” in the play store. It will let you log in automatically if you are using your own phone and if not, it will offer the option of a guest login. This is cool, isn’t it?

3
From a Non-Android Phone

If you do not have an android phone, you can go to https://www.google.com/android/find in a browser on any phone and log in. Once you have accessed Find My Device through any of these methods, it will provide you a list on top to find the one what’s missing. Eventually, it will start tracking and you can find it within a few seconds. It will give you information like the time it was located, connected network and the location shown in the map. These will give you hint of where your phone is. 

The saddest thing about losing your mobile phone is not about the brand and how much it cost. It is the good amount of data in which some is probably sensitive. The thought of this bring you fear and despair. What if someone will know about it, what will happen? But lessen your worry because there is a way of preventing somebody on getting to your personal data.

Another thing that you need to know about Find My Device application is it can be used to lock your phone and gives you an opportunity to set another password to unlock your phone. Locking your phone is necessary to block someone from accessing your device while you’re trying to recover your device.

How to Lock Your Lost of Stolen Phone Remotely

There are 3 steps on doing it:

  • Locate your phone on Find My Device.
  • Press or Tap the lock button
  • Enter a message and phone number to display on the lock screen then tap lock.

Once the command is sent to your device, it will lock immediately even if it is used. If you are having hard time in following instructions. There are a lot of YouTube tutorials that will help you in doing so.

When the time comes that you already do your best in locating your stolen phone. Unfortunately, nothing becomes effective and lost hope already, you can completely wipe the device with the “erase” command. This will reset the device, wiping all of your personal data, pictures, music and all other stored files in your device.

If you unable to recover your smart phone, Android gives you the option to erase all the data on the phone remotely by using the same app mentioned above—- Find My Device. It is just a matter of seconds doing it and the thief won’t be able to stop it once the process already started. However, it is irreversible meaning, you cannot undo what is deleted so you need to be careful before doing it.

How to reset your phone easily using the Find My Device app

How to reset phone remotely - Find, Lock and Reset Stolen Phone using Find my Device App

On this few steps you will learn on how to easily format your phone remotely. Yes! Without even touching it. This will come handy if you lost your phone and you have sensitive info /photos/videos/messages on it.

Reset Your Phone Remotely
  • Select the lost/stolen device from the main drop down (it will give you options like find, erase, and lock button)
  • Tap “erase” button (You’ll be prompted to confirm the process. One that will  be deleted such as apps, media, settings and user data)
  • Again, tap “erase” and the process of factory reset will begin

The right step that you need to do the moment you realize that your phone is gone is to report the loss to your cell phone carrier immediately or to the nearest police station. Google’s Find MY Device is only your secondary option that secures your device and make it safe. Be sure to be safe too by not attempting to retrieve your stolen mobile phones immediately.

China: One of the Biggest Threat In Cyber Warfare

China cyber warfare

China is one of the biggest threats to other countries when it comes to cyber hacking. China is both the world`s second-largest economy and a nuclear weapon powerhouse with the world`s second-largest defense budget, there’s no question that China cyber warfare is the most aggressive worldwide. Western countries have long accused China of aggressive underground activities, and while investigations have traced various attacks on corporate and infrastructure computer systems to have originated from China.

It is nearly impossible to know whether or not an attack is government-sponsored because of the difficulty in tracking true identities in cyberspace.

Why Is China Always Connected To Cyber Hacking?

Hackers from China, often with ties to the government, and have been accused of breaking into gas companies, steel companies, and chemical companies. Not long ago, Chinese Government Companies were charged for stealing the secret chemical make-up of the color white from DuPont. China developed its J-20 fighter planes, a plane similar to Lockheed Martin`s F-22 Raptor, shortly after a Chinese National was charged for stealing technical data from Lockheed Martin, including the plans for the Raptors.

The Federal accusations mostly offer a high-level look from there, but China`s hackers followed a fairly standard playbook. Once they had established themselves on a computer, they would start downloading more malware to escalate their privileges, until they found what they are looking for: data. Chinese Information Operations and Information Warfare include the concept of network warfare, which is roughly analogous to the United States concepts of cyber warfare.

Foreign Policy provided an estimated range for China`s hackers’ army personnel, anywhere from 50,000 to 100,000 individuals. Technology Theft and other unfair business practices originating from China are costing the American economy more than $57 billion a year, White House Officials believe, and they expect that figure to grow.

China Hacked Dozens of US Government Agencies and Businesses

China hacking government agencies and businesses

In dozens of interviews with the U.S. Government and business representatives, officials involved in commerce with China, hacking and theft were an open secret for almost two decades, allowed to quietly continue because U.S. companies had too much money at stake to make waves. Eventually, the hackers even installed their own VPN systems on the network so that they could enter at will over an encrypted connection.

A multi-year attack carried out by Chinese hackers was exposed recently, and the scope of it is beyond anything previously seen in nation-state cyber underground activities. A notorious team that is widely believed to have Chinese government support is believed to have compromised at least 10 major global carries and used their networks to track and spy on high-profile business leaders and members of foreign governments.

That makes these cyber underground activities incidents unique is that Chinese hackers appear to have been following their targets as they move from country to country, hopping from one breached network to another as needed. While this ability is not new, this kind of mass-scale has not been seen before. According to a Justice Department accusation, that is effectively what China has done to the rest of the world since 2014. That when the countries APT10 (Advanced Persistent Threat), the hacking group decided to target not just individual companies in its long-standing efforts to steal intellectual property, but instead focus on so-called manage service providers. They are the businesses that provide IT infrastructural like data storage or password management.

