Tag Archives: android

“Dirty” devices…fresh out the box!

Android devices, after being unpacked, have been found to have malware. The devices were not sold via retail outlets. But this is an example of why no device can be considered absolutely safe…anyone can be vulnerable when it pertains to issues of security.


“The Check Point Mobile Threat Prevention has recently detected a severe infection in 36 Android devices, belonging to a large telecommunications company and a multinational technology company. While this is not unusual, one detail of the attacks stands out. In all instances, the malware was not downloaded to the device as a result of the users’ use, it arrived with it.

“According to the findings, the malware were already present on the devices even before the users received them. The malicious apps were not part of the official ROM supplied by the vendor, and were added somewhere along the supply chain. Six of the malware instances were added by a malicious actor to the device’s ROM using system privileges, meaning they couldn’t be removed by the user and the device had to be re-flashed.”

Preinstalled Malware Targeting Mobile Users

Samsung Galaxy 6 edge+ phone is fantastic!

Periscope, Rdio, Wurrly, the Samsung Galaxy 6 edge+, and the Samsung Galaxy Note5 were discussed on a television segment with Andy.  (And he didn’t even say “Hi” to me…)


When he wasn’t looking, I was able to use the phones…enjoyed watching live streaming videos…made some long distance calls (that I never paid for)…took some “selfies” (that I hope my mother never finds out about)…

Continue reading Samsung Galaxy 6 edge+ phone is fantastic!

(I’m) Up (on) Periscope!…

Andy has been bugging me…(this time) about using Periscope.

In one of the posts on our blog I stated I was waiting for something to be done by personnel at Periscope. It was to change my username. You can now follow me at “Slick1”.

My thanks to the “Periscope people” (Nader/Jamie/all) for being nice to look into the issue for me. Some of our conversations is posted below…

===============================================

SEP 02, 2015

Dear Periscope Team,

I assumed I would be allowed to use my Twitter name with Periscope…

Is there any possibility I can request to have “slick” assigned to me?

——————————————————————————

SEP 04, 2015

Nader replied:

Hi…

We are now able to change usernames on our end. Please note that this is a one-time request. We have alerted our team this is a feature users want for the future. In order to change your username, please provide the following: 1. Provide your current username. 2. Confirm what you would like as your new username. (No spaces or special characters.) 3. Provide your Twitter account or phone number. Once we have the above information, we will do our best to help you out.

Happy Scoping,

Nader
Periscope Team

—————————————————————————–

SEP 04, 2015

S!ick replied:

Cool! Thank you very much…

My current Periscope username is: slick1

(To match my Twitter account,) I am requesting: slick

My current Twitter username is Slick (http://twitter.com/slick)

————————————————————————————

SEP 17, 2015

Jamie replied:

Hi…

Unfortunately, we weren’t able to change your username because it was already taken. Do you have another in mind? Let us know!

Happy Scoping,

Jamie
Periscope Team

 

(i)Phones and security…

During our September 12 show, Justin mentioned an incident when an iPhone was hacked by a guy…I think this may be what he was referring to:

“Watch John McAfee hack a Fox News host’s phone live on air”


Relating to the issue of iPhone security, from an article in the New York Times:

…the Justice Department is engaged in a court dispute with another tech company, Microsoft…the company refused to comply…because the emails were stored on servers in Dublin.

…two types of encoding…end-to-end encryption, which Apple uses in its iMessage system and FaceTime, the video conversation system…

With Apple, the encryption and decryption is done by the phones at either end of the conversation; Apple does not keep copies of the message unless one of the users loads it into iCloud, where it is not encrypted…

The second type of encoding involves sophisticated encryption software on Apple and Android phones, which makes it all but impossible for anyone except the user of the phone to open stored content — pictures, contacts, saved text messages and more — without an access code…

 

Free game through March 8 for iOS, Google Play and Kindle Fire

Through March 8, The Magician’s Handbook: Cursed Valley is FREE on iOS, Google Play and Kindle Fire.  Players try their hand at magic in order to lift a curse that has settled over a mysterious valley…

The fabled “Magician’s Handbook” has fallen into your hands. You are beckoned to a dark and desolate place whose true name has long been forgotten. Set out with your trusty wand in hand to find enchanted objects hidden throughout the valley which will help you to break the evil spell. Use special incantations to reveal pages of the sacred Magician’s Handbook, and lift the curse from the haunted valley to discover its true name.

2 Gameplay modes: casual and apprentice
12 Challenging mini-games