View RSS Feed


  1. Google Play cracks down on scammers and spammers

    Click image for larger version. 

Name:	google-play-logo1.jpg 
Views:	688 
Size:	25.9 KB 
ID:	92
    Google Play has updated its content policy to tighten its rules around in-app advertising, in-app payments and misrepresentation.

    Google Play's relatively lax content policy has led to a few problems that can make the consumer experience very annoying: relentless pop-ups, bloated software, fake reviews to make an app seem better than it is and misleading app descriptions.

    Google has sent an email to third-party developers announcing changes ...
    devices , apps , mobile , andriod
  2. Pandora will remove 40-hour mobile listening limit on Sept 1st

    Click image for larger version. 

Name:	Pandora.jpg 
Views:	256 
Size:	18.4 KB 
ID:	86
    Just months after introducing a 40 hour per month cap on free mobile listening for its online radio service, Pandora has announced that it will remove the limit starting September 1st.

    Pandora first added the limitation in March due to increased licensing costs, noting that just 4 percent of users would be affected by it. The company says it can now return to the unlimited option because of the “rapid progress of its mobile advertising”.

  3. Android bug batters Bitcoin wallets

    Click image for larger version. 

Name:	android-bitcoin.jpg 
Views:	253 
Size:	6.7 KB 
ID:	82
    Android security engineers have issued fixes that aim to address weaknesses in the mobile operating systems underlying Java Cryptography Architecture. The flaws had enabled theft from certain Android Bitcoin wallet apps.

    Google’s Android security team has issued a patch for the mobile operating system’s built-in pseudorandom number generator (PRNG), after problems with the feature led to some Bitcoin users having a small amount of money stolen.
  4. Paypal trials app that lets you pay with your face

    Click image for larger version. 

Name:	paypal_20130811105928_320_240.JPG 
Views:	157 
Size:	14.6 KB 
ID:	79
    While we're not quite scanning retinas à la Mission Impossible and Minority Report, PayPal is now testing face verification for mobile-payment transactions.

    The ecommerce company's app has a tab labeled "Local," which helps users find nearby stores and restaurants that accept mobile PayPal payments. Once customers check in to a venue online, their name and photo appear on the store's PayPal app. Shoppers can then use the app to pay for items ...
  5. Chrome password security issue stirs debate

    Click image for larger version. 

Name:	Chrome-logo-2011-03-16_270x269.jpg 
Views:	191 
Size:	8.5 KB 
ID:	78
    Another person with access to your computer can see your Google Chrome saved passwords through a simple series of steps. Should you be worried?

    The security flaw was highlighted in a blog posted Tuesday by software developer Elliot Kember. In his blog, Kember described how your saved passwords in Chrome can be revealed in plain text, a process that any Chrome user can replicate.

    In Chrome, click on the Settings icon, and then click on the ...
  6. Fort Disco botnet hackers bruteforce their way onto 25,000 Windows machines

    Click image for larger version. 

Name:	original.jpg 
Views:	216 
Size:	15.9 KB 
ID:	77
    A new bruteforce botnet campaign has infected over 25,000 Windows machines with malware using an unknown infection method, according to Arbor Networks.

    Arbor Networks security researcher Matthew Bing reported detecting the password-guessing campaign, codenamed Fort Disco, confirming it has already infected several popular web tools, including Joomla and WordPress.

    "We've identified six related command-and-control (C&C) sites that ...
  7. Android malware is reaching critical mass warns Trend Micro

    Click image for larger version. 

Name:	android_sick_0.jpg 
Views:	448 
Size:	16.0 KB 
ID:	76
    Google's Android mobile operating system is so beset by cyber criminals creating malicious apps that the malware is on track to hit the million mark before the end of 2013, Trend Micro has warned.

    The news is in the security firm's second quarter Security Roundup Report, which reveals that the number of malicious Android apps surged by 350,000 in the first half of 2013, hitting a total of 718,000 by June this year.

    Trend Micro said that ...
  8. Twitter hardens two-factor authentication with app-based secure logins

    Click image for larger version. 

Name:	v65oai7fxn47qv9nectx.jpg 
Views:	169 
Size:	3.9 KB 
ID:	74
    Barely two months after rolling out two-factor authentication, Twitter has beefed up its login procedures yet again, both to improve security and to make two-factor available to more Twitter users worldwide.

    Twitter launched two-factor authentication in late May with a system based on SMS messaging. While that was good enough for many users, however, it did present some problems.

    For one thing, verification via SMS is only available via ...
  9. Android one-click Google authentication method puts users, businesses at risk

    Click image for larger version. 

Name:	Android-Claco-A-AndroidLogin.jpg 
Views:	250 
Size:	5.7 KB 
ID:	72
    The single-click Google account login for Android apps is a little too convenient for hackers, according to Tripwire's Craig Young, who has demonstrated a flaw in the authentication method.

    The mechanism is called “weblogin”, and basically it allows users to use their Google account credentials as authentication for third-party apps, without sharing the username and password itself: a token is generated to represent the user's login details.
  10. Feds Are Suspects in New Malware That Attacks Tor Anonymity

    Click image for larger version. 

Name:	structured_cabling_network_switch.jpg 
Views:	215 
Size:	30.3 KB 
ID:	70
    Security researchers tonight are poring over a piece of malicious software that takes advantage of a Firefox security vulnerability to identify some users of the privacy-protecting Tor anonymity network.

    The malware showed up Sunday morning on multiple websites hosted by the anonymous hosting company Freedom Hosting. That would normally be considered a blatantly criminal “drive-by” hack attack, but nobody’s calling in the FBI this time. The FBI is the ...
Page 1 of 2 12 LastLast