Saturday, 4 June 2011

Latest Nokia Dual SIM Mobile Phones : X1-01 and C2-00




Nokia's biggest strength has been its basic model phones which have achieved great sales volumes mainly in India. With Nokia revealing about the New Dual SIM Music Phone, Nokia X1-01, the expectation has increased to a new height and along with it the Nokia C2-00 will also be flooding the markets. Here is a brief preview of what you can expect from the Dual SIM mobile phones.
Nokia C2-00 design and display:

The design of Nokia C2-00 is pretty good and and is to an extent similar to that of the other basic multimedia Mobiles from Nokia. The display of the mobile features the necessary options to display the signals of both the sim cards. The display of the Nokia C2-00 features a TFT 65K colors and the size of the mobile is 128 x 160 pixels, 1.8 inches.

Nokia C2-00 Camera:
The Nokia C2-00 sports a VGA, 640x480 pixels. The mobile does not feature a video recording and a secondary camera. As the mobile is a basic one, there is nothing much to rinse about the mobile.

Nokia C2-00 multimedia features:
The mobile can play audio formats such as MP3/WAV/AAC+ . There is nothing much worth mentioning about the mobile. The Nokia C2-00 also features a Stereo FM radio with FM recording

Nokia C2-00 connectivity:
The connectivity feature of the mobile does features GPRS and Bluetooth. The GPRS runs on Class 12 (4+1/3+2/2+3/1+4 slots), 32 - 48 kbps.

Nokia C2-00 memory and messaging:

The messaging feature of Nokia C2-00 supports SMS, MMS, Email, IM and Nokia C2-00 has no internal memory and the external memory of the mobile can be extended up to 32 GB using microSD card.

Other features of the mobile:
Dual SIM (dual standby)
Hot swappable external SIM slot (second SIM)
MP3/WAV/AAC+ player
Organizer
Voice memo
Predictive text input

Nokia unveils new dual-SIM phones



Nokia unveiled two new dual-SIM phones at an event called "Twins Day Out" here. While Nokia C2-00 is targeted at customers who want to access internet on the move, Nokia X1-01 is a music phone. Nokia had brought together 60 twins for the event and held a parade before showing its new handsets.

Dual-SIM phones are very popular in India at the entry-level and many industry insiders believe that it is Nokia's inability to come with such devices earlier that has hit the company hard.

It had brought one dual-SIM phone to Indian market last year. But by that time companies like Micromax and Spice had already established themselves in the market of dual-SIM phones.

"Nokia believes in being closer to the consumers and we want to develop products that meet the Indian consumer's changing needs and aspirations. We are sure Nokia C2-00 and Nokia X1-01 will set new benchmarks in the mobile internet and music space in the entry-level dual-SIM category," said Vipul Sabharwal, sales director at Nokia India.

Nokia claims C2-00 is the first dual-SIM phone to have 'easy swap', which offers consumers the convenience of changing SIM cards without the need to turn off the phone or remove the battery. The phone also remembers the settings for up to five separate SIM cards. Nokia said C2-00 will be available for around Rs 3,000.

Nokia X1-01, meanwhile, comes with a 'jumbo' battery that delivers up to 36 hours of continued music playback. It has in-built speakers and supports a memory card up to 16GB. This phone will be sold for around Rs 2,000.

Wednesday, 1 June 2011

30,000 to 120,000 Android Users Affected by New Variant of Droid Dream Malware





Between 30,000 and 120,000 users of Android devices are believed to have been affected by new mobile malware which has its roots in an earlier scourge known as Droid Dream. This variant, called Droid Dream Light, appears to have been created by the same developers whose malware had infected over 50 applications back in March. According to Lookout Security, the new malware was found in over 25 mobile applications, all of which Google has since removed from the Android Market.

Droid Dream "Light"

Droid Dream Light is a stripped down version of the original DroidDream, says Lookout. Its malicious components are invoked upon the receipt of a "android.intent.action.PHONE_STATE intent" - for example, an incoming phone call. That means that this variant is not dependent on the manual launch of the malicious application in order to trigger it into action. Instead, explains Lookout via blog post:

The broadcast receiver immediately launches the .lightdd.CoreService which contacts remote servers and supplies the IMEI, IMSI, Model, SDK Version and information about installed packages. It appears that the DDLight is also capable of downloading and prompting installation of new packages, though unlike its predecessors it is not capable of doing so without user intervention.

In other words, despite the malware's designation of "Light," in some ways it's actually more malicious as it requires no user actions to take place in order for it to launch.

Lookout says it identified the malware thanks to a tip from a developer who notified them that modified versions of his app and another developer’s app were being distributed in the Android Market. The Lookout team then confirmed that there was malicious code in these apps and identified those as containing much of the same code as earlier DroidDream samples. Four different developer accounts were used to distribute the malware. The following apps were infected:

Magic Photo Studio

* Sexy Girls: Hot Japanese
* Sexy Legs
* HOT Girls 4
* Beauty Breasts
* Sex Sound
* Sex Sound: Japanese
* HOT Girls 1
* HOT Girls 3
* HOT Girls 2

Mango Studio

* Floating Image Free
* System Monitor
* Super StopWatch and Timer
* System Info Manager

E.T. Tean

* Call End Vibrate

BeeGoo

* Quick Photo Grid
* Delete Contacts
* Quick Uninstaller
* Contact Master
* Brightness Settings
* Volume Manager
* Super Photo Enhance
* Super Color Flashlight
* Paint Master

Lookout reminds users that to stay safe, they should install from trusted sources, check the developer name and reviews, check for the permissions the app is requesting, be aware of any unusual behavior on their phone and, of course, use a mobile security app like the one from Lookout.

Unfortunately, that last requirement is becoming all too much of a necessity on Android devices these days, especially since much of the malware mimics the naming formats, descriptions and even the code of other popular titles. Not only is this bad for the end user, it's bad for developers, whose apps' names are ripped off and used to distribute malware.