Thursday, December 8, 2016

// // Leave a Comment

5 Ways To Identify Fake Android Apps

5 Ways To Identify Fake Android Apps

Many of us use our smartphones to download all kinds of apps. The shortcoming here is that you don’t know if these apps are original or not. In fact, fake apps can make your phone vulnerable to hacking. So, before you download the next app, read these tips that can help you identify fake apps. You are encouraged to download the apps on the Google play store.

Research the developer

There are thousands of apps that are free to download. Before you download the app, you should do a bit of research about the developer. That means you should Google them. If there is nothing about them on the internet, you shouldn’t download it.

Check the number of downloads

The number of downloads can also help you in making the decision if you should install a particular app or not. Original apps notwithstanding of their level of popularity will have been downloaded more than a million times. If the number is in hundreds, don’t bother yourself.

Read reviews

Sometimes, apps may not have a million downloads but it is original. To get more clarity on this, you should read the reviews of others who have downloaded and used the apps. You can install if there are more positive reviews.

Check user ratings

This is perhaps the simplest way to identify if an app is fake or not. You just check the user ratings which is between 1 and 5. The higher the ratings and the number of people who rate the app, the better the chances that the app is original.

Design and features

Some apps give themselves away by their design. If you look closely at their designs and read the features, you will discover that it may be a cloned app or fake. If you have any doubts, you should avoid the app or get more information about the app.
Read More
// // Leave a Comment

IoT Security Foundation Announces Compliance Framework

The Internet of Things Security Foundation (IoTSF) has announced the publication of its IoT security compliance framework.

IoT Security Foundation announces compliance framework

The framework, published at its recent annual conference in London, is in line with IoTSF’s mission to improve the quality and prevalence of security in Internet of Things (IoT). Moreover, the IoTSF promotes the Supply Chain of Trust concept which inspires producers to adopt a duty of care for their own customers and towards the wider eco-system.

The framework offers a comprehensive and practical checklist to guide organisations via a security assuring process, and also provides a methodical approach to determine an organisation’s unique security posture for the business processes and technical necessities. The framework has been designed to be generally applicable and extendable with release 1.0 targeted at the consumer product category.

Read the full article on IoTTech.
Read More

Wednesday, December 7, 2016

// // Leave a Comment

EEMBC Announces New Benchmark To Target IoT Security Functions

The Embedded Microprocessor Benchmark Consortium, EEMBC, has announced a new benchmark to ensure optimum efficiency of security implementations in IoT devices.

EEMBC announces new benchmark to target IoT security functions

Currently at a development stage within the EEMBC’s IoT Security working group, the benchmark is said to provide an industry-created and standardised tool for application developers to quickly, accurately, and equitably compare the performance and energy efficiency of security solutions targeted at IoT end-point applications.

The benchmark will be rolled out in phases. The first phase is planned for beta release in the first quarter of 2017; this will include tests to evaluate various standalone security functions such as the SHA256, AES, and ECC. The benchmark will enable EEMBC members to implement these algorithms on their microcontrollers using software libraries or hardware accelerators, whichever yields the best-in-class balance of performance, energy, and cost.

The EEMBC IoT Security benchmark will complement the EEMBC Connect benchmark, which is also in the development phase. The EEMBC Connect benchmark is built to reliably determine the combined energy consumption of a system, taking into consideration the real-world effects of sensor inputs and communication (e.g. Bluetooth, Wi-Fi). Current active working group members include Analog Devices, ARM, C-Sky Microsystems, Flex, Intel, Microchip, Nordic Semiconductor, NXP, Redpine Signals, Renesas, Silicon Labs, STMicroelectronics, Synopsys, and Texas Instruments.

Markus Levy, president of EEMBC, said: “Security is a priority of application developers, though they are typically concerned that implementing security functions within their IoT devices will hurt performance and lower battery life. Therefore, a critical goal of our new benchmark will be to quantify the latency and energy impact of implementing security to allow developers to select the optimal combination of microcontroller, hardware, and/or software security products for their application.”