More Accusations Against China

For an even greater sense of scale: The accusations allege, among other things, that by hacking into a single New York-based MSP, APT10 was able to compromise data from companies in a dozen countries, from Brazil to the United Arab Emirates. With a single initial intrusion, Chinese spies could leapfrog to industries as varied as banking and finance, biotech, consumer electronics, health care, manufacturing, gas oil, telecommunications and more.

https://www.youtube.com/watch?v=ZuzwHuQPKz0
  • The DOJ`s accusations – outline alleged APT10 activities that are focused on government agencies and defense contractors, dating back to 2006, that took a more conventional approach. But MSP hacks don`t just show China`s hacking sophistication; they demonstrate its ruthless efficiency and determination.
  • More than 90% of the department`s cases alleging economic underground activities over the past seven years involve China, more than two-thirds of the departments’ cases involving thefts of trade secrets are connected to China. Compromise MSP, and you have a much easier path into all these clients. They`re super. Yet an investigation by Federal Agencies into why three successive administrations failed to stop cyber hacking from China found an unlikely obstacle for the government.
  • The U.S – China Economic and Security Review Commission was set up in 2000 to examine the implications of growing economic ties with China. An expert on Chinese security issues at the conservative Heritage Foundation said the alleged Internet
  • Hijacking appeared to be part of what he described as a disturbing pattern of aggressive Chinese Cyber Activities. All of this that from China`s view, a global conflict is already underway – in the virtual world of cyberspace, the ability to direct vast amounts of data constitutes a threat, not only to national security, but also to private companies and individuals, as their information, too, has now been put a risks.

Obama’s Say About The Issue

The past Obama administration officials say they did not turn a blind eye to the Google hack or cyber theft from China.

The administration was struggling with other important priorities, such as North Korea, Iran, the economic and climate change. Cybersecurity companies have gotten relatively good at observing and analyzing the tools and tactics of nation-state threat actors; they are less good at placing these actions in context sufficient enough for defenders to make solid risk assessments. In short, APT hackers put themselves in a position where they not only had access to MSP systems but could move through them as an administrator might. Using those privileges, they would initiate what`s known as Remote Desktop Protocol connections with other MSP computers and client networks.

Think of anytime an IT staffer has taken over your computer to troubleshoot, install Photoshop, whatever. It is like that, except instead of a friendly coworker it`s Chinese hackers hunting for secrets. China has denied these accusations of cyber warfare and has, in turn, accused the United States of engaging in cyber warfare against China – a claim the U.S. government denies. China`s hackers will continue to rob the world blind at every opportunity. At least, though, they may now be a little less anonymous when they do.

References:

Wearable Technologies: Is it Safe to Use? Or Threat?

Wearable Technologies leading-edge technology companies are smart when it comes to deciding where to invest millions of research and development dollars. Apple Watch, Fitbit, or Google Glass, and the latest NeuroSky Mindware device. Technologies can provide us with a world of data, but also make us vulnerable to unseen security breaches. The global market for wearable technology devices is expected up to $51.6 billion by 2022, according to a study of markets and markets, meaning a lot of people are using wearable technologies on smart devices like the latest accessories in their internet wardrobes.

Wearable Technologies is the new security threats. Technologies have never been free of the dualistic nature of reality, good or bad, right or wrong. The wearable technologies market is divided on the basis of products and application, the segment is further categorized on the basis of smart clothing and smart glasses, sleep sensors, smartwatches, activity monitors, augmented reality headsets, continuous glucose monitor, heart rate monitors (HRMS), drug delivery devices, hand-worn terminals, wearable patches, jewelries. The application segments are further classified on the basis of infotainment, fitness and wellness, health care and medical, industrial, and military, safety and security, fashion and lifestyle.

Wearable comprises four main categories: smart glasses and headgear, smartwatches, wearable medical devices, and fitness trackers.

All of these have one or more features that:

  • Sense and translate data;
  • Collect and prepare data for transmission; and/or
  • Transmit data off-site storage for processing and reporting.
  • Cloud-computing and Artifical Intellegence.

But while we`re still adapting to the information made available through wearable technology, we have left ourselves wide open to security breaches. Businesses across the U.K are failing to protect their data from security. Companies looking at CRM systems and database upgrades should start planning for new data coming from there devices. If they plan to launch a new wearable technology device, they will need to prove that it helps you to do smart things you wouldn`t be able to achieve.

Biggest Thread of Wearable Technologies

The biggest threat with wearable devices comes when users work in a company that endorses bring your own device policies. These liberal policies did not anticipate the potential invasive features of wearable technology devices. Because they were designed for older technologies, they did not anticipate the potential of how wearable technology devices could pose a security threat in the workplace.

When a user`s login key personal health data about their lives on websites, they actually have no idea about the developers behind the apps or the companies selling them. The most problem was insufficient user authentication. Wearable technologies have come a long way since 2015, but we have might been concerned about our privacy and the security of the data these devices collect and store. Here are some of the example issues to consider.

Smart Watches Control Smart-Home Technologies

Smart Home
Smart Home / Shutterstock

Smartwatches sometimes can control smart-home technology. For example, you may able to use your smart-watch to unlock your front door. However, what happened if your device was stolen or lost?

Smartwatch manufacturers offer security settings that can help protect you in the case of theft. For instance, security settings may prevent your smartwatch from being paired with any other devices you haven`t approved. That`s smart to make sure you`ve enabled such protection in your security settings.

Wearable Technologies We Might Need To Know

  • Educate Users – It is important to educate users about the types of data wearable`s collect, where it goes, and how it might have been used.
  • Require multi-factor authentication – Should require employees to use multi-factor authentication on their smartphones.
  • Segregate wearable`s on a different network – It should threat wearable like any other computing device on their network.
  • Wearable security is a legitimate concern – This means that malware and other forms of attacks can use that path to compromise the phone and then other resources inside the network. The attackers would have access to legitimate enterprise credentials that would lead to loss of, or the ransom of, sensitive data.
  • Prepare for security and privacy risks, especially in the short term – Wearable`s use a variety of third party components, operating systems, and software, there are no standard dominant operating systems, such as Microsoft Word, to standardize or build upon.

