Asides

XDA Member developed a Messaging Application for Twitter called Aquila Messenger

XDA Member developed a Messaging Application for Twitter called Aquila Messenger

Twitter is an online news and social networking service where users post and interact with messages, “tweets”. We all know that a lot of people use Twitter, we also use Twitter to see the latest tweets from people and brands they follow, but some actually just use it to message their friends.

So, here is a good news for those Twitter users who use it to message. An XDA Junior Member john.rees has developed an Android application “Aquila Messenger”. Aquila Messenger is a bright and colorful Twitter messaging app.

The application focuses on providing you a colorful messaging application for Twitter that also lets you sign into multiple Twitter accounts. You can download it from Google Play Store.

(Source)

Recommended For You


Report Say 4 types of Facebook users, Which type are you?

Report Say 4 types of Facebook users, Which type are you?

Facebook has nearly two billion monthly users. Users can be categorized into four types ranging from people who use the social media network to build on real-world relationships, to those focussed on “likes” and attention.

On an average, 1.28 billion people check Facebook daily, and according to a recent estimate, an average Facebook user spends 35 minutes a day on the platform.

A smartphone user shows the Facebook application on his phone.

“What is it about this social-media platform that has taken over the world,” lead author Tom Robinson, Professor at the Brigham Young University, said in a statement.

To answer this, the team compiled a list of 48 statements to identify potential reasons as to why people use Facebook.


They found four categories of Facebook users: relationship builders, town criers, selfies and window shoppers.

Relationship builders post, respond to others’ posts and use additional Facebook features primarily in an attempt to fortify relationships that exist beyond their virtual world. “They use it as an extension of their real life, with their family and real-life friends,” Robinson said.

Town criers, on the other hand, are unconcerned with sharing photos, stories or other information about themselves, they instead “want to inform everybody about what’s going on”. “They push out information,” Robinson noted.

People in the selfies category use Facebook to promote themselves. They too post pictures, videos, and text updates, but are focused on getting attention, likes and comments. The more ‘likes’ they receive, the more they feel approved by their peers.

Window shoppers, like town criers, feel a sense of social obligation to be on Facebook but rarely post personal information. These users “want to see what other people are doing. It’s the social-media equivalent of people watching”, said Clark Callahan, a professor at the Brigham Young University.

“Social media is so ingrained in everything we do right now. And most people don’t think about why they do it, but if people can recognize their habits, that at least creates awareness,” said Kris Boyle, a professor at the Brigham Young University.

RECOMMENDED FOR YOU


Lost your mobile? Block all Services even if SIM is removed

Lost your mobile? Block all Services even if SIM is removed

The government is putting in place a new system that will block all services on stolen or lost mobile phones on any network even if the SIM card is removed or IMEI number of the handset is changed.

State-run BSNL has been entrusted with the job of running a six-month pilot project in Maharashtra from its Pune center to develop implementation methodology and software for the new system called Central Equipment Identity Register (CEIR).

The CEIR will aim to bring down the number of counterfeit mobile phones and discourage theft. It is also expected to protect consumer interest and facilitate law enforcement authorities for lawful interception, an official document said.


“DoT (Department of Telecom) intends to implement CEIR that connects to the IMEI database of all mobile operators.

IMEI number- A unique 15-digit serial number of mobile devices — is allocated by global industry body GSMA and bodies authorized by it. When a mobile phone is lost, the victim is required to mention the IMEI number of the handset for tracking.

“The theft of mobile phones is not just a financial loss but also a threat to the personal life of the citizens as well as national security,” the document said.

The CEIR will be regularly updated with IMEI of lost, stolen or counterfeit handsets.

The CEIR will also help operators in identifying handsets with fake IMEI numbers as it will have details of handset model to whom the IMEI has been originally allocated.

The DoT is also set to notify rules that will make tampering of IMEI number a punishable offense with up to three years of imprisonment.

RECOMMENDED FOR YOU


Meet Marcus Hutchins Who Saved the World from WannaCry

Meet Marcus Hutchins Who Saved the World from WannaCry

The 23-year-old who saved the world from a devastating cyber attack in May was asleep in his bed in the English seaside town of Ilfracombe(is a seaside resort and civil parish on the North Devon coast) last week after a night of partying when another online extortion campaign spread across the globe.

Around 6 pm on June 27, Marcus Hutchins, a self-taught computer-security researcher, and avid surfer was awakened by a phone call from a colleague telling him another attack was underway. Dreading a return of the virulent WannaCry malware that he stopped in its tracks the previous month, Hutchins logged on to his computer in the house he shares with his parents and younger brother to scan the latest reports.

Hutchins was supposed to be enjoying a week’s holiday, but returning home after a lunch of burgers and cheesy chips with a friend and seeing the carnage WannaCry was inflicting, he couldn’t resist jumping in.

After analyzing a sample of the malware and seeing it spread by exploiting vulnerabilities in Microsoft’s network file-sharing protocols, he realized it was using a cyber weapon allegedly stolen from the US National Security Agency. Known as “EternalBlue,” it was part of a cache of sophisticated NSA hacking tools targeting Microsoft software that was obtained by the Shadow Brokers criminal gang last year and leaked onto the internet in April.

Hutchins also noticed a quirk buried deep in the malware code. It tested for the existence of an unregistered nonsensical domain name. He promptly registered the domain for $11 and redirected all traffic to a server designed to capture malicious data, a sinkhole, which would allow him to monitor the progress of the attack.

Hutchins said he has been courted by some of the world’s biggest cyber security firms. In 2015, he interviewed with Britain’s top-secret Government Communications Headquarters but went to work for Kryptos instead after it made him an offer he said he “couldn’t refuse.”

