Google Banned 150 Mobile Apps Due to GriftHorse Trojan

The penetration and outreach of cyber threats are incomparable. You don’t know the vulnerability every application brings with itself. And Google has come up with the same alert and alarm signals. Android smartphone users, this news is for you! Recently Google announced that it is banning almost 150 mobile apps due to the security risks of these platforms and applications. To get more information on this scoop, pump up your patience and read more from this piece. 

 

More About News

Zimperium, a top-notch and renowned mobile security provider, alerted Google about various mobile applications floating in Google’s flagship product, Play Store. Zimperium stated that they discovered a particular kind of malware called GriftHorse. Once infecting the device, this malware is encroaching their privacy by making unauthorized subscriptions in the user’s name. For example, you have installed one of the apps banned by Google recently. Now such an app may sign you up for a Netflix account and avail of a subscription. 

 

Working of GriftHorse

The Trojan GriftHorse gets attached with harmless applications which a user like you installs. Once entered into the system, this GriftHorse starts sending messages related to cashback, prize money, and other lucrative offers. The frequency of such messages is no less than 5 in an hour. Users who fall into this trap are redirected to a web page where they are only asked for their mobile number to claim the prize money. After obtaining user’s mobile numbers, the hackers submit these details to let users avail themselves of premium SMS services. The value of these subscriptions starts at €30 (£25) per month (around 2.588k INR /-).

 

Names of Some of the Banned Apps

The Exhibit team is exclusively providing the names of some of the apps as following:

  • Handy Translator Pro
  • Fingerprint Changer
  • Heart Rate and Pulse Tracker
  • Amazing Video Editor
  • OFFRoaders
  • Bus Metrolis 2021
  • SnapLens
  • Bus Driving Simulator

For other names, you can directly check the blog section of the Zimperium website, where all apps are listed. 

 

Final Conclusion

Considering the subscription pricing, it seems like the malware is currently hovering in and around Europe and North America. However, it is necessary for regulating authorities like CERT-In to take steps and deter such digital attacks. Also, as a responsible citizen, Exhibit will request not to install any of these mobile apps on your smartphone. 

 

How Drinik Malware Can StealYour Money?

Trojans, malware, viruses, and many others are no less than a state of concern, creating distress in minds. Now, these applications have started wooing you with the legitimacy to tap into your accounts and steal vital data and hard-earned money. A recent incident regarding a cyber attack has come into the Ministry of Electronics & Information Technology (MeitY) notice about Drinik malware. To get more information on this cyber attack and know whether you are vulnerable, hold your patience and continue reading this Exhibit blog. 

Drinik Malware

MeitY informed that accounts of 27 banks are currently vulnerable as Drinik Malware is trying to shield itself in the name of ITR. We all know that if it’s about ITR, our excitement will increase automatically. After all, it’s the second time you will receive any money into your account in the month. Drinik Malware is sending an SMS containing a URL with a request to fill in your bank information. The details that people like you have to enter into the form are:

  • Name
  • PAN
  • Mobile Number
  • PIN
  • CVV
  • Aadhaar
  • Address
  • Date of Birth
  • Debit Card number
  • Email Address
  • IFSC Code 

 

What happens next?

Once the details are entered, all the victim has to do is to click the Transfer button appearing on the screen. But after clicking this option, users find that an error dialog box pops up, and it is a fake screen that the application is pitching in front of you. This button clicking action is basically sending the information you have given in the portal to the hacker’s system. Getting the bank information, hackers are sending the mobile banking screen of the respective banks. Here, while you are entering login credentials, you are creating severe damage. It is because the hacker is capturing this screen to know the customer’s credentials. Rest information is already there with them to make a complete carnage and havoc in your life. 

Important Instructions

The essential instruction you need to understand is that the Indian Government has the PAN and Aadhaar numbers of yours. Government can easily transfer the money into your account if you are eligible for any scheme or entitlements. Apart from this, the legitimacy of information storing must only come if the URL contains ‘gov.in’. In case you have lost the money, you need to immediately report this issue to incident@cert-in.org.in. 

