We found 143 results for 'malware'
Huawei’s budget sub-brand Honor is the subject of increasing chatter in phone geek circles of late. In January, the Honor 5X introduced the “company” (insofar as they operate as a separate business unit) to a Western audience with a very affordable, metal-bodied phone.
The device, though, seemed to land on deaf ears, at least among enthusiasts. I can’t speak to how the Honor 5X did in US sales channels, but initial launch buzz quickly wore off once reviews went to press, and the phone itself really was pretty mediocre in retrospect. Its dazzle, its allure really came from looking the part of a $300-400 phone while costing much less. Read More
Email scams are as old as email itself, but Google is doing its best to help you make smart decisions. Starting this week, Gmail users will see some new tools that identify potentially dangerous messages. There are two new features here, but only one is coming to Android. Read More
Starting in Android 4.4, Google implemented verified boot (known as dm-verity) in the Android kernel to prevent malware from hiding in your device. This was all behind the scenes until Android 6.0 Marshmallow—that's when Google started alerting users to system integrity. In Android 7.0, it's going a step further. In Nougat, verified boot will be "strictly enforcing" and won't allow your device to boot if the software has been compromised. Android will also be able to correct errors, but this will cause some headaches for modders. Read More
I'll let you in on a secret. I haven't played Pokémon GO yet. There was a time when I liked watching Pokémon and laughed my ass off each time Meowth came on the screen, but I was a little too old then to play the game let alone get obsessed by it. I was... 17. So I don't get the craze behind GO all that much, but I'm not completely uninterested.
Actually, I decided yesterday to try the game to get a feeling for it, but I thought it better to install it on my secondary device: a Nexus 5X. Read More
Ransomware is one of the nastier types of malicious software to emerge in the last few years. It's not exclusive to mobile, but the basic gist is that it locks down either specific files or an entire machine until the user sends money to a shady, untraceable online account to get their digital life back in order. The combination of easily-exploited security vulnerabilities, relatively small payments spread out over thousands of devices, and users reliance on their phones or computers has proven incredibly lucrative for malware developers. Read More
We occasionally see apps pulled from the Play Store for trivial (but valid) violations of the rules. Google has been more proactive about enforcing its guidelines, but it's often pointed out it could be more consistent. Case in point: there are, right now, two listings on the Play Store from a warez site called BlackMart that offers paid apps for free. One of them has been up for months and has more than 100,000 downloads. C'mon, Google. Read More
Welcome to the roundup of the best new Android applications, games, and live wallpapers that went live in the Play Store or were spotted by us in the previous 2 weeks or so.
Please wait for this page to load in full in order to see the widgets, which include ratings and pricing info.
Looking for the previous roundup editions? Find them here.
Internet Radio - PlayTime
This week's roundup is brought to you by Playtime Internet Radio from HandyApps. This useful all-in-one radio manager allows users to search for specific songs or shows streaming on thousands of live channels all across the Internet, or use the more conventional recommendation engine for a more random experience. Read More
Google has released its second Android Security Annual report, and it's full of big, impressive numbers. The full report is 49 pages long and covers the state of Android security in detail, but the basics are covered in Google's latest blog post. The gist is, Google scans all the things to keep Android users safe. We're talking about billions of apps; the Verify Apps service sure is working overtime. Read More
In the continuing war against bad USB Type-C cables, the USB Implementers Forum, USB-IF for short - no, there's not a USB-ELSE - has announced USB PD 3.0, which includes a new Authentication program, meaning there is even less chance a bad cable will damage your devices.
Type-C Authentication means that any cable that is plugged in automatically authenticates itself with the other device (such as a phone, tablet, or laptop), before any data or power is transferred between the two, causing the host device to verify the cable has been fully verified by the USB-IF and is safe to use. Read More