Add MobilityArena as a preferred source on Google
Google is currently letting Beta Testers test out a new Nearby Sharing feature. This feature has some sort of similarity to Apple’s Airdrop and is currently rolling out to certain Google Play Beta testers. These testers will now have an option to share files “Nearby” in the Android share menu.
When enabled, this feature will allow users see Nearby devices (a bit like Bluetooth) and you can then select the visibility levels to your contacts or just toggle this feature off if you do not want it turned on.

If you have the “Nearby Sharing” feature turned on, you should be able to see when someone is trying to share something nearby, even if you may not appear on the sender’s device. You can click on notifications to become visible to other devices to receive files. This feature works for files like videos, photos and other content like URLs or tweets.
Google has confirmed that it intends to bring this feature to all devices from Android 6 (marshmallow) and up. Although this feature is still only in limited Beta testing, it would be great to see it finally released to end-users as a quicker and more effective means of transferring files and other shareable information among Android devices.
References
- Source ;
- Source .
Author:Alfa Baye
Staff Writer
Add MobilityArena as a preferred source on Google
Google has removed 25 apps from its Play Store that have been stealing Facebook credentials. This comes with the tech company taking steps to improve user protection and security on a number of its apps. French cyber-security company Evina stated that these malicious apps had over 2.5 million downloads.
The apps offered a variety of functions for users but used the same method for extracting data from users. A number of these apps had been available on Play Store for almost two years before Google finally took them down.

According to Evina, once the malicious app was launched on the victim’s device, the app will detect what application is currently running and the other apps in the user’s foreground. If the app is a Facebook application, the malware will launch a browser that loads Facebook at the same time, this browser is seen in the foreground, making you believe that the Facebook application launched it.
The moment the user inputs their Facebook login details into the phishing page, the malicious app then sends the user’s credentials to a remote server. This could let hackers and other individuals access all data stored in the Facebook account.
Most of these apps offered new wallpapers, with a number of others providing video editing tools. It is still unclear how exactly some of these apps were able to evade detection by Google Play Store Protection service this long but it is a relief that they are finally off the platform.
References
- Source ;
- Source ;
- Source .
Author:Alfa Baye
Staff Writer