Source: IoTTech
Read More
// // Leave a Comment

Google Further Shrinks Android App Install Sizes – Now Up To 90 Percent

Google further shrinks Android app install sizes – now up to 90 percent

Earlier this year, Google announced it had shrunk app updates by 47 percent, but it turns out that was just the start as the Android platform owner has further boosted its compression abilities.

Google is using a new updating technique called 'File-by-File patching' to shrink updates by 65 percent on average but it can reduce sizes up to 90 percent in some cases. A user's device is sent a patch which describes the differences between your current version and the new version; to ensure only the necessary data is downloaded.

The new compression leads to 6 petabytes of data being saved per day across Google Play – reducing the strain on networks, saving data usage, and getting users going faster with the latest versions. With apps increasing significantly in size – particularly games – this will be welcome news for both consumers and developers.

Android developers are not required to do anything for their users to benefit from the File-by-File patching system, but it's currently being limited to users with 'auto-updates' enabled. This is due to hardware limitations on legacy devices, but as these get phased out this will likely change.


Read More

Tuesday, December 6, 2016

// // Leave a Comment

5 Likely Ways To Become An Internet Ghost

5 Likely Ways To Become An Internet Ghost

This is impossible! In this 21st century and digital age, you want to erase yourself from the internet. That means you want to return to the Stone Age? Well, nobody wants to return to life without the World Wide Web. But, some people will like the feeling whereby you don’t just have to Google their names and everything about them appears online in seconds. You don’t receive calls from people to ask about your profile. There is no mystery or is anything hidden. If you want that feeling back or you just want to temporarily get off the grid, here are ways you can pull this off. However, think this through before you become an internet ghost.

Deactivate your social media accounts

Deactivate all your social media accounts including Facebook, Twitter, LinkedIn and Instagram. This is the easiest means through which your profile pop up online in search engines. If you decide to change your mind, you can reactivate your account as some of them give you a window period to return.

Remove personal information from websites

If you have your personal information on different forums and websites, you should reach out to them to remove your profile from their websites or better still, you take it down yourself.

Use Deseat.me

If you want to clean up your existence online, this is the website to visit. You only need an email and a password. Any account related to that email will be removed. By the way, it must be a Google email.

Use Google Remove URL Tool

Google is the biggest search engine in the world. If you want to remove your profile or there is information you don’t like in the search results, you can use the Google remove URL tool to suspend the results for 90 days. You can also permanently delete depending on what you want.

Account Killer

This is another software that aggregates links to the account deactivation page of different websites. This simplifies the process of deactivating your accounts. It categorises websites into blacklist and whitelists. For blacklisted websites, you cannot erase your account and vice versa. You can also decide to make your account anonymous.
Read More

Sunday, December 4, 2016

// // Leave a Comment

Verizon GizmoTab Kid-friendly Tablet Specs And Price

Verizon has launched a brand new Android tablet with a focus on providing an ideal experience for kids.

Verizon launches GizmoTab tablet

The Verizon GizmoTab has a removable bumper to help protect it from drops, and it includes lots of kid-friendly software. That includes a home screen that features colorful islands and up to 300 premium educational apps.

Verizon has also includes a Parent Dashboard so that you can keep track of a kid’s usage, measure their progress, and select the apps that children can access. The Parent Dashboard also lets you control your child’s profiles and passwords.

When it comes to raw specs, Verizon’s GizmoTab runs Android 6.0.1 on an 8-inch 1920x1200 display. It’s powered by an octa-core Snapdragon 617 processor, 3GB of RAM, and a 5,100mAh battery. There’s an 8-megapixel camera on the GizmoTab’s rear and a 5-megapixel snapper on its front, and included is 16GB of built-in storage as well as a microSD slot for adding more storage if you need it.

The GizmoTab is now available from Verizon, both online and in stores. Pricing is set at $79.99 with a two-year contract or $0 down and 24 monthly payments of $10.41. You can also pay $249.99 full retail if you’d prefer to avoid any kind of commitment.

