The Most/Recent Articles

Showing posts with label android. Show all posts
Showing posts with label android. Show all posts

Scientists Discover Replacement For Lithium Cellphone Batteries... And Well, It's FISH GUTS...

Fish gut powered phones
Lithium is the dominating mineral in the production of cell phone batteries and furthermore of electric vehicles. Sodium and magnesium are different options called to supplant this exceptionally debased component.

In any case, a Spanish report by the University of Córdoba along with the University of Xiamen (China) and the Wentworth Institute of Technology (Boston, United States) have focused on the ocean and China.

In China alone, around 59 million tons of fish are created every year, of which 58% isn't devoured as food and winds up turning out to be bio-squander.

Its natural option for batteries is fish collagen. This marine buildup can be utilized as vitality stockpiling material and consequently fabricated with batteries in which to supplant lithium, a decent gathered in barely any nations and whose accessibility could be scant later on.

In the three-manner work with China and the United States, Spanish specialists have explored different avenues regarding lithium batteries, utilized around the world, and with sodium and magnesium gadgets, two of the fundamental items planned to supplant lithium.

As per the finishes of the examination, the limit esteems ​​achieved in the three cases are fundamentally the same as, and significantly higher in certain extents, than those acquired with other artificially integrated materials, with the favorable position that, on this event, the anode of the battery originates from a supportable material that frequently transforms into a great many huge amounts of waste.

The specialist responsible for the undertaking at the University of Córdoba, Gregorio Ortiz, calls attention to that collagen has been utilized as an anode - negative shaft and exposed to various lab tests to gauge how it would work when joined with cathodes - positive post customary.

As per the University of Córdoba, it is the first occasion when that collagen from fish squander has been utilized for use in batteries, in spite of the fact that it had recently been utilized in different parts of the business, as an impetus to eliminate benzene, a compound unpredictable toxin that causes ecological and medical issues.

_________
Author: Ryan Scandi
UK Newsroom

Hackers Want Into Your Phone - How To Keep Them Out...

Phone hackers
Smartphones became a kind of disaster drawer into which absolutely fits all the lifetime of the user. From your emails to your contact numbers or bank codes.

So it's not surprising that cybercriminals are currently taking a interest in ' hacking ' them ; especially in cases where it's known that the user handles sensitive information . To avoid a drag , and make it difficult for a malicious third party to access the device, there are a series of measures that, along side the utilization of a top quality security solution, must be implemented.

Beware of "phishing"
The " phishing ", or spoofing so as to trick users and steal personal data, is one among the favourite cybercriminals mechanisms in their campaigns. It are often produced through different channels: email , SMS or WhatsApp message . To be effective, criminals often impersonate well-known companies or banks and send messages using social engineering to draw in the eye of the victim and make it easier for them to fall under the trap.

Recently, the National Cybersecurity Institute drew attention to a case during which hackers were posing as Amazon and other companies via email . within the message, they affirmed that the platform had a special offer for all those that fill out a form during which a good sort of personal information was requested, also because the mastercard .

It is extremely important to use sense . within the case of scams that attempt to steal the user's checking account , for instance , you've got to understand that banks don't inherit contact with the customer

To avoid falling into the trap, experts recommend paying close attention to emails and messages received from third parties. Especially people who are sent, theoretically, by companies and public institutions. just in case the message is strange, and if it doesn't add up that it's sent via " mail ", SMS or WhatsApp, it should be contacted by means of a call with, supposedly, signed. Likewise, it's advisable to verify that the domain that sends the message is that the official one among the sender.

«It is extremely important to use sense . within the case of scams that attempt to steal the user's checking account , for instance , you've got to understand that banks don't contact the customer through emails or via SMS to invite their credentials. it's very rare. i might say that it doesn't happen with any entity. just in case we've a doubt, it's advisable to call our bank and consult it ", tells ABC José De la Cruz , technical director of the cybersecurity firm Trend Micro Iberia.

Take an honest look before downloading an app
The " apps " have helped to significantly facilitate the user's life. However, cybersecurity experts recommend being very careful before downloading them, as they will host computer viruses and steal control or information that's stored on the device.

One of the foremost common techniques employed by criminals who work with "apps" is forging popular platforms to urge more downloads. The study "A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps", prepared by the University of Sydney and published last year, maintains that, during two years, the presence of quite 2,000 applications for Android present within the official Google Play store posing as other well-known "apps" and containing "malware", that is, computer viruses.

