personal information

AppWizard
June 11, 2025
WhatsApp and Telegram each have over a billion users but face scrutiny for security issues and tracking practices. A new state-controlled messaging app, VladsApp, has been approved by Russian lawmakers as an alternative to these platforms. Sergei Boyarsky, head of the Duma’s Committee on Information Policy, described it as a “secure, multifunctional alternative” aimed at enhancing digital security in Russia. The app will operate on state-controlled infrastructure and is expected to integrate with government services, allowing personal information transfer with user consent. The draft legislation must pass through parliament and receive President Vladimir Putin's signature to become law. There are concerns that the state may restrict access to foreign messaging services to promote VladsApp among users in Russia.
AppWizard
June 11, 2025
Academics from the University of Cambridge have raised concerns about the collection and commercialization of personal information through menstrual tracking applications, which have over 250 million downloads globally. These apps collect extensive data, including exercise, diet, medication, sexual preferences, hormone levels, and contraception use, making menstrual data valuable for consumer profiling. The report highlights that information on pregnancy status is particularly sought after in digital advertising, leading to risks of exploitation for targeted ads. If this data is misused, it could result in health insurance discrimination, employment risks, or domestic abuse. The researchers advocate for enhanced governance in the femtech industry, emphasizing the need for improved data security and meaningful user consent. They suggest that public health organizations develop alternatives to commercial tracking apps to prioritize user privacy and safety.
AppWizard
June 8, 2025
The Google Play Store has been infiltrated by deceptive applications that are part of a phishing campaign, as revealed by an investigation by Cyble. These applications mimic legitimate digital wallets, including names like SushiSwap, PancakeSwap, Hyperliquid, and Raydium, and have utilized over 50 domains to evade detection. The primary threat involves the extraction of users' mnemonic phrases, which are critical for accessing cryptocurrency and tokens. Users are advised to uninstall nine specific apps identified by Cyble: Pancake Swap, Suite Wallet, Hyperliquid, Raydium, BullX Crypto, OpenOcean Exchange, Meteora Exchange, SushiSwap, and Harvest Finance Blog, to protect their digital assets. Although many of these malicious apps have been removed from the Play Store, the risk persists for those who still have them installed.
Winsage
June 6, 2025
Windows 10 support will end in October 2025, leaving users without free security updates, new features, or technical assistance. Microsoft is encouraging users to upgrade to Windows 11, which offers enhanced security features, through advertising campaigns. Windows 11 requires a Trusted Platform Module (TPM) 2.0, which has frustrated some users with older PCs. Microsoft has introduced an extended support program for Windows 10, with costs starting at over ₹5,000 for the first year and increasing to over ₹20,000 by the third year per device.
AppWizard
May 29, 2025
Users can manage app permissions on Android devices by following these steps: 1. Open phone settings and select "Security and privacy." 2. Choose "Permission manager." 3. Tap "Start" on the intro screen. 4. Select a permission type to revoke or grant. 5. Tap the app to change its permission. 6. Deny permission by selecting "Don't allow" if the app already has access. While managing permissions is important, some apps require specific permissions to function properly, so users should be informed about the permissions they grant.
Tech Optimizer
May 29, 2025
All modern Windows PCs come with Microsoft Defender, a built-in antivirus solution. A tool called Defendnot can disable Microsoft Defender by tricking Windows into believing another antivirus is active. It uses an undocumented API to register a counterfeit antivirus, which leads to Microsoft Defender being automatically disabled without user notification. Defendnot creates a scheduled task for persistence and allows customization of the antivirus name. It is a successor to a previous project, No-Defender, which was removed due to copyright issues. Currently, Microsoft Defender flags Defendnot as a threat.
AppWizard
May 28, 2025
Google has released an updated fraud and scam advisory in anticipation of its inaugural Scams Summit, highlighting prevalent scam tactics such as customer support, package tracking, and toll road scams. The company has enhanced its Phone and Messages app with advanced scam protection features for Android users, integrating Gemini technology to detect and block potential scams. Google’s updated advisory also addresses risks from malvertising and counterfeit travel websites, while Chrome has received an update featuring AI-driven warnings for potential scams. Additionally, new scam protection features for calls and texts have been introduced, focusing on blocking actions when potential call scams are detected and identifying various scams related to toll roads, billing, cryptocurrency, and financial impersonation.
Tech Optimizer
May 28, 2025
Cybercriminals are executing a sophisticated malware campaign through a counterfeit Bitdefender antivirus website, specifically the domain “bitdefender-download[.]co,” which mimics the legitimate site. This fraudulent site distributes three types of malware: VenomRAT, StormKitty, and SilentTrinity, aimed at stealing financial data and maintaining persistent access to victims’ computers. When users click the “Download For Windows” button, they inadvertently download a ZIP file containing these malicious programs. VenomRAT acts as a remote access tool, allowing attackers to steal files, cryptocurrency wallets, and browser data, including credit card information. StormKitty quickly harvests sensitive credentials, while SilentTrinity provides stealthy long-term access for further exploitation. The fake Bitdefender site is linked to other malicious domains impersonating banks, indicating a coordinated phishing operation. The attackers utilize the same command and control infrastructure, with the IP address 67.217.228.160:4449 identified as a connection point. Bitdefender is working to take down the fraudulent site, and Google Chrome has begun flagging the link as malicious. Security experts recommend verifying website authenticity and downloading software only from official sources.
Search