Final Remarks

It is necessary to upgrade your awareness and vigilance guard to deter and show resilience against such attacks. Cyber attacks are a worrying part, but it’s your keen eye and sense that can avoid such mishaps.

 

Google And Other UPI Payment Without Internet Available Now!

Damn internet. You must have felt this frustration whenever you wanted to make a payment and the internet went down. The dependency on the online payment due to the internet is high, and you feel handcuffed. But what if you get to know that now your UPI or other payment portals like Paytm won’t need internet. Yes, a popular organization named NPCI has come up with this announcement. To know more about this development on UPI payment without internet, adhere to patience and get every information from this writing piece. 

Offline Payment System

Before bringing the concept of UPI, NPCI came up with a methodology that allowed you to transfer a substantial amount. This National Unified USSD Payment methodology has another name, *99# service. NPCI (National Payment Corporation of India) has decided to integrate this offline payment service with UPI. This step will bolster the UPI and digital payment transactions considering the latest figures show that it was somewhere around INR 6.39 lac Crores in the last month. 

Steps to Use This New Payment Platform

Before heading first with this platform, you need to install the BHIM app. Give the right details related to the mobile number linked to your account while configuring the mobile app. After installing the app, follow the given instructions mentioned below:

  1. Open the caller application on your smartphone and press *99#. 
  2. The menu will open that offers several options like sending money, receiving money, checking balance, my profile, pending requests, transactions, and UPI.
  3. Press 1 if you want to send the money. Choose the choice among the options coming – UPI ID, Bank Account Number, or phone number.  
  4. If you want to use the UPI ID, fill in the right ID and proceed further. 
  5. Next, enter the amount that you would like to send or transfer to the recipient. 
  6. At the last stage, all you need is to enter the UPI PIN related to your account and all set to make the first transaction without switching on the mobile data. 

Final Remarks

One key point you need to note is that an additional amount of INR 0.50/- will be incurred on you every time you use this provision. Considering it to be very minimal, you don’t have to think about it. With this UPI payment without internet service, there will be a greater push coming to digital transactions. To follow other trending news on Exhibit, click on this link. For other tech-based blogs, click here

Universal Charging Cable for the Entire EU Region

“Excuse me, can you give me your mobile charger for some time?” “Oops, it’s a C cable.” “Sorry, I won’t be able to use it.” Such statements must have come when you tried to borrow a smartphone charger, and damn, you found that the cable is not compatible with your device. Ever came the feeling of sulking due to these instances? I am sure it must have come. But, if you are in the EU, there’s good news for you. The EU has announced that if mobile manufacturers want to sell their smartphones, they should come with a universal charger. Precisely, it will be a USB-C charging cable. Let’s know what the impact of this development will be on everyone from this blog. 

Universal Charging Cable for EU 

The European Commission has come up with a proposed rule that mobile manufacturers have to bring USB-C cable chargers for the smartphones meant to be sold in the EU region. According to the European Commission, the proposed rules will apply to smartphones, tablets, cameras, headphones, portable speakers, handheld video game consoles, etc. However, the European Commission has kept smartwatches, earbuds, fitness trackers, etc. The basic objective behind this step is to reduce the electronic waste getting generated every day. Apart from this, the European Commission also believes that this step will encourage users to reuse existing chargers. 

Even An Apple Not Allowed

Gone were the days when we used to say that an apple a day keeps the doctor away. Here, the European Commission is somewhere trying to remove that bridge between you and the doctor. Well, the tech giant has come up with strong opposition, and this proposed rule will somewhere hit their market and consumer base. As per the Commission’s impact study, around 21% of EU consumers who have a smartphone use Apple’s lightning connector, while the rest of the population has either a micro-B or USB-C connector. 

