Category: Mobile

  • How to locate your Android phone IMEI number

    How to locate your Android phone IMEI number

    You might have been wondering, what is IMEI number and what is it used for? Don’t worry, it will be explained here.

    About IMEI number.

    Every phone no matter how cheap or expensive it might be will have an International Mobile Equipment Identity (IMEI) number. The IMEI number is a 15-digit unique identifier that can help you find a lost or stolen phone.

    My Phone History

    Android is a touchscreen mobile operating system based on a modified version of the Linux kernel and other open-source software, built mainly for smartphones and tablets. Google commercially sponsors Android, which is created by a group of developers known as the Open Handset Alliance. And it has been around for nearly 15 years.

    Now, after having a brief understanding of your mobile phone, let’s proceed.

    Read Also : OnwardMobility discards the 5G BlackBerry project

    How can I locate my phone IMEI number?

    Perhaps If you ever misplace your phone or it got stolen, you’ll need to provide the IMEI number to law enforcement so they can track down your device. Companies use mobile device identification codes (IMEIs) to track down lost or stolen phones and prevent them from being used on their network by blacklisting IMEI numbers associated with those devices.

    Method 1

    1. On your Android phone, open the Settings app.
    2. Go to About Phone and tap it. In some android versions, you will find it at the top while for some, you will have to scroll down.

    3. The number can be found under IMEI if you scroll down.

    How to locate your Phone IMEI Number

     

    Note, if after looking around, you can’t still locate it, use the search option in the setting and search for IMEI

    Search for IMEI

    Read Also : Samsung Heavy Industries Has Appointed a New CEO for its Nigerian Subsidiary

    Method 2

    Another approach to get your IMEI is to dial USSD Code on your Phone app.

    1. On your Android phone, open the Phone app.
    2. Dial *#06# into the Dialer.
    3. And wait for the appearance of the dialog box.

    Get Your IMEI by dailing USSD Code on your Phone app

    Following the entry of this code, your IMEI number and other numbers will be displayed on the screen.

    You might need to write it down for reference purposes Since this method works on any Android device, it might be the simplest option.

  • Google Chrome Vulnerability

    Google Chrome Vulnerability

    Users of Google chrome have been urged to update their browser as unpatched weaknesses in the software is being exploited by hackers. These vulnerabilities can lead to data corruption and the execution of arbitrary code on vulnerable systems.

    Tracked as CVE-2022-0609 and rated high severity, the exploited vulnerability is described as a use-after-free vulnerability issue in the Animation component.

    This vulnerability was reported by Adam Weidemann and Clément Lecigne of Google’s Threat Analysis Group.

    Read Also: Kenya Launches Cybercrime Protection Game for Children

    On Monday, 14th February 2022, Google Chrome team released a report in which it announced the release of new updates to the Chrome browser. “The Stable channel has been updated to 98.0.4758.102 for Windows, Mac and Linux which will roll out over the coming days/weeks.” The recent update includes 11 security fixes.

    Google Nine other vulnerabilities rated “high” severity that has been patched in the latest Chrome release.

    2021 saw a total of 16 ‘zero-day’ listed below.

    CVE-2021-21148 – Feb. 4, a vulnerability in its V8 open-source web engine.
    CVE-2021-21166 – March 2, a flaw in the Audio component of Google Chrome.
    CVE-2021-21193 – March 12, a use-after-free flaw in Blink, the browser engine for Chrome that was developed as part of the Chromium project.
    CVE-2021-21220 – April 13, a remote-code execution issue.
    CVE-2021-21224 – April 20, an issue with type confusion in V8 in Google Chrome that could have allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.

