Posts

Showing posts from July, 2020

Does Having Multiple cameras produces a Good image Quality?

Image
      We are in this Digital era where every person having a smartphone is a journalist and thanks to the advancement of technology and most of us give preference to Cameras, as many of there profession or passion depends on a Good image or video Quality of a Mobile.                As many of us cannot buy High-quality DSLR cameras for Photography we go for Smartphones Which are pocket friendly and has good image optimization. These cameras are good enough for upcoming You tubers and there are some short filmmakers who have made movies using these mobile cameras.     You all know that most of our Phones and upcoming smartphones are packed with multiple cameras having dual cameras, multiple cameras, quad cameras by adding multiple lenses to their phones like a telephoto lens, macro lens, ultra-wide lens, and a depth sensor.      There were smartphones whose camera quality was even better befo...

Can Your Phone be Hacked by a Charger?

Image
    In today's generation of smartphones, the battery cell of a phone is increased and the battery life of the phone is reduced. The maximum stand by time of a battery could be 8-12 hrs. This isn't sufficient for daily usage and we need to juice up our device and juicing up our device in our home or office is not a big task for us but while we are traveling we look for a charging port to juice up our device and most of the time we use public charging ports to juice up our device. This is the place where a hacker launches his/her cyber attack through the USB port's and this type of attack is called  Juice Jacking.               This is a Digital World where everything surrounding us is digital and this makes our life simple and by the same way even the theft is also happening digital and these thieves are called as hackers and not all the hackers are thieves these thieves are called as Black Hat Hackers and the hacker pr...

Is your smartphone safe?

Image
        Everyone in this world is using a smartphone. According to Statista  there are 3 billion smartphone users across the globe and there were 54% of data which were breached in India alone and even your data could be there on the list. Below are the methods of how your data are breached study them carefully and protect your data.   How do you think your data are leaked?                  Is it because of vulnerability in your device that hackers get access to your device? Probably not the vulnerability is not in your device it is with you.       Yes, you are the one who is giving access to your data by installing apps from an unknown source and allowing permission for the app which is not necessary.  F or example, if there is a game that does not have anything to do with call and SMS. The maximum permission that a game needs would be storage but still the application would ...

What is an e-sim?

Image
E-sim is abbreviated as  embedded-SIM  which is programmed and embedded directly in your device.   Evolution of sim cards?     Technologies are evolving day by day, devices which we are using today are becoming an outdated one the next day. The feature phones that we were using a few decades ago were equipped with standard sim slots and then smartphones were launched and this changed the game and every innovation that was possible was embedded into the phone to make it compact. According to science things which are small are supposed to be more powerful and the same thing happened to Standard Sim card trays which changed into micro sim slot and micro to nano and nano to e-sim which is directly embedded in the device. How does an e-sim work?      Before going to e-sim let’s see how a  SIM  works  SIM  stands for  Subscriber identity Module ,   to buy and activate a sim card, you have to go to a dealer a...