One other detail worth noting is that, for a limited time, GizmoTab buyers will receive a gift card for Toys R Us, Barnes & Noble, or The Gap. Pairing your new GizmoTab with a GizmoPal 2 or GizmoGadget will give you $100 gift card.
Read More
// // Leave a Comment

WeChat’s Censorship System Extends Beyond China’s Borders

WeChat is muting certain keywords and websites for its domestic users even if they re-register with an overseas phone number, claims a new study by the University of Toronto’s Citizen Lab.
WeChat’s censorship system extends beyond China’s borders

The popular messaging platform is owned and operated by Chinese internet giant Tencent, and now boasts 846 million users, making it the fourth largest app of its kind in the world. WeChat’s services are no longer limited to messaging and voice and video calls, it also offers games, mobile payments, and bots. The platform’s model is the envy of Western messaging services, in particular Facebook Messenger — which itself has pushed through a number of updates to bring it closer to WeChat.

However, like any app operating within China, WeChat has to follow the government’s strict guidelines on censorship. Although it was initially believed that WeChat only removed keywords and URLs from messages sent by users registered with a mainland China phone number, that no longer seems to be the case. According to Citizen Lab, its tests found that once a China-based user registers with the app its censorship follows them around — even if they switch to an international phone number.

With roughly 50 million Chinese people thought to be studying and working abroad, that’s a significant number of people the app could potentially be targeting.

The tests also revealed that WeChat no longer warns users when it blocks messages. In the past, it would issue an alert that read: “contains restricted words.” Now, a banned keyword is simply removed from the recipient’s screen, claims the study. Additionally, the study found censorship on group chat to be more extensive.

WeChat’s censored keywords span a range of content, including current events, politics, and social issues. They are also regularly updated, with some words being relegated and new terms being adopted on an ongoing basis.

The study saw Citizen Lab undertake several controlled experiments using combinations of China, Canada, and U.S. registered phone numbers and accounts. Researchers tested more than 26,000 keywords that have been blocked on other Chinese websites, such as Weibo and TOM-Skype. Overall, they discovered that 174 words were muted from messages, including terms such as “Free Tibet,” and “ISIS crisis.” The highest percentage of blocked keywords were related to the Tiananmen Square massacre.

Read full story at Digital Trends.
Read More

Saturday, December 3, 2016

// // Leave a Comment

AMD Radeon RX 490 Release Next Week As New GPU Leaked Online

AMD Radeon RX 490 launch is likely to happen soon. Because the features of new GPU are already leaked online and also fueling the rumor mill.

AMD Radeon RX 490 release date

As per the latest updates, fans can expect the device at the event called New Horizon, which is scheduled to take place on December 13. AMD has not stated anything about the launch of AMD Radeon RX 490 on its official website. So, the readers are advised to take the news with a pinch of salt.

As per the leaked details, AMD’s upcoming GPU will sport 4k and VR-focused graphics. It is likely to pack 2 x Polaris 10 GPUs, or a brand new Vega 10 GPU.

Radeon RX 490 is going to break the records set by AMD’s own GPUs. It will be the fastest card of Radeon RX 400 series. Radeon RX 490 can cross 1.5 teraflops in terms of performance. The new GPU chip can power 60 frames per second (fps) gaming in 1080p resolution.

The brand will ensure that all the features sported by the Radeon RX 490 sample piece will be seen on the original Radeon RX 490. The fans are already on their toes to buy the device. They can grab AMD Radeon RX 490 from the official websites of AMD and Sapphire.

The price range is not disclosed. However, multiple sources are claiming that the product will have discounts on its price tag.


Read the full story at BitBag.
Read More

Thursday, December 1, 2016

// // Leave a Comment

5 Signs Your Computer Network Has Been Hacked

5 Signs Your Computer Network Has Been Hacked

As far as you are always online, you are vulnerable to being hacked. So, oftentimes than not, it is never simple to decide if your computer has been hacked. This is because hackers have developed subtle ways to quietly access your network without you suspecting anything. Not to worry, here are some signs to look out for. If you notice any of these signs, you should alert your IT department. Hacking can damage a lot of things including your reputation.