As wearable technology becomes more popular, there is a clear warning that they`ve become a bigger target for abuse. Companies like Google, Samsung, and Apple should start with tight security, not add it on later. Smartwatches will be the most important new product categories in consumer electronics since the iPod defined the market for tablets. Smartwatches had not been deployed all that successfully, having limited functionality and aesthetics that have been less than appealing to wear on the wrist.

Of course, the Apple Watch may be changing that perception completely, as it is a promising wearable technology that will ensure and surely finds many, many more uses than though of upon its first release. There are many other devices already in use and even more both the near and far horizons for personal, professional, and patient use. The convenience of wearable technologies for companies and for you is likely to drive demand. Consumers are notoriously bad at managing their data securities. If they have unwittingly agreed for their data to be shared and sold, there`s no way to know where it will end up.

There are also concerns that developers are sacrificing security in the rush to get to market. But it`s a good idea to understand the risks and take steps to help protect your personal information. Whatever the application, a large number of wearable devices are still in their testing phase and performance, benefits of use and long term reliability need to confirm. The concept and new developments are what will continue in the future and with the variety of devices possible will come the vast array of requirements which will define the need for suitable protection.

Wearable Technologies are designed with the intention to make everyday tasks easier and more accessible.

References:

Android Released July 2019 Security Patch Update with 33 New Vulnerabilities

Google’s famous mobile operating system platform, Android, recently released this month’s security updates of a total of 33 new vulnerabilities that are affecting Android-related devices. Out of this 33 patch updates, 9 are reported to be critical in severity. This is quite an issue that Android developers need to worry about.

According to Statcounter.com, the Android mobile operating system comprises 76.03% of the total market share worldwide. Its rival, Apple’s iOS, is second in place garnering 22.04% only.

Why Vulnerabilities Affect a Mobile Operating System?

This question sounds a little bit complex but to make it simple a vulnerable security update, which is newly created or released, can be a door for malware attacks.

A weak security patch can result in issues to the Android system like lower processing speed, more storage space is consumed than normal or average.

Vulnerabilities also affect multiple Android components like the operating system itself, libraries, media frameworks, other frameworks, as well as Qualcomm components.

9 New Vulnerabilities Explained

The 3 of the critically severed vulnerabilities thrive inside Android’s media framework. Out of this, the most severe could give access for a potential remote attacker to send an arbitrary code on its target device. This method convinces users to open a malicious file.

The other remaining vulnerabilities:

  • Affecting the Android Library
  • Affecting the System
  • Two vulnerabilities are residing in Qualcomm components. One in DSP_Services, and the other in Kernel.
  • The last 3 is residing in Qualcomm closed-source components.

When an application creates an android media player object, it is actually holding up a proxy who can be used to manipulate the concrete player resides in the media server process. Apart from releasing patches for security vulnerabilities, Android Security Patch on July 2019 also included bug fixes for various issues in some of the supported version of Pixel devices.

Besides this, a high severity flaw in the Android framework that could allow an installed malicious application to bypass the user`s interaction requirements in an attempt to gain access to its additional permissions. Most basic security methods, which are very precise important that, every device supports a very strong, hard encryptions.

Many OEMs these days ship their devices with dedicated encryption hardware. While it is beneficial, it is also very expensive. Such as dedicated hardware, has typically been restricted for mid to high tier devices. This is not to say that low-end devices cannot support encryptions, but without hardware accelerated encryptions, the overall user experience is degraded because of slow read/write times.

Most of Qualcomm`s profits come from licensing smartphone radios and chips to the other companies, and one of the biggest costumers of it was Apple. However, the two companies have battled it out in court over royalty payments since 2017. Apple initially sued Qualcomm for allegedly overcharging to use LTE modems. Whereupon Qualcomm countersued saying that it is Apple actually gained and owned it more money in royalties and that it infringed on some of its patents and shared propriety information with its rival Intel. Apple`s relationship with Qualcomm is coming to a bitter end.

Why More Users Choose Android

There are many advantages of Android open-source operating systems to develop applications. Just recently, we posted on how Android phones innovate compared to its rival mobile brands. Oppo’s mesh talk is one of them. Never the less the security on developed apps is vulnerable due to an intruder can get root access by privileges escalation.

Despite most several organizations are working in data security, there is not a global security standard for mobile devices. However many companies, universities, and manufacturers have proposed some guidelines. The majority recommendation was created to avoid or detect a mobile device’s actual threats in different OSI (open systems interconnection).

Security Has Been Improved

It was impossible to detect safety flaws in the APK code, which can trigger threats over the user`s data and over the information recorded into the server. For future works, it is necessary to analyze vulnerabilities over the communication channels, between mobile applications and database servers, in order to establish threats even when it is with encrypted techniques.

Users are strongly recommended to download the most recent Android security updates as soon as they were available to the app in order to keep their Android devices protected against any potential threat attacks, given that users trust so much in so many sensitive transactions on their devices daily.

References:

How To Have An Adapting Cybersecurity

 Cyber security
Cyber security / shutterstock

Every system built in the real world has security. Set a banking institution as an example, the entrance has guards on it even the inside has more. The same setup applies online. For online business owners having a strong Cybersecurity is a must but how to have an adapting one is not easy.

Any individual or an organization will like to buy a magical permanent solution against all Cybersecurity problems and all can sleep without fear. But it is easier said than done. Technology nowadays keeps on evolving like a 4G became a 5G network and soon become 6G.

Let us face the truth, having a Cybersecurity is not easy and to have a strong yet adapting one is a challenge! There is no magical formula to have one but there are a handful of things that anyone can do to achieve lower exposure to risks as well as significant security posture improvements.

