Monday 7 October 2019

Surface Duo: Not another Microsoft Phone

Microsoft is all set to give it another go in the phone arena. This time, not with its own OS. At the recent launch of the Surface Duo, Microsoft surprised everyone, not with it coming after two years back into the phone game, but with android being the OS in its new phone. The new Surface Duo will apparently have two screens, featuring Android on both of them, that folds together with the help of hinges.

Surface Duo: Not another Microsoft Phone

When can you get your Hands on the New Surface Duo?


The new Phone will be available in a whole year from now, on the holidays of 2020. With Microsoft’s foldable phone, it’s renewing its relationship with phones in a genre that is sure to grab people’s attention- the foldable phone market.

You may be forgiven to think that the new Surface Duo would run on the same OS as the dual-screen Surface Neo, launched at the same time. The Surface Neo would run on Windows 10X OS. However, it will not be able to make calls. So it basically makes sense for it not to come with the typical Android OS.

Another thing different with both phones is that the Surface Neo is much bigger than the Surface Duo and comes with a different processor than the Surface Duo. Plus, it also works with a magnetic keyboard, which again is something that the Surface Duo does not have.

Why Android?


After the first Windows phone, Microsoft learned the hard way that people prefer Android phones. Besides that, in a practical sense, it’s also a safer bet as Google knows what’s it’s doing with the OS and in supporting apps on a platform. This is something that Windows knows to do only when it comes to computers and not phones.

Surface Duo Microsoft’s last Stint with phones:


The last Microsoft phone was poised to be one of the top mobiles in the 2000s, but then came along Apple and its more intuitive iOS. That began Microsoft’s steady decline into oblivion. After that, it was one Microsoft phone after the other with none of them doing well, what with Apple’s iPhones and Google’s rapidly gaining Android ground.

Microsoft even took over Nokia’s phone business but couldn’t really stay in the game with Android and iOS. At this Point, Microsoft’s phone’s ambition was all but dead. That is until now.

Although a Windows phone with a Microsoft OS is still a way off, for now, a Windows Phone with Android will do, and who knows this just might be a game-changer.

The Dual screen fad:


At a time when workloads, Netflix binge-watching, or general video watching has increased, the demand for larger screens sizes has increased too. But on the other side of the coin, we all want a phone that we can fit into our purses or pockets. The solution- a foldable screen. With these types of phones, you get the benefit of a larger screen with the ability to carry them around in your pocket.

Tuesday 1 October 2019

How to use Google 2 Factor Authentication without Phone

How to use Google 2 Factor Authentication without Phone
In this modern world, people have to be more careful in securing their account. If not their account will be hacked, and hackers might steal all the sensitive data from them. The Google 2 factor Authentication adds an extra layer of security to your account. Over the past few years, the profile high jacking cases and cybersecurity cases have increased a lot. Now, the old way of locking down Google is no longer the safest way. If you want to lock down your account, you have to use "Google 2 Factor Authentication" method. This is the special way where you can safeguard your account. Google 2 Factor authentication makes your online accounts and online presence more secure. If you use the old way, then you might get into trouble as hackers are managing to steal traditional passwords with ease. That's the reason why these days, most of the people are moving towards the two-factor authentication method for Google accounts.

Don't know what's Google Two Factor Authentication?

Google 2 Factor Authentication is a simple step which helps you secure your account. Here all you need to do is enter your traditional password and a one-time password which is generated on your phone, tablet to log into your online account. This process can be done either by the form of SMS or Call verification. As you are directly getting the SMS or call to your device, you can stay secure. If anyone tries to access your account, they might not be able to access that because the final password will be in your hands.

Google Authenticator Process:

Usually, Google offers two default ways. The first way is to prompt on your secondary device. The second way is via SMS or call. Although this case is secure, it has a slight defect if you have no access to the SMS or calls then you will not be able to login to your account. In some cases, if your phone is lost means, you cannot log in to your account. If you are worried about those situations means don't worry, in that type of situations, Google's Backup codes can help you out and be the saver of the day.

What is Google Two Factor Authentication Backup Codes:

Google 2 Factor Authentication backup codes are just a string of numbers which are used to authenticate your account whenever you don't have access to your verification codes. Usually, Google generates a total of 10 codes at a time. All you have to do is store those ten authentication codes at a secure location where you can visit. This place depends on your wish and convenience. In case, if you want to have a fresh set of batch numbers, then you can generate the second batch of numbers as well. Now, as you are striving to be protected with Google 2 Factor Authentication without the phone, you can follow the below steps and get your work done.

How to Set Up Google 2 Factor Authentication Backup Codes:

In this post, I'll let you know about how to set up Google 2 Factor Authentication backup codes with ease. Step 1: Quickly Sign into your main Google account and go to the Google 2 Step verification option. Step 2: Once you go to the landing page. Click on the Get Started button which is right at the top of the page. In case, if you have already worked with 2 Factor Authentication, then you'll see the data at the top. Along with these, it will also show you the other Google 2 Factor Authentication ways that already exists in your Google Account. Most of the cases, people will enable Google Prompt and SMS verification rather than backup codes. Step 3: Now, Scroll down to the bottom until you see the option for your Backup codes. When you see that, click on set up and then you will be welcomed with random digits. Step 4: Download all the codes; whenever you tap on the download button, it will download all the codes in a text file. Keep that safely and use when you need to authenticate. If you want a new set of numbers, then click on get New Codes button to refresh the numbers. Now, we have seen how to download the backup codes. Let's check out how to use Google 2 Factor Authentication without Phone.

How to Use Google 2 Factor Authentication without the Phone:

Step1: When you find yourself in a situation where you can't use the SMS verification or Google Prompt? Then you can just log in to your account by trying other methods. At that time, all you have to do is click on Try another Way Button. Step2: Then you find out all the activated methods listed on the page. Now, you need to click on the 8-digit backup codes option. Step 3: Enter one of the eight-digit code in the list which you have downloaded. Then you can easily login into your account with that code. Once you have used this code, Google will strike out that code. You can't use that code again. Next time you can use the other code on the list which you have downloaded. If you're wondering how to backup Google 2 Factor Authentication codes? Then you can check that process below.

How to Backup Google 2 Factor Authentication Codes:

Google Keep:

If you want to store these codes in a safer place? Then you can keep all the codes locked away in the Google Keep file. With this, you can easily enhance your security. As Google keeps will assign a checkbox to each code so that after using you can check off the code.

Password Manager:

Password managers who come with secure vault can help you store these secure backup codes. Like passwords, keys, docs and the more you can save these codes securely in your vault with the help of password manager. Make sure you always safeguard your password managed by keeping a secured master password.

Store them in your vault:

Most of the people love to store their secured information in their physical vault by simply writing them down. These are the three ways to secure your backup codes. If you want to find out more interesting articles and topics? Then you have to check out our other articles.

Wednesday 18 September 2019

TikTok Users Now Need to Be Wary of scammers

TikTok

TikTok has seen a great rise in popularity. Last year alone, TikTok has seen a meteoric rise. It is one of the most downloaded apps on Google Play Store and Apple App Store.

What is TikTok? 


TikTok is video sharing app developed by a Chinese Internet technology company called ByteDance. It is a 15 second video making app and one of the most popular video sharing apps. Initially it was launched in China as Douyin in September 2016. A year later, it was open to the international market under the name of TikTok.

According to a CNN Business report dated June 2019, TikTok has more than one billion monthly active users. With TikTok, users can create and share short videos with special effects.

TikTok has seen a meteoric rise in the Indian market. According to the app analytics firm, Sensor Tower, the app was downloaded more than 240 million times in February alone.

The app is very popular, but many say that the content is inappropriate.

Due to its increasing popularity among the masses, the scammers too are not to be left far behind. They are looking for ways to commit fraudulent transactions. There was a report that was published by a cyber security company called Tenable stating that TikTok is becoming a platform for adult dating scams. The report claims that the scam makes users sign up for an adult dating website.


TikTok as a platform for adult dating websites


The unsuspecting users sign up on the adult dating websites.

The TikTok profiles that are shown in the accounts contain nude pictures and are stolen from other websites. The idea behind this is to increase the likes of the account and increase the popularity of the given profile.

According to Tenable, the fake profiles show up in the ‘For You’ section page. This has been placed there by TikTok, though it is not known how this happens. The scammers force the users to go to Snapchat accounts where there are videos on nudity. Once the users go to Snapchat where they add adult based accounts, they will encounter a Snapchat story. This will show videos of an unknown person either being sexually suggestive or showing nudity. There will be an emoji or a sticker that will cover the explicit portion of the video.

From the Snapchat account, the unsuspecting user will be directed to adult dating websites. The user will be asked their age and then be directed to a sign in page. After filling in their information, the user will be directed to the actual adult dating website. Here again, they will need to fill the sign up page.

The scammers benefit by generating revenue. They maximize their cost per action to generate revenue. Every time a user signs up, the scammers get paid. A scammer gets paid between $1 and $3 for a qualified lead based on the geographical region, age category or a new user account.

Another way of scamming users is asking them to subscribe to a ‘premium’ Snapchat account. Here the scammers earn revenue when they post not-safe-for-work (NSFW) Snaps from a more private account.

How is TikTok protecting its users? 


They say there are strict policies in place. They flag and remove the spam accounts before they reach the users account.
The number of scammers are increasing and TikTok needs to take stringent steps to wipe out these fraudulent activities.

Turn Old Electronics Into Fast Cash

 If you have old, electronic devices collecting dust it your drawers or cabinets, now is the time to trade them in for some quick cash. As one of the hottest startups to launch in San Diego, the tech company ecoATM offers a new and intriguing way to recycle, declutter your home and pad your bank account at the same time.

How Does It Work?

Like any good tech startup, ecoATM began as a way to meet a need. Thousands of Americans have old, used technology laying around that they never even touch anymore, so why not turn that unnecessary clutter into quick, easy money? The process is simple. Just visit one of the 2700 machines scattered across the country and insert your fully-charged device. State-of-the-art technology then analyzes the device to determine a fair price. If the amount of money you are offered is agreeable, all you have to do is accept it and then our kiosk rewards you in the form of gift cards or cash, depending upon your preferences.

What Devices Does the Company Accept?

The ecoATM company accepts many different types of small, portable electronic devices that would otherwise take up space in our home. The amount of money you receive varies depending upon several factors. The quality, age and type of device you have to offer all have an impact on how much money you can earn for trading it in. EcoATM accepts nearly any model from the following categories.
  • iPhones
  • MP3 players
  • Android phones
  • Mobile phones
  • Tablets
Before trading in your device, make sure you have wiped its memory so there is no chance you could have personal information stolen. The best way to do this is to restore your device to its factory settings. Not only does this erase your information, but it prepares the device to be restored and go to a new owner with minimal hassle on your end.

What Are the Benefits?

Trading in old devices has many benefits. You have no use for them anymore, so they simply take up space and collect dust the longer you keep them. You can choose to trade certain devices in to your cell phone provider for credit toward a new device, you can sell it to someone else, or you can trade it in with ecoATM and save yourself both time and hassle.

Most cell phone providers only accept mobile phones for trades. Instead of receiving cash, you can earn credit to a new phone. Older phones and those in less than perfect condition may not be accepted, which still leaves you with the old device that takes up space.

If you choose to sell your devices, you may not get nearly what they are worth. You also have to deal with the hassle of presenting the phone to the buyer, whether in person or via a mail carrier, and collecting the amount of money you agreed upon.

When you choose to trade your device in with ecoATM, not only do you receive fair market value depending upon condition and age, but you also have minimal hassle. You don’t have to communicate with buyers or haggle over a price, and you don’t have to worry about shipping your device. You simply drop your device off at one of our kiosks, receive a price, and either accept or decline the offer.

EcoATM has revolutionized the process of trading in unused electronic devices. Get quick cash by decluttering your home with items you have no use for, and do it in an environmentally-friendly way. Visit one of our kiosks today or check out our website to get an estimate on how much money you stand to receive for your device.

Sunday 1 September 2019

Google Bug Bounty to provide security for Android Apps

Google Bug Bounty
Many apps on Google Play Store have malware which have been discovered recently. In order to increase security of the apps, Google is seeking help from the public too. Google is regularly improving their security and privacy of their products. The Google Bug Bounty provides security for Android apps.

What is Google Bug Bounty?

Google is offering a wide range of vulnerability reward programs to encourage the people and developers to improve security for everyone. As part of the Google Bug Bounty program there are changes to the Google Play Security Reward Program (GPSRP). In addition to the Google Bug Bounty program, they are also launching the new Developer Data Protection Reward Program (DDPRP).

How does Bug Bounty offer changes to the (GPSRP)

Google Play Security Reward Program offers rewards to the developers who find any security breach on the apps. Earlier, there were only eight top apps which were included in the program. Now, any app from Play Store that has more than 100 million installs come under this program.In case a developer comes across any security breach in an app, they need to report it to Google. They can then claim a bounty of up to $20,000.

As part of Google Bug Bounty program under the GPSRP, all these apps are eligible for rewards. This is even in the eventuality of the app developer not having their own vulnerability disclosure or bug bounty program. Google will disclose the vulnerabilities to the concerned app developer. In this way the security researchers help the app developers to identify and fix the malware in their apps.

In case the developers have their bounty programs, the researchers can collect their rewards from the developer and from Google. From GPSRP, which is a part of the Google Bug Bounty Program, vulnerable data can be identified. With this Google can create automated checks to scan all the apps in Google Play for any malware.

The app developers who are affected will then be notified through Play Console. Play Console is part of the App Security Improvement (ASI) program. This program gives information on the malware and how they should fix the problem. Till date, ASI has helped over 30,000 developers fix more than 1,000,000 apps on Google Play. According to the Bug Bounty program, GPSRP has paid over $265,000 in bounties.

Launching of Developer Data Protection Reward Program as part of Google Bug Bounty

DDPRP is a Bug Bounty program which is in collaboration with HackerOne. It will help to identify and fix malware in Android apps, OAuth projects and Chrome extensions. Here, rewards will be given to those who can give complete evidence of data abuse in a similar model as Google’s other vulnerability reward programs.

In this Bug Bounty program, it aims to find out situations where the user data is being used illegitimately, without the consent of the user. There could be a breach related to an app or Chrome extension. That app or extension will be removed from Google Play or Google Chrome Web Store. In case an app developer is involved in data abuse, their API access will be removed. As per the Google Bug Bounty in the DDPRP, a single report could net $50,000 reward.