    Read Also: Africa is set to take over the global videogame business

    CVE-2021-30551 – June 9, a type confusion bug within Google’s V8 open-source JavaScript and WebAssembly engine.
    CVE-2021-30554 – June 17, a use-after-free bug.
    CVE-2021-30563 – July 15, type confusion in V8.
    CVE-2021-30632 and CVE-2021-30633 – Sept. 13, an out-of-bounds write in V8 and a use-after-free bug in the IndexedDB API, respectively.
    CVE-2021-37973 – Sept. 24, a use-after-free flaw in Portals.
    CVE-2021-37976 and CVE-2021-37975 – Sept. 30, an information leak in core and a use-after-free bug in V8, respectively.
    CVE-2021-38000 and CVE-2021-38003 – Oct. 28, an issue with Insufficient validation of untrusted input in Intents in Google Chrome on Android, and an inappropriate implementation in V8 respectively.
    CVE-2021-4102 – Dec. 13, a use after free in V8.
    Two of these zero-day were deemed serious enough to warrant a $7,500 payout to the security researchers who found them.
    The CVE-2022-0609 is Chrome’s first zero-day in 2022 and Google Chrome users anticipate a permanent fix to bugs and vulnerabilities.

    Read Also: MTN Set To Employ 150 Digital Experts

    How To Know Which Version of Google Chrome I am  using

    Knowing and keeping your browser up-to-date is vital and one of the safest ways to keep your browsing and your device as safe as possible and knowing how to do this on chrome is easy. Just follow the steps below to know which version of chrome you are using and keep it up to date

    1. Open Google Chrome on your device ( PC or Mac )

    2. Click the three dots in the upper-right corner of the window.

    3. Hover your cursor over “Help.” ( as shown in the image below )

    4. Click “About Google Chrome”

    Doing the above will display the current version of your Google Chrome on the screen. Depending on your setting, your chrome browser update can be done automatically or at a prompt from time to time.

  • Libyan Team Were Impressive In Technology Competition

    Libyan Team Were Impressive In Technology Competition

    The Libyan Team (Binary Brains) has been awarded 3rd prize in Huawei’s first Tech4Good competition, according to the results of a popular online vote. This competition is a key part of Huawei’s flagship CSR program, Seeds for the Future 2021.

    Tech4Good Competition

    The Tech4Good Competition is a new project started in 2021 under Huawei’s flagship Seeds for the Future digital skill training program. Tech4Good asks students to identify a social issue and propose a technical solution for it based on the ICT skills they learn throughout the program. This competition is also designed to cultivate leadership and teamwork through practice and group competition.

    Seeds for the Future was launched in 2008 to develop skilled, local ICT talent and bridge communication gaps between countries and cultures. In it, young people from around the world study advanced ICT technologies and build real-world expertise and skills. The 2021 program had more than 3,500 participants from over 117 countries, bringing the total number of participants over the past 13 years to 120,000 students representing 139 countries and regions.

    Read Also: Ethiopia vows it won’t renege On Mobile Financial Services

    During her opening remarks at the award ceremony, Catherine Chen, Huawei’s Senior Vice President, Director of the Board, explained how this year’s program was a particular success, saying “The participation of Seeds for the Future program was record-breaking in 2021. Your feedback and love for this program have been truly heartwarming. Your generation’s passion and drive to learn never fail to impress me.”

    The first and second place was awarded to Thailand and Vietnam teams respectively, and Team Brazil Digital4People won the Audience Award with over 40,000 votes according to a popular online vote. There were a total of 79 submissions for the competition and more than 110,000 people participated in the final voting.

    The winners will have private consultation or coaching sessions with Huawei executives and managers, and be shortlisted to speak at international forums and other events.

    Read AlsoCCHUB Launches Africa’s First Design Lab in Kigali

    Chen also spoke at length during the event about the program’s aim to foster unity and cooperation in a contentious international environment along with other social goals. She said, “In this year’s Seeds for the Future program, more than half of the participants from over 20 countries are women. Tech has no gender. A diverse, inclusive, and innovative world needs the perspectives and strength of women. We look forward to seeing more women participate in science and technology in the coming years.”

    About Huawei

    Founded in 1987, Huawei is a leading global provider of information and communications technology (ICT) infrastructure and smart devices. We have more than 197,000 employees, and we operate in more than 170 countries and regions, serving more than three billion people around the world.