With the right platform, intelligence, and expertise along with what mentioned above can help anyone or any institution evade the vast majority of threats. Plus it can also help in detecting and responding to any attacks that get through the system more quickly. No system is safe, that is a reality.

The Challenges of Having a Cybersecurity

It is very indeed a challenging thing to have a Cybersecurity for many reasons but the evolving perimeter that surrounds as well as the complex solutions are not helpful.

A long time ago all but a faint distant memory, according to the Techno standards, Cybersecurity was built around a mere concept of INSIDE vs. OUTSIDE and US vs. THEM or vice versa. The servers, users, applications, and data inside the network system were basically trusted while everything outside was flagged as a potential threat.

The creation of free public Wi-Fi, hotspots, and handy laptops on the go, mobile devices includes phones, tablets, watches, and cloud computing devices have eroded the concept of a fixed perimeter. The old model of perimeter defense is not valid anymore because attacks can be anywhere. Worst, most attacks are appearing to be valid and legitimate users. Software that hasn’t been updated just like what happened to VLC – which hackers found a way to inject malware to its users.

Here’s a Quick Video on How Cybersecurity Works

https://www.youtube.com/watch?v=JdfmV2KW11I

On the other hand, new platforms and technologies are developed thus Cybersecurity vendors are forced to create specific point solutions for each problem. The result of this scenario is confused, mixed tools and services that serve specific facets of the perimeter but does not always play well with each other. This does not provide a comprehensive approach to the whole system but rather a complex one. The said whole security system must be understood and stand-alone.

We can’t remove the fact that the threat or attack landscape is expanding and evolving worsening any solutions even more. Attacks have become stronger, more complex, and harder to be identified such as the famous file-less “Living off the Land” (LotL) attacks.

The diversity of the Information Technology systems, in particular, the hybrid or multi-clouded environment, gives way to misconfiguration. Inevitable human errors expose the network to unnecessary risks.

The attackers are also learning and adapting the Artificial Intelligence (AI) to bypass or evade detections along with the automation of developing customized attacks.

Ways to Enhance Your Cybersecurity

With all those things mentioned above sounds discouraging like there is no hope but there are measures we can do. Bear in mind that our goal is to neutralize attacks or weaken them at least. There is no perfect Cybersecurity system.

As the title of this article, “How To Have An Adapting Cybersecurity”, we must learn to adapt to threats and attacks. One of the goals is to give a hard time for the attackers to penetrate your network system and improve your chances of quick attack detections, stopping them in time. Being smart or knowledgeable is our best defense. We must know our enemies like we know ourselves coming from Sun Tzu’s Art of War book.

Here are the five keys in order to implement that:

  1. You need to evaluate your business objectives and unique attack surface.

Select a threat detection method that can address your workloads properly. Cloud servers are unpredictable they spiral out of control UP and DOWN on a regular basis. Your Cybersecurity system’s detection should follow the provision and de-provision of the engine cloud platforms. The collection of metadata to follow events must be observed because of detection traverse in dynamic environments. Most SIEMs (SIEM stands for Security information and event management) cannot do this.

  • Vulnerabilities must be eliminated even before they are detected.

This method uses vulnerability assessments to identify and remove disadvantages before they become exploited. This includes assessing full application stack, system code, third-party code, and code configurations.

  • Data from multiples sources must be aligned to improve use cases and desired outcomes.

There are kinds of data that must be collected, inspected for any suspicious activity namely; web, log, and network. Each data type has its own unique strengths in identifying certain threat kinds and altogether, gives a whole picture for greater precision and actionable context.

  • Analytics can be used to detect the latest sophisticated attacks.

Sounds complex but don’t be confused, it is ensuring your threat detection mechanisms are looking in real-time events and patterns alongside the past historical events across time. Machine application learning is advised here in order to find out what you are specifically looking for. If you use SIEM, make sure to apply machine learning in order to see missed correlations and tune your SIEM rules better.

And last but not least of course:

  • Align your security goals according to your business demands.

There are more ways to improve your security posture and identify threats. Most of SIEMs have traditional approach in finding threats. They are most helpful for organizations that have a well-rounded staff security program but a SIEM alone isn’t the best answer for security monitoring against today’s web applications and cloud surfaces.

Again remember, no system is safe, just counter arising problems. Be smart is the best defense.

References:

Open-source Media Player: VLC Can Be Source For Hacking

With the current fast-paced technology nowadays. Lots of fun are offered on the internet for free. This entices hackers to do their crimes. Hackers will do anything to steal precious confidential personal information. One of the media players in the market that mostly used by a lot of people today is the VLC developed by VideoLAN. Their methods of hacking recently include the use of the said software. It’s an open-source program and most of all, free. Because of that, the VLC player has become a source for malware if left un-updated to newer versions.

Why Hackers Choose VLC

One of the simple reasons hackers managed to use the VLC player as a source for hacking, it’s popularity. The said player is very compatible with most Operating Systems especially Windows and Mac with over 3 billion downloads worldwide by hundreds of millions of users. Not only that, but it is now popular also to Android and iOS mobile platforms.

Because of this, hackers have made the VLC player as a developing ground for malware creation.

VLC Malware Exploitation

The first VLC malware exploit was discovered by Symeon Paraschoudis from Pen Test Partners identified the malware as CVE-2019-12874 which is a high-severity vulnerability as it was classified. It is also a double-free issue that thrives in the “zlib_decompress_extra” function of VideoLAN VLC player and gets activated when it parses a malformed MKV type of file with the Matroska demuxer.

Another researcher which is unnamed discovered the second VLC malware exploit, a high-risk flaw and called CVE-2019-5439. It is a read buffer overflow issue that resides in the “ReadFrame” function and can be activated using a malformed AVI video file.

https://www.youtube.com/watch?v=gb4O5jZuQ34

Even though the proof-of-concepts delivered by both discoverers cause a crash error, potential hackers are still able to exploit these vulnerabilities to successfully execute arbitrary code with similar privileges of the targeted users.

