Won’t allow apps that target others: Google on why it pulled down 'Remove China Apps'

Agencies
June 5, 2020

With the scrapping of Mitron and Remove China Apps from its Play Store gaining a lot of attention in India, Google on Thursday said that it removed a video app "for a number of technical policy violations", while adding that it also does not allow an app that "encourages or incentivizes users into removing or disabling third-party apps".

Both the apps became immensely popular in India within a short span of time due to the prevailing anti-China sentiment amid border tensions between India and China in Ladakh and calls by Indian activists to boycott Chinese products.

Reports suggested that the Mitron app is a repackaged version of TicTic, which is a TikTok clone.

The Remove China Apps was designed to help users identify applications of Chinese origin.

Without naming the apps, Google hinted that the Mitron app may make a comeback on the Play Store once it fixes some technical issues, but the chances of the Remove China Apps are thin.

"We have an established process of working with developers to help them fix issues and resubmit their apps. We've given this developer (of the video app) some guidance and once they've addressed the issue the app can go back up on Play," Sameer Samat, Vice President, Android and Google Play, said in a statement.

Google said that its Android app store was designed to provide a safe and secure experience for the consumers while also giving developers the platform and tools they need to build sustainable businesses.

Samat said that Google Play recently suspended a number of apps for violating the policy that it does not allow an app that "encourages or incentivizes users into removing or disabling third-party apps or modifying device settings or features unless it is part of a verifiable security service".

"This is a longstanding rule designed to ensure a healthy, competitive environment where developers can succeed based upon design and innovation. When apps are allowed to specifically target other apps, it can lead to behaviour that we believe is not in the best interest of our community of developers and consumers," Samat said.

"We've enforced this policy against other apps in many countries consistently in the past - just as we did here," he added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 3,2020

Mumbai, Jul 3: In yet another move to keep Chinese technologies companies at bay, the Centre has cancelled the 4G upgradation tender for BSNL as it has decided to come up with fresh specifications for the upgrade process, sources said.

The Department of Telecommunications (DoT) is likely to issue a fresh tender in the next two weeks.

People in the know said that the fresh tender may not allow Chinese companies to participate and that the new tenders that will be floated in the next two weeks will emphasise on Make in India.

As the border tussle with China escalated last month and around 20 soldiers lost their lives, the government had last month asked both BSNL and MTNL not to use equipment of Chinese makers in their upgrading process to 4G facilities.

Huawei and ZTE are the major Chinese telecom equipment makers working with Indian telecom companies and they would be the hardest hit by the decision.

The impact may be felt in terms of the much-awaited 5G trials in the country. After much deliberation, the Centre last December decided to allow Huawei to take part in the 5G trials.

The cancellation of tender for BSNL's 4G upgradation comes after the Centre on Monday banned 59 Chinese apps including TikTok, WeChat and UC Browser.

A statement by the Ministry of Electronics and IT said that the decision was taken since "there is credible information that these apps are engaged in activities which are prejudicial to sovereignty and integrity of India, defence of India, security of state and public order".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
April 28,2020

Los Angeles, Apr 28: People who experience loss of smell as one of the COVID-19 symptoms are likely to have a mild to moderate clinical course of the disease, according to a study which may help health care providers determine which patients require hospitalisation.

The findings, published in the journal International Forum of Allergy & Rhinology, follows an earlier study that validated the loss of smell and taste as indicators of infection with the novel coronavirus, SARS-CoV-2.

According to the scientists from the University of California (UC) San Diego Health in the US, patients who reported loss of smell were 10 times less likely to be hospitalised for COVID-19 compared to those without the symptom.

"One of the immediate challenges for health care providers is to determine how to best treat persons infected by the novel coronavirus," said Carol Yan, first author of the current study and rhinologist from the UC San Diego Health.

"If they display no or mild symptoms, can they return home to self-quarantine or will they likely require hospitalisation? These are crucial questions for hospitals trying to efficiently and effectively allocate finite medical resources," Yan said.

The findings, according to the researchers, suggest that loss of smell may be predictive of a milder clinical course of COVID-19.

"What's notable in the new findings is that it appears that loss of smell may be a predictor that a SARS-CoV-2 infection will not be as severe, and less likely to require hospitalisation," Yan said.

