Jump to content

Search the Community

Showing results for tags 'mobile'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Categories

  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions

Categories

  • General News
  • File Sharing News
  • Mobile News
  • Software News
  • Security & Privacy News
  • Technology News

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 21 results

  1. Samsung and Microsoft today expanded their partnership by announcing new Microsoft Office, Teams and Outlook experiences for the newly announced Samsung foldable devices including Galaxy Z Fold3 and Galaxy Z Flip3. Find the details below. Microsoft Teams: When you unfold a Galaxy mobile device, you can see a presentation in full-screen detail and the faces of your co-workers on the Teams call underneath. Also on that Teams call, pull up the Whiteboard and draw what you’re explaining on the board with an S Pen. Microsoft Outlook: With Microsoft Outlook’s dual-pane mode for Galaxy devices, you can read a full email while previewing others on the side, just like on a desktop. Microsoft Office: You can now run two instances of the same Office app. “With the Multi-Active window, you can run multiple apps at the same time,” says Patrick Chomet, executive vice president, head of Mobile Products & Experiences at Samsung. “For example, you can open Microsoft Excel and PowerPoint and easily drag and drop a table right into your presentation. Now, you can even run two instances of the same app.” Source: Microsoft Microsoft’s Office mobile apps are now optimized for Samsung foldable smartphones
  2. Every other year, Facebook announces that it has changed the settings of its web version and/or applications. This month's change is rolling out to all users of Facebook's mobile application, and its main purpose is to streamline the layout, make things easier to find, but without removing any of the previous settings. Facebook's privacy settings were changed in 2018 the last time. Back then, the company claimed that the new design would make "things easier to find", because settings were now found in a single place. Today's update changes Facebook's setting page significantly. The company reduced the number off categories and decided to rename these to "more closely match people's mental models". Facebook notes its new system takes into account user expectations, so that specific settings are easier to find in the application. The six categories that Facebook's settings page is divided into are Account, Preferences, Audience and Visibility, Permissions, Your Information, and Community Standards and Legal Policies. And Privacy? The privacy settings have been moved to the relevant categories, to meet user expectation, according to Facebook. Facebook's research suggest that "privacy settings can be easier to find when they're presented in short, well-organized menus, and that "grouping settings based on users' mental modes about which privacy topic(s) the settings address can be even more helpful". Our research shows that using more specific and descriptive names makes settings easier to find. That’s why we’ve unbundled the Privacy Settings category and moved the settings previously contained within it into other categories. Finally, to more easily guide you through important privacy and security settings on Facebook, we’ve added another shortcut to Privacy Checkup, right at the top of the Settings landing page. As a user of Facebook's mobile application, you will find location privacy settings under permission, post visibility settings under audience and visibility, and the activity log under your information. Users may also use the search tool to find specific settings, and there is the privacy checkup tool to make some privacy-related changes using the tool. Closing Words Many existing users will have difficulties finding specific settings that they accessed in previous versions of Facebook's mobile apps. Critics might argue that the redesigned settings make it more difficult for users to find and change privacy settings; tighter privacy settings may provide Facebook and third-parties with less data, and that may affect the company's bottom line. Ultimate, users need to go through all the settings one-by-one to make sure that they don't miss an important setting. Facebook scatters privacy settings all over the place on mobile
  3. Facebook Busts Palestinian Hackers' Operation Spreading Mobile Spyware Facebook on Wednesday said it took steps to dismantle malicious activities perpetrated by two state-sponsored hacking groups operating out of Palestine that abused its platform to distribute malware. The social media giant attributed the attacks to a network connected to the Preventive Security Service (PSS), the security apparatus of the State of Palestine, and another threat actor known as Arid Viper (aka Desert Falcon and APT-C-23), the latter of which is alleged to be connected to the cyber arm of Hamas. The two digital espionage campaigns, active in 2019 and 2020, exploited a range of devices and platforms, such as Android, iOS, and Windows, with the PSS cluster primarily targeting domestic audiences in Palestine. The other set of attacks went after users in the Palestinian territories and Syria and, to a lesser extent Turkey, Iraq, Lebanon, and Libya. Both the groups appear to have leveraged the platform as a springboard to launch a variety of social engineering attacks in an attempt to lure people into clicking on malicious links and installing malware on their devices. To disrupt the adversary operations, Facebook said it took down their accounts, blocked domains associated with their activity, and alerted users it suspects were singled out by these groups to help them secure their accounts. Android Spyware in Benign-Looking Chat Apps PSS is said to have used custom-built Android malware that was disguised as secure chat applications to stealthily capture device metadata, capture keystrokes, and upload the data to Firebase. In addition, the group deployed another Android malware called SpyNote that came with the ability to monitor calls and remotely access the compromised phones. This group used fake and compromised accounts to create fictitious personas, often posing as young women, and also as supporters of Hamas, Fatah, various military groups, journalists, and activists with an aim to build relationships with the targets and guide them toward phishing pages and other malicious websites. "This persistent threat actor focused on a wide range of targets, including journalists, people opposing the Fatah-led government, human rights activists and military groups including the Syrian opposition and Iraqi military," Facebook researchers leading the cyber espionage investigations said. A Sophisticated Espionage Campaign Arid Viper, on the other hand, was observed incorporating a new custom iOS surveillanceware dubbed "Phenakite" in their targeted campaigns, which Facebook noted was capable of stealing sensitive user data from iPhones without jailbreaking the devices prior to the compromise. Phenakite was delivered to users in the form of a fully functional but trojanized chat application named MagicSmile hosted on a third-party Chinese app development site that would surreptitiously run in the background and grab data stored on the phone without the user's