microphone

AppWizard
May 15, 2025
Cybersecurity experts have identified a new threat to Android users called Kaleidoscope malware, which has infiltrated various popular applications not available on the Google Play Store. This malware operates in the background, collecting personal information, displaying intrusive ads, and potentially allowing more harmful malware to enter. Users are advised to check their device settings for suspicious apps, uninstall them, restart their devices, and review app permissions, especially for those requesting access to sensitive features. Experts recommend downloading apps only from trusted sources, being cautious about permissions, and regularly updating systems to address security vulnerabilities. Google has identified 62 dangerous vulnerabilities in Android devices, with two being particularly threatening, and users are urged to update their devices promptly.
Winsage
May 14, 2025
Microsoft is rolling out a hands-free feature for its Copilot Voice application on Windows 11, allowing users to start conversations by saying “Hey Copilot!” Beta testers, known as Windows Insiders, can activate this feature within the updated app. Users need to enable the feature to respond to the wake word, and the rollout is gradual, with availability to testers worldwide who have set their display language to English. Eligibility requires the Copilot app version to be 1.25051.10.0 or higher. Once activated, a microphone icon will appear, and the feature uses an on-device wake word spotter with a 10-second audio buffer, ensuring audio clips are not sent to the cloud or stored locally. Full functionality requires online access for cloud processing.
Winsage
May 14, 2025
Microsoft is rolling out an update for the Copilot app through the Microsoft Store, introducing several enhancements. A key feature is the "Hey, Copilot" wake word, allowing users to activate Copilot Voice hands-free. Users must enable this feature in the app's settings. Once activated, users can say "Hey, Copilot" followed by their query, and the Copilot interface will appear on the screen. Conversations can be ended by tapping the ‘X’ or automatically after a few moments of silence. The feature requires manual activation and will show that the microphone is in use when enabled. The wake word detection occurs locally, and no recordings are sent to the cloud until the wake word is recognized. The feature is available only in English and requires the PC to be powered on and unlocked. The update version 1.25051.10.0 and higher is being rolled out gradually to Insiders with English display language settings. Users can provide feedback through the app.
AppWizard
May 7, 2025
The May 2025 security update for Google Pixel devices began deployment on May 6, addressing a critical zero-day security vulnerability (CVE-2025-27363) and including three bug fixes along with 28 security patches. The rollout may take about one week to reach all devices, depending on models and carriers. The update prevents devices from reverting to older, vulnerable versions of the bootloader. It also resolves specific issues for Google Pixel 6 and newer devices, including improvements in microphone recording quality, resolution of Bluetooth pairing issues with certain smartwatches, and correction of secondary language display issues in quick settings. Users are advised to check for the update in the Settings app under System > Software update.
AppWizard
May 5, 2025
Google is developing a new feature called "Live for AI Mode," which is expected to enhance user interaction with AI, potentially utilizing Google Lens for a more conversational interface. Recent updates have expanded AI Mode access to all Labs testers in the U.S., introducing visual cards for products and locations. The new feature may include an "End Session" button and a microphone mute option, similar to the existing Gemini Live feature. Since its rollout in April, Google has integrated Lens into AI Mode, allowing users to capture images and ask questions about them. The update aims to provide a more dynamic experience, including a "multisearch" capability that combines images and text. As of May 1, AI Mode has been updated to include a history of previous queries and will soon allow users to access organized information blocks for local establishments, including reviews and operational hours.
AppWizard
April 25, 2025
Recent findings from cybersecurity experts at ESET revealed that several Android applications, disguised as harmless tools, have been secretly recording conversations and stealing sensitive data. These malicious apps infiltrated devices through the Google Play Store and third-party platforms, compromising the privacy of thousands of users. One tactic used by cybercriminals involved romantic deception, where victims were coaxed into downloading a seemingly harmless messaging app containing the VajraSpy Trojan, which activated upon installation to record conversations and harvest personal data. The identified malicious apps fall into three categories: 1. Standard Messaging Apps with Hidden Trojans: These apps, including Hello Chat, MeetMe, and Chit Chat, request access to personal data and operate silently in the background, stealing contacts, SMS messages, call logs, device location, and installed app lists. 2. Apps Exploiting Accessibility Features: Apps like Wave Chat exploit Android’s accessibility features to intercept communications from secure platforms, record phone calls, keystrokes, and ambient sounds. 3. Single Non-Messaging App: Nidus, a news app, requests a phone number for sign-in and collects contacts and files, increasing the risk of data theft. The 12 malicious Android apps identified include: Rafaqat, Privee Talk, MeetMe, Let’s Chat, Quick Chat, Chit Chat, YohooTalk, TikTalk, Hello Chat, Nidus, GlowChat, and Wave Chat. The first six apps were available on the Google Play Store and had over 1,400 downloads before removal. Users are advised to uninstall these apps immediately to protect their personal data.
Tech Optimizer
April 17, 2025
Bitdefender Total Security offers comprehensive antivirus protection, a VPN with a daily limit of 200 MB, and specific protections for cryptocurrency mining. The software includes multi-layered antivirus protection, real-time Advanced Threat Detection, Ransomware Remediation, a firewall, and an anti-spam feature. Performance testing shows minimal impact on speed, with quick scans completing in minutes and full scans taking about 30 minutes. Additional features include a secure browser for financial transactions, a virtual keyboard, a trial password manager, webcam and microphone privacy controls, and PC optimization tools. The user interface is designed for ease of use, with a customizable dashboard and intuitive navigation. Support options include phone, chat, and email, with quick transitions to live agents. Bitdefender typically retails at .99 annually, with competitors offering lower introductory prices.
AppWizard
April 10, 2025
A report from DomainTools LLC reveals that cybercriminals are using newly registered domains to distribute the SpyNote Android remote access trojan (RAT) by creating fake websites that resemble legitimate Google Play app installation pages. These counterfeit pages often include familiar visual elements to deceive users into downloading harmful APK files, such as a site mimicking the TikTok installation page. The downloaded files typically contain variants of SpyNote, which can conduct surveillance, harvest sensitive information, and execute remote commands on compromised devices. The delivery mechanism involves a two-stage process where a dropper APK installs a secondary APK with core spyware functionalities, utilizing JavaScript to trigger downloads from fake install buttons. Common characteristics of the domains distributing SpyNote include registration with NameSilo LLC and XinNet Technology Corp., hosting on infrastructure linked to Lightnode Ltd and Vultr Holdings LLC, and the presence of SSL certificates. The malware delivery sites contain code in both English and Chinese, suggesting a Chinese-speaking threat actor may be involved. SpyNote has been associated with advanced persistent threat groups targeting individuals in South Asia, including those in the Indian defense sector. Once installed, SpyNote requests intrusive permissions to access SMS, contacts, call logs, camera, microphone, and location services, and employs persistence mechanisms that make it difficult to remove. DomainTools advises users to be vigilant against spoofed app pages and avoid sideloading APKs from unverified sources.
AppWizard
April 2, 2025
Google is refining its music identification capabilities on Android devices, with potential upgrades revealed through an APK teardown. Currently, users can identify songs using features like Circle to Search and Now Playing, but the process often requires manual prompts. The latest version of the Google app (build 16.12.39.sa.arm64) shows signs of automatic music detection, changing the interface to "Searching song..." upon recognition, although users still need to tap a button to view results. The absence of the typical pulsing-sphere visual element indicates that this feature is still in development.
Search