"If an infected person loses that sense, it seems more likely they will experience milder symptoms, barring other underlying risk factors," she added.

Risk factors for COVID-19 previously reported by other studies include age, and underlying medical conditions, such as chronic lung disease, serious heart conditions, diabetes, and obesity.

In the current study, the scientists made a retrospective analysis between March 3 and April 8 including 169 patients who tested positive for COVID-19 at UC San Diego Health.

They assessed olfactory and gustatory data for 128 of the 169 patients, 26 of whom required hospitalisation.

According to the researchers, patients who were hospitalised for COVID-19 treatment were significantly less likely to report anosmia or loss of smell -- 26.9 per cent compared to 66.7 per cent for COVID-19-infected persons treated as outpatients.

Similar percentages were found for loss of taste, known as dysgeusia, they said.

"Patients who reported loss of smell were 10 times less likely to be admitted for COVID-19 compared to those without loss of smell," said study co-author Adam S. DeConde.

"Moreover, anosmia was not associated with any other measures typically related to the decision to admit, suggesting that it's truly an independent factor and may serve as a marker for milder manifestations of Covid-19," DeConde said.

The researchers suspect that the findings hint at some of the physiological characteristics of the infection.

"The site and dosage of the initial viral burden, along with the effectiveness of the host immune response, are all potentially important variables in determining the spread of the virus within a person and, ultimately, the clinical course of the infection," DeConde said.

If the SARS-CoV-2 virus initially concentrates in the nose and upper airway, where it impacts olfactory function, that may result in an infection that is less severe and sudden in onset, decreasing the risk of overwhelming the host immune response, respiratory failure, and hospitalisation, the scientists added.

"This is a hypothesis, but it's also similar to the concept underlying live vaccinations," DeConde explained.

"At low dosage and at a distant site of inoculation, the host can generate an immune response without severe infection," he added.

Loss of smell, according to the study, might also indicate a robust immune response which has been localised to the nasal passages, limiting effects elsewhere in the body.

Citing the limitations of the study, the scientists said they relied upon self-reporting of anosmia from participants, which posed a greater chance of recall bias among patients once they had been diagnosed with COVID-19.

They added that patients with more severe respiratory disease requiring hospitalisation may not be as likely to recognise or recall the loss of smell.

So the researchers said more expansive studies are needed for validating the results.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 22,2020

Kochi, May 22: During the nationwide COVID-19 lockdown, Kerala recorded the highest number of cyber attacks followed by Punjab and Tamil Nadu, a study by anti-virus software firm K7 Computing said on Thursday.

In a statement issued in Chennai, the company said its K7 Computing's Cyber Threat Report, a comprehensive analysis of cyber attacks during the lockdown has found that Kerala recorded the highest number of cyber attacks during this period. The report analyses various cyber attacks within India during the pandemic and reveals that threat actors targeted the state with COVID-themed attacks aimed at exploiting user trust.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period - the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu with 184 attacks, the company said.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level.

These attacks aimed to compromise computers and mobile devices to gain access to users' confidential data, banking details, and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users' sensitive data. Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better. Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost 6 and 4 times the number of attacks as Bengaluru users.

According to the statement, a majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users. These attacks were aimed at heightening users' fears and creating a sense of urgency to take action.

K7 Labs noticed phishing attacks where scamsters posed as representatives of the United States Department of Treasury, the World Health Organization (WHO), and the Centres for Disease Control and Prevention (CDC), the company said.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus.

"Covid-19 has created an ideal situation for various threat actors to target individuals and enterprises alike. The panic caused by the stringent lockdown measures and rapid spread of this virus has left many people looking for more information on the situation," J. Kesavardhanan, Founder and CEO of K7 Computing was quoted as saying in the statement.

"Threat actors exploit this fear to their advantage and scam users into downloading malicious software and divulging sensitive information like banking codes. The need to be cyber cautious has never been greater. This is more so in the case of corporates who have adopted a work from home policy hurriedly without adequate cyber hygiene. We have seen an increase in attacks on enterprises and SME employees as well," he added.

Such attacks are expected to continue till normalcy returns. Social engineering attacks targeted at winning users' trust will gain momentum.

Healthcare institutions, well-known government offices, and international organisations will continue to be a prime target throughout the pandemic, the statement said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.