knowledge. The group also maintained a huge infrastructure comprising 179 domains that were used to host malware or acted as command-and-control (C2) servers. "Lure content and known victims suggest the target demographic is individuals associated with pro-Fatah groups, Palestinian government organizations, military and security personnel, and student groups within Palestine," the researchers added. Facebook suspects Arid Viper used the iOS malware only in a handful of cases, suggesting a highly-targeted operation, with the Hamas-linked hackers simultaneously focusing on an evolving set of Android-based spyware apps that claimed to facilitate dating, networking, and regional banking in the Middle East, with the adversary masking the malware as fake app updates for legitimate apps like WhatsApp. Once installed, the malware urged victims to disable Google Play Protect and give the app device admin permissions, using the entrenched access to record calls, capture photos, audio, video, or screenshots, intercept messages, track device location, retrieve contacts, call logs, and calendar details, and even notification information from messaging apps such as WhatsApp, Instagram, Imo, Viber, and Skype. In an attempt to add an extra layer of obfuscation, the malware was then found to contact a number of attacker-controlled sites, which in turn provided the implant with the C2 server for data exfiltration. "Arid Viper recently expanded their offensive toolkit to include iOS malware that we believe is being deployed in targeted attacks against pro-Fatah groups and individuals," Facebook researchers said. "As the technological sophistication of Arid Viper can be considered to be low to medium, this expansion in capability should signal to defenders that other low-tier adversaries may already possess, or can quickly develop, similar tooling." Source: Facebook Busts Palestinian Hackers' Operation Spreading Mobile Spyware
  4. Google Store stops selling Cardboard VR headsets The drawn-out death of VR on Android is now more or less complete as the Google Store has ceased selling its Google Cardboard DIY VR goggles. Mobile VR solutions are not truly dead, but after Android 11 officially dropped support for the Daydream platform in late 2020, it looked like time had finally run out. However, the Google Store still listed official Google Cardboard VR goggles for sale. Google has now though finally stopped selling the cardboard headsets some five years after first going on sale and seven years after being announced. Android Police spotted that the store listing shows “Out of stock” with a banner reading: “We are no longer selling Google Cardboard on the Google Store. We will continue to help the community build new experience through our Cardboard open source project.” The aforementioned Cardboard open-source project was launched in 2019 as Google wound down development on the VR SDK. This allows developers to continue producing apps and experiences for the platform moving forward. Interestingly, in this original announcement, Google claims to have shipped some 15 million Google Cardboard units globally. A low entry-price actually made them an ideal learning companion with your smartphone taking the place of normally expensive VR headsets. VR has since been left behind in favor of AR, with Google Maps showcasing the enhanced capabilities of the mixed reality platform over the virtual option. Apps can still be grabbed from the Daydream app on the Google Play Store, with 360-video being another example of the VR platform that Google Cardboard helped promote. It’s unclear just how long the dedicated portal for VR apps will remain live, as recent outages left longtime fans perplexed and frustrated. One major upside is that you can still grab third-party alternatives to fill the void left by official Google Cardboard hardware if you are pining for some affordable and accessible VR. Source: Google Store stops selling Cardboard VR headsets
  5. Hi All, Just wondering if Nokia with Canonical makes Ubuntu Touch Devices, does people love it and buy to help support Ubuntu Touch development? My wish is that Nokia should join hands with Canonical to make Ubuntu Devices. If that happens, all lazy s/w app giants will create apps supporting Ubuntu Touch platform. I'm calling s/w app giants as lazy bcoz if they would've supported Ubuntu Touch earlier, the OS could've been overtaking Android & Windows Phones(or Windows 10 Mobile) by now. All Nokia & Ubuntu/Linux fans(incl. myself) or devs out there, please suggest Nokia to create Ubuntu Devices in future ASAP. Please vote and provide feedback in comments(if any). Members please note that I'm referring to the future and not now. I'm not a fool to ask for/suggest a change in the first year of re-emerged Nokia. @steven36 & @teodz1984: Please read the desc carefully before providing comments.
  6. 50 Phone Wallpapers (all 1440x2560, no watermarks) DOWNLOAD : https://imgur.com/gallery/C3pQs
  7. Does the world really need to know that every email you write was "Sent from my HTC One™ X, an AT&T 4G LTE smartphone"? Probably not. Aside from turning you into a free marketing tool, it will give your friends fodder to tease you over your your choice of handset or carrier. Plus, it makes you look like a noob that doesn't have control over their email. These annoying signatures are easy to change, though, if you know where to look. Changing the signature in iOS's Mail app On iOS, go to the Settings app, tap Mail, Contacts Calendars, scroll down, then tap Signature. Once there, you can change your email signature, and choose whether you want a different signature for every email account you have (tap Per Account) or One Signature to Rule Them All (All Accounts). In my case, I modified the stock iPhone email signature to serve as a warning about the inevitable typos. Once you're done, tap the back button or close out of the Settings app. On Android Android typically comes with two mail apps: a general email app that will work with lots of different mail services (aptly named "Email") and one for Google's own Gmail service. The two apps are very similar to one another, and the process of changing your email signature is the same for both apps. To start, open either the Email app or Gmail app, depending on which one you want to change. Next, tap the More button in the toolbar. It's represented by three dots: in Gmail, it's in the upper right; in Email, it's in the lower right. Next, select Settings from the menu that appears. On the Settings screen, tap the email address whose signature you want to change, and on the following screen, scroll down and tap Signature. Enter the signature you want to use with that account, then tap OK. If you have multple email accounts you want to append signatures to, go back to the main Settings screen by tapping the Back button in the upper left corner of the screen. Select another email address from the list, and repeat the process. Original Article: http://www.techhive.com/article/2052156/how-to-change-your-email-signature-on-your-smartphone.html
  8. Source: http://malwaretips.com/threads/limited-time-betanews-offer-get-6-free-months-of-bitdefender-mobile-security.24507/ Giveaway page link: http://www.bitdefender.com/media/html/betanews-bms/ p.s. you have to activate your license within 7 days of getting the mail.