The trick is the attacker just needs to create a malicious MKV or AVI video file that becomes a decoy for the users to play on using the un-updated vulnerable VLC media player versions. The said trick is similar to the infamous click-bait trap which is very popular in phishing sites.

Here is an overview of the hacking process; the user plays the downloaded malicious video file through the un-updated VLC program. After that, the malware has been successfully inserted into the user’s computer system and the hacker can steal targeted information thereon.

Why VLC Malware So Dangerous

Imagine after creating this VLC malware, potential hackers can easily target thousands of users in a short span of time. It is very easy for the attacker to do this after they successfully inserted the malicious files to the targeted ones. They can attach the malicious files unmasked through the video files. In torrent sites especially for those users who like pirated copies of a newly released movie or TV series like Game of Thrones episodes. This can also be copied from one user to another and can become very viral through social media sharing sites or the like.

Actions against the VLC Malware

The VideoLAN has already announced an advisory regarding this, by having ASLR and DEP protections enabled in their laptops or PC systems. In this way, it can help mitigate the threats but developers admit that bypassing still can occur after doing these protections.

The discoverer Paraschoudis has used the “honggfuzz fuzzing” tool find this issue along with four other bugs which were also patched by the VideoLAN team just a month ago. There are also 28 other bugs that are found by other security researchers through the EU-FOSSA bug bounty program.

Tips on Countering the VLC malware:

  • It is highly recommended or a must that every user to update their VLC media player VLC to 3.0.7 or later versions.
  • Avoid opening, playing or downloading video files from untrusted or fishy third party programs or sites.
  • Get a strong Anti-virus or Antimalware program and have installed in your desktops, laptops or even mobile and tablet gadgets. Make sure that they are updated with the latest engine protection.

It is very important for users to be knowledgeable about malware and viruses. Don’t let the hackers get a chance to steal your precious confidential information like bank accounts, phone numbers, emails, and names.

NeuroSky Mindwave Mobile – The Future of Smart Phones

The NueroSky Mindwave Mobile is the future of smart phones. Using smart phones would be a lot faster with mind control; the technology would allow you to perform each and every task you can do via touch or voice with your mind.

  • Send text messages, can control your screen brightness, or create movie videos you`ve captured.
  • Play so many music videos on some futuristic versions on YouTube, and Netflix.
  • Edit images you have captured – you get the picture with your thoughts.

NeuroSky Mindwave Mobile you would not be longer have to search for an app to open it or stretch your finger all the way to the top of the screen to tap it. Technologies have come so long far away since today the smart phones sport large touchscreens displays. A few years ago, the main way of using a phone was most of them are physical keypads. This was replaced eventually by touch screens we used to this very day. NeuroSky Mindwave Mobile consists of a headset, an ear clip, and a sensor arm. The headset`s reference and ground electrodes are on the ear clip and the EGG (Electro Encephalo Graphy).

The technique`s works like this: Electrodes were placed on the surface of someone`s forehead; these electrodes can measure the electrical signals produced by the brain`s neurons through the scalp. EGG has been used as a diagnostics tools for more than a half of centuries.

NeuroSky Mindwave Mobile Development

NeuroSky Mindwave Mobile

Scientists were developing more technologies to allow people to type with their minds that it would give them more satisfaction. MIT also working on something so-called device AlterEgo, which lets you converse the users with the machines with only by thoughts. These features of the future technologies don`t require you to wear weird contraption things on your head to use it. We`ll have to face it and accept that the battery life of the average smart phones really sucks.

Even how much expensive you`re smart phone was and even if you have a high-end smart phone like the Mate 20 Pro with this massive 4,200mAh battery, you are still only looking at round two days of average uses. Once the devices run out of juice, you either have to plug it in for a couple of hours or place it on a wireless charging pad, if your smart phones support it.

Things could be quite different in the future. It`s only recently that people have started harnessing EEG as a way of many tools to control technologies and devices. Patients with spinal cord injuries or ALS could potentially use the technology to mobilize these wheelchairs or much better communicate, EGG headsets claimed to give wearers something to akin to superpowers.

As more wearable technologies emerge that claims to quantify our biology. It is important to remember that EGG can read our minds and thoughts. The features of this technology “NeuroSky Mindwave Mobile”, has an automatic wireless pairing, uses TGAM1 Bluetooth v2.1 class 2 module up to 10 meters range, single AAA battery powered and it can run up to 8-hours, static headset, IOS, and Android supported, and a starter kit edition.

NeuroSky Mindwave Mobile Products

NeuroSky Mindwave Mobile product families consist of hardware and software component simples’ integration of this bio-sensor technology into the consumer and industrial end-applications. Usage of the neurosky products is subject to an end-user license agreement.

“Made for iPad,” “Made for iPod,” and “Made for iPhone,” means that electronic accessories have been designed to connect especially to iPad, iPod, and iPhone respectively. It is been certified by the developer to meet Apple performance standards. No warranties that the NEUROSKY product families and related documentation are provided “as is” without any express or implied warranty of any kind including warranties of merchantability, non-infringement of intellectual property, including patents, copyrights or otherwise, or fitness for any particular purposes.

Educational Focused

What`s really good about this mind wave is more than 100 brain training games, educational apps, and development tools were available through NeuroSky, iOS, and Android stores. You can also write your own programs to interact with Mind wave Mobile by using the free developer tools. But even with those sharpened algorithms, portable EGG systems still won`t be able to do all of the things that wired EGG systems can do all in the laboratory. Therefore, companies have to be very careful not to over-promise or make claims that are ahead of these technologies. InteraXon is now working with the app developers to help them better and understand more about the data collected from EGG systems and limits of this technology.

