Android 11 tiene una utilísima función que encantará a los usuarios de la carga inalámbrica

Google ya ha lanzado la Developer Preview de Android 11, y hemos podido probar el adelanto de la nueva versión del sistema operativo de Google que, como cada año, trae unas cuantas novedades debajo del brazo para hacernos la vida algo más fácil a los usuarios. Poco a poco, los usuarios que están probando Android 11 descubren alguna nueva característica acerca de esta nueva versión, y hoy te venimos a

Entra en Andro4all para leer el artículo completo

Puedes unirte a nosotros en Twitter, Facebook o en Google+

¡Suscríbete a nuestro canal de YouTube!

Publicado recientemente en Andro4all

La entrada Android 11 tiene una utilísima función que encantará a los usuarios de la carga inalámbrica se publicó primero en Andro4all.

from Andro4all https://ift.tt/2wlWJVK
via IFTTT

Resucita su viejo teléfono “de rueda” gracias a un Google Home Mini y mucho ingenio

Entra en Andro4all para leer el artículo completo

Puedes unirte a nosotros en Twitter, Facebook o en Google+

¡Suscríbete a nuestro canal de YouTube!

Publicado recientemente en Andro4all

La entrada Resucita su viejo teléfono “de rueda” gracias a un Google Home Mini y mucho ingenio se publicó primero en Andro4all.

from Andro4all https://ift.tt/39tHCba
via IFTTT

60Hz, 90Hz, 120Hz: Qué es la tasa de refresco de la pantalla de tu móvil, y por qué es importante

Además de convertirse en uno de los mejores móviles de 2019, el OnePlus 7 Pro que analizamos en su momento fue el smartphone encargado de introducir una mayor tasa de refresco de pantalla en la primera línea de los smartphones de gama alta del pasado año, popularizando así este concepto que, hasta ahora, parecía ser exclusivo de los conocidos “teléfonos para gamers”. Modelos como el Razer Phone –en sus dos

Entra en Andro4all para leer el artículo completo

Puedes unirte a nosotros en Twitter, Facebook o en Google+

¡Suscríbete a nuestro canal de YouTube!

Publicado recientemente en Andro4all

La entrada 60Hz, 90Hz, 120Hz: Qué es la tasa de refresco de la pantalla de tu móvil, y por qué es importante se publicó primero en Andro4all.

from Andro4all https://ift.tt/32HtUiF
via IFTTT

Así es el nuevo móvil de HTC que sale al mercado con Android 9 y con MicroUSB (sí, estamos en 2020)

Hace unos días os comentamos que HTC, una de las marcas más míticas no solo de Android, sino de la telefonía móvil en general, pensaba aprovechar el tirón de la tecnología 5G y de la realidad virtual para resucitar sus teléfonos móviles. También os hablamos del HTC Wildfire R70, el nuevo dispositivo móvil de HTC de este año que a pesar de toda la expectación generada por la firma taiwanesa…

Entra en Andro4all para leer el artículo completo

Puedes unirte a nosotros en Twitter, Facebook o en Google+

¡Suscríbete a nuestro canal de YouTube!

Publicado recientemente en Andro4all

La entrada Así es el nuevo móvil de HTC que sale al mercado con Android 9 y con MicroUSB (sí, estamos en 2020) se publicó primero en Andro4all.

from Andro4all https://ift.tt/2vlPs8h
via IFTTT

French Firms Rocked by Kasbah Hacker?

A large number of French critical infrastructure firms were hacked as part of an extended malware campaign that appears to have been orchestrated by at least one attacker based in Morocco, KrebsOnSecurity has learned. An individual thought to be involved has earned accolades from the likes of Apple, Dell, and Microsoft for helping to find and fix security vulnerabilities in their products.

In 2018, security intelligence firm HYAS discovered a malware network communicating with systems inside of a French national power company. The malware was identified as a version of the remote access trojan (RAT) known as njRAT, which has been used against millions of targets globally with a focus on victims in the Middle East.

Further investigation revealed the electricity provider was just one of many French critical infrastructure firms that had systems beaconing home to the malware network’s control center.