Final Remarks

Apple’s concerns are right, but the EU has a better reason. The EU is thinking about a region where an average person has almost three mobile chargers, with unused and disposed charging cables emitting 11000 tonnes every year. There’s no doubt that it will drastically hit Apple’s outreach. Hence, the best will be that the European Commission comes with a midway path and phase-wise scrapping of these cables that Apple innovates. This step will allow Apple to get the optimum time to make changes and shift to other charging technology. To follow more news on Exhibit, click on this link

Feeling Anxious & Depressed? Open Your iPhone

The iPhone development team must have heard this song, “Jhuki Jhuki Si Nazar,” from the movie “Arth.” A perfect song by Jagjit Singh, which tells that face is a perfect place where you breed your expressions and notions. That’s why an announcement has come from the tech giant Apple that iPhone will exhibit a feature in the future to detect mental depressions and cognitive decline present in you. How? Let’s get to know more about this news from here. 

Seabreeze Pi

Apple has collaborated with the University of California and Biogen (a pharmaceutical company) to develop a new feature in the future iPhones that will check mental depressions which you are going through. According to the Wall Street Journal report, Apple will use a sensor that will assess how a person types, the sleep period of a user, physical activity time, etc., to read current mental status. Apple is already working with the University of California to study stress and anxiety among humans, for which 3000 people volunteered. The project name of Apple UCLA (University of California, Los Angeles) is Seabreeze, while that of Apple and Biogen is Pi. 

Technology behind these Projects

The core and key technology that will run behind these projects is facial recognition. It is for sure that UCLA has somewhere assessed the facial expression of the volunteers. Accordingly, they will store the same data in their database as the train data. This data will allow the system to understand the current notion of the person). The concerned team, just for easy mapping, may give an index number to that particular expression. So, when the CV (computer vision) will read your face, it will compare the same with the index number. By that comparison, it will tell you your current mental health profile. 

How will it help?

First of all, this feature can help showcase whether you are developing symptoms of severe mental diseases like Alzheimer’s, dementia, etc., or not. Considering the stats related to such diseases, that is no less than a catastrophe; globally, more than 44 million patients are suffering from this problem. In India, it is 4 million patients. Hence, it may help people to let them understand whether their current mental condition is not aggravating. 

Final Remarks

Even the research is currently in its nascent stage. But, there is an assurance that this technology will bolster the concept of digital health and well-being. However, the concern will be somewhere on privacy that iPhone will store the data in offline mode and won’t upload it to the Apple servers in any way. For other tech articles and the latest news, click on this link.

A Nuclear Submarine is not Actually Nuclear

The former PM Atal Bihari Vajpayee was right about one thing, “We can change our friends but not our neighbours”. The international system is all about making alliances and breaking it. Post COVID-19 pandemic is anchoring a new international order where small alliances are getting created. Recently, when the US, UK, and Australia came with the concept of AUKUS, France declared that it would form a new multilateral order with India. With AUKUS came the very first declaration that Australia would have a nuclear submarine. Let’s know more about this nuclear submarine defence technology and whether India has such acumen or not from this piece.

What is a Nuclear Submarine?

Nuclear submarines, or precisely nuclear-powered submarines, run using a miniature nuclear reactor instead of diesel or other snorkel engines. Such nuclear reactors have generally enriched Uranium as a fuel. Another question: What is enriched Uranium? Well, let’s go back to class XII and unfold the chapters from the Modern Physics chapter. Normally, Uranium exists in two isotopes: U-238 and U-235. Now, U-238 is the one that is available in abundance (around 99.3%). But, to run a nuclear reactor present in a submarine demands 50% U-235 as content. A big figure? Not for the scientists. Well, some dedicated scientists do that by transforming this U-238 to the 235 isotope form using gas diffusion or laser isotope separation. 

