So much for surprises. Oppo has been trying to maintain an aura of mysteryaround the launch of the Find 7 on March 19th, but the design lovers at Red Dot have spoiled things by showing off the smartphone in their product gallery, nearly two weeks ahead of time. While we’ve had some idea of what the Find 7 will look like, it’s now clear that the 5.5-inch device will have a more upscale look than theFind 5 with a seamless front and a “breath light” at the bottom for notifications. What you don’t see, however, is that rumored 50-megapixel camera — the handset shown here comes with a relatively ordinary 13-megapixel shooter. Nokia isn’t likely in danger of losing its camera resolution supremacy, then. Even so, we doubt that many prospective Find 7 owners will complain given the Quad HD screen and other top-tier specs.
(CNN) — Police have arrested two people in connection with a cyber-attack that yielded personal details for 12 million customers of one of South Korea’s biggest phone companies.
One of the suspects, identified only by the surname Kim, used his own customized hacking program to break into the computer system used by KT Corp, Incheon Metropolitan Police Agency Commissioner Lee Sang-Won said in a statement obtained by CNN Thursday.
Kim, whom police said was 29 year old, accessed bank details, home addresses and employment information for three-quarters of KT’s 16 million registered users. This data was sold on to a 37-year-old man identified only as Park. The owner of a telemarketing business, Park used this information to sell cell phones posing as a KT representative, police said.
The two made 11.5 billion won (US$10.8 million) from the scheme, which dated back to February 2013, police added.
A third person initially implicated in the case was released.
The investigation is now expanding to other hacking activities and other cell phone sales stores.
KT said in a statement that it would actively cooperate with the police investigation to “minimize the damage to its customers,” and “figure out the route of information leakage.”
Credit card scam
In January this year, the personal data for 20 million South Korean credit card customers was stolen by a worker at the Korea Credit Bureau — a company that offers risk management and fraud detection services.
The worker, who had access to various databases at the firm, is alleged to have secretly copied data onto an external drive over the course of a year and a half.
Clients of three Korean companies — KB Kookmin Bank, Lotte Card and Nonghyup Bank — were hardest hit by the data theft.
Following this leak, financial regulators have been working to revise legislation to beef up the protection of personal information, the Yonhap news agency reported.
Those artificially inflated benchmark scores Samsung devices were getting last year? They’ve been patched. According to new tests run by Ars Technica, Samsung devices running Android 4.4 no longer boost CPU speeds during benchmark tests. In July, Exynos variants of the Galaxy S 4 and Note 3 were caught running their CPUs at an unsustainable max speed during benchmark programs, bolstering their total score by as much as 20 percent. Samsung suggested this was normal, claiming that varied processor frequencies were designed to provide an “optimal user experience.” The firm never clearly explained if the phenomenon was a feature, fault or foul play, but it’s over now: devices updated to the latest version of Android are apparently running clean.
Chinese cybercriminals are increasingly targeting mobile users via a vast underground network of tools and services, according to a new report.
Security firm Trend Micro outlines the popular methods used by Chinese gangs to make money from the mobile web.
It details how cheap some mobile malware kits can be – from as little as 100 yuan (£9.70).
Such underground forums are thriving worldwide, particularly in Russia, China and Brazil.
The Mobile Cybercriminal Underground Market report outlines some of the key businesses operating in this vast and sophisticated network.
It includes the selling of premium-rate phone numbers, which can be bought from 220,000 yuan (£21,400).
Such numbers are used in conjunction with malicious apps that reply to text messages and then delete confirmation messages so users end up paying vast sums to cybercriminals without realising.
Spam is big business in a country where 81% of Chinese internet users went online using their mobile phone in 2013.
At the end of 2013 there were 500 million mobile internet users in China, according the China Internet Network Information Center (CNNIC).
To launch spam campaigns, cybercriminals often use a GSM modem, a device attached via USB to a computer, which can send out text messages to multiple users.
A 16-slot GSM modem, are available for approximately $425 (£254) each, can send up to 9,600 text messages per hour.
This spam can be used to advertise various products as well as tricking users into visiting malicious websites.
The report also talks about SMS forwarders – which are Trojans designed to steal authentication or verification codes sent via text messages.
They monitor text messages sent from online payment service providers and banks and intercept authentication or verification codes which are then forwarded to cybercriminals.
Currently they only run on Android phones.
Apple users are also being targeted via iMessage spammers that are able to buy 1,000 spam services for as little as 100 yuan (£9.60).
Also operating on the mobile underground are app-rank boosting services, which can promote a malicious app by creating several dummy accounts to download and write good user reviews for it.
To boost an iPhone app into the top five of Apple’s China app store can cost 60,000 yuan (£5,800).
In Android third-party stores – where most Chinese Android users shop – cybercriminals pay according to the number of downloads they want, with prices starting at 40 yuan (£3.90) for 10,000 downloads.
The report concludes: “The barriers to launching cybercriminal operations are less in number than ever. Toolkits are becoming more available and cheaper; some are even offered free of charge.
“Cybercriminals are also making use of the ‘deep web’ to sell products and services outside the indexed or searchable world wide web, making their online shops harder for law enforcement to find and take down.”