Did you know you can now install the Google Assistant on any phone running Android 5.1+?
Google ported the assistant for users who do not have Pixel phones. Now it's available as a downloadable apk file and you can install it on any phone/tablet running the latest Google app and Android Lollipop or above.
Find it here: https://www.apkmirror.com/apk/google-inc/google-assistant/
Google ported the assistant for users who do not have Pixel phones. Now it's available as a downloadable apk file and you can install it on any phone/tablet running the latest Google app and Android Lollipop or above.
Find it here: https://www.apkmirror.com/apk/google-inc/google-assistant/
Tech Byte™
Did you know you can now install the Google Assistant on any phone running Android 5.1+? Google ported the assistant for users who do not have Pixel phones. Now it's available as a downloadable apk file and you can install it on any phone/tablet running the…
It's that easy, just press and hold your device's home button or simply say "Ok Google" and the assistant will be at your service. 😊
Fake WhatsApp On Google Play Store
Downloaded By Over 1 Million Android Users
Cybercriminals are known to take advantage
of everything that's popular among people in
order to spread malware, and Google's official
Play Store has always proved no less than an
excellent place for hackers to get their job
done.
On November 9 some users spotted a fake version of
the most popular WhatsApp messaging app for
Android on the official Google Play Store that
has already tricked more than one million
users into downloading it.
Dubbed Update WhatsApp Messenger, came
from an app developer who pretended to be
the actual WhatsApp service with the
developer title "WhatsApp Inc."—the same title
the actual WhatsApp messenger uses on
Google Play.
You might be wondering how the sneaky app
developer was able to use the same title as the
legitimate Facebook-owned maker of the
messaging client—thanks to a Unicode
character space.
The app maker added a Unicode character
space after the actual WhatsApp Inc. name,
which in computer code reads WhatsApp+Inc
%C2%A0.
However, this hidden character space at the
end of the WhatsApp Inc. would be easily
invisible to an average Android user browsing
Google Play Store, allowing this dodgy version
of the app to masquerade as a product of
WhatsApp Inc.
In other words, the titles used by the fake app
maker and real WhatsApp service are
different but appeared same to a user.
According to Redditors, who first spotted this
fake app on Friday, the app was not a chat
app; instead, it served Android users with
advertisements to download other apps.
"I've also installed the app and decompiled it,"
one Redditor said. "The app itself has minimal
permissions (internet access) but it's basically
an ad-loaded wrapper which has some code to
download a second apk, also called
'whatsapp.apk.' The app also tries to hide by
not having a title and having a blank icon."
Google has now removed the fake WhatsApp
Android app from its official Play Store, but
this incident once again marked the tech
giant's failure to spot the scam on its app
platform—even for the program that had more
than a million downloads.
It is an unfortunate truth that even after so
many efforts by Google (even recently
launched Bug Bounty Program), malicious
apps continuously somehow managed to fool
its Play Store's security mechanism and infect
millions of Android users.
Google Play Store is still surrounded by
hundreds of other fake and malicious apps
that trick users into downloading and
installing them and potentially infect their
smartphones to carry out malicious things
without their knowledge.
So, users are advised to be more vigilant
while downloading apps not only from the
third-party app store but also from official
Play Store in order to protect themselves.
Downloaded By Over 1 Million Android Users
Cybercriminals are known to take advantage
of everything that's popular among people in
order to spread malware, and Google's official
Play Store has always proved no less than an
excellent place for hackers to get their job
done.
On November 9 some users spotted a fake version of
the most popular WhatsApp messaging app for
Android on the official Google Play Store that
has already tricked more than one million
users into downloading it.
Dubbed Update WhatsApp Messenger, came
from an app developer who pretended to be
the actual WhatsApp service with the
developer title "WhatsApp Inc."—the same title
the actual WhatsApp messenger uses on
Google Play.
You might be wondering how the sneaky app
developer was able to use the same title as the
legitimate Facebook-owned maker of the
messaging client—thanks to a Unicode
character space.
The app maker added a Unicode character
space after the actual WhatsApp Inc. name,
which in computer code reads WhatsApp+Inc
%C2%A0.
However, this hidden character space at the
end of the WhatsApp Inc. would be easily
invisible to an average Android user browsing
Google Play Store, allowing this dodgy version
of the app to masquerade as a product of
WhatsApp Inc.
In other words, the titles used by the fake app
maker and real WhatsApp service are
different but appeared same to a user.
According to Redditors, who first spotted this
fake app on Friday, the app was not a chat
app; instead, it served Android users with
advertisements to download other apps.
