YouMobile on Facebook YouMobile on Google+ Follow YouMobile on Twitter
Latest News - / Smartphones - Posts


While Samsung had hoped to bring the world's first under-the-glass fingerprint scanner with the Galaxy S8, that plan didn't work out as the technology just wasn't ready in time. As a result, the Galaxy S8 ended up with the world's weirdest fingerprint scanner ever! Nevertheless, Samsung tried to incorporate it once again with the upcoming Note 8 and this time by working with a different company. However, reports are indicating that it didn't work out either and the Note 8 will sport a rear mounted fingerprint scanner, but in the middle thankfully! As it turns out, Apple themselves were not finding it easy to incorporate the next-gen fingerprint scanners either and rumor has it that there's no guarantee as to how the iPhone 8 OLED will be sporting its fingerprint scanner when it comes out later in the year.


Strangely enough, it's the Chinese manufacturer Vivo who is reportedly ahead of both the big guns and has already implemented the technology in one of their upcoming smartphones, which they are going to unveil in this very month (June 28) at the MWC Shanghai. I am really looking forward to this one, what about you?


Saikat Kar (tech-enthusiast)



We knew that the phone was coming but now it's finally here. Yes, we are talking about the much speculated Essential phone by Andy Rubin. In case you don't know yet, let us tell you that Andy Rubin is the original CEO and the main man behind the Android OS from days when Google didn't even own Android. Essential is his own start-up company and aka the Essential phone. Now that we have cleared that up, it's time to take a look and see what makes this phone special.


Top of the Line Specs


The phone truly doesn't hold back on any specs at all. Take a look at them below to see what we are talking about here.


Ceramic-glass build with Gorilla Glass 5 in front
5.7-inch LTPS bezel-less display with a resolution of 2560x1312 and an aspect ratio of 19:10
Qualcomm Snapdragon 835
4GB RAM and 128GB internal storage
Bluetooth 5.0
Dual 13-megapixel rear cameras with a telephoto lens, Laser and Phase Detection Autofocus, dual LED flash and 4K recording
8-mp front camera with 4K recording
Unique Digital assistant
3,040mAh battery with fast charging
Price: $699


Modular Design


Essential has taken on modularity; something in which both LG and Google has failed previously. However, it has taken the Lenovo route in doing so by opting for a magnetic connector at its back to allow for accessories; much in the same way the Moto Z does it. At this time, there are only two accessories available; a 360-degree camera ($199) and a charging dock.


We cannot help but see a striking similarity between the Essential phone and the Xiaomi Mi Mix! What do you think?


Saikat Kar (tech-enthusiast)



I know it sounds ridiculous but it's true! Thanks to Android Authority, we have found something for you today that's so different from every other smartphone out there that it's definitely worth a look.


There are two things that you need to understand about the Banana Phone.


• It's not an actual banana (which I am sure you had guessed)


• It's not exactly a standalone device


The Banana Phone is more of a Bluetooth communicator than a phone as it does require an actual smartphone to connect to, before voice communication is possible. It has a volume up, a volume down and even a Home button on it. With a battery life of roughly 10 hours (talk time) and a voice assistant that lets you make call from your banana, it might just be worth checking out at $40.


If you want one, the only problem is that you may have to wait till September. It's a crowd fund project by the way and will only go into production if they manage to reach their goal. In case you are wondering why you want to buy it, in spite of not being able to think of any logical use for it, join the club!


Saikat Kar (tech-enthusiast)



Next time you pick up your phone, you could also be picking up cash.


As mobile devices become increasingly "smarter," it is harder than ever for users to put down their phones. In 2016, Ofcom reported that nearly two thirds of UK's population now own a smartphone. The study showed that this group spends nearly two hours every day using their mobile devices to browse the internet, shop online or post on social media. If you are one of these frequent mobile users, then it's time you started earning extra money online. After all, your time is valuable too.


Making money right from your mobile device has never been easier. While there are virtually unlimited options, these four ways may be the quickest.


Download Apps That Pay


There are numerous apps that will pay you for your time. This may sound too good to be true, but it is incredibly simple as long as you have the free time.


Some apps, like Shopkick or Easy Shift, let you earn money by visiting stores you already shop at anyway. Scan barcodes and check prices to help businesses check their retail products. Companies will even pay you for putting their advertisements on your phone's lock screen.


If you want to get out and be more active, Gigwalk posts tasks related to verifying the name or location of street signs, roads or landmarks. GymPact will pay you to work out and then charge you for missed days, helping hold you accountable for your exercise routine.