  • Apple empowers businesses with contactless payments through Tap to Pay feature on iPhone

    Apple empowers businesses with contactless payments through Tap to Pay feature on iPhone

    Apple continues to build its stand as the leading innovative mobile tech giant in the world after announcing its plan to introduce a new Tap to Pay feature on iPhone which allows businesses to receive payment seamlessly. The feature would allow compatible iPhones to accept payments via Apple Pay, contactless credit cards and debit cards, and other digital wallets. The interesting part is no additional hardware is required. Merchants get to enjoy this awesomeness with just a download of an app.

    Let’s take a deep dive into how the Tap to Pay works and the possibilities it unlocks for businesses.

    What is Tap to Pay on and how does it work on iPhone?

    In July 2020, Apple acquired payments startup Mobeewave, which created a system that lets shoppers tap a credit card or smartphone on another phone to process a payment. Tap to Pay is notable because, previously, businesses that accepted contactless payments on an iPhone needed to use additional third-party hardware such as the Square Reader dongle.

    As it seems, Apple acquisition of Mobeewave is the basis of this technology.

    The Tap to Pay feature essentially allows small businesses to large retailers to use mobile devices as a payment terminal — seamlessly and securely accept Apple Pay, contactless credit and debit cards, and other digital wallets through a simple tap to their iPhone (iPhone XS or newer) through supported iOS apps. For now, it’s limited to businesses and merchants in the US that wish to accept contactless payment.

    On purchasing an item from a store, a merchant will ask you to hold your own iPhone or Apple Watch, contactless credit or debit card, or another digital wallet near the merchant’s iPhone, and then the payment will be securely completed using NFC technology.

    Now businesses are being empowered and all merchants will need in the future is their compatible iPhones in order to accept and process payments, says Apple.

    Businesses that support Tap to Pay on iPhone

    Stripe has announced it’ll be the first payment platform to offer “Tap to Pay on iPhone” to their business customers, including the Shopify Point of Sale app, in spring 2022. Additional payment platforms and apps will follow later this year. Apple Stores in the US will also roll out the feature sometime in 2022, says Apple.

    Jennifer Bailey, Vice President of Apple Pay and Apple Wallet pointed out that — “In collaboration with payment platforms, app developers, and payment networks, we’re making it easier than ever for businesses of all sizes — from solopreneurs to large retailers — to seamlessly accept contactless payments and continue to grow their business.”

    Read Also: IOS or ANDROID Which is Safer from Cyber Attack?

    “As more and more consumers are tapping to pay with digital wallets and credit cards, Tap to Pay on iPhone will provide businesses with a secure, private, and easy way to accept contactless payments and unlock new checkout experiences using the power, security, and convenience of iPhone.” She noted.

    When will the Tap to Pay feature be available and which iPhone model supports it?

    The feature will launch in the US later in 2022. It appears to be exclusive to the US at launch, with no other countries announced yet. Hopefully, as the Tap to Pay feature becomes widely accepted in the US, other countries including Africa.

    Although Tap to Pay isn’t ready for you to use yet – the supporting API is available in the iOS 15.4 beta 2 potentially enabling the feature on iPhone XS and later models.

    There are older iPhones with NFC – but, for now, the iPhone 6, 7, and 8 models are not on the compatible list.

    Tap to Pay on iPhone will also roll out to Apple Store locations in the US later this year according to Apple.

  • IOS or ANDROID Which is Safer from Cyber Attack?

    IOS or ANDROID Which is Safer from Cyber Attack?

    The fear that you would wake up one day and your phone would no longer be yours to control is a valid fear especially with how hackers so easily take over social media accounts even though these companies are constantly upgrading their security systems.

    Experts have said that security systems on computers are better than security systems on mobile phones because cyber security awareness level is very high with computer corporations.

    One of the world’s leading cyber security experts Gil Shwed, founder of Check Points, in an interview with Forbes, expressed concern over the threat of a cyber pandemic. He warned that the need for cybersecurity “is now bigger than ever,’ “Before, security people were saying, ‘you can’t come in because it’s unsafe.’ Today, we’re all forced to say everything is open because that’s the only way we can work. So I think that the task that we have for next year, and then beyond that, is not to close these doors, but to secure them.”

    Android and iOS are two major operating systems (OS) in mobile phones, tablets.
    Apple was founded by Steve Jobs and Steve Wozniak in 1976 while Android was developed by Andy Rubin in 2008.

    Android Security Features

    App sandbox
    Android assigns a unique user ID (UID) to each Android app and runs it in its own process. Android uses this UID to set up a kernel-level App Sandbox.

    App signing
    App signing allows developers to identify the author of the app and to update their app without creating complicated interfaces and permissions. Every app that runs on the Android platform must be signed by the developer.

    Authentication
    Android uses the concept of user-authentication-gated cryptographic keys that requires cryptographic key storage and service provider and user authenticators.

    On devices with a fingerprint sensor, users can enroll one or more fingerprints and use those fingerprints to unlock the device and perform other tasks. The Gatekeeper subsystem performs device pattern/password authentication in a Trusted Execution Environment (TEE).

    Read Also : Cyberattacks Ravages European Oil Companies

    Biometrics
    Android 9 and higher includes a BiometricPrompt API that app developers can use to integrate biometric authentication into their apps in a device- and modality-agnostic fashion. Only strong biometrics can integrate with BiometricPrompt.

    Encryption
    Once a device is encrypted, all user-created data is automatically encrypted before committing it to disk and all reads automatically decrypt data before returning it to the calling process. Encryption ensures that even if an unauthorized party tries to access the data, they won’t be able to read it.

    Keystore
    Android offers a hardware-backed Keystore that provides key generation, import and export of asymmetric keys, import of raw symmetric keys, asymmetric encryption and decryption with appropriate padding modes, and more.

    Security-Enhanced Linux
    As part of the Android security model, Android uses Security-Enhanced Linux (SELinux) to enforce mandatory access control (MAC) over all processes, even processes running with root/superuser privileges (Linux capabilities).

    Trusty Trusted Execution Environment (TEE)
    Trusty is a secure Operating System (OS) that provides a Trusted Execution Environment (TEE) for Android. The Trusty OS runs on the same processor as the Android OS, but Trusty is isolated from the rest of the system by both hardware and software.

    Verified Boot
    Verified Boot strives to ensure all executed code comes from a trusted source (usually device OEMs), rather than from an attacker or corruption. It establishes a full chain of trust, starting from a hardware-protected root of trust to the bootloader, to the boot partition and other verified partitions.

    IOS Security Features

    Passcode
    Setting a passcode to unlock iPhone is the most important thing you can do to safeguard it.

    Face ID or Touch ID
    Face ID or Touch ID provides a secure and convenient way to unlock an iPhone, authorize purchases and payments, and sign in to many third-party apps.

    Find My iPhone
    Find My helps to find an iPhone if it is lost or stolen and prevents anyone else from activating or using the iPhone.

    Apple ID
    Apple ID provides access to data in iCloud and a user’s account information for services like the App Store and Apple Music.

    Two-factor authentication
    To help users set up accounts, many apps and websites offer Sign in with Apple. Sign in with Apple limits the information shared about the user, it conveniently uses their Apple ID, and it provides the security of two-factor authentication.

    Read Also : The Race To Conquer Space in Africa

    For sites and apps that offer two-factor authentication, IOS users can get automatically generated verification codes on their iPhones without relying on SMS messages or additional apps to provide the codes.

    App tracking
    All apps must receive IOS users’ permission before tracking them across apps and websites owned by other companies to target advertising to them or share their information with a data broker.

    ICloud Private Relay
    When iCloud Private Relay is turned on, the traffic leaving IOS is encrypted and sent through two separate internet relays. This prevents websites from seeing IOS user’s IP addresses and location and network providers from collecting their browsing activity.

    Vulnerabilities.
    The world of technology understands that the mobile security situation is a disaster. From banking trojans to mobile remote access trojans, deployed by both nation-state threat actors and criminal enterprises, arms-length espionage by state intel agencies on overseas targets. Our social engineering creates these threats.

    Read Also : Technologies that powers Football

    There have been more mobile vulnerabilities targeting and exploiting Android devices than iPhones in the last year even though iPhones are not more secure.

    Similarity and Difference between IOS and Android Security.

    If you use an android, there’s loads of security companies who could help secure your phone while Apple, on the other hand, sees to the cybersecurity of your device. Apple regulates what’s on the IOS platform securing it from the back end.
    The versatility of Android creates a huge space for errors and shortcomings due to improperly configured hardware while Apple’s exclusive source code access eliminates errors.

    Conclusion

    Neither IOS nor Android is free from malware attacks, malicious data breaches, weak security features, and cyber scams.

    There is a need for cybersecurity awakening because even though both IOS and Android have come a long way with software and hardware development, they can do more to ensure that users enjoy secure experiences.

  • 5G Network In Africa

    5G Network In Africa

    Buried deep in every individual is the fear of being left behind by society. We see this in the way people run after trends. People keep running to meet up societal standards of perfection in various aspects of life. This constant need to improve and do more has moved us from the 2nd, 3rd, and 4th generations of technology to the computer age that is now called, 5G. Calendar

    What is 5G Technology

    5G network is based on parallel processing hardware and AI (Artificial Intelligence) software. All the high-level languages like C and C++, Java, .Net etc., are used in this generation. 5G wireless technology is meant to deliver higher multi-Gbps(gigabytes per second) peak data speed, ultra-low latency, more reliability, massive network capacity, increased availability, and a more uniform user experience.

    It was gathered in a study conducted by Viavi Solutions in February of 2021 that the 5G network is no longer a myth as many countries have already gone past the testing phase and that the 5th generation of computers is forcefully advancing.

    Commercial 5G is now available in 1.336 cities in 61 countries across the world, equal to an increase of 350% on 2020 data, which listed just 376 cities possessing this technology. The growth of 5G has reached 30% of the world population with China, America, Asia, Europe, and Africa as groundbreakers in this astonishing age of fifth-generation technology.

    List of African countries with 5G network

    According to GSMA (Global System for Mobile Communications- an organization representing mobile network operators worldwide), Safaricom launched 5G network in Kenya in February 2021. This makes Kenya the second country in Africa to launch 5G after South Africa’s 5G roll out in 2020.

    In South Africa, Vodacom launched its commercial 5G network in Johannesburg, Cape Town, and Pretoria in May 2020. In June 2020, MTN launched the 5G technology in 100 sites across
    Johannesburg, Cape Town, Bloemfontein, and Port Elizabeth.

    5G Network in Nigeria

    5G Network in Nigeria
    In Nigeria, NCC (Nigeria communication commission) surpassed the price it sold GSM licenses over 20 years ago in the auction of its 2 available lots of 100 MHz TDD slots of 3.5GHz band ranging from 3500-3600 MHz and 3700-3800 MHz.

    The bid for 3.5GHz license spectrum at Transcorp Hilton where Professor Danbata, the vice-chairman of NCC announced that after 11 rounds of bidding which lasted for 8 hours, Mafab Communications Ltd and MTN Nigeria Plc, emerged the two successful winners of the 3.5 gigahertz (GHz) spectrum auction for the deployment of Fifth Generation (5G) technology to support the delivery of Ubiquitous broadband services in Nigeria.

    The winners of the auction of the 3.5 GHz license spectrum MTN Nigeria and MAFAB Communications Ltd, would pay the sum of $273.6 million as full payment of the license fee before February 24, 2022, and roll out 5G network across Nigeria.

    In this fifth generation, VLSI (Very large scale Integration) technology has become ULSI (Ultra Large Scale Integration) technology, resulting in the production of microprocessor chips having ten million electronic components.

    In Conclusion

    There are several technology corporations like Qualcomm, (a multinational technology corporation that has over the years, spearheaded ground-breaking research especially in Al (Artificial Intelligence), wireless technology and mobile communication standards) who, building on their 3G and 4G technology leadership, continue to spearhead research for the 5G evolution.

    Their efforts are leading to the invention of technologies that will unlock the full potential of 5G and enable an even more intelligently connected future for humanity.