Thursday 23 July 2015

THE Vivo X5 "ONE THE SLIMMEST PONE" 4.75

THE Vivo X5 "ONE THE SLIMMEST PONE"  4.75




 The Chinese smartphone manufacturer Vivo announced the world’s slimmest phone X5 Max in China, on December 10th. At 4.75mm, the Vivo X5 max dethrones the recently launched Oppo R5 as the world’s slimmest phone that measures 4.85mm thick.

The Vivo X5 Max features a 5.5-inch 1080p super AMOLED display screen which is also the world’s thinnest screen with a thickness of only 1.36mm. The handset is dual SIM, with one slot for a Micro-SIM card and another one for a nano-SIM card or TF card. The super-thin smartphone is also 4G LTE-capable.

The smartphone is powered by 1.7GHz 64-bit Qualcomm Snapdragon 615 octa-core processor coupled with 2GB of RAM. There’s 16GB of internal storage which can be expanded to 128GB.The Vivo X5 Max comes with a 5mp front-facing camera and a 13mp rear-facing camera with a Sony IMX214 sensor

Monday 20 July 2015

DIAMOND ROSE iPHONE 32GB "MOST EXPENSIVE PHONE IN THE WORLD"

The world’s most expensive iPhone

The world’s most expensive iPhone to date is the 32 GB iPhone 4 Diamond Rose by Stuart Hughes. With a price of about $8 million the phone’s bezel is made of rose and approximately 500 individual flawless diamonds that total over 100ct. The back is also rose gold and features the Apple logo all decked out with 53 additional diamonds, while the front navigation button is platinum with interchangeable single cut 7.4ct pink or rare 8ct Flawless diamonds in the center.


Luxor Las Vegas Jackpo


Luxor Las Vegas Jackpo





This phone comes from a traditional purveyor of a luxury handsets – Gresso, and is called Luxor Las Vegas Jackpot. This phone was established in Switzerland in2005. It is made of solid gold weighing 180 grams. The back panel is made up of African backwoods that is more than 200 years old. That wood is the most expensive wood in the world. Its keys are made of sapphire crystal. And it costs a cool $1 million.

MOST EXPENSIVE MOBILE FROM SONY ERICSSON

MOST EXPENSIVE MOBILE FROM SONY ERICSSON


sony Ericsson's Black Diamon. 
this phone is designed by Jaren Goh. a stylish concept for sony. It features mirror detailing, polycarbonate mirror and an organic LED technology. Of course, when it comes to Sony, nobody can challenge the screen results. It is decorated with two diamonds, one on the navigation buttons and the other in the back of the phone. The price of this phone is $300,000







iPHONE PRINCESS PLUS "EXPENSIVE mobile"


iPhone princess plus 




iPhone princess plus is designed by famous designer Austria, and Peter aloisson. expensive
 this special iPhone flavour comes with no less than 138 princess cut and 180 brilliant cut diamonds with a weight of 16.50 – 17.75. And according to Peter Aloisson, the diamonds have the best quality, so owning such a device is quite a remarkable thing.
It’s price is $ 176.400.

One may think that since it is priced at such a high rate, there would be few or perhaps no buyers for it. But surprisingly a Russian businessman had already pre-ordered it in October 2007 and the handset has been delivered to him in January 2008.
The phone features yet remain untouched and the iPhone Princess Plus stands a class apart from the rest of the iPhones and also comes with a heavy price tag.


UPCOMING I PHONE 7 PLUS "AMAZING LOADED PHONE"

iPhone 7 Plus





iPhone 7 Plus”. The leaks generated significant buzz among techies as the source is arguably the most reliable one for advanced information on Apple’s upcoming products. In January of 2011, for example, Kuo almost perfectly predicted the iPad 2’s dual-core processor, screen resolution, and camera specs. He also correctly forecast several features of the iPhone 5, the discontinuation of the 17-inch MacBook Pro, and the redesign of the iMacs. But Kuo has also had his fair share of forecasting duds, including a prediction that a cheaper iPhone would be issued in 2013. Nevertheless, when it comes to forecasts on Apple products, hardly anyone can match Kuo’s accuracy.

Here are ten of Kuo’s most exciting predictions on Apple’s rumored iPhone 6S and IPhone 6S Plus (or iPhone 7 and iPhone 7 Plus), which will supposedly begin being mass produced in mid-to-late August Force Touch, already unveiled on Apple’s new 13-inch MacBook Pro and the Apple Watch, is a haptic technology that allows for the detection of the force of a tap and correspondingly responds uniquely to the variances in the applied pressure. But what benefit does the inclusion of such technology in the new iPhones really provide for their users? It’s actually pretty exciting. Because Force sensors allow for the detection of variances in the intensity of pressure applied, a hard press could enable particular capabilities, such as displaying the definition of a word or showing the preview of a file. Increased pressure could also indicate that the user wants to increase the rate at which a movie fast forwards or an image zooms. And not only taps, but also drags can be pressure-sensitive, meaning signatures could be drawn with the precision of a fountain pen, thus raising the possibility for electronically generated signatures to be just as or even more reliably verifiable than physically written ones.

Tuesday 14 July 2015

SAFE YOUR SMART PHONE


SAFE YOUR SMART PHONE



If you are still coping with threats to your system, then be ready to do the same with your mobile phone, especially the high-end ones that are enabled with internet. Mobile phones are now more vulnerable to virus attacks and the risk has increased manifold in the last few years. With mobile phones without IMEI number flooding in the market, this risk has increased a lot. Virus can attack files like games, software, security patches, and ad-on functionalities of your mobile. However, with the problem comes a solution as well. There are ways, which can help you protect your mobile from an attack by viruses or malware. All you need to do is to be a little vigilant.

