India

AppWizard
March 3, 2026
Google's March Pixel Drop introduces several enhancements for Pixel devices, including: - Integration of live location sharing in Google Messages, allowing users to share real-time location within chats. - Introduction of short app preview videos in Google Play for users to quickly assess app functionality before downloading. - Enhanced Find Hub app for recovering lost luggage by generating a secure tracking link for tagged bags, which can be shared with participating airlines. The tracking links expire after seven days and can be stopped at any time. Over ten major airlines, including Ajet, Air India, and Lufthansa Group, support this feature, with Qantas expected to join soon. Google collaborated with SITA and Reunitus to integrate this feature with baggage systems used by many airlines worldwide.
AppWizard
February 28, 2026
The Broadband India Forum (BIF) has expressed legal concerns about the government's SIM binding mandate, stating it is "ultra vires the parent legislation" and "unconstitutional," based on a senior counsel's opinion. This opinion critiques the Telecommunications (Telecom Cyber Security) Amendment Rules, 2025, claiming they exceed the authority of the Telecommunications Act of 2023. The government's directive requires app-based communication services to maintain a link to a user's active SIM card, which BIF argues violates principles of due process and proportionality. BIF also highlights that the introduction of Telecommunication Identifier User Entities (TIUEs) alters the scope of telecom regulation improperly, potentially leading to legal conflicts with existing laws like the Information Technology Act. BIF concludes that the amendment rules represent an impermissible expansion of delegated authority under the Telecom Act, advocating for adherence to the statutory framework. The government's directive, aimed at addressing cyber security concerns, would change how users access messaging services in India.
BetaBeacon
February 16, 2026
Android remains the dominant OS in countries like India, Indonesia, Brazil, and parts of Africa, providing indie studios with a large audience eager for content and more likely to download experimental games from unknown developers.
AppWizard
February 16, 2026
Tredixo has launched an Android app aimed at providing simplified and structured trading education. The app is designed to address common challenges faced by learners, such as overwhelming information and lack of beginner-friendly guidance. It features beginner-friendly content covering stock market basics, technical analysis, trading psychology, and risk management. The app also offers market updates, trading tools, and a user-friendly interface for easy navigation. It is tailored for beginners, students, new traders, and working professionals seeking to learn about trading at their convenience. Tredixo emphasizes a learning-first approach to trading, promoting knowledge, discipline, and practical application. Future plans include additional learning modules and improved features. The app is available for download on the Google Play Store.
TrendTechie
February 12, 2026
Cybersecurity specialists have identified a long-running malware campaign that disguises itself as installers for pirated games, utilizing a malicious component called the RenEngine Loader. This loader operates stealthily, embedding itself within the system while allowing the game to run without disruption, thus evading detection. The campaign has been active since at least April 2025 and primarily targets popular titles from Electronic Arts and Ubisoft, such as Far Cry, FIFA, Need for Speed, and Assassin’s Creed. The malicious code appears as a harmless launcher based on Ren’Py, leading users to believe the installation is normal. Once installed, the loader can facilitate further exploits without immediate data exfiltration. Telemetry has recorded over 400,000 inquiries related to this distribution chain, with an average detection rate of around 5,000 incidents per day, and Russia ranks fourth in these observations.
Tech Optimizer
February 11, 2026
MicroWorld Technologies confirmed a breach of its eScan antivirus update infrastructure, allowing attackers to deliver a malicious downloader to enterprise and consumer systems. Unauthorized access was detected, leading to the isolation of affected update servers for over eight hours. A patch was released to revert the changes made by the malicious update, and impacted organizations were advised to contact MicroWorld for assistance. The attack occurred on January 20, 2026, when a compromised update was distributed within a two-hour window. The malicious payload, introduced through a rogue "Reload.exe" file, hindered eScan's functionality, blocked updates, and contacted an external server for additional payloads. This rogue executable was signed with a fake digital signature and employed techniques to evade detection. It also included an AMSI bypass capability and assessed whether to deliver further payloads based on the presence of security solutions. The malicious "CONSCTLX.exe" altered the last update time of eScan to create a false sense of normalcy. The attack primarily targeted machines in India, Bangladesh, Sri Lanka, and the Philippines, highlighting the rarity and seriousness of supply chain attacks through antivirus products.
Search