The Danger With Cheap Android Phones According To Hackers
Every now and then, we hear news about hackers hacking tech companies and other devices. But did you know that inexpensive phones are very easy to hack? Not only they are easy to hack, but some are also programmed to be an accomplice with the hackers.
The Allure Of Inexpensive High-End Phones
With so many phones coming out into the scene every month, it is hard to buy those $400-$600 phones. For some people, it goes like this, "Why buy those expensive phones when you can buy $50-$200 phones that are capable to compete with those high-end phones?" This logic seems very reasonable, but there is a dark truth behind it.
The Danger With Inexpensive Phones
Despite not wanting to waste money, but desperately trying to "keep up" with the trend, there is a report that inexpensive phones are giving up your personal information. In a written article at USA Today, the firm, Kryptowire conducted an investigation and found out that tens of thousands of inexpensive and pre-paid phones are transmitting information including full body text messages, contact lists, and call history with full telephone numbers along with security details over secured web protocols to a server located in Shanghai.
The text messages were being transmitted back to the server located in China every 72 hours. Personal information was transmitted every 24 hours. Even if China denies these allegations, we can imagine what damage it can do if all the gathered information was used against other countries or people.
Is It Safe To Buy Phone Made By Chinese Companies?
Though China is known for producing products with decent prices and making replicas, it is not fair to assume all Chinese phone manufacturers are hackers. In fact, Huawei, Lenovo, and Alcatel are some of the most well-known and highly trusted brands that are being sold throughout Europe and the U.S. for a pretty long time - according to Phone Arena. Just be sure to stay away from those no-name phones or not really well-known phones.
Google's Translation App Update: All You Need To Know
Google's Translation app just got an upgrade! It can now translate sentences. Read more to know everything you need to know about it.
Snapchat Files For An IPO, Does It Confidentially
Snap Inc., the parent company of the popular Snapchat app has secretly filed for an IPO that will value the company between $20 to $25 billion.
Apple iOS 10.2 Beta 3 Now Released; Latest Updates And Improvements Unveiled
Just today, Apple has begun seeding the 3rd beta for iOS 10.2 to developers, which introducing some notable improvements to its new TV app that was first introduced in the 2nd iOS 10.2 beta. According to reports, the TV app is a lot more functional, with supports for the upcoming feature that will keep track of what you're watching across multiple devices. The TV app has now completely replaced the former Videos app in the U.S., which has now been removed. Aside from the all-new TV app, here's a short list of some changes that is featured on the iOS 10.2 beta 3.
Wikileaks' Allegations Against CIA: Should You Be Worried?
A trove of new Wikileaks documents reveal that the CIA is capable of committing “undetectable assassinations” by hacking into the computer systems of autonomous cars. While the CIA has neither confirmed nor debunked the allegations, a number of security experts said they know enough about the CIA to know that the agency could actually murder people by hacking into peoples’ cars. This has raised a number of concerns about the future of autonomous cars and how well they could protect their owners from hackers and malicious programs.
9 Hackers Involved In $17M Banking Theft Plot Arrested By Russian Authorities
It´s well known that Russia has some of the most dangerous and skillful hackers in the world, which has been quite inconvenient for this nation, considering that cyber crimes have been committed.
MORE IN ITECHPOST
6 Must-Take Steps to Protect Yourself from a Data Breach
A data breach can take place in many ways. Whether it involves gaining physical access to your laptop or a malicious cyberattack on your device, the safety of your data could be easily compromised at any time.
How Do Personal Emergency Response Systems Work?
Personal emergency response systems, known as PERS for short, are systems that help people to raise the alarm and get immediate help when a medical or personal emergency occurs. They are ideal for older people and anyone with a mobility issue or an injury or illness that can cause falls.
Eight Must-Have Tools to Keep Your Car Out of Garage
We all dread taking our car to a garage for repairs. We might just want to avoid the inconvenience of being off the road or maybe the costs associated, which can even lead to knock-on effects on things like our holiday plans.
6 Hacks for Students to Choose a Laptop While on a Budget
The modern world tries to drown us in the sea of choices. One can’t simply buy a laptop - there are hundreds of laptops around and sometimes our budget becomes the only real limitation we can rely on. But how to choose other parameters to get the best laptop possible?