The Companies want to encourage, not just their own developers, but the community as well, in thinking about what the headset can do and can`t do, so the experience isn’t too disappointing for all users. With this technology finally, we can do now measurements with our minds. We can measure the speed and sound with only our mind. One day and if that day would come we will face ourselves and find out that we are living in the world of full of lies. And the scientists start already to feel that the big clash is coming.

All you Need to Know about Facebook and Libra

Facebook Cryptocurrency Libra
Facebook Cryptocurrency Libra – Shutterstock

It was last December when Facebook’s plans for a digital currency network surfaced. The social media giant said it plans to help launch a digital currency in 2020 that caters about a dozen countries which publicly announced lately the Cryptocurrency in said was the Libra coin, making it as one of their most aggressive moves yet to push beyond digital advertising. Founder of Facebook, CEO Mark Zuckerberg, is assumed to present details of an ambitious project for his company to make a new global cryptocurrency Libra. The company is expected to outline plans in more detail this summer and has already spoken to Bank of England governor Mark Carney. They want to start testing its cryptocurrency Libra, which has been referred to internally as GlobalCoin, probably by the end of this year.

Cryptocurrency – Libra

The crypto-currency is called Libra. It is from a new nonprofit group based in Geneva; the Libra Association will oversee the currency. Libra’s vision is to be a global, digitally native, reserve-backed cryptocurrency built on the foundation of blockchain technology. Thus, people will be able to send, receive, spend, and secure their money, enabling a more comprehensive global financial system.

Their mission is to make Libra famous and effortless to use as possible to create money that people can use with assertiveness and convenience in their everyday lives. A reserve of real assets fully supports it.

One of the most significant advantages of this is that Facebook focuses on the millions of people in the world who cannot get a bank account. Libra, on the other hand, will allow people to send and receive payments anywhere in the world with the smallest amount of fees. The funding will be done online via the heap of Facebook-owned apps.

Libra Uses Blockchain Technology

A network of validator nodes runs the Libra Blockchain. The evolution of the blockchain is supervised by the Founding Members of the Libra Association, and each member will be accountable for running a validator node. As the network grows and becomes more self-sustaining, the Libra Association will work to transition a permissionless mode of operation gradually.

A lot of people says that Libra is very similar to Bitcoin crypto-currency. Although both have significant difference like; Libra will be a more substantial currency and will circumvent the constant fluctuations in value the way Bitcoin has encountered. Libra will be supported by numerous currencies, like the dollar, euro, and yen. A list of more currency on the box below.

Currency Code Currency Name Support for Cents
SGD Singapore dollar Yes
RON Romanian new leu Yes
EUR Euro Yes
TRY Turkish lira Yes
SEK Swedish krona Yes
ZAR South African rand Yes
HKD Hong Kong dollar Yes
CHF Swiss franc Yes
NIO Nicaraguan córdoba Yes
JPY Japanese yen No
ISK Icelandic króna No
TWD New Taiwan dollar No
NZD New Zealand dollar Yes
CZK Czech koruna Yes
AUD Australian dollar Yes
THB Thai baht Yes
BOB Boliviano Yes
BRL Brazilian real Yes
MXN Mexican peso Yes
USD United States dollar Yes
ILS Israeli new shekel Yes
HNL Honduran lempira Yes
MOP Macanese pataca Yes
COP Colombian peso No
UYU Uruguayan peso Yes
CRC Costa Rican colon No
DKK Danish krone Yes
QAR Qatari riyal Yes
PYG Paraguayan guaraní No
CAD Canadian dollar Yes
INR Indian rupee Yes
KRW South Korean won No
GTQ Guatemalan quetzal Yes
AED United Arab Emirates dirham Yes
VEF Venezuelan bolívar fuerte Yes
SAR Saudi riyal Yes
NOK Norwegian krone Yes
CNY Chinese yuan Yes
ARS Argentine peso Yes
PLN Polish złoty Yes
GBP Pound sterling Yes
PEN Peruvian nuevo sol Yes
PHP Philippine peso Yes
VND Vietnamese dong No
RUB Russian rouble Yes
HUF Hungarian forint No
MYR Malaysian ringgit Yes
CLP Chilean peso No
IDR Indonesian rupiah No

The Challenge

It is an excellent platform again by Mark Zuckerberg, but may we never forget that until now that many big Facebook announcements never really take off. For example, two years ago, Facebook promised us that they would focus on delivering to us about the “augmented reality” idea in which phones and other devices project digital images into real-world surroundings. Such an AR application is still invisible today.  How about the online shopping chatbots that Zuckerberg announced a year earlier, saying they would transform e-commerce in its Messenger app.

Many believed that Zuckerberg wants to create a US version WeChat that originated in China. It combines social networking, messaging, and payments in a single app. Hopefully, this will be realized to avoid more broken promises.

How to Recover Data From Android Using PC

How to Recover Smart Phone Data Android to your Desktop PC
How to Recover Smart Phone Data Android to your Desktop PC – shuterstock

Nowadays, the smartphone becomes one of the essential things in our daily and we do a lot of tasks with it. However, it’s also easy to get broken or damaged due to unexpected activities. Breaking the screen of the Android phone can be frightening and troublesome. Situations like cracked screen, water-damaged, the black screen are just a few to mention.

Many of us have been through it. When one of these situations happens, the worst thing is not the phone is broken, but we are unable to access the precious data, such as contacts, messages and more that have been stored in the phone memory. On this tutorial, you will learn how to recover data from android using PC – because your data is important, on this tutorial, we are going to show to you how you can recover your data on the broken smartphone and access it using your PC.