"I've also installed the app and decompiled it,"
one Redditor said. "The app itself has minimal
permissions (internet access) but it's basically
an ad-loaded wrapper which has some code to
download a second apk, also called
'whatsapp.apk.' The app also tries to hide by
not having a title and having a blank icon."
Google has now removed the fake WhatsApp
Android app from its official Play Store, but
this incident once again marked the tech
giant's failure to spot the scam on its app
platform—even for the program that had more
than a million downloads.
It is an unfortunate truth that even after so
many efforts by Google (even recently
launched Bug Bounty Program), malicious
apps continuously somehow managed to fool
its Play Store's security mechanism and infect
millions of Android users.
Google Play Store is still surrounded by
hundreds of other fake and malicious apps
that trick users into downloading and
installing them and potentially infect their
smartphones to carry out malicious things
without their knowledge.
So, users are advised to be more vigilant
while downloading apps not only from the
third-party app store but also from official
Play Store in order to protect themselves.
Anonymous: Expect Us!:
⚛ Premium Socks (sock 5)⚛ (Updated Nov. 2017 )
Form:- IP : Port : StateCode
67.197.155.219 : 11052 : US
107.195.72.100 : 19936 : US
95.165.164.170 : 27548 : RU
88.210.48.163 : 5555 : RU
69.58.0.151 : 10996 : CA
79.140.221.254 : 1080 : IE
195.138.66.92 : 33012 : UA
@techbyte
⚛ Premium Socks (sock 5)⚛ (Updated Nov. 2017 )
Form:- IP : Port : StateCode
67.197.155.219 : 11052 : US
107.195.72.100 : 19936 : US
95.165.164.170 : 27548 : RU
88.210.48.163 : 5555 : RU
69.58.0.151 : 10996 : CA
79.140.221.254 : 1080 : IE
195.138.66.92 : 33012 : UA
@techbyte
World’s largest child porn site was run by
police for undercover op
Dark web is home to explicit and illegal
content including child pornography sites
which are often in the news once they get
busted. But then there are platforms run by
police or security agencies, for example,
notorious website Playpen which was run by
the FBI for an undercover operation.
However, now it turns out that Australian
police ran the world’s largest child porn site
called ‘Childs Play,’ between October 2016 and
September 2017 as part of its large-scale
undercover op to track and bust pedophiles.
The joint operation was conducted by
European, American and Canadian
authorities. In an interview with Norwegian
newspaper the head of Task Force Argos, Mr.
Jon Rouse said that:
“We don’t create these sites. We do not want
them to exist. When we do find them, we
infiltrate and get as high as possible in the
networks administrative structure to destroy
it. But we will never create a forum for child
sex offenders.”
police for undercover op
Dark web is home to explicit and illegal
content including child pornography sites
which are often in the news once they get
busted. But then there are platforms run by
police or security agencies, for example,
notorious website Playpen which was run by
the FBI for an undercover operation.
However, now it turns out that Australian
police ran the world’s largest child porn site
called ‘Childs Play,’ between October 2016 and
September 2017 as part of its large-scale
undercover op to track and bust pedophiles.
The joint operation was conducted by
European, American and Canadian
authorities. In an interview with Norwegian
newspaper the head of Task Force Argos, Mr.
Jon Rouse said that:
“We don’t create these sites. We do not want
them to exist. When we do find them, we
infiltrate and get as high as possible in the
networks administrative structure to destroy
it. But we will never create a forum for child
sex offenders.”
Forwarded from RL channels
Have a Telegram channel📢, group💬 or bot🤖 you want to get more followers👥 to? Or maybe it's your brand new YouTube channel, Instagram or Twitter fanpage?
👍I got you covered, I'll advertise your products on my Telegram platforms for a very affordable price and make sure you reach that target you set. Gather loads of views, visits, likes, follows or subs depending on your advert.
💰I accept payments via PayPal, Bitcoin, Etherium or M-Pesa💵
Simply contact me on Telegram or on any of my social media handles for pricing and advertising.
Special NEW YEAR deal for regular clients: Get upto 25% off an advertising package!!
- @romL3N #RLad
👍I got you covered, I'll advertise your products on my Telegram platforms for a very affordable price and make sure you reach that target you set. Gather loads of views, visits, likes, follows or subs depending on your advert.
💰I accept payments via PayPal, Bitcoin, Etherium or M-Pesa💵
Simply contact me on Telegram or on any of my social media handles for pricing and advertising.
