QR codes

AppWizard
February 24, 2026
Circle to Search has reached its second anniversary, marking a significant milestone for Google. It was introduced to Android as a practical application of artificial intelligence and has evolved to include enhanced functionalities relevant in 2026. Users can access the generative AI model Nano Banana directly through Circle to Search for image creation and editing, streamlining the remixing process. The tool also features a full-screen translation capability that allows instant translation of text displayed on screens across various apps and websites, supporting multiple languages and enabling scrolling translations. Additionally, Circle to Search can scan QR codes and barcodes displayed on screens, functioning similarly to the Camera app. Its capabilities include text selection, image searching, generative AI, code scanning, song recognition, and on-screen translation, making it a versatile tool that enhances user experience. The Google Pixel 10 is highlighted as an ideal companion for Circle to Search, equipped with AI-powered tools that enhance overall user experience.
AppWizard
January 30, 2026
The Indian government has taken action against the Wingo app, a cyber fraud network that sent fraudulent SMS messages from users' devices without consent. The app's digital infrastructure has been blocked, and four associated Telegram channels with 153,000 users have been shut down. Over 53 related videos have been removed from YouTube. The Wingo app lured users with promises of quick financial gains, encouraging them to deposit funds for minor tasks or investments, but then either shut down or blocked accounts after receiving money. Payments were made through UPI or personal wallets, complicating traceability. Users were asked for access to personal data and provided with fake customer care numbers. Android users are advised to avoid apps promising guaranteed profits, verify app legitimacy, and refrain from granting unnecessary permissions. The government recommends uninstalling suspicious apps and reporting them, as well as contacting the cybercrime helpline at 1930 for assistance.
AppWizard
January 26, 2026
Google has introduced a new feature in the Google Home app that allows users to manually search for smart home devices when QR code scanning or automatic pairing fails. The feature, labeled "Add a different way," includes a curated list of supported brands and a search bar for easier device location. The updated pairing flow also incorporates device images for visual confirmation. This feature is being rolled out with the Google Home app version 4.6.55.1 and will reach a broader user base shortly. Users are advised to update their app to access the new feature, which may be rolled out gradually.
AppWizard
December 18, 2025
A new Android malware campaign has been launched by the North Korean threat actor Kimsuky, introducing a variant called DocSwap. This malware is distributed via QR codes on phishing websites that impersonate CJ Logistics. Attackers use QR codes and notification pop-ups to lure victims into downloading the malware, which decrypts an embedded APK and activates Remote Access Trojan (RAT) capabilities. The malicious app is disguised as a legitimate application to bypass Android's security measures. Victims are tricked into installing the app through smishing texts or phishing emails that mimic delivery companies. The app downloads an APK named "SecDelivery.apk," which then loads the malware. It requests permissions to access various device functions and registers a service that simulates an OTP authentication screen. The app connects to an attacker-controlled server, allowing execution of commands such as logging keystrokes, capturing audio, and gathering sensitive information. Additionally, two other malicious samples have been identified, disguised as a P2B Airdrop app and a trojanized version of the BYCOM VPN app. The campaign also includes phishing sites mimicking popular South Korean platforms to capture user credentials.
AppWizard
November 26, 2025
CISA has issued a warning about spyware targeting users of instant messaging applications, particularly highlighting the Sturnus trojan, which poses significant risks to Android smartphone users. Sturnus, identified as a banking trojan, can bypass encrypted messaging by capturing messages after they are decrypted on the smartphone screen, rather than cracking the encryption itself. Security expert Aditya Sood noted that Sturnus uses a combination of plaintext, RSA, and AES-encrypted communication, complicating detection efforts. The trojan can read everything displayed on the smartphone screen in real time, including sensitive messages and contacts. CISA also identified tactics used by cyber threat actors, such as phishing, zero-click exploits, and impersonation to gain unauthorized access to messaging apps. Users are advised to keep Google’s Play Protect activated, avoid unauthorized app stores, and be cautious with accessibility permissions to protect against these threats.
AppWizard
November 25, 2025
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about the increasing threat of spyware targeting messaging applications, particularly on Android devices like Samsung. Cybercriminals are using social engineering techniques, including sending harmless-looking image files via WhatsApp, to install malicious software. Russian hackers have been reported to compromise Signal accounts. The alert highlights a focus on high-value individuals, including government officials and civil society members in the U.S., Middle East, and Europe. CISA has a history of issuing such alerts and provides cybersecurity guidance, including a "must-patch" list for federal agencies. Users are advised to be vigilant and follow mobile security guidelines, as threat groups are also using malicious QR codes and zero-click exploits to compromise devices.
TrendTechie
October 18, 2025
Many methods of console piracy have emerged over time, often exploiting unintentional vulnerabilities in licensed games. For example, the PSP was easily hacked due to flaws in games like Grand Theft Auto: Liberty City Stories and Medal of Honor: Heroes, which allowed users to manipulate save files to gain access to the system. A debug code in Alien: Resurrection for the PS1 enabled users to swap discs without turning off the console. Various makeshift tools have been used for hacking, such as a paperclip to exploit the Nintendo Switch and tweezers to access dormant memory sections in the Wii. The Nintendo 3DS was hacked using a magnet to trick the lid sensor, allowing access to developer mode. The Xbox 360 faced significant modding due to its firmware modification capabilities. A notable method involved drilling into the drive to bypass rewrite protection, known as the "Kamikaze Hack." While piracy methods have evolved, modern consoles have become increasingly secure, with fewer successful hacks reported in recent years. The appeal of piracy has diminished as subscription services and sales provide easier access to games.
AppWizard
October 15, 2025
Google has introduced two safety features for its Messages app: the Android Key Verifier and a spam protection feature. The Android Key Verifier is available for users on Android 10 and above, using QR codes to verify end-to-end encrypted message exchanges. Users can verify keys by tapping on the contact's name and selecting “Verify keys.” A confirmation message appears upon successful verification, and users are alerted if a contact's key changes due to reasons like acquiring a new device or SIM card, key expiration, or encryption protocol upgrades. Potential malicious reasons for key changes include man-in-the-middle attacks and SIM swapping. Users are advised to keep the Android System Key Verifier app updated. The spam protection feature prevents access to harmful links in texts unless marked as “not spam,” and it is now available worldwide.
Search