Contact: +2347033996028 Grassroot Reporters | Nigeria's No. 1 Online Newspaper: Technology

Grassroot Reporters | Nigeria's No. 1 Online Newspaper

Nigeria's No. 1 News Portal

Breaking

Showing posts with label Technology. Show all posts
Showing posts with label Technology. Show all posts

Monday, April 5, 2021

April 05, 2021

LG To Stop Production Of Mobile Phones, Becomes First Major Smartphone Brand to Withdraw From Market Due to Losses


 

LG will now focus on growth areas such as electric vehicle components, connected devices, and smart homes.



South Korea's LG Electronics said on Monday it will wind down its loss-making mobile division - a move that is set to make it the first major smartphone brand to completely withdraw from the market.


Its decision to pull out will leave its 10 percent share in North America, where it is the No. 3 brand, to be gobbled up by smartphone titans Apple and Samsung Electronics.


The division has logged nearly six years of losses totalling some $4.5 billion (roughly Rs. 33,010 crore), and dropping out of the fiercely competitive sector would allow LG to focus on growth areas such as electric vehicle components, connected devices and smart homes, it said in a statement.

In better times, LG was early to market with a number of cell phone innovations including ultra-wide angle cameras and was once in 2013 the world's third-largest smartphone manufacturer behind Samsung and Apple.

But later, its flagship models suffered from both software and hardware mishaps which combined with slower software updates saw the brand steadily slip in favour. Analysts have also criticised the company for lack of expertise in marketing compared to Chinese rivals.

Currently its global share is only about 2 percent. It shipped 23 million phones last year which compares with 256 million for Samsung, according to research provider Counterpoint.

In addition to North America, it does have a sizeable presence in Latin America, where it ranks as the No. 5 brand.

"In South America, Samsung and Chinese companies such as Oppo, Vivo, and Xiaomi are expected to benefit in the low to mid-end segment," said Park Sung-soon, an analyst at Cape Investment & Securities.

While other well-known mobile brands such as Nokia, HTC, and Blackberry have also fallen from lofty heights, they have yet to disappear completely.

LG's smartphone division - the smallest of its five divisions, accounting for about 7 percent of revenue - is expected to be wound down by July 31.

In South Korea, the division's employees will be moved to other LG Electronics businesses and affiliates while elsewhere decisions on employment will be made at the local level.

LG will provide service support and software updates for customers of existing mobile products for a period of time which will vary by region, it added.

Talks to sell part of the business to Vietnam's Vingroup fell through due to differences about terms, sources with knowledge of the matter have said.


(Reuters)



Friday, July 19, 2019

July 19, 2019

How Hackers Hack Into Accounts And How To Avoid Being Compromised


I am sure most of you have been victims of your email accounts being hacked, or your
not working. Well, this may be a result of your password might have been hacked.

One way to keep yourself secure is by knowing how hackers hack the passwords and the methods and software they generally use.
By knowing how hackers get into your account, you will be in a better situation to understand the ways in which you can lose your account information and passwords and thus can protect yourself from getting hacked next time.

How Do Hackers Get Your Passwords?

There are some common techniques which hackers use to hack your passwords.
One of them is phishing pages. A hacker will send a login page of Gmail or Facebook which looks exactly the same as the real Facebook or Gmail login page.
Most of the times they use social engineering skills where they send a message that says “This person has posted your bad picture on Facebook, click here to check your photo”. Once you click on the link, you will be taken to the login page and as soon as you enter your password, it will be available to the hacker.
Most of the time, the victim doesn’t even realize that the password is gone.

Hackers hack accounts and passwords for various reasons. Some of them hack just to show their skills off while some get into hacking for profits. Many of them will use your email account to send spam links to your contact list or use your Facebook account to send spam application links.
The major problem arises when hackers get hold of your private and sensitive data. Like I mentioned above, there are many other methods being used by hackers to hack passwords or email access.

1. Keyloggers

This is one of the basic tool used for getting your passwords. Keylogger resides in your system memory and runs at every startup. These keyloggers log all your keystrokes.
A log is created and is then sent to the hacker. One of the most famous is the Ardamax Keylogger. It can be customized to not be shown in “Processes” (Windows Task Manager).
I suggest you to start using
when typing passwords for sensitive sites like your bank account, email and Paypal account. You can also start using a password manager that autofills the login data and thus no key logs are made.

2. RAT

 With RAT, a hacker can connect to your PC without your knowledge. The hacker can see your screen and also see the sites you surf. It also has the built-in functionality of keylogger.
Hackers can copy files from your hard disk to his/her computer – all this without your knowledge. A good example of RAT is Poison Ivy . It can be customized to connect to your PC on a particular port number specified while creating the RAT.

3. Trojan Horses

These are the most common types of malware. Trojans spread through warez sites mostly . All of you want free software.

Right?

Beware though!
When you download from warez sites, all the keygens and patches and even the original trial programs are infected with trojan.
This means you will get the software for free, but your computer will be affected with a trojan horse.
When you run the patch/keygen, you’ll get the desired output, but in the background, your system gets infected with the trojan.
Turkojan is a famous Trojan horse. A trojan is much more superior compared to keyloggers or RATs. It provides much more functionality so that the hacker has greater access to your PC.
These days Android phones are most vulnerable to the trojan horse a.k.a backdoors. Hackers will persuade you to install an apk file which will then install a backdoor apk. This is why you should never install .apk files from untrusted sources. We will talk more about how to safeguard yourself in future articles.
There are many other ways which a hacker uses, for example, if you are connected to the internet on a LAN, which uses the same router, a hacker can use any packet sniffer and base decoder to read all sensitive data being transmitted from your computer. Cain and Abel is one such sniffer, but there are many more.
That’s one reason why I always encourage whenever possible. Most sites, like Facebook, give an option to use the https login, which encrypts your data. In such cases, even if the hacker uses to capture your data, decoding passwords will not be easy.
Brute forcing is another common method, but with technology advancement, most email and web login forms come with features that can handle such attacks.

How to protect yourself from hacking:

Install a good, licensed anti-virus . I suggest you go for Kaspersky. It’s the best anti-virus out there.

Always have your Windows Firewall turned on.

Encrypt your data.
Start using a Password manager and activate 2FA for all the services you use.
If you are paranoid just like me, start using hardware-based security such as Yubikey.

Never ever trust warez sites. There is a lot of flowing out there.

Never auto-play a flash drive. The malware automatically gets installed on your PC.

Don’t run attachments from emails unless you are certain about the source.

If you want to run .exe files safely, run them sandboxed. A free application
is available for this purpose.

If you feel you’re infected, format your PC/Mobile phone immediately. No anti-virus can remove a Trojan horse from your PC. It’s very difficult to remove a trojan from an infected PC.
Do a security audit every quarter or half yearly, depending on your need.

Source: Shoutmeloud.com