Be Safe Than Sorry

That is why it is important that you back up your phone as regularly and carefully as you do your other devices. A large scale of smartphone platforms can back up their data to a computer or to the Internet. In the event of a crash—which, for phones, could literally mean crashing onto the floor and shattering—the data can be easily restored when the device is repaired. Throughout the time, a lot of ways are suggested to back up data’s like:

  • Saving it on Google Account
  • For SMS/MMS messages, playlists, and alarms, third-party software MyBackup Pro is used.
  • Back up your smartphone to your computer manually.
  • You can use third-party software like AirSync from DoubleTwist and The Missing Sync for Android
  • Or avail free services like Google Music and Picasa

Now it’s a different story when it comes to breaking and malfunctioned screens. You can no longer use its screens for scrolling and command options. So the question now is “how to get back lost data from Android phone when the screen is broken”?

Recovering Files

How to recover data from android using PC.

Your computer is one of the best help in recovering files from your Android phone. The first thing to do is to activate the USB debugging in the configuration of the Android device, to make sure that the smartphone will be recognized by the PC.

Enable USB Debugging
Enable USB Debugging

Images and music are one of the most precious things we want to keep. Simply connect your smartphone to your PC, activate Debug from the settings menu and use the mouse to access the different folders saved on your device.

How to Enable Debugging

By the way debugging is the routine process of locating and removing computer program bugs, errors or abnormalities, which is methodically handled by software programmers via debugging tools. Debugging checks, detects and corrects errors or bugs to allow proper program operation according to set specifications.

Debugging is also known as debug.

For Android 2.3 or earlier:

Enter “Settings”> “Applications”> “Development” > “USB debugging”

For Android 3.0 – 4.1:

Go to “Settings” > “Developer options” > “USB debugging”.

For Android 4.2 or newer:

Hit “Settings” > “About phone”. Tab “Build number” for 7 times till the dialogue box “You are under developer mode” occurs. Then go back to “Settings” > “Developer options” > “USB Debugging”.

USB debugging mode not active or PC doesn’t recognize your device

“USB device not recognized”, “PC not recognizing Android phone”, or “USB device not detected but charging”, sounds familiar? Definitely yes as it happens all the time and it’s frustrating! These are cases that although the PC has recognized your smartphone, you are still unable to view the files saved on it. Don’t fret because, as always, on Android there is a solution to everything.

Before going too technical, try these few suggestions first.

  • Try a new USB cable and another computer. Some cables are power only.
  • Connect Android device to PC directly instead of through USB hub.
  • Reboot phone and connect to PC while in Airplane mode.
  • Remove battery and SIM card, and wait a while, then put them back and reboot.
  • If Windows detects your phone but doesn’t find any content, you should unlock your phone screen and try again (only if you can still find a way to use the display of your phone).

If not, then let us go deeper. For Samsung user, make use of the section called Find My mobile which not only useful for when you lose your smartphone, but also for unlocking your device with the function Unlock my screen. By accessing this function, the PC will recognize your device and you can then use the well-known Kies program to transfer your data.

Remotely find, lock, or erase Phone using Find my Device Feature

  • Go to android.com/find and sign in to your Google Account.
  • If you have more than one device, click the lost device at the top of the screen.
  • If your lost device has more than one user profile, sign in with a Google Account that’s on the main profile. Learn about user profiles.
  • The lost device gets a notification.
  • On the map, you’ll get info about where the device is.
  • The location is approximate and might not be accurate.
  • If your device can’t be found, you’ll see its last known location, if available.
  • Pick what you want to do. If needed, first click Enable lock & erase.
  • Play sound
  • Rings your device at full volume for 5 minutes, even if it’s set to silent or vibrate.
  • Lock
  • Locks your device with your PIN, pattern, or password. If you don’t have a lock, you can set one. To help someone return your device to you, you can add a message or phone number to the lock screen.
  • Erase
  • Permanently deletes all data on your device (but might not delete SD cards). After you erase, Find My Device won’t work on the device.
  • Important: If you find your device after erasing, you’ll likely need your Google Account password to use it again.

For devices from other brands, you can enter Recovery mode and use Fastboot (which does not need USB Debugging enabled). You’ll then have to start a Custom Recovery with Fastboot and use shell commands to extract files.

Bootloader mode (Fastboot mode) allows you to do various amazing things. You can flash any partition using this mode and If you are familiar with the android stuff these are .img that can be flashed via fastboot mode. This option requires expertise and familiarity Android, but with it, recovery of data is surely possible.

How to recover data if your screen is broken but you can still see the display

If you can still access the display of your broken screen phone, then you can fix this by using a USB OTG (On The Go).

USB On-The-Go (OTG) is a standardized specification that allows a device to read data from a USB device without requiring a PC. The device basically becomes a USB host, which isn’t an ability every gadget has. You will need an OTG cable or OTG connector.

Old Android device does not support USB OTG; it’s something the manufacturer has to enable. But most of the latest Android devices are already compatible with it.

How to recover data if your screen is off

The most practical way that you can control or mirror Android to PC is through the use of ApowerMirror.

  1. Download and install ApowerMirror on your computer. Launch the program when the installation is done.
  2. Get your USB cable and connect your Android device to the PC. Wait until the connection process is completed.
  3. Click “Start Now” on your Android to begin mirroring Android to PC. Use your keyboard and mouse to control Android with broken screen.

Another feasible solution is using Samsung SideSync.

  1. Search for the SideSync desktop version on your browser.
  2. Install it on your computer then connect your Android to the PC with a cable
  3. After some time, your device will be recognized by the PC and the app will automatically launch.
  4. A small menu will pop up on your screen. From here, click on “Phone screen sharing” to cast your Samsung completely to your computer.

Recovering files with AirDroid

  1. Create an AirDroid account.
  2. Adding a device when you finished create AirDroid account.
  3. Visit our official website to download AirDroid desktop clients; Or visit Web AirDroid http://web.airdroid.com/ directly to manage your mobile devices.

This feature allows you to mirror pop-up notifications and help you focus on your computer to handle all messages from phone, no more need to check your phone.