Steps to follow

The steps you should follow to protect your mobile include:

Mobile antivirus: You can download an antivirus application directly in your smartphone
Branded mobiles: make sure that you always choose a mobile from a recognized brand, which come with IMEI number.
Scan your mobile: Once you download an antivirus application in your phone, remember to scan your mobile often to search for any virus.
Turn off Bluetooth: Bluetooth is another way through which unknown applications or virus can make way into your mobile, so when in unknown places, it is better to turn the Bluetooth function off.
The bright side for mobile users

The numbers of mobile malware and worms are constantly on the rise, as virus writers creates new ways of attacking software run by mobile phones. When on one side virus attacks on mobile is increasing at a fast pace, on the other side expanding field of mobile communications also offer opportunity of designing security in a proper manner. Other than installing mobile antivirus, you should follow some precautionary steps to make sure that your mobile stay away from virus attack. When you surf the net from your mobile, ensure that you download content from a reliable website only.

Other points to remember to protect your mobile device

Some of the other points, which you should keep in mind include:
Avoid downloading unknown software from internet
It is also recommended to maintain a backup of your contact list
When accepting content and programs like videos, mobile themes, photos, etc. verify the source, especially while downloading from the web.
If you have Bluetooth, then put it on non-discoverable mode, and never accept data, which comes from sources you do not trust.
You can also use password to protect your device, as this helps to prevent the use of data stored in your phone.
Update virus database and stay away from malicious messages

Just like your system, keep the virus database of your mobile antivirus updated all the time, so that it can protect your mobile from new viruses, which can creep into it. Even though viruses created for mobile phones are not very damaging, but the future is unpredictable, so you should be prepared for the worst attacks. Viruses can also spread through multimedia messages, so keep away from sharing such messages, as these can be malicious.

THE POLICE VIRUS


THE POLICE VIRUS


A few days ago a new Android malware showed up, Android/Koler.A. It was in the news as it was actually a Police Virus / ransomware attack, similar to the ones we have seen in Windows computers, but this time it was targeting mobile phones.

Although in this case this piece of malware cannot encrypt any of the phone data, it is nasty and it is really difficult to get rid of it (without antivirus for Android), as the warning message is always on top and the user has only a few seconds to try to uninstall it.

While we were studying it, we found a new variant exactly the same as the first one but this one was connecting to a different server, in order to download the proper warning. And this server was still up… It turns out that the cybercriminals made a small mistake configuring it and left the door half-opened  Sadly, we could not get access to all the information there (there was a mysql database with all the payments, infections, etc. that we couldn’t reach ) but still we were able to download some files from the server and take a look at how it works.

I won’t go into details about the mistake they made to leave that door half-opened, as of course we do not want to help them

Unsurprisingly, the way it works from the server side is really similar to the ones targeting Windows and that we have seen in the past: a number of scripts to geolocalize the device and show the message in the local language and with the images of local law enforcement. It saves information from all infected devices in the database and it takes the IMEI number of the mobile phone, adding the MD5 of the malware that is infecting the device. Doing this they can track the number of infections per malware variant and measure the success of their different infection campaigns.

This Trojan is targeting users from 31 different countries from all around the world; 23 of them are Europeans:
Austria, Belgium, Czech Republic, Germany, Denmark, Finland, France, Greece, Hungary, Ireland, Italy, Latvia, Netherlands, Norway, Poland, Portugal, Romania, Spain, Sweden, Switzerland, Slovenia, Slovakia and United Kingdom.

Users from these countries are also being targeted: Australia, Bolivia, Canada, Ecuador, Mexico, New Zealand, Turkey and United States of America.

Android-based smart phone users infectious Trojan virus



Android-based smart phone users against an infectious Trojan virus

Cybersecurity sleuths have alerted Android-based smart phone users against an infectious Trojan virus which steals vital information from the personal device and can even illegally send SMSes to those on the mobile contact list.

The deadly virus has been identified as 'AndroidSmssend' and it can acquire as many as four aliases to hoodwink the user and perpetrate its destructive activities on a personal Android enabled phone.

"Android/SmsSend is a premium service abuser family malware that arrives bundled with legitimate Android applications and infects Android based smartphones
"Once infected, it sends text messages (typically with a link to itself or a different threat) to a specific number, typically to numbers on the contact list and is also capable to send SMS to premium rate numbers," the Computer Emergency Response Team of India (CERT-In) said in its latest advisory to Android phone users in the country.

The CERT-In is the nodal agency to combat hacking, phishing and to fortify security-related defences of the Indian internet domain.

It said that after a typical successful infection of the virus, basic information about the smart phone like IMEI number, device id, device type among others are compromised and it can even install spyware on the targeted device.

The virus is so notorious, the agency said, that it "steals contacts and pictures, tracks the location, steals passwords, illegally accesses text messages, crashes a complete system, steals personal banking information when logged in, installs other sort of spyware and disables firewall and anti-virus program to defend itself."

The CERT-In said the malware is created by modifying the legitimate application and then re-distributing via marketplace or other separate channels.

The agency has suggested some counter-measures in this regard.

"Do not download and install applications from untrusted sources, install applications downloaded from reputed application market only, run a full system scan on device with mobile security solution or mobile anti-virus solution, check for the permissions required by an application before installing, exercise caution while visiting trusted/untrusted sites for clicking links, install Android updates and patches and use device encryption or encrypting external SD card feature available with most of the android OS (operating system)," it said.

Also, avoid using unsecured, unknown Wi-Fi networks and make a practice of taking regular backup of the Android device, the advisory said.