“He’s a natural talent,” said Salim Neino, 33, Kryptos’s chief executive officer, who hired Hutchins after reading his blog. “He was obviously solving hard problems and he wasn’t doing it for monetary reward, and those are some of the key traits of great cyberwarriors.”

(Source)

DU Third Cut-Off List Released, Remaining Admission Chance

DU Third Cut-Off List Released Remaining Admission Chance

Delhi University has released its third cutoff list on Thursday night for admission in merit-based graduate courses. The third cutoff has decreased by 3 percent, although most of the courses have declined by 0.25 percent to 1 percent. Significantly, the DU released its first cut-off list on June 23.

According to reports, some top courses have been closed in some colleges in the third list. In many courses in SRCC, Miranda, LSR, KMC, Aurobindo College, the seats have been filled for general category. At the same time, admission will run on the second list from today (Friday) until 10 July. In the third cutoff, the top colleges have reduced from just 0.25 to 0.5 percent and there is still a challenge in commerce, eco-honors, English honors, history honors, political science, physics, mathematics, and chemistry.

In evening colleges cut by 2 percent

LSR has also given a chance to reduce this by decreasing by 25 percent in four courses. Some colleges have also reduced the percentage to 3% to attract students. Evening colleges have also been cut by 2 percent. Dayal Singh Evening College has decreased from 5 to 2 percent. Deshbandhu has cut cutoff by 3 percent in the BSc program. SGTB Khalsa College has reduced rate of 1 to 3 percent in every course.

(Source)

Instagram New Update Gets Photo and Video Replies

Instagram New Update Gets Photo and Video Replies

Instagram, now with a  new update, Instagram Stories will become more interactive. Instagram Stories now lets users reply to Stories with photos or videos. Moreover, you can apply filters, stickers, and other camera tools to the photos and videos sent in the form of a reply to Stories.

Instagram’s new feature now available for Stories, users can choose any friend’s Stories to watch and send photos and videos, in addition to sending text message replies to them. To reply with a photo or a video, you’ll need to tap the new camera button while you’re watching a friend’s story. After taking your photo or video, you will be able to use any creative tools inside the camera, including face filters, stickers, and Rewind. Also, while replying you’ll see a sticker of the Story that you can move around.

instagram new update gets photo video replies

The friend at the other side, who posted the Instagram Story, will receive the photo or video reply in their direct messages where they can tap to view it and also see a thumbnail of the original Story, only visible to them. Just like the disappearing photos and videos in Direct, you will know when they have taken a screenshot or replayed your reply. The photo and video reply feature is rolling out with v10.29 on Android and v10.28 on iOS.

Separately, Instagram has now acknowledged a bug was forcefully logging users out of their Instagram accounts, making it appear like an account deletion.


Instagram told The Verge that it is working to resolve it “as quickly as possible.” Over the last 24 hours, an increasing number of Instagram users reported that they had been logged out of their accounts, and not able to sign back in. This made the users believe that their accounts have been deleted, while really they were not.

The accounts affected included some personal and business related ones. While trying to sign in, Instagram asked for a security code to recover the accounts, but users report that they never received any. Some other users also reported that at the time of logging back in, they were shown a message saying that their accounts were disabled for violating Instagram’s terms with an option to learn more about the issue.

(Source, 1)

CopyCat Malware Affected Over 14 Million Android Devices

CopyCat Malware Affected Over 14 Million Android Devices

Researchers have now found that CopyCat Android malware had affected over 14 million devices last year, succeeding in rooting at least eight million of them. The malware made its way to the devices via malicious apps available inside illegitimate app markets, instead of Google Play, to earn as much as $1.5 million (roughly Rs. 9.6 crores) in fake ad revenues in two months, the researchers said.

A study conducted by Check Point researchers has revealed that the CopyCat malware could seep into the Android devices by harnessing six different vulnerabilities possessed by them, and used a novel technique to generate and steal ad revenues. It infected more than 280,000 Android users in the United States, while its major target was Southeast Asian countries. The CopyCat malware was being spread under a campaign and it used to infect device and subsequently root them, gaining the full control of the smartphone.

The researchers define CopyCat as “a fully developed malware with vast capabilities, including rooting devices, establishing persistence, and injecting code into the Zygote”, which is a primary Android app launching process. After a device is infected by CopyCat, it further holds itself until the device reboots and then it tries to root the device. As an attempt to root the device, the malware uses six vulnerabilities possessed by Android 5.0 Lollipop and earlier versions through an ‘upgrade’ acquired through Amazon Web Service storage. Although the flaws found by researchers was capable enough for earlier Android versions, it could still be persistent in the devices that have not been patched or updated in last two years.

The CopyCat malware starts the malicious code injection process to the Zygote app launching process and then generates illicit revenue by installing apps and further replacing the user’s referrer ID with that of attackers. It additionally starts displaying fraud ads and apps. This kind of a technique was earlier used by the Triada Trojan, which targeted devices to gain superuser privileges before making use of regular Linux debugging tools to embed its DLL and infect mobile browsers.

There is about 26 percent of the CopyCat infected devices showed fraudulent advertisements, while a good 30 percent devices were operated to steal credit for downloading and installing the apps on the device. In addition, the study mentions that the malware also shared the device’s information to CopyCat’s control centers.

Google was able to subdue the impact of the CopyCat malware campaign back when the outbreak happened, gradually reducing the number of affected devices, however, devices that haven’t been updated could still be open to attackers. We recommend users stick to official app stores for their app downloads.

(Source)