Traits of a Nuclear Submarine

First of all, you need to understand that merely possessing a nuclear submarine doesn’t make you a nuclear power, and you are just using a nuclear reactor to sail a marine. Then? Well, using a nuclear reactor eradicates many of the limitations of a submarine. Unlike conventional diesel-powered engines that have limitations and cannot let you stay inside the water for months, you cannot witness the same with a nuclear submarine. Apart from this, the small size of the nuclear reactor allows you to enhance the storage of items in the submarine and influences its speed and endurance. 

Does India possess this technology?

The answer is yes. Yes, India is one of those six countries that possess this technology apart from France, China, the US, the UK, and Russia. As of now, India has 15 conventional submarines and one nuclear submarine. Stop. Some of the defence specialists will say that what I am writing for nuclear submarines is wrong. No, sir and ma’am, it is true. India had two nuclear submarines – INS Chakra and Arihant. Russia actually leased INS Chakra to India for some time which has been returned. Currently, India has an indigenously built INS Arihant that is nuclear-powered. 

Final Remarks

Nuclear submarines are actually not nuclear. However, they upgrade your navy in terms of enhancing the features. With this latest development, Australia will become the 7th country to possess this technology. 

Cyberattacks are Increasing: State of the Cybersecurity Report

Cybersecurity is a concern that is booming like the Indian stock market. Why? Read the latest State of Cybersecurity Report by ISACA and HCL Technologies. Well, if you are not interested in going through technical terminologies, Exhibit is always there to let you get the crisp details from every tech and lifestyle-based news. And, it will do the same today with this latest news. To know more about cyberattacks, read this piece

The World is Not Digitally Safe 

COVID-19 pandemic pushed you and me to tap those untapped and underutilized horizons by letting us go digital. With the expansion in the digital ecosystem, digital cyberattacks showcased the surge they can present. But you must not forget the dialogue from the movie “Spiderman” – “With great power comes great responsibility.” However, the time is organic and lets you and I change with it. Hence, I would like to modify this dialogue with this – “With great power comes unscrupulous vulnerabilities.” And, it is so true considering the case of digital attacks. Why? Let’s get deep insights related to the report.

Attacks That Harms the Most

To frame every crucial instance in this report, both the organizations surveyed around 3600 industrial professionals.

  • 62% of the respondents reported a cybersecurity attack.
  • Ransomware is one of the top three methodologies used by attackers. 
  • 40% of professionals surveyed to formulate this report said that their organization uses either third-party or in-house threat intelligence.
  • The banking, financial services, and insurance (BFSI) sector wants to increase its budget by 55%, especially the domain specifically related to cybersecurity. This increment is by 49% in the medical field, 50% in energy, and 51% in the manufacturing sector. 

It’s Not Always Dark Clouds

The latest report presented by HCL and ISACA is about the state, but not on events only related to cyberattacks. The report also projected the idea and best practices of how some of the organizations are deterring such events. Around 78% of them said that their training in the cybersecurity domain created a positive impact. In addition to this, cloud migration is one of the most effective solutions preferred by 1/3rd of the organizations to secure the data. Apart from this, 65% of the organizations are constantly assessing the maturity profile of their cybersecurity solutions. 

Conclusion

Cybersecurity and cyberattacks are no less than two coterminous words. You expand your horizon to reduce the impact of cyberattacks. Considering the efforts some organizations are making to give a safer digital ecosystem to each of us, it is also important to work on making even the single threat ineffective. To follow other articles on cybersecurity, click on this link

Artificial Intelligence is a Threat to Human Rights: UN

I have read this subject “Political Science & International Relations” that covers human rights issues. Now, there can be scholars who can have problems with the three generations and how they are a bit overlapping. But, everyone understands the importance of having human rights. Yet, AI was unable to understand the same is a bit strange, isn’t it? In a recent report by the United Nations, the observations came out that artificial intelligence is no less than a threat to human rights. Why did it feel that way? Let’s discuss this issue from this blog. 