That is why it's crucial to pay close attention to the very fact that the appliance we would like to download is that the original one . "This are often seen by checking the amount of downloads, the reviews of other users or the syntax within the description," Eusebio Nieva , technical director of the cybersecurity company Check Point , told this newspaper . Likewise, the expert highlights that it's essential to always download the applications from the official stores of the devices, be it the Google Play Store, on Android, or the App Store, on iOS.

WiFi isn't good for everything
Open WiFi networks are widespread for years, but there's certain information that ought to not be consulted when connected to at least one of them, since it's going to are "hacked". «In general, people have the incorrect perception that using an open Wi-Fi network doesn't have any quite danger for his or her security of the info stored on the device that's connected, in order that they don't take the required measures to ensure protection of your information, "they say during a statement from the cybersecurity company Check Point.

To avoid risks, it's important to not consult sensitive information when connected, like the checking account . Likewise, the browsing history and cookies, also because the browser's temporary files, must be deleted after using them.

Keep the device up so far (and inaccessible)
The application updates and operating systems are crucial to strengthening the safety of the terminal. And it's that, normally, the new versions are amid solutions of open gaps which will be exploited by cybercriminals.

For this reason, cybersecurity experts recommend not letting time pass and completing the corresponding update as soon because it is out there . Likewise, it's advisable to stay the services that we've installed on the "smartphone" duly protected by using strong passwords .

"A good password must be of considerable length and intelligible"
The password of a social network, for instance , is that the key that provides access to its interior; so it's not something to be chosen randomly . Thus, when creating one, it's important to use ingenuity in order that they're especially difficult to decipher. That happens, of course, by not using personal information, like birthday dates, or dozing off and typing the classic and dangerous 12345 on the keyboard.

'A good password must be of considerable length and intelligible. The user must not use in any case a word that has got to do with him, like his month of birth or his name. It must even have numbers, letters and special signs, like asterisks or dollar symbols, "ethical hacker Deepak Daswani told ABC .

In addition to always employing a strong password, it's important that the user change it frequently. in theory , having it done once every three months would be enough. Likewise, it's not advisable to use an equivalent altogether social networks. within the event that a platform suffers a knowledge leak, or the user falls victim to a cyber scam, the utilization of various passwords can help limit the risks of losing control of several sites at an equivalent time.


____
Author: Lan Jing
Asia News Team

Smartphones: How We ALL Became Addicted...

It wasn’t too long ago when smartphones were first introduced. But, they have quickly become a basic necessity in the lives of millions of people across the globe.

Let’s be honest. Who can imagine their life without their smartphone in their hands? It didn’t really take that long for these devices to become an integral and essential part of day to day life. It was revealed that half of the world’s population use smartphones right now.

But, how did these handy devices change how people do things?

A decade ago, people didn’t even think that it was possible to use a mobile device to talk with another person. Now, it has become common to engage in all kinds of conversations using their phone’s built-in personal assistants. From getting recommendations for the best dining spots in the city, getting directions to the nearest hospital, ordering chocolates online for their special someone to dictating emails, smartphones and their integrated assistants can pretty much do anything and everything under the sun.

People today can no longer imagine their lives without their smartphones by their side. These devices have evolved to the point that they are no longer just a mere tool for communication but also a constant companion that helps cater to your unique needs while making your life so much easier and simpler. You can choose from millions of apps and download those that are useful and interesting for you, such as apps to remind you of important appointments, build websites, edit photos and videos, track your health and control your connected smart appliances.

Doing business using your mobile devices has also gone beyond spending time in a coffee shop and making endless calls. Invoicing, design, emails, and online research have all become possible today. Capturing videos and images even while on the go has also been made easier while integrated security features make it safe to conduct business no matter where you are. In the field of education, learners don’t just get to access the internet but can even reach out to the best teachers and professionals in the world with just the use of their smartphones.

Half of the users of smartphones use the device to access the different health-related services. Whether they use apps to verify prescriptions or monitor glucose levels, use the device to find healthy recipes or make it their personal fitness tracker, smartphones have affected how people deal with their health and wellness.

But even with the incredible technology that pretty much puts the whole world right in your hands, the truth is that the evolution of smartphones still remains to be in its infancy. This is because technological innovations are still moving forward and beyond with the giant names in the industry leading the race as they to address and cater to the needs and desires of the users today and in the future.

So, the next time you look at your smartphone, don’t forget that there is so much more to it than just being a device to help you check your social media accounts or take photos.

--------
Author: Mellionardv