Other victims included one of France’s largest hospital systems; a French automobile manufacturer; a major French bank; companies that work with or manage networks for French postal and transportation systems; a domestic firm that operates a number of airports in France; a state-owned railway company; and multiple nuclear research facilities.

HYAS said it quickly notified the French national computer emergency team and the FBI about its findings, which pointed to a dynamic domain name system (DNS) provider on which the purveyors of this attack campaign relied for their various malware servers.

When it didn’t hear from French authorities after almost a week, HYAS asked the dynamic DNS provider to “sinkhole” the malware network’s control servers. Sinkholing is a practice by which researchers assume control over a malware network’s domains, redirecting any traffic flowing to those systems to a server the researchers control.

While sinkholing doesn’t clean up infected systems, it can prevent the attackers from continuing to harvest data from infected PCs or sending them new commands and malware updates. HYAS found that despite its notifications to the French authorities, some of the apparently infected systems were still attempting to contact the sinkholed control networks up until late 2019.

“Due to our remote visibility it is impossible for us to determine if the malware infections have been contained within the [affected] organizations,” HYAS wrote in a report summarizing their findings. “It is possible that an infected computer is beaconing, but is unable to egress to the command and control due to outbound firewall restrictions.”

About the only French critical infrastructure vertical not touched by the Kasbah hackers was the water management sector.

HYAS said given the entities compromised — and that only a handful of known compromises occurred outside of France — there’s a strong possibility this was the result of an orchestrated phishing campaign targeting French infrastructure firms. It also concluded the domains associated with this campaign were very likely controlled by a group of adversaries based in Morocco.

“What caught our attention was the nature of the victims and the fact that there were no other observed compromises outside of France,” said Sasha Angus, vice president of intelligence for HYAS. “With the exception of water management, when looking at the organizations involved, each fell within one of the verticals in France’s critical infrastructure strategic plan. While we couldn’t rule out financial crime as the actor’s potential motive, it didn’t appear that the actor leveraged any normal financial crime tools.”

‘FATAL’ ERROR

HYAS said the dynamic DNS provider shared information showing that one of the email addresses used to register a key DNS server for the malware network was tied to a domain for a legitimate business based in Morocco.

According to historic records maintained by Domaintools.com [an advertiser on this site], that email address — ing.equipepro@gmail.com — was used in 2016 to register the Web site talainine.com, a now-defunct business that offered recreational vehicle-based camping excursions just outside of a city in southern Morocco called Guelmim.

Archived copies of talainine.com indicate the business was managed by two individuals, including someone named Yassine Algangaf. A Google search for that name reveals a similarly named individual has been credited by a number of major software companies — including Apple, Dell and Microsoft — with reporting security vulnerabilities in their products.

A search on this name at Facebook turned up a page for another now-defunct business called Yamosoft.com that lists Algangaf as an owner. A cached copy of Yamosoft.com at archive.org says it was a Moroccan computer security service that specialized in security audits, computer hacking investigations, penetration testing and source code review.

A search on the ing.equipepro@gmail.com address at 4iq.com — a service that indexes account details like usernames and passwords exposed in Web site data breaches — shows this email address was used to register an account at the computer hacking forum cracked[.]to for a user named “fatal.001.”

A LinkedIn profile for a Yassine Algangaf says he’s a penetration tester from the Guelmim province of Morocco. Yet another LinkedIn profile under the same name and location says he is a freelance programmer and penetration tester. Both profiles include the phrase “attack prevention mechanisms researcher security tools proof of concepts developer” in the description of the user’s job experience.

Searching for this phrase in Google turns up another Facebook page, this time for a “Yassine Majidi,” under the profile name “FatalW01.” A review of Majidi’s Facebook profile shows that phrase as his tag line, and that he has signed several of his posts over the years as “Fatal.001.”

