Skip to main content

Posts

Showing posts with the label 2023 at 11:19PM

Hackers Exploit WebAPK to Deceive Android Users into Installing Malicious Apps.

#iip_updates . #Information_is_Power . Read more here https://informationispowah.blogspot.com/2023/07/hackers-exploit-webapk-to-deceive.html in the link. Threat actors are taking advantage of Android’s  WebAPK technology  to trick unsuspecting users into installing malicious web apps on Android phones that are designed to capture sensitive personal information. “The attack began with victims receiving SMS messages suggesting the need to update a mobile banking application,” researchers from CSIRT KNF said in an analysis released last week. “The link contained in the message led to a site that used WebAPK technology to install a malicious application on the victim’s device.” The application impersonates PKO Bank Polski, a multinational banking and financial services company headquartered in Warsaw. Details of the campaign were  first shared  by Polish cybersecurity firm RIFFSEC. WebAPK allows users to install progressive web apps (PWAs) to their home screen on Android devices witho

Patient Attendants in Tara Subjected to Peel Cassavas Before Discharge from the Health Centre.

#iip_updates . #Information_is_Power . Read more here https://informationispowah.blogspot.com/2023/07/patient-attendants-in-tara-subjected-to.html in the link. #we_inform_the_uninformed . : Some of the patient attendants peeling cassavas under a mango tree at Tara health centre III in Maracha District. Photo by  Information is Power. Some patient attendants in Tara health centre III in Tara sub-county,  Maracha east constituency in Maracha district have decried what is termed as indirect mistreatment of health service seekers by the health service providers in that facility before they are finally discharged. Mrs Angudeyo Lillian who escorted a pregnant woman to deliver at the health facility said, some health workers are hostile towards patients and patient attendants. She narrated that, each and every care taker (patient attendant) who escorts patients, especially pregnant women to deliver at Tara health centre are first subjected to compulsory peeling of Cassavas before they ar

Apple and Google Join Forces to Stop Unauthorized Location-Tracking Devices.

#iip_updates . #Information_is_Power . #we_inform_the_uninformed . Click here https://informationispowah.blogspot.com/2023/05/apple-and-google-join-forces-to-stop.html to read more. Apple and Google have teamed up to work on a draft industry-wide  that’s designed to tackle safety risks and alert users when they are being tracked without their knowledge or permission using devices like AirTags. “The first-of-its-kind specification will allow Bluetooth location-tracking devices to be compatible with unauthorized tracking detection and alerts across Android and iOS platforms,” the companies said in a joint statement. While these trackers are primarily designed to keep tabs on personal belongings like keys, wallets, luggage, and other items, such devices have also been abused by bad actors for criminal or nefarious purposes, including instances of stalking, harassment and theft. The goal is to standardize the alerting mechanisms and minimize opportunities for misuse across Bluetoo

Apple and Google Join Forces to Stop Unauthorized Location-Tracking Devices.

#iip_updates . #Information_is_Power . #we_inform_the_uninformed . Click here https://informationispowah.blogspot.com/2023/05/apple-and-google-join-forces-to-stop.html to read more. Apple and Google have teamed up to work on a draft industry-wide  that’s designed to tackle safety risks and alert users when they are being tracked without their knowledge or permission using devices like AirTags. “The first-of-its-kind specification will allow Bluetooth location-tracking devices to be compatible with unauthorized tracking detection and alerts across Android and iOS platforms,” the companies said in a joint statement. While these trackers are primarily designed to keep tabs on personal belongings like keys, wallets, luggage, and other items, such devices have also been abused by bad actors for criminal or nefarious purposes, including instances of stalking, harassment and theft. The goal is to standardize the alerting mechanisms and minimize opportunities for misuse across Bluetoo