  9. Special report Voicemail inboxes on two UK mobile networks are wide open to being hacked. An investigation by The Register has found that even after Lord Leveson's press ethics inquiry, which delved into the practice of phone hacking, some telcos are not implementing even the most basic level of security. Your humble correspondent has just listened to the private voicemail of a fellow Regjournalist's phone, accessed the voicemail inbox of a new SIM bought for testing purposes, and the inbox of someone with a SIM issued to police doing anti-terrorist work. I didn’t need to use nor guess the login PIN for any of them; I faced no challenge to authenticate myself. There was a lot of brouhaha over some newspapers accessing people's voicemail without permission, but one of the strange things about it all is that at no stage have any fingers been pointed at the mobile phone networks for letting snoops in. And some doors are still open. It's believed the infiltrated inboxes merely had default PINs, or passcodes that were far too easy to guess, allowing eavesdroppers to easily drop by. People were urged to change their number codes for their voicemail, but, as we shall see, that advice is useless – you simply don't need to know a PIN to listen to someone's messages. Going down the rabbit holeThe login flaw was discovered during development work I was doing on a virtual mobile phone network that's aimed at folks who struggle with modern technology: it allows, for example, an elderly subscriber to ring up a call centre and ask to be put through to a friend or relative, rather than flick through a fiddly on-screen contacts book. In this case, the operator makes the connection between the subscriber and the intended receiver, but the "calling line identification" (CLI) shown at the receiving end is that of the subscriber and not of the call centre. CLI is the basis of caller ID in the UK, but it's a bit of a misnomer because it can be changed as required. I’d long suspected that miscreants were hacking voicemail by spoofing their CLIs to fool the phone system into thinking it was the handset collecting the messages – but surely that's too easy? It is trivial to set an arbitrary CLI when making a call. I had to find out if voicemail systems were vulnerable to spoofing. I was emboldened by an email from Register reader Sebastian Arcus, who had set up some software for making voice calls over the internet (VoIP in other words) using his mobile phone number, and was surprised that he was able to collect his voicemail from his VoIP client without having to hand over an access PIN. I was further goaded in a chat in the pub with Reg man Andrew Orlowski, who bet me I couldn’t hack his voicemail. I should’ve asked for money to back that one up. How it should work and how it falls apartIf you call your voicemail service from a handset linked to the account, you go through to your message inbox without the need to enter a PIN, presumably as a convenience. Use any other phone and you are asked for a PIN access code. If there is no PIN set, you don’t get to the voicemail. So far, so good. The special sauce here is how does the mobile phone network know which phone you are calling from? The easy way is to look at the CLI sent when establishing a call. Unfortunately, as our reader found out, this caller identification isn’t at all secure and can be spoofed, so we looked at Three, EE (and Orange), O2 and Vodafone. How well do the big four networks protect your private voicemail?We set up a VoIP handset to inject the necessary code to tell the network that our handset had the mobile number of the voicemail account we wanted to hack. We then dialled the voicemail service number to see if it would let us in. All networks have two voicemail numbers: a shortcode that you use from the mobile, and a long number when you call in from another phone or sometimes when you are abroad and the shortcode doesn’t work on the network you’ve roamed to. We could only use the long number because we were not on the mobile network under test. The issue is: what does the voicemail system do when you dial the long number from a handset which identifies itself as being a subscriber? We’ll get the secure ones out of the way first. We couldn’t hack either Vodafone or O2, so their systems must rely on more than simply checking the CLI sequence in a call. Vodafone handles the issue best. All calls to the long number ask you both for the number of the phone you are collecting the voicemail for and for a PIN. It ignores the caller display completely.O2 got confused. The call wasn't placed, and we got instead a message generated by our VoIP system saying the number we were calling wasn’t available. O2 uses a system where you call your own mobile number and press star when you get the intro message to get to the voicemail menu. We suspect that calling from the mobile number on the VoIP network just confused everything, the voicemail system went round and round in circles until our VoIP timed it out. But the results with Three and EE were shocking. I’d just bought a new pay-as-you-go SIM on Three, put credit on it, and set up the voicemail, which asks for a PIN right up front. I then switched off the mobile and called it using another phone to leave a voice message. We programmed the VoIP system to present the Three mobile number to the network and dialled the long number for collecting voicemail. We got straight through as though we were using handset with the Three SIM. It's enough to make your scr-EE-m It was similar with EE. Our man Orlowski has a phone on the EE network, so we programmed his mobe number into the VoIP phone and called the voicemail long number. We got straight in. Unfortunately he didn’t have any voicemail, so we called from another phone, left a message and then called back on the VoIP phone and listened to it. Testing with an Orange number (Orange and T-Mobile UK are part of EE) was more interesting. For this, we turned to a contact who works closely with the kinds of people who legally carry concealed guns – anti-terrorist, organised crime, under-cover, witness protection and the like. They use a mix of SIMs from Vodafone and Orange. So we called him, explained what we were going to do first, and then spoofed his Orange number. We got in, but didn’t want to listen to his voicemail. So we changed the greeting message. Anyone calling him would learn that he had changed his name to “Mabel”. It makesfraping look tame. We did however find that with Orange it would sometimes ask for a PIN and sometimes not. We put this down to routing. We suspect – and such things are the day-job for one of the people helping me – that when the call went through some routes its illegitimacy was spotted, and when it went through others the call went straight through as though it was kosher. The urgent issue is for EE and Three to make their systems secure. We’ve deliberately not given blow by blow details of how to spoof the CLI, but we can’t be the only people to have figured this out. It's not like the networks have not been warned. The majority of the information presented to the Leveson inquiry on how to hack voicemail was redacted, but in a brief public document [PDF] the danger of CLI spoofing is mentioned. And the mobile networks' own industry body, the GSMA, also warned of the danger in its voicemail security guidelines published in February 2012. In this document the GSMA talks about fraud as well as security. It points to the danger that a crook could register a premium-rate number and then use that number to leave a message on the mark's voicemail. By spoofing the CLI, the miscreants can then pick up the message and return the call, raking in the profits from the premium-rate call. What Three and EE must do next There is a lot that the two networks could do. Using CLI, or at least CLI alone, is shoddy. As a telco, they get all the necessary signalling information to know if the call is coming from their network or another one. This is true even if the handset is roaming, not least so that they can charge you for the call. Networks are never shy of charging for calls. They can also look at the Home Location Register (HLR) and see if the phone calling them is actually in a call. By using these techniques they don’t have to resort to the