Special NEW YEAR deal for regular clients: Get upto 25% off an advertising package!!
- @romL3N #RLad
Forwarded from RL advertisements
😂Had a bad day? We're here to make it better. Here you'll get the worst of the worst jokes of all time, jokes so bad you'll die...well, not really.
https://t.me/joinchat/AAAAAEG0tDE7UFOstqDcLg
https://t.me/joinchat/AAAAAEG0tDE7UFOstqDcLg
DOWNLOAD THE BEST APP IN PROVIDING MAXBET TIPS 👇👇👇👇👇
RECOMMENDED BY WORLD FOOTBALL FEDERATION AND FIFA
https://play.google.com/store/apps/details?id=com.winma.zealmaxbets
For any assistance talk to our service help centre @captainclein or @mwikah
It's correspondence website. 👇👇👇
www.winmaxbets.com
RECOMMENDED BY WORLD FOOTBALL FEDERATION AND FIFA
https://play.google.com/store/apps/details?id=com.winma.zealmaxbets
For any assistance talk to our service help centre @captainclein or @mwikah
It's correspondence website. 👇👇👇
www.winmaxbets.com
Here's how an attacker can get your mobile phone number using Facebook, PayPal & G-Mail.
https://null-byte.wonderhowto.com/how-to/find-anyones-private-phone-number-using-facebook-0181071/
https://null-byte.wonderhowto.com/how-to/find-anyones-private-phone-number-using-facebook-0181071/
Forwarded from Telegram Geeks
Leaked WhitePaper - Telegram Open Network (TON).pdf
10.9 MB
Here is the leaked white paper of Telegram Open Network (TON)
#ton #blockchain #ico #gram
ℹ️ @geeksChannel
#ton #blockchain #ico #gram
ℹ️ @geeksChannel
Telegram Geeks
Leaked WhitePaper - Telegram Open Network (TON).pdf
Telegram's cryptowallet, and more leaks...
Iranian ISPs applied some restrictions on VPN networks.
if you can modify your client config file on PC, create a ssh tunnel on port 8080 (or whatever you want) and add the following lines at the end of your config file:
socks-proxy-retry
socks-proxy 127.0.0.1 8080
if you can modify your client config file on PC, create a ssh tunnel on port 8080 (or whatever you want) and add the following lines at the end of your config file:
socks-proxy-retry
socks-proxy 127.0.0.1 8080
Tech Byte™ pinned «Have a Telegram channel📢, group💬 or bot🤖 you want to get more followers👥 to? Or maybe it's your brand new YouTube channel, Instagram or Twitter fanpage? 👍I got you covered, I'll advertise your products on my Telegram platforms for a very affordable price…»
DiskDigger v1.18 Portable
Key included.
Undeletes and recovers lost files from your hard drive, memory cards, USB flash drives. Supports most types of media that your computer can read
Key included.
Undeletes and recovers lost files from your hard drive, memory cards, USB flash drives. Supports most types of media that your computer can read
Here's a nice example of a c++ code using
GNU GCC/Code::Blocks for parsing switch
parameters the proper way, meaning for
example, a user can change the order of
them, without the code messing up. By using
some logic, it connects the proper value to the
desired switches:
https://github.com/stephanvandekerkhof/cpp-
switch-parameter-parser-example
Have a nice Friday!
GNU GCC/Code::Blocks for parsing switch
parameters the proper way, meaning for
example, a user can change the order of
them, without the code messing up. By using
some logic, it connects the proper value to the
desired switches:
https://github.com/stephanvandekerkhof/cpp-
switch-parameter-parser-example
Have a nice Friday!
Tools You can Use to Hack on Android
Kali, the best hacking OS, is based on Linux, luckily for us, so is Android. With the Termux terminal emulator, you can install and use most tools and packages supported on Kali. I've picked out some of the best tools you can use to hack devices and systems on Android:
Prerequisite:
Before we start, you're gonna need some gear:
1. Assuming you've installed Termux, type and run the commands
Now that you're up-to-date, let's begin.
Kali, the best hacking OS, is based on Linux, luckily for us, so is Android. With the Termux terminal emulator, you can install and use most tools and packages supported on Kali. I've picked out some of the best tools you can use to hack devices and systems on Android:
Prerequisite:
Before we start, you're gonna need some gear:
1. Assuming you've installed Termux, type and run the commands
apt-get update followed by apt-get upgrade > This will update all packages installed on your device to the latest version.Now that you're up-to-date, let's begin.