*Block Spam calls & SMS on Android with these five apps

TechViews News   …..

Spam used to be just about email (and that nasty canned stuff). But now it is following us to our smartphones in the form of spam-texts and robo-calls. You could opt for not responding to those texts, or answering calls from unknown callers, but then you run the risk of missing an important message.

Most of the time, it’s about things that don’t interest you or information or products you’ll never use. Nonetheless, you still have to deal with them, just like regular emails & phone calls.

Getting rid of spam calls/SMS on your Android device is actually as easy as using one of the following apps. These Android apps will help make those annoying calls and texts not show up in your inbox.

Continue reading

Advertisements

*Computing vulnerabilities you should address

TechViews News   …..

Most people and small businesses are still using hardware and software that is older than five to seven years old. In a general sense, that’s ok. But as the march of improved products and software moves forward, it leaves existing equipment behind. Older than five years is becoming too old to be trusted in today’s world of security breaches.

An old computer that’s still chugging along, running an old operating system and perhaps old programs and applications, doesn’t seem to be a big deal. After all, they still seem to work just fine. Why spend money on new equipment or software if it’s adequate and functioning?

Walker White, president of BDNA, a company that tracks and analyzes end-of-life (EOL) data for hardware, software and medical devices, says that the main problem with out-of-date software and legacy hardware is that once they pass their EOL cycle, the vendor no longer maintains or supports the products, resulting in security vulnerabilities and risk.

Here’s a look at the hardware, software and mobile device vulnerabilities you should tackle now to reduce risk and increase security.

Continue reading

* How to choose which apps to delete from your phone

TechViews News   …..

It can be tempting to let apps accumulate on your phone until you start to run out of space, but apps you don’t use still have whatever data you put into them. They’ll still eat up your bandwidth to update themselves. And they will continue to distract you when you’re swiping through the grids of app icons in iOS and Android.

Neither Apple nor Google’s operating systems report which apps have gone ignored the longest, but their tracking of battery and bandwidth usage by apps can offer a rough indication of which ones have retained your attention.

Continue reading

*How to set up your Android phone for ultimate privacy

TechViews News   …..

It’s not an exaggeration to say that your smartphone is the most personal device you have. The fact it’s always with you, however, sure does generate a lot of information about your habits.

Your location history, Google searches, web browsing habits, app usage, and even recordings of your voice talking to the Google Assistant.

But it’s not paranoia to take stock from time to time of just how much you’re handing over to Google or if you’d rather not place all your digital privacy eggs in the same basket.

If your goal is to maybe do a little de-Googling because you don’t want the company to know every thing about you, the first place to start is the My Activity account center. This is essentially the dashboard for every instance where your activity touches Google servers. The site is quite mobile friendly, so you can attack all these details from your phone or tablet as well as on the desktop.

The amount of information is a little staggering, especially if this is your first time there. For example, touch “Android” and you’ll see a timeline of the interactions from your phone, such as which apps you’ve used on your phone, tablet, or Android TV. Same goes for Chrome, Search, or Play. There’s also a search function, which is surprisingly a little hit and miss at finding your stuff.

Continue reading

*WhatsApp users are being targeted with new malware

TechViews News   …..

Some users of the WhatsApp messaging service have had their banking credentials stolen by hackers. Cybercriminals are sending a virus to WhatsApp customers disguised as legitimate-looking documents.

How the latest WhatsApp scam works

Hackers are beginning to send malicious links in the form of Microsoft Excel or PDF files, or a Word document. If you click on the malicious link, the virus allows the scammer to browse through your computer or wireless device with the goal of stealing your banking credentials, including PIN codes, and other personal information from your gadget.

Continue reading

*Uber tracks your location even after your ride has ended

By Declan Dunn, TechViews.org …..

Uber, the ride sharing service, is now tracking you even when your ride is over. The company claims that by doing so it is better able to serve it’s customers.

If you have updated the company’s smartphone app recently, be sure to read the updated user agreement and it’s app-permissions you have agreed to allow. By agreeing to use the Uber phone app, you are agreeing to allow your phone to be tracked by Uber for ‘at least’ five minutes after the arrival at your destination.

This will happen regardless if the app remains open or has been closed. The term, ‘at least’ implies a minimum amount of time, and could indicate you are actually being tracked for a longer period of time. The user agreement doesn’t specify.

Continue reading

*10 Million People Need to Stop Using This Android App Now

TechViews.org   …..

The popular AirDroid file-management app could open your Android device to attack, a security firm says. Until the flaw gets fixed — hopefully, within the next two weeks — you should stop using the app.

Researchers at San Francisco mobile-security company Zimperium have discovered a flaw in AirDroid that allows malicious hackers to overcome encryption and access potentially sensitive information. The flaw can also give hackers the ability to remotely execute code on the respective device.

According to Zimperium, which spoke to ArsTechnica about the flaw, AirDroid uses a static encryption key to safeguard some data transmitted by the app. What’s worse, the researchers say, that encryption key can be easily found within the app’s code by anyone with a even little know-how.

Armed with that knowledge, a hacker can launch a man-in-the-middle attack on devices using AirDroid. From there, the hackers can decrypt the mobile app’s communications and even get full remote control over the smartphone through a malicious software update.

Continue reading