Vodafone system of always asking you for your number and a PIN when you call the long voicemail collection number, but they could be sure that you are who you say you are. The network also gets the cell tower ID and IMEI of the incoming call. Now these are different systems, but linking the two together would be belt and braces. We approached Three about this, and a spokesman said: "The advice we've always given customers about security is to mandate their PIN. This is particularly so for people who worry that if a phone is stolen, it might be used to access their voicemail. This advice is given under the voicemail security pages of the Three website."Meanwhile, EE wanted to reassure its customers that it is investigating and systems are being updated to mitigate this technical issue. EE also gave us this statement" First and foremost it’s illegal to access a voicemail account without the owner’s permission. If any customer has concerns about voicemail security we would advise them to follow a few simple steps on their device and set up PIN entry. Comment The mobile phone networks are more than missing a trick. While they complain about how the over-the-top players, such as WhatsApp and Skype, are stealing their lunch money, they do have one thing no one else can offer: complete control over the signalling and voice path. They could offer security at a level that would command a significant premium and yet they leave the door keys under the flower pot. Source
  10. A probe by Citizen Lab at the University of Toronto and computer security firm Kaspersky Lab has uncovered a massive network of mobile malware for all phone types that is sold by an Italian firm to police forces around the world. The malware, dubbed Remote Control System (RCS), was produced by a company called Hacking Team. It can subvert Android, iOS, Windows Mobile, Symbian and BlackBerry devices. The study found 320 command-and-control (C&C) servers for RCS running in over 40 countries, presumably by law enforcement agencies. Kaspersky has developed a fingerprinting system to spot the IP addresses of RCS C&C servers and found the biggest host is here in the Land of the Free, with 64 discovered. Next on the list was Kazakhstan with 49, Ecuador has 35, just beating the UK which hosts 32 control systems. "The presence of these servers in a given country doesn't mean to say they are used by that particular country's law enforcement agencies," said Sergey Golovanov, principal security researcher at Kaspersky Lab. "However, it makes sense for the users of RCS to deploy C&Cs in locations they control – where there are minimal risks of cross-border legal issues or server seizures." The Milan-based firm that developed RCS boasts on its website that its malware can crack any mobile operating system and remain undetected while doing so. Based on documents leaked to Citizen Watch, the firm may be correct in its claims. The documents detail how the RCS system works. Once a target is identified by cops or g-men the malware is sent out and installed, either by tricking the user with a spearphishing attack or by exploiting vulnerabilities in the target's operating system. The Hacking Team has devoted a lot of time to hacking Android systems with great success. But the documents suggest that it has also found a way to crack Apple's iOS, albeit with a rather tricky attack vector. It appears that RCS won't work against iOS phones unless they have been jailbroken. But, if an unjailbroken iPhone is hooked up to an infected computer, then a remote-operated jailbreak can be carried out without the owner's knowledge using a tool like Evasi0n – then the malware can be installed easily. Once on a target's mobile, the RCS software can intercept and record all phone calls, SMS messages, chat conversations from apps such as Viber, WhatsApp and Skype, grab any files or pictures on the handset, spy on the calendar, look up the user's location, and take screenshots whenever the operator specifies, as well as harvesting data from third-party applications like Facebook. The malware's operator runs the code from behind an anonymizing firewall and the code can be tailored to provide little or no evidence that surveillance is taking place. The code is optimized to avoid running down the handset's battery, and can even get around the mobile data usage statistics displayed by the operating system. While Hacking Team says that its software should only be used to track down criminal targets, Citizen Watch says it has found samples of the code aimed at political targets in Saudi Arabia, Malaysia, Morocco and Ethiopia. "This type of exceptionally invasive toolkit, once a costly boutique capability deployed by intelligence communities and militaries, is now available to all but a handful of governments," said Citizen Watch. "An unstated assumption is that customers that can pay for these tools will use them correctly, and primarily for strictly overseen, legal purposes. As our research has shown, however, by dramatically lowering the entry cost on invasive and hard-to-trace monitoring, the equipment lowers the cost of targeting political threats." Source
  11. It’s not the apps – they’ve got better. It’s not even the devices – they’re faster, slicker, with shortcuts and enhancements that make it easier, but not good. The problem is the medium itself – mobile communication has aspired to take over the entirety of our business communication, but the awkward way in which we type and the inconsistencies of a purely touch-based interface utterly shred precision and accuracy. I should also be clear that I’m talking about phone-based communication. Allegedly, Jack Dorsey, CEO of both Twitter and Square, doesn’t even use a laptop or computer. The article (and many others) have hinted that this may mean he only uses a phone, which I consider utterly preposterous – unless he has entire team members dedicated to tasks that are arduous on mobile – like writing long-form content. Accurate, detailed and well-formatted content simply doesn’t work on mobile. It’s not there, and on tablets is only just becoming viable, as they cross back into the realm of becoming, well, laptops. The issues with phone-based communication in business are obvious: Formatting is difficult Editing is difficult Fast, consistent and detailed communication is significantly slower than on a desktop Interoperability in apps is incredibly poor – even in iOS, which has improved leaps and bounds, but still requires bouncing between apps, leading to confusion and lost data It’s inefficient The success of Gmail’s smart replies, though most commonly discussed on desktop, is a glimpse toward a future of automation that isn’t totally automated, but takes the awkwardness in constructing communication out of the equation. Here’s how I see this happening in the next 10 years. Autocomplete for entire emails Templating is nothing new in business email, but the next logical step is natural language processing and machine learning that can create and customize the workflows for you. This isn’t something that’s going to be unique to mobile – on the contrary, it’ll have a huge effect on desktop communication – but it’s something that will be so common and necessary to making your phone that bit more effective in business. For example, once you finish a phone call with someone, your automated mobile inbox could create a follow-up template with line items to fill in, scheduled to send at the right time. A more complex system would understand your conversations with a prospect in advance, and at a particular time of day would prompt you to send a follow-up email at the right time. Another might be the simpler and more particular stuff – the creation of agendas before meetings handled automatically, with the right people in the “to:” and “CC” field, with the correct dates and formatting handled for you. Why this is so applicable to mobile is that you don’t have to handle the nitty gritty – it’s almost adjacent to a tinder experience of swiping left or right on what particular email to sent. Content creation on demand While certain emails may be created based on certain factors, days and calls you’ve made, your mobile phone could actually be a far more efficient interface if AI was capable of creating the emails from scratch based on ones you’d sent before. This (in line with what I’ve said about chatbots previously) is where a chatbot connected to AI is necessary. The creation of an email would be a conversation with a bot that could understand the context of both what you’re saying, your current inbox, and your contacts, and say “okay, you want to put together a short (400-500) word summary of a financial document, sent to Bob, Sally and Barbara” based on a few things. It could then understand a document (after confirming what you’d just said) and produce an email based on it – free of grammatical and spelling errors, and with a quick review you’d have it out the door. This would work incredibly well on mobile – all you need is a quick glance versus a full-screen review. It’ll require trust, but once it works, it will be amazing. There are also smaller-scale yet wonderful ideas you could build from such a system based on more casual conversation. For example, you could direct the email assistant to reach out to someone to catch up, with a little bit of an update about how things have been, with some suggested dates to meet up, and perhaps a few questions to get them thinking on a reply. Finally, as a salesperson this is a natural solution to quick and efficient prospecting – the natural language processing of an AI could learn our particular personal touches, and the general parts of a personalized, thoughtful email can be researched by the AI based on more than just databases you populate, but on recent things in the news, financials from Crunchbase and beyond. Active, intelligent responses One of those incredibly annoying feelings is getting an email when mobile that you’re not able to fully respond to before you get back to your desk. Our AI-based mobile future is one that has an inbox capable of reading itself and producing informed, accurate responses. If someone asks you if you’re able to make a call at 2PM PST, your inbox should be able to consider both your calendar and how many meetings you have booked that day. If you’re free, it produces a well-worded and grammatically sound “yes,” with an invitation prompt filled in with your Zoom conference link attached along with the right people invited. If you’re not free, it can intelligently see the rest of your calendar, and produce a response that’s empathetic and suggesting other answers. More interestingly, it could also respond with potential attachments or links to your Google Drive or other cloud storage. Someone requesting the latest version of a document is a cross-platform annoyance, but is particularly awkward when mobile – unless your inbox can see what it is, respond, suggest a document to you, and create a “here it is – let me know what you think!” reply. Intelligent replies that trigger entire other workflows already exist (we’ve already built some!), but your inbox should, with the right connections, be able to take care of these for you. When a contract’s requested, assuming the right boilerplate contract exists, your inbox could read the request, fill in the necessary details (or request them all on its own), create the signature boxes, send out the contract for signature, and when it’s completed send out a summary email internally to tell everyone the good news. The napkin math of doing that on mobile is headache-inducing – more than likely leading you to give up halfway and head back to the office. Your inbox gets smarter every day While many of these ideas can cross multiple platforms, your mobile device is an incredibly efficient interface for executing commands with those you trust. We’re used to turning on our lights, opening our cars and unlocking our doors with our phones because it’s a tap or two to make them happen – we swipe, we tap, and it’s done. If mobile email could be condensed and automated so that the repetitive, exhausting actions of email are taken away, the entire experience could be vastly preferable to the desktop. Better yet, your desktop emails could become more personal, more focused and more about what you want to do versus have to do. Source
  12. MessageTap malware is meant to be installed on Short Message Service Center (SMSC) servers, on a telco's network. One of China's state-sponsored hacking groups has developed a custom piece of Linux malware that can steal SMS messages from a mobile operator's network. The malware is meant to be installed on Short Message Service Center (SMSC) servers -- the servers inside a mobile operator's network that handle SMS communications. US cyber-security firm FireEye said it spotted this malware on the network of a mobile operator earlier this year. HOW MESSAGETAP WORKED FireEye analysts said hackers breached a yet-to-be-named telco and planted the malware -- named MessageTap -- on the company's SMSC servers, where it would sniff incoming SMS messages, and apply a set of filters. First, MessageTap would set SMS messages aside to be stolen at a later point if the SMS message's body contained special keywords. "The keyword list contained items of geopolitical interest for Chinese intelligence collection," FireEye said. "Sanitized examples include the names of political leaders, military and intelligence organizations and political movements at odds with the Chinese government." Second, MessageTap would also set SMS messages aside if they were sent from or to particular phone numbers, or from or to a device with a particular IMSI unique identifier. FireEye said the malware tracked thousands of device phone numbers and IMSI codes at a time. PART OF APT41'S ARSENAL The company's analysts linked the malware to a relatively new Chinese hacker group it calls APT41 [PDF report]. In a previous report, FireEye said that APT41 stood apart from other Chinese groups because besides performing politically-motivated cyber-espionage, the group's members also carried out financially-motivated hacks, most likely for their private benefits. Furthermore, FireEye also found evidence on the hacked telco's network that APT41 interacted with the mobile operator's call detail record (CDR) database -- a database that stores metadata on past phone calls. FireEye said APT41 queried for the "CDR records [that] corresponded to foreign high-ranking individuals of interest to the Chinese intelligence services." While FireEye didn't name the hacked telco or the spied on targets, Reuters journalists said that MessageTap was related to China's efforts to track its Uyghur minority, with some of these efforts involving hacking telcos to track Uyghur travelers' movements. CHINESE HACKING OPERATIONS ARE CHANGING The discovery of this campaign is significant, in the grand scheme of things of Chinese cyber-espionage operations, as a whole. For the past years, Chinese hacking groups have been known for their smash-and-grab approach, where they hacked a target and stole as much data as they could, to analyze it at later points. APT41's modus operandi shows a carefully planned and very targeted surveillance operation aimed at a very small group of targets. That's different from what Chinese hacking groups have done in the past, but it appears to have become the norm these days -- if we take into account the CCleaner and ASUS Live Update hacks, where Chinese hackers also breached a company just to go after a small subset of its customers. The overall arch is that Chinese hacker groups are now getting very good at targeted operations, on par with what we've usually seen from US or Russian operations. On a side note, FireEye's report today also confirms a general trend of Chinese hackers going after telecom opertions, first detailed in a June 2019 Cybereason report which found that Chinese government hackers had breached the networks of at least ten foreign mobile operators. Source: Chinese hackers developed malware to steal SMS messages from telco's network (via ZDNet)
  13. steven36

    5G isn’t ready for me