Your Last Resort If Anything Above Fails

The last option will be quite expensive since you have to bring it to a reputable shop. Recovering all those precious memory is always worth it.

And that my friend is how to recover data from android using PC.

One Plus 7 PRO Camera – Most Advanced Smartphone Camera So Far

Right after the announced of Oppos MeshTalk, that lets users call or message each other without the need of internet, Bluetooth or even GSM Network. One plus won’t get behind. Here’s a quick overview of One Plus camera.

We all love taking pictures, don’t we? From professional photographer to selfie drama queens, we love taking photos.

For professional photographers, they want to show people the good things about themselves One Plus 7 PRO Camera’s would be a best choice.  Photography for them is catching not just the smallest detail but every emotion that comes with it. Indeed, a picture could paint a thousand words, and for every amateur photographers, every angle and every perspective tells a different story.

Then here comes the selfie queens and kings. Some people think selfies, pictures that focus on you, are vain. The use of this word becomes widespread, not till 2012 or so. Self-portraits are not new. How can we forget the favorite portrait of all time? Mona Lisa – is a half-length portrait painted by the Italian Renaissance artist Leonardo DA Vinci. May we never forget the issues that come with the painting because of Mona Lisa’s smile. Da Vinci exploited human optical illusion to create a unique smile through perspective and by using shadow work.

Selfie Camera in Action

Image from Gyazo

Since then, people became obsessed with producing and upgrading ways to enhance self-portraits. We could find a lot of camera and beautifier applications in the market like BeutyPlus, Camera360, B612, YouCam, SweetCamera, etc . And for the selfie queens and kings, they believe it helps them gain more confidence through these applications.

DSLR Sales Dropped Because of High Quality Smartphone Cameras

One of the side effects of the rise in popularity of smartphones is a decline in compact camera sales. In 2016 sales of DSLRs and Compact System Cameras (or mirrorless cameras) were reasonably stable, but sales of compact cameras dropped, according to data from the CIPA.

The main advantages of using a smartphone above a compact camera are convenience. Smartphones are like small computers; it’s like bringing your personal computer, anywhere, everywhere, and anytime with you. It has its playback display unit and always connected to share your images.

Under convenience comes the different abilities a smartphone can do like sharing, playback, image editing, picture quality, Lens versatility (which is a doubt to some ordinary smartphones), manual control, battery, and cost. But it’s imperative to pick the right smartphone camera. Cheaper smartphones tend to have more inexpensive photographic components to keep the cost down, so the pictures won’t be as good.

Here’s A Good Video Review

Video Courtesy : Marques Brownlee Youtube Channel

That’s What We Came For.

Other brands right now are jumping to foldable screens, but OnePlus 7 Pro has enough features du jour to keep its fans enticed.

In the US, One Plus partnership with Verizon and T-mobile helped the boost in the market which started last year. The company presented its first OnePlus One in 2014 which garnered a reputation for making phones with premium specs at a wallet-friendly price. The pressure of maintaining their rate was on, but still, they have the highest increase in price its upgrading models.  The OnePlus 7 Pro is still great value despite being the company’s most expensive phone. With the OnePlus 7 Pro, the company is giving its customers a top-of-the-line telephone at a reasonable price that’s still less expensive than the iPhone XR and Galaxy S10E — the cheapest “flagship” options from Apple and Samsung.

  OnePlus 7 pro Iphone XR Galaxy S10E
Triple Features Video Single Features Video Dual Features Video
Main Camera 48 MP, f/1.6, (wide), 1/2″, 0.8µm, Laser/PDAF, OIS 8 MP, f/2.4, 78mm (telephoto), 3x zoom, Laser/PDAF, OIS 16 MP, f/2.2, 13mm (ultrawide) Dual-LED dual-tone flash, panorama, HDR [email protected]/60fps, [email protected]/60/240fps, [email protected], Auto HDR, gyro-EIS, no video rec. with ultrawide camera 12 MP, f/1.8, 26mm (wide), 1/2.55″, 1.4µm, PDAF, OIS Quad-LED dual-tone flash, HDR (photo/panorama) [email protected]/30/60fps, [email protected]/60/120/240fps, HDR, stereo sound rec. 12 MP, f/1.5-2.4, 26mm (wide), 1/2.55″, 1.4µm, Dual Pixel PDAF, OIS 16 MP, f/2.2, 12mm (ultrawide), 1.0µm LED flash, auto-HDR, panorama [email protected], [email protected], [email protected], HDR, dual-video rec.
Selfie Camera Single Features VidSingle Features VidSingle Features Vid
Motorized pop-up 16 MP, f/2.0, 25mm (wide), 1/3.0″, 1.0µm Auto-HDR [email protected], gyro-EIS 7 MP, f/2.2, 32mm (standard) HDR [email protected] 10 MP, f/1.9, 26mm (wide), 1.22µm, Dual Pixel PDAF Dual video call, Auto-HDR [email protected], [email protected]

The camera hasn’t been a strong suit for OnePlus phones, but the company upped its game this time. OnePlus 7 Pro has a triple-camera setup featuring a 48-megapixel Sony IMX586 sensor, an 8-megapixel telephoto lens, and a 16-megapixel ultra-wide angle lens. For selfies, the OnePlus 7 Pro houses a 16-megapixel camera.

OnePlus 7 Pro price is $670 (128GB). As for the Galaxy S10e and iPhone XR, the smartphones are available at $750 and $749 (64GB), $799 (128GB), $899 (256GB) respectively. All three smartphones aim to offer flagship experience but with minor trade-offs. If performance and price is your key, you can go for the OnePlus 7 Pro.

One plus brand is producing quality pictures and is expected to produce and enhance its features in the future models to be released. With the price it offers in the market and the constant upgrading of its unit model, they are for sure a forerunner to compete with the bests like Samsung and Apple.

References: