Asia

AppWizard
May 12, 2026
Many users rely on default Android weather apps like Pixel Weather, which may not provide accurate forecasts. The accuracy of weather forecasts is heavily influenced by the data source used. Different sources, such as global models (GFS, ECMWF) and regional services (like SAWS), vary in reliability. Popular apps like Samsung Weather and Pixel Weather have limitations, as they rely on specific data sources that may not adequately represent certain regions, leading to inaccuracies. Users dissatisfied with these apps can switch to alternatives like Meteogram Weather Widget, Breezy Weather, Weather Master, and Weawow, which allow for more flexibility in choosing data sources. When selecting a weather app, factors like update frequency and regional specificity are important for accuracy. Users are encouraged to experiment with multiple sources to find the best fit for their location.
Tech Optimizer
May 12, 2026
Trend Micro Inc (TSE: 4704) is trading at ¥6,178.00, which is a 698% premium over Morningstar's estimated fair value of ¥8,415.77 for May 2026. The company specializes in cybersecurity solutions, including antivirus software and cloud security, with a subscription-based business model. Its core markets include Japan, North America, Europe, and Asia-Pacific, with significant revenue from enterprise security solutions like the Trend Micro Vision One XDR platform. The company has a Price/Earnings ratio of 20.02, a Quick Ratio of 1.10, and a Return on Assets of 13.52%. The rising demand for cybersecurity, particularly in North America, is a key revenue driver. Trend Micro's portfolio includes AI-powered threat intelligence and mobile security solutions, targeting sectors like finance and healthcare. The company is positioned favorably against competitors and offers U.S. investors access through American Depository Receipts (ADRs).
AppWizard
May 11, 2026
28 Android applications were removed from the Google Play Store after being identified as scams by security researchers at ESET. These apps, part of a campaign called “CallPhantom,” falsely claimed to provide access to private call logs, SMS records, and WhatsApp activity. They attracted millions of downloads despite lacking legitimacy, offering fabricated data such as fake phone numbers and bogus call durations. Some apps charged users for “detailed reports” that either never arrived or contained nonsensical information. The apps did not steal phone data or install malware but instead promised illicit access and generated fictitious data. The primary targets of this scam were users in India and the Asia-Pacific region.
AppWizard
May 9, 2026
Cybersecurity researchers from ESET have discovered 28 fraudulent applications on the Google Play Store that falsely claimed to provide access to call histories for any phone number. These apps have been downloaded over 7.3 million times, with one app alone accounting for over 3 million downloads. The operation, named CallPhantom, primarily targeted Android users in India and the Asia-Pacific region. Users were lured into subscription services, paying for access to fictitious data, including call histories and SMS records, but received only randomly generated information. Some apps were published under the developer name "Indian gov.in" to create a false sense of trust. Payments were processed through the Google Play Store or third-party applications like Google Pay and Paytm. Users who subscribed via Google Play may be eligible for refunds, while those who used third-party payment methods may not be able to recover their funds. The fraudulent activity may have been ongoing since at least November 2025.
AppWizard
May 8, 2026
A series of fraudulent applications known as CallPhantom have been identified on the Google Play Store, claiming to provide access to call logs, SMS records, and WhatsApp call history for a fee. A total of 28 CallPhantom apps were reported, with over 7.3 million downloads. These apps falsely generated random phone numbers and fabricated data, misleading users into paying for nonexistent services. The apps primarily targeted Android users in India, utilizing UPI for payments and often sidestepping Google Play's official billing system. Users expressed frustration in negative reviews after being scammed. The investigation revealed two clusters of deceptive applications: one that presented hardcoded data and another that promised to send call histories via email after payment. Refunds may be possible for subscriptions made through Google Play, but users who paid outside the platform must contact their payment provider or the app developer for resolution.
AppWizard
May 7, 2026
imo is a messaging application launched in 2007 by two former Google engineers, which has over 200 million active users. It focuses on labor migrants from the Global South, offering reliable video calling even on poor connections. The app grew organically as migrants shared it with their families and communities, particularly in regions with limited connectivity. imo has developed into a fully-featured messaging platform, serving as essential infrastructure for millions of migrant families to maintain connections. Its growth strategy involved avoiding direct competition in saturated markets and addressing the specific needs of migrant workers.
BetaBeacon
May 6, 2026
- ScarCruft, also known as APT37 or Reaper, is a North Korean espionage group targeting government, military organizations, and companies in Asia. - BirdCall is a Windows backdoor attributed to ScarCruft, with spying capabilities such as taking screenshots and logging keystrokes. - The Android version of BirdCall collects contacts, SMS messages, call logs, and media files, and was actively developed over several months. - The BirdCall backdoor was discovered in a trojanized card game on a gaming platform tailored for ethnic Koreans living in Yanbian, China. - The attack was likely aimed at collecting information on individuals from the Yanbian region deemed of interest to the North Korean regime, such as refugees or defectors.
AppWizard
May 5, 2026
A North Korean hacking group has targeted a digital gaming platform popular among the Korean ethnic enclave in China, using a sophisticated strategy to infiltrate Android applications. Researchers from Eset discovered that an app on the platform contained a backdoor known as BirdCall, linked to North Korea. The official website for the gaming platform hosted the same suspicious APK file. A second Android file associated with another game on the same site was also found to contain the BirdCall backdoor. This supply-chain attack was attributed to the threat actor ScarCruft (APT37), active in Asia and extending into Europe and the Middle East since late 2024. The hackers likely compromised the web server to recompile original APKs with the backdoor, which can collect sensitive information such as contacts, SMS messages, call logs, documents, media files, and private keys, and can take screenshots and record audio. The malware disguises its command and control traffic among regular internet traffic, primarily using Zoho WorkDrive for operations.
AppWizard
April 29, 2026
Motorola and Google are introducing a wardrobe feature in Google Photos, allowing users to create a personalized digital closet by capturing images of clothing and accessories. This feature will debut on Android devices in select regions later this summer. Additionally, Motorola has integrated Google Photos Memories into its content feed, called Daily Drops, which refreshes twice daily with personalized content. The wardrobe feature aims to help users organize outfits and express individuality, while Daily Drops allows users to rediscover memories. The wardrobe feature will be available on various Android devices, including Motorola models, in the coming months, and Daily Drops is already rolling out on select Motorola devices across multiple regions.
Search