    Don't fool yourself. It's not ready for you, either. Over the spring and summer, the first 5G networks lit up over the US, with all the major carriers offering a 5G service of some kind. However, there are still only a few compatible phones to go around, the best of which is probably Samsung's Galaxy S10 5G. It's practically an entirely new phone. Samsung substantially upgraded its S10 with more cameras (six) and a third more battery than the standard S10 -- more capacity than the S10 Plus, too. It's an impressive phone on paper even before considering that it's made for next-gen 5G networks. It's been a few months since Chris Velazco tested 5G networks at launch in Chicago, so it was time for another network test -- this time, on the other side of the Atlantic. The plan was simple enough: pit the Galaxy S10 5G against the Galaxy S10 OG in London, UK. Vodafone provided both phones, so we could see how the phones fared on the same network. Now, the state of the UK's 5G is a little behind the US, despite the stark size difference between the two countries. Two carriers, EE and Vodafone, already have working 5G networks across a handful of cities and areas. Meanwhile, the UK's other two networks, O2 and Three, will launch their 5G services later this year. Vodaphone recently expanded its next-gen network further, so it seemed like a good time to see how far its 5G network has come. TL;DR: it still has a long way to go. You've heard the 5G sales pitch a hundred times before, regardless of carrier or country. Incredible leaps in data speeds, more reliability, new use cases. Gaming in the cloud! Instant 4K streaming! Stuff we can't even imagine yet! So, with Ookla's SpeedTest, Netflix, a bunch of app updates and some Fortnite grudge matches, I headed out in search of 5G. That search took longer than expected, though things were made easier by a heat map, provided by Vodafone online, here. It attempts to show service availability, and while it helped my search, 5G spots are, well, spotty. Over a few weeks' testing, the Galaxy S10 5G mostly kept itself on 4G. Once I picked up a Galaxy S10 to compare, I found the 5G model was largely matching the data speeds of the 4G one, even when I managed to trigger a 5G connection. Speed is meant to be the easy-to-communicate benefit of 5G; carriers say the service will be ten times faster than current 4G LTE speeds -- if everything works as it should. This is a very hard thing to measure in the early days of 5G. Independent tests show Vodafone's 4G data speeds circle around 20Mbps, on average. And with 5G, the phone network is promising average speeds of 150 to 200Mbps and peak speeds that will reach 1Gbps. According to other tests, like Tom's Guide, 5G networks in the US are already seeing max download speeds that are almost three times faster than the peaks on 4G LTE networks, at a blistering 1.8 Gbps versus 678 Mbps. But that's just optimistic talk of perfect conditions -- the realities of signal reception are going to ruin those speeds. The visible difference, for me, came less from blazing data speeds and more from reliability. As 4G signal choked on the Galaxy S10, the S10 5G came into its own, generally giving sub 200 Mbps data speeds, when 4G devices struggled to give me 20 Mbps. (It's that 10-times speed thing -- just not quite as high-speed as I'd hoped.) When I had 5G signal, Netflix episodes downloaded twice as fast as on 4G, and perhaps the most visible proof of 5G's potential, streaming and scrubbing through to midway of an episode took seconds, while on 4G, it had to really think about it. Sadly, my outdoors Fortnite tests came undone over a mere 4GB update (possible on 4G and 5G, yes, but life is too short), so I took the phones back to the office to play. While playing, there weren't any notable differences between the two S10 models, both with more than enough graphical power to handle Fortnite. Both gave me a reliable steady connection -- I mean, plenty of people test fate by playing Fortnite on mobile data already. So, it's probably the conclusion you were expecting: 5G will be great when it gets here. But that's not right now. The good news, though, is that 4G networks are going from strength to strength, at least in urban areas. But that makes the advancements of 5G harder to cheerlead in a pithy paragraph, and perhaps for carriers, harder to hinge the sale of a new smartphone on. And if my mileage varied hugely, imagine the chances of hooking a 5G signal outside major cities. Carriers are rolling out the service slowly, adding cities and expanding coverage, but it's a process that takes time. It's highly likely this is why rumors about Apple's new iPhones suggest no 5G capabilities. Not yet. If you're looking for a Samsung phone ready for a next-gen service, you can probably wait until 2020. The S10 5G is gorgeous and capable and has a big ole battery. But it's marquee feature doesn't make enough impact. Source
  14. Hello Nsaners, hope someone can assist me with the following. I have a Galaxy S9 with the latest update installed (G960FXXU7CSJ1/G960F0CM7CSJ1/G960FXXU7CSI6). I have been trying to connect it to my laptop but I keep failing every single time. The below are checked more than once • Android Driver correctly installed • USB debugging is enabled • Wiped cache partition • Tried different cable • Tried the USB C converter that came with the phone. No USB detected
  15. If there were any major sites that took a web traffic pummeling in 2019 it was Yahoo and Tumblr. That’s according to a new report from SimilarWeb. The report looks back on key web trends in 2019. Among those trends were some pretty bad news for some sites. Particularly, SimilarWeb’s report says Tumblr saw its web traffic plummet 33% since 2018, when the site banned adult content. Yahoo saw a similar drop from its 2017 numbers, falling 33.6% during the period. Other key findings from the report: Total web traffic is on the rise, growing 8% in 2019 to 223 billion visits per month to the top 100 websites worldwide. Mobile is fueling much of that growth. While desktop web traffic decreased 3.3% since 2017, mobile web traffic shot up 30.6% over the same period. But with the mobile web comes shrinking attention spans. The report says that visitors are spending 49 seconds less on websites per visit than they did three years ago. The top 10 sites took 167.5 billion visits per month in 2019–a 10.7% increase. Mobile visits claim the majority of visits made to “vice” sites–those that involve porn and gambling. The U.S. leads the world when it comes to visiting the websites. In 2019, over 300 billion visits per month to sites were made from America. The takeaway? Mobile is quickly becoming the new norm, but websites are going to have to work harder to keep visitor attention as our attention spans continue to shrink. Source
  16. The Firefox Browser is not as private as you may think – especially on iOS and Android. Mozilla recently announced that they would be allowing any Firefox user a means to request Mozilla to delete stored telemetry data that is tied to said user. Mozilla maintains “strict limits” on how long they store this logged telemetry data, but any duration is too long if the telemetry data can be associated with an individual Firefox browser instance on a particular IP address through a government request. Sure, the collection of this telemetry data can be turned off, but the vast majority of Firefox users are not using Firefox with telemetry turned off, and are therefore incredibly vulnerable. The change by Mozilla comes as a result of the California Consumer Privacy Act (CCPA), a state law which came into effect at the turn of the new year. 2020 is a year of clear vision, and we get to start it off with the revelation that Firefox stores telemetry data in a way that can be traced back to an individual user. After all, how else would Mozilla be able to delete just your telemetry data upon request? To answer this question, Privacy Online News reached out to Mozilla and a Mozilla spokesperson explained how the telemetry data is associated with your browser instance: “By default, Mozilla collects limited data from Firefox to help us understand how people are using the browser, such as information about the number of open tabs and windows or number of webpages visited. This does not include data that can reveal sensitive information about users’ activity online, such as search queries or the websites users visit. The data collected is associated with a randomly generated identifier that is unique to each Firefox client. We refer to this as a clientID. That clientID is not linked to you personally or any sensitive data (for example to your name or phone number) but to your local Firefox software installation. It is never shared with third-parties. Full public documentation about this data collection, including the identifier, can be found here. When users choose to delete their telemetry, the Firefox browser will submit this identifier to Mozilla and we will then delete data on our servers associated with this ID.” Specifically, when you request your telemetry data be deleted from Mozilla’s servers, you do so by sending a “deletion-request” ping which by virtue of how internet pings work, includes a timestamp, your IP address and your unique client ID – as confirmed by Mozilla. That is all the information that’s needed to tie your telemetry data back to your specific browser instance. Mozilla confirmed to Privacy Online News that all this data is stored, but they don’t seem to consider it a privacy issue because they are stored separately. A Mozilla spokesperson explained how the IP address of all telemetry pings, not just the deletion-request ping, is stored: “Mozilla does initially receive the IP as part of telemetry technical data. The IP is then stripped from the telemetry data set and moved to an environment with restricted access for security and error review purposes only. By moving the IP address into this restricted environment this de-identifies the collected telemetry data.” Firefox stores your telemetry data in a way that can be tied back to you While the fact that Firefox collects telemetry data may be well known to some security minded researchers, and even viewed as acceptable because of reasons such as “debugging,” it is quite the revelation that Mozilla actually maintains this data in a way that is matchable to an individual user’s IP address that is requesting said data be deleted. Mozilla even tried to downplay the impact of their privacy decision, saying in their announcement: “To date, the industry has not typically considered telemetry data “personal data” because it isn’t identifiable to a specific person, but we feel strongly that taking this step is the right one for people and the ecosystem.” While it is arguable that telemetry data isn’t technically “personal data” when it is viewed on its own without other information; however, if there’s a way to link a given set of telemetry data to a particular Firefox browser instance and IP address – and Mozilla just revealed that there is – then that telemetry data all of a sudden becomes the most personal of data. What does Firefox telemetry data include? According to the Mozilla wiki, telemetry data includes all the information needed to answer the following questions: How long does it take Firefox to start? How long does it take Firefox to load a web page? How much memory is Firefox consuming? How frequently do the Firefox cycle collector and garbage collector run? Was your session successfully restored when you last launched Firefox? Reading into the questions, the technical pieces of data that Firefox needs to store to be able to answer these questions become apparent. Stay tuned to future posts from Privacy Online News that will dive into the Firefox codebase to showcase what constitutes telemetry data stored by Mozilla in association with your Firefox browser instance. For a preview, simply type about:telemetry into your Firefox browser. For Android and iOS versions of Firefox, parts of this telemetry data – and more – are also shared with a third party company called Leanplum. What is Leanplum and why is it on Firefox for iOS and Android? Firefox on the popular mobile operating systems iOS and Android has even larger privacy concerns beyond the telemetry data that is stored by Mozilla. Leanplum is a mobile advertising company that also receives your personal information, courtesy of Mozilla. According to Mozilla Firefox’s support website: Firefox by default sends data about what features you use in Firefox to Leanplum, our mobile marketing vendor, which has its own privacy policy. This data allows us to test different features and experiences, as well as provide customized messages and recommendations for improving your experience with Firefox.” Mozilla sends information to Leanplum under the guise of testing different features. More information, also from Mozilla’s support team, gets into the specifics: Leanplum tracks events such as when a user loads bookmarks, opens new tab, opens a pocket trending story, clears data, saves a password and login, takes a screenshot, downloads media, interacts with search URL or signs into a Firefox Account.” The horror story continues: “Leanplum receives data such as country, timezone, language/locale, operating system and app version.” More specific information on what Leanplum collects from your mobile Firefox browser can be found from the Leanplum privacy policy, which Mozilla defers to in their own support text possibly because it’s so heinous: “[…] we automatically collect certain information, which may include your browser’s Internet Protocol (IP) address, your browser type, the nature of the device from which you are visiting the Service (e.g., a personal computer or a mobile device), the identifier for any handheld or mobile device that you may be using, the Web site that you visited immediately prior to accessing any Web-based Service, the actions you take on our Service, and the content, features, and activities that you access and participate in on our Service. We also may collect information regarding your interaction with e-mail messages, such as whether you opened, clicked on, or forwarded a message.” The opening up of a privacy option to allow all users (not just Californian users) to delete telemetry data reveals a deeper, darker truth: that the popular browser actually keeps track of telemetry data in a way that can be connected back to your specific browser instance and IP address. Revelations like these are exactly what should be occurring after proper privacy laws are written, passed, and enacted. Just with this revelation, arguably, the CCPA has already done so much more than the GDPR for internet privacy. Firefox is not the privacy conscious browser that it has been masquerading as. Not on the desktop, and certainly not on mobile. About the Author Caleb Chen is a digital currency and privacy advocate who believes we must #KeepOurNetFree, preferably through decentralization. Caleb holds a Master's in Digital Currency from the University of Nicosia as well as a Bachelor's from the University of Virginia. He feels that the world is moving towards a better tomorrow, bit by bit by Bitcoin. Interesting discussion about this article at Hacker News here Side Note : make sure to disable their telemetry if you dont want to be spied on if you use Firefox Source
  17. Coronavirus case confirmed at Samsung's mobile device factory in South Korea Samsung has confirmed that one of its employees working at its mobile device factory in Gumi City, South Korea has been infected with coronavirus. The company says it has already closed that facility and the shutdown will last until Monday. In a press statement, the tech giant announced that other workers who came in contact with the infected employee have been put under self-quarantine. They will also be tested for possible infection. The floor where the infected employee worked has also been shut down until February 25, Tuesday. The Gumi factory is responsible for producing smartphones meant mostly for the domestic market of Samsung. That said, the company will continue operations at its chip and display factories in other parts of South Korea. Coronavirus has disrupted the tech community over the past couple of months, most notably when tech companies such as LG, Nvidia, ZTE, and Ericsson have started withdrawing from the Mobile World Congress that was set to take place in Barcelona later this month. Samsung was also reported to be cutting back on its MWC presence due to safety concerns related to the virus. Eventually, the GSM Association decided to cancel the event entirely following an escalation of "global concern regarding the coronavirus outbreak". Source: Coronavirus case confirmed at Samsung's mobile device factory in South Korea (Neowin)
  18. Punit Verma

    Samsung launches Galaxy S20

    Samsung released the whole new Galaxy S20. What do you think about the new members of the Galaxy series?
  19. Fuchsia may hold the key to the future of Android, Chrome, and everything in between Photo:" Android and Chrome chief Hiroshi Lockheimer speaking at a live recording of The Vergecast at Google I/O 2019 in Mountain View, California. Google Fuchsia remains shrouded in mystery, but the company is slowly beginning to open up about the next-generation operating system, what its purpose is, and what devices it might power. At Google’s I/O developer conference this past week, Android and Chrome chief Hiroshi Lockheimer offered some rare insight into Fuchsia, albeit at a very high level, in front of public audiences. What we do know about Fuchsia is that it’s an open source project, similar to AOSP, but could run all manner of devices, from smart home gadgets to laptops to phones. It’s also known to be built on an all-new, Google-built kernel called “zircon,” formerly known as “magenta,” and not the Linux kernel that forms the foundation of Android and Chrome OS. Beyond that, we don’t know much and have only really seen a brief peek at a prototype Fuchsia-powered user interface two years ago. There have also been reports over the last 12 months or so regarding Google Fuchsia dev tests on the Pixelbook and nebulous plans for a product development timetable that would see an official Fuchsia device released in three to five years. Plus, the Google Home Hub (now called the Nest Hub) is thought to be one of the test devices for Fuchsia. But onstage during a live recording of The Vergecast yesterday, Lockheimer finally opened up about the ultimate goal of Fuchsia. “We’re looking at what a new take on an operating system could be like. And so I know out there people are getting pretty excited saying, ‘Oh this is the new Android,’ or, ‘This is the new Chrome OS,’” Lockheimer said. “Fuchsia is really not about that. Fuchsia is about just pushing the state of the art in terms of operating systems and things that we learn from Fuchsia we can incorporate into other products.” He says the point of the experimental OS is to also experiment with different form factors, a hint toward the possibility that Fuchsia is designed to run on smart home devices, wearables, or possibly even augmented or virtual reality devices. “You know Android works really well on phones and and you know in the context of Chrome OS as a runtime for apps there. But Fuchsia may be optimized for certain other form factors as well. So we’re experimenting.” Lockheimer became somewhat cryptic at the end of his answer, following it up with, “Think about dedicated devices... right now, everybody assumes Fuchsia is for phones. But what if it could be used for other things?” At a separate Android fireside chat held at Google I/O earlier today, Lockheimer provided some additional details, although still similarly cryptic in his specifics. “It’s not just phones and PCs. In the world of [the Internet of Things], there are increasing number of devices that require operating systems and new runtimes and so on. I think there’s a lot of room for multiple operating systems with different strengths and specializations. Fuchsia is one of those things and so, stay tuned,” he told the audience, according to 9to5Google. Source
  20. A quirk in Google’s search algorithm turned me into Facebook’s customer support. I’m waiting for the subway when the phone rings. On the other end of the line an angry woman is shouting at me about her Facebook account. I hang up. A few hours later, I’m walking to get some lunch when someone calls. “I forgot my Facebook password,” the man says. I sigh, and—once again—explain that I can’t help. Later, while at my desk, someone else calls up. “I’m trying to get a hold of Facebook,” a man says. “They are taking my American rights away from me. They’re anti-free spech, anti-American, they’re pro Muslim.” The man says Facebook disabled his account after he wrote a post that, he explains, “wasn’t even horrible.” This keeps happening. In the last three days, I’ve gotten more than 80 phone calls. Just today, in the span of eight minutes, I got three phone calls from people looking to talk to Facebook. I didn’t answer all of them, and some left voicemails. Initially, I thought this was some coordinated trolling campaign. As it turns out, if you Googled “Facebook phone number” on your phone earlier this week, you would see my cellphone as the fourth result, and Google has created a "card" that pulled my number out of the article and displayed it directly on the search page in a box. The effect is that it seemed like my phone number was Facebook's phone number, because that is how Google has trained people to think. Considering that on average, according to Google’s own data, people search for “Facebook phone number” tens of thousands of times every month, I got a lot of calls. “[Google is] trying to scrape for a phone number to match the intent of the search query,” Austin Kane, the director for SEO strategy for the New York-based consulting company Acknowledge Digital, told me in an email. “The first few web listings ... don't actually have a phone number available on site so it seems that Google is mistakenly crawling other content and exposing the phone number in Search Engine Results Pages, thinking that this is applicable to the query and helpful for users.” (Vice Media is a client of Acknowledge Digital.) When I reached out to Facebook’s PR to get their thoughts, a spokesperson started his email response with: “Huh, that’s an odd one.” I obviously can’t blame Facebook for Google’s faulty algorithm. But the fact that Facebook does not have a customer support number is contributing to this. (Facebook, instead, offers a portal for users who need help.) Of course, I could blame VICE’s formidable SEO. Or I could blame myself, for putting my phone number in my stories as a way to get tips from readers who might have something newsworthy to share. But on this query, Google's algorithm was clearly broken—for some reason, it thought it was a good idea to extract and prominently display a phone number from article hosted on vice.com that’s titled “Facebook’s Phone Number Policy Could Push Users to Not Trust Two-Factor Authentication.” Google's search algorithms are why it became so powerful in the first place, but sometimes, however, the algorithm is painfully stupid. In 2017, The Outline showed that Google often displayed completely wrong information at the top of the results when people searched for things like “Was President Warren Harding a member of the KKK?” or “Why are firetrucks red?” The article delved into the so-called “featured snippets,” those big boxes at the top of search results that are supposed to give users a quick answer to what they’re looking for. The Outline piece proved that in the search for convenience, Google was getting things wrong. In a nutshell, this is another example of that exact same problem. Motherboard has previously explained, for example, that Google's overreliance on Wikipedia has left it open to trolling—the company's "knowledge box," which shows up on the right hand side of search results for some queries, are often pulled from Wikipedia, which led in one case to the search engine equating the Republican party with "Nazism." On Wednesday, I told Google that my number was being mistakenly shown when people searched for "Facebook phone number." A few hours later, a Google spokesperson said they would remove my number as soon as possible. “This feature is generally used to surface phone numbers from websites and make it easy for users to find them. In this case it was a triggering error and was pulling the phone number you had listed at the end of the article,” a company spokesperson wrote in an email. “There's also the coincidence that your article happened to be about Facebook and phone numbers, so it was highly relevant to that query and was ranking high up in results, adding to the confusion for people when your number appeared towards the top of the results page.” After reaching out to Google to get my number removed, the company fixed it. And now, when you Google "Facebook phone number" on mobile, the number that is shown is from an NPR article, which explains that the number Google was displaying is associated with a Facebook scam. Thankfully, that number is now out of service, but it doesn't give me any more faith in Google's algorithm. At least people will stop calling me. Podcast via SoundCloud Source
  21. Google search on mobile is getting a redesign The changes are intended to simplify how search results look Illustration: Alex Castro / The Verge Google is redesigning how search results look on mobile, the company announced in a blog on Friday. “We wanted to take a step back to simplify a bit so people could find what they’re looking for faster and more easily,” Aileen Cheng, who led the redesign, said in the blog. The redesign will have larger and bolder text that’s intended to be easier to scan quickly, and you’ll see more of Google’s font in results. Search results will also take up more of the width of your screen, thanks in part to reduced shadows. Google also says the redesign will use color “more intentionally” to help highlight important information without being distracting. To get an idea of how the redesign differs from the current experience, compare this render of the redesign with a screenshot of the current search experience I took from my iPhone 12 mini. Image: Google Screenshot by Jay Peters / The Verge It looks like the new design puts more information higher up the page and reduces some visual clutter, which will hopefully make results easier to parse without forcing you to scroll down too far to find what you’re looking for. Google says the redesign will roll out in the coming days. Google search on mobile is getting a redesign
×
×
  • Create New...