Unexpected slowdown

Normally, the speed of your internet is faster than Usain Bolt but suddenly it becomes very slow. It may be that someone is tampering with your router remotely. This is possible when hackers install a software that can slow down your networks. So, if you notice any of this you should take action.

You are unable to log in

You open your system and log in with ease. But in this case, it is taking forever for you to log in and nothing seems to be working like your password and username even if it is correct. This may be a clue that something is wrong. If this is the case, you should immediately change your password.

Unusual activity

Computers something can drive you insane due to because when you want to perform an important task that is when it starts acting up. If these unusual activities continue nonstop, there must be something wrong. It may be a technical fault or it may be hackers attempting to steal sensitive information.

Your Antivirus is deactivated

If your antivirus appears disabled, it is a good signal that something is amiss. This is because you didn’t deactivate it. You may probably have visited a website created by a hacker which can automatically disable the antivirus of any system. Your system will tell you if it is off. Pay attention to this and switch on or update your antivirus.

New Apps appear

There are thousands of apps out there including the ones developed by hackers. Note that hacking is now very sophisticated. So hackers are now creative. If an app you didn’t download appears on your system appears, don’t click it. The best you can do is to delete. If you do open it, you given hackers unlimited access to your system. Be careful.
Read More
// // Leave a Comment

4 Ways To Improve Your Cell Phone Connection

How to improve your cell phone connection

Imagine that you are stuck in a place and you are looking to complete some tasks online but unluckily, you open your phone to tackle these tasks but you notice a complete lack of bars up in the corner. No reception, 3G or Wifi. It can be frustrating, isn’t it?

Maybe the area you are stuck in is a no-network zone, or maybe there are too many obstructions interfering with the signal, but, either way before you give up entirely on using your phone, try one of these tips to boost your reception.

Ensure your battery is full

Your phone is used for so many activities such as messaging, email, internet, apps, social media, and other real-time services and most times, these activities drain the battery of your phone. Unfortunately though, if you’re low on battery, your phone might not have enough juice to find a signal. Keep your phone battery charged and conserve battery power by turning off hardware options like Bluetooth and NFC when not in use, using lower screen brightness, closing unnecessary or unused apps working in the background, keeping your phone away from extreme temperatures

Elevate your phone

This is the most common way to improve your cell phone connection. Basically, the higher you are, the less there is in the way to block signal. So, climbing up a chair or going upstairs to make phone calls can make the signal better. If you know what area your phone mast is, you can try going to the side of the house closest to it or opening window nearest to mast so you can get enough signal to have an uninterrupted conversation.

Switch providers

The service providers in Nigeria are not superb when compared to those in other parts of the world and as such the most common cell phone reception problems encountered include dropped calls due to network error and poor voice quality. To help ease up your cell phone connection, you may want to get a double SIM phone, that way you can easily switch providers when you are experiencing difficulties as some providers have better coverage than others, especially in rural areas.

Use Wi-Fi calling

If you are in a location or area where you have a Wi-Fi router connected to a broadband connection, chances are your cell phone signals may experience fluctuations. It may be advisable to turn on your WiFi call feature, that way you can defeat patchy mobile phone signals. You can even set up your phone to automatically connect to WiFi when you are in a WiFi connected zone, and you will not even notice that you are making and receiving calls over the internet rather than via a cell phone signal.
Read More

CSCPT - Subscribe To Our Email Newsletter

Computer Science Programming Tutorials (CSCPT) is a blog for sharing free programming tutorials, free source codes, eBooks, software downloads and latest technology news.


The following are some of the advantages of subscribing to our newsletter:

  • You get the latest updates sent daily to your inbox.
  • Never miss a post.
  • Be notified of freebies - ebooks, software, etc.