Urgent action needed over artificial intelligence risks to human rights

United Nations Human Rights Commissioner Michelle Bachelet came with the statement, “The higher the risk for human rights, the stricter the legal requirements for the use of AI technology should be”. She further added that artificial intelligence has no doubt has taken the good causes to reach their best level. However, artificial intelligence also hovers around the dark cloud that brings catastrophe over human and human rights. Hence, till the time the world comes together and takes a consolidated action over the same, there is a need to rethink about the course of this domain. 

Why are such events coming to the Global scenario?

Is privacy important for you? I guess yes. Have you heard about the Pegasus cry in recent times? I guess the answer is the same again. And, is privacy a human right? Definitely. Okay, one last question. Have you seen this web series Family Man? Then, you must have seen how TASC used to assess any post present on social media and tried to assess whether it is a threat or not. Now, if someone is messing with your privacy, you must understand that you are vulnerable. 

How can Artificial Intelligence hamper privacy?

Okay, let’s take the form of TASC. Consider that these so-called intelligence agencies have got some sort of API from a social media platform using which they can fetch every post. Now, considering the craze, these people have millions of posts every day to evaluate which is beyond human evaluation. So, humans will rely on machines and algorithms. When reading the post, the NLP algorithms come into play and try to give the toxicity or negativity index to that post. These algorithms will also check whether such posts are creating instability in terms of law and order. And, accordingly they provide a report to the concerned departments and authorities to take action. 

Final Remarks

There is a need to have a concept like terracotta environmentalism. You and I cannot deny the fact that we can live without artificial intelligence. Hence, there is a need for ethical artificial intelligence. That’s it. With that, even we as individuals won’t face any threat to our human rights by AI technology. For more news on technology, click on this link.

Want Fake COVID-19 Vaccine Certificates? Visit Telegram

In the world of whims and fancies that may be necessary for you, there will always be existing unethical and fraudulent practices. And, it happened with the COVID-19 vaccination, and this news will somewhere wake up some authorities for sure as such instances are highly unacceptable at any place. According to an agency named Check Point Research, fake vaccination certificates are floating in the market, even in India. To dig more into this news on fake certificates, let’s get to know how such things are possible from this Exhibit blog. 

Fake Certificates

I sometimes try to imagine the pain this world is suffering from fake things. Look at social media, and every day you will get something apart from fake news. Humanity has not come out from this fake pit that a stone named fake COVID-19 certificate has thrown them back again to the dungeon. As per the news, Check Point Research provided information on fake certifications that are available on the Telegram app through some channels. In India, if you want to buy a fake COVID-19 vaccine certificate, all you need is to pay INR 5520/-. As per the revenue generated, there is a clear inference that many people are using such platforms. These fake documents will help them escape the normal drive.  

 

How to generate fake vaccination certificates? 

Let’s talk about India. After getting vaccinated, you can download the vaccination certificate from the COWIN platform or the Aarogya Setu app. In which format are they available? PDF. Can one edit PDF documents or generate a new PDF? Yes, of course. If you are a coder and have expertise in languages like Python, you can fabricate new information into the document. It is because Python gives the leverage of using advanced libraries related to PDF processing operations. That’s it, you develop an application, and you will be generating money for yourself unethically. 

Is it stoppable?

Of Course. And, India can do this easily. How? Remember, Indian authorities came up with the idea that they will provide a 4-digit pin whenever you make an appointment for your vaccination slot. And, when you reach those vaccination centers, the very first thing they are demanding is that same 4-digit pin. Hence, to keep the entire process accountable, this 4-digit pin is handy. But, the administration has to add one more layer of verification. Why? No, no, not in the software application but for information sharing. The administration can allow travel authorities and other concerned departments to check and verify the 4-digit security pin to avoid irregular movement of people. 

Conclusion

India holds the deterrence against this event, and we should feel the pride that India doesn’t have to go through damage control as such key features during the vaccination drive. For other trending news, click on this link.

Exit mobile version