Each app offers a different pay scale. Research which earning rate and activity level is right for you.


Play Online Games for Money


Online gaming isn't just sitting in front of your computer. There are websites that offer the chance to earn real money simply by playing.


Fantasy sports websites have become increasingly popular because of their strategy-based game play and immediate results. Learning the details of how to play these games successfully, however, can be overwhelming. You have to have a strong knowledge base in these various sports in order to be profitable.


If you are looking for something equally fun and easier to play, try online gambling websites. Live casino and betting websites feature classic card and table games that anyone can jump right in and play. Try your luck spinning the Roulette wheel or double down with a hand of Blackjack.


These games are such a great way to put a little extra cash in your wallet because you get to play while also making money.


Sell Your Stuff Online


Using your smartphone can turn cleaning out your closet into quick cash.


By posting unwanted or unused items on eBay, you can check two different items on your to-do list; you can make money and get rid of clutter.
If you like crafts, Etsy is another great resource that can match your talents with a potential buyer. Create hand-made products, post them to your portal and sell them immediately.


Although both of these give you huge ability to make money, there are some barriers to instant success. In order to actually sell goods on these websites, you must have a product that is in demand and that someone is willing to buy. Selling on these platforms require skill and patience. Both of these problems can be solved with research and studying effective selling strategies. And, even though these companies will take a small fee, it is still cheaper than starting and promoting your own business website.


Offer Freelance Work


You may not have a product to sell, but you might have a skill.


Whether it is writing, drawing, editing or just offering advice, there is growing market for services online. Known as the "gig" economy, you can sell a variety of specialty services through companies, such as Fiverr. Since you are paid by the project and your starting pay may be small, you may have to build a client base and generate positive reviews before you can really begin to earn.


If you are into photography, you could sell you work to a large, resource website, like Shutterstock. Because this doesn't require much effort to do, many people take advantage of this opportunity. You may have to be persistent and creative to get your items sold.



These days, it isn't rare to take our mobile devices with us everywhere. Mobile phones and tablets have expanded their abilities at incredible rates. Now, the power under our fingertips is vaster than the technology that sent the Apollo missions to the moon. That is an incredible leap forward that, along with the Internet's global community has completely changed the way that humans interact and live.


The digital age has made people available 24/7, no matter where they are. People can communicate using cutting edge chat-apps that even 15 years ago would have required a powerful desktop PC (remember AOL?). Now, we can chat to someone in Indonesia from Seattle at the drop of the hat - and then be chatting to someone in Ukraine moments later - all while waiting for a train (thanks to 3G or public WiFi).


Digital Drawbacks & Technological Threats


Sadly, along with the ability and will to be connected, also comes some very serious drawbacks. Modern problems. Digital threats that in some ways make people more vulnerable than ever before in history. Being connected leaves a trail and these digital footprints code for who we are like digital DNA. The data we create is highly personal and for that reason that data is incredibly valuable and people must seek to protect it.


What we actually find is a decrease in the level of scrutiny we apply to our online presence. Facebook, Twitter, Instagram, Pinterest and the plethora of other social media platforms are all there for us to use, but that comes at a cost. We share our intimate moments. We share where we are, when we're away from home, when we're going on holiday, and often leave very easy breadcrumbs on exactly what we're doing, and when we're out, and where to find us. We share details that we wouldn't share with friends or family face to face, but saving them in a public forum is acceptable for millions of us. These posts, and images stay there forever. We think so little of our own private information that we give away lots of our information for free, without even thinking about it.


The inter-connectivity of devices also throws up additional concerns. We login to everything, on everything. Our phones have Facebook, our Facebook is used as a logon tool for many other services. We input our date of birth to gain access, our e-mails, our interests, likes, hobbies, names, friends, and more at an increasing rate. Our entire lives are online somewhere. Where people feel more at home with their mobile devices, we also login to our banks, and provide our financial information. The level of trust that we put into our devices, and the amount of digital data that we're inputting to those devices is increasing, drastically.


Governments, Internet Service Providers, advertisers, corporations, organizations, hackers, and cybercriminals, all want a piece of that pie. The technology has crept up on us quickly and only more recently have people come to accept that data should be considered a form of currency.


Whether it be to protect data from cybercriminals - or the government - the only way to be truly secure is for people to take control of their own digital footprints. Due to the value of personal data, everyone should make efforts to protect it. The sad truth is, that because that data is so valuable everyone is trying to get at it, but fewer are trying to protect it.


Personal cybersecurity


The first thing that people must realize is that mobile devices are just as vulnerable, if not more so, than PCs. In addition, the gap between Apple and Android has closed and now it is common to find malware for both. In fact, in some ways the Open Source nature of Android (as opposed to Apple's proprietary closed source environment) is allowing for encryption apps to pop up at a faster rate: things change.


These days, malware, viruses, spyware, and trojans all offer hackers methods for intercepting data - and their availability online to ‘script kiddies' means that cybercrime is at epidemic levels. The result is an elevated risk of fraud, loss of earnings - and perhaps worst of all - identity theft. For these reason, people need to take personal cybersecurity seriously and must seek to protect themselves and their devices. The most basic step is to make sure that the apps we install on our devices are secure, and that we always update them with the latest security patches and updates.


Third party and untrusted apps might be tempting, but the reality is that they could be malevolent. For this reason, people should to stick to trusted apps from known vendors and app stores. Even on official distributors such as Google Play Store it is possible to come across malicious apps.


For this reason people should take extreme care when downloading apps. Before you agree to install the app, check the permissions carefully. If the app wants access to things it doesn't really need then think twice before installing it. Why does a torch app want access to your GPS location and all of your contacts? If the requests don't seem reasonable simply don't download the app.


Remember that data is a currency, so if an app says it is ‘free' maybe you are actually paying with your data? In some cases, it might be worth paying a pound for a torch app that only requires access to the light on your phone, than to accept the free one that wants access to your entire device.


The Big Public WiFi Threat


Alongside smart devices, which allow us to be connected non-stop, in recent years there has been an explosion in the availability of public internet hotspots. Those hotspots provide high speed connectivity when people are out and about. The advantage of logging onto public connections is that people get to save their mobile data (if they have data limits).


What many people might not realize, however, is that public WiFi can be a security risk. When connected to public networks people's devices are vulnerable to having their data intercepted by another user that is logged onto the same router. This problem is the same on any WiFi - including shared home networks - so if you live in a big house where a lot of people regularly take the password from the router - you could also be at risk. The best solution for the problem is a VPN service.


A VPN service encrypts all the data between a phone, or tablet, and the VPN's servers. The result is that nobody on a public WiFi (or even on a fake hotspot controlled by a cybercriminal) can ‘sniff' the subscriber's data, as that data is encrypted.


The best VPNs provide strong military grade OpenVPN encryption, but many don't. With different levels of protection, and different services providing different benefits (and disadvantages), what you're specifically looking for can change the VPN service that you are looking for. Do you want faster speed, but are willing to accept a smaller number of geo locations, or do you need security at all costs, including speed and price? As such, it's important to do research about which VPN to use.


Other Levels of Protection


McAfee, Norton, AVG. At the launch of the internet, it's rare that individuals would have been desperate for anti-virus. There simply weren't as much malicious code flying around, but now, with an always-on internet antivirus is no longer seen as that "additional level of security that might sometimes help", or for those who delve more often into virus rife areas of the net. Now, things are different. It's rare for new computers, and new operating systems to not include some form of anti-virus, even for a month's trial while you set your computer up ensuring that you're not infected at this vital stage of life of your computer.


Not only is antivirus an integral part of your computer system, but firewalls are also included in the same package to help keep your computer safe. The problem arises that we're using our PCs, and our Laptops less and less, and using our mobile phones, and tablets more and more. There's a huge disconnect between the level of security on our larger devices, and our mobile phones, but we're still storing our intimate data on unprotected devices.


This could be a bit more understandable if protective services weren't easily available for mobile devices. Antivirus, firewalls, and password protection are just as available for devices, and the larger firms often provide multi-device deals, permitting several devices to be covered by the same services.


As well as more digital based protection, there's a large amount of physical ways to protect the data on our phones as well. Phone manufacturers are constantly in an evolutionary arms race with chancers who find new back-door entrances into devices. This has led to an increase in the amount of protection required to unlock a phone. Rather than just a pin, we now have patterns, passwords, swipe to unlock, fingerprint scans, google sign-ins. These simple methods help to keep that data secure from prying hands.


Our data, and our lives are much more mobile than they were before. Keeping up with that level of change is not only important: it's imperative.

Results per page:
<< 1 ... 4 5 6 7 8 >>
Description

youmobileorg
Posts: 4453





© 2018 YouMobile Inc. All rights reserved