There are also two different Skype accounts registered to the ing.equipepro.com email address, one for Yassine Majidi and another for Yassine Algangaf. There is a third Skype account nicknamed “Fatal.001” that is tied to the same phone number included on talainine.com as a contact number for Yassine Algangaf (+212611604438). A video on Majidi’s Facebook page shows him logged in to the “Fatal.001” Skype account.

On his Facebook profile, Majidi includes screen shots of several emails from software companies thanking him for reporting vulnerabilities in their products. Fatal.001 was an active member on dev-point[.]com, an Arabic-language computer hacking forum. Throughout multiple posts, Fatal.001 discusses his work in developing spam tools and RAT malware.

In this two-hour Arabic language YouTube tutorial from 2014, Fatal.001 explains how to use a RAT he developed called “Little Boy” to steal credit card numbers and passwords from victims. The main control screen for the Little Boy botnet interface includes a map of Morocco.

Reached via LinkedIn, Algangaf confirmed he used the pseudonyms Majidi and Fatal.001 for his security research and bug hunting. But he denied ever participating in illegal hacking activities. He acknowledged that ing.equipepro@gmail.com is his email address, but claims the email account was hacked at some point in 2017.

“It has already been hacked and recovered after a certain period,” Algangaf said. “Since I am a security researcher, I publish from time to time a set of blogs aimed at raising awareness of potential security risks.”

As for the notion that he has somehow been developing hacking programs for years, Algangaf says this, also, is untrue. He said he never sold any copies of the Little Boy botnet, and that this was one of several tools he created for raising awareness.

“In 2013, I developed a platform for security research through which penetration test can be done for phones and computers,” Algangaf said. “It contained concepts that could benefit from a controlled domain. As for the fact that unlawful attacks were carried out on others, it is impossible because I simply have no interest in blackhat [activities].”

from Krebs on Security https://ift.tt/38glvUr
via IFTTT

Collabora Office, un LibreOffice con todas sus herramientas llega a Android y iOS de la mano de Collabora

Collabora Office

Cuando hablamos de suites de ofimática, hace décadas que lo primero que nos viene a la cabeza es Microsoft Office. Ha sido y sigue siendo la suite más descargada de manera legal e ilegal en la gran mayoría de ordenadores, que recordamos que usan sistema operativo Windows, pero también existen otras opciones como el iWork de Apple o los servicios de Google. Por otra parte, LibreOffice, que viene instalado por defecto en muchas distribuciones Linux, es una opción de código abierto que ya podemos usar en dispositivos móviles bajo el nombre de Collabora Office.

A la mayoría de usuarios no nos gustan los cambios. Por ese motivo, son muchos los usuarios de Linux y macOS que usan una de las opciones disponibles para trabajar en Microsoft Office en sistemas diferentes a Windows, por lo que es probable que terminen accediendo al servicio disponible en office.com. Y los que ya nos hemos hecho a LibreOffice, cuando queremos usarlo un dispositivo móvil tenemos que usar otras opciones… o eso era así hasta hace poco, porque Collabora ha portado la suite de ofimática libre más popular para que podamos usarla en Android y iOS.

Collabora Office: LibreOffice para sistemas operativos móviles

Collabora Office es una suite de ofimática de código abierto que está basada en LibreOffice. La diferencia entre ésta y otras herramientas que había disponibles es que la de Collabora incluye todo tipo de herramientas de edición, no como las otras que eran básicamente un visor de documentos, lo que no tenía demasiado sentido si tenemos en cuenta que muchos documentos se pueden leer de manera nativa.

Collabora Office se ha diseñado para que sea fácil de usar en dispositivos móviles y táctiles. La interfaz de usuario se ha basado en Collabora Online, lo que podríamos decir que es la versión de Collabora del office.com anteriormente mencionado. La principal diferencia con Collabora Online, y como no podía ser de otra manera teniendo en cuenta que se trata de apps, es que Collabora Office funciona sin conexión a internet.

Si estáis interesados en usar Collabora Office en vuestro dispositivo Android o iOS, podéis descargarlo desde este enlace la versión de Android y desde este otro la versión para iPhone o iPad.

from Linux Adictos https://ift.tt/2Iiwulv
via IFTTT