Skip to main content

Quantum Computing | Qubit, Basic Structure, Difference with Classical Computers, Applications and More

Computational problems, Yes, the Solution of computational problems, that can never be solved in a feasible time period by the existing supercomputers is the basic need of a Quantum computer.  Quantum Computers use quantum-mechanical phenomena like Superposition and Entanglement to perform computation. Superposition refers to the presence of a quantum particle like an atom or a photon in two states simultaneously, exactly it is not simultaneous but it spins so quickly that it appears to be in both positions at the same time. Entanglement is a physical phenomenon in which a group of quantum particles, interact, share spatial proximity in such a way that their quantum states remain dependent on one other even if they get separated by larger distance. Such particles show wave-like properties, and when frequency and waveform of these particles become identical, they are said to be in Coherence. Coherence is a mandatory condition to perform computing. In a Quantum System, Superposi...

Third-Party Apps | Meaning, Download Risks and Security Measures

What are Third-party apps?

Third-party apps are apps developed by someone other than your phone manufacturer( Apple, Nokia, Motorola...) or Operating system provider(Android, iOS...).                                   
                                                  
Third-party Apps

Such apps are often downloaded by us to get any specific task done but they can be a threat to the security of our phones and even to our bank accounts.


Because these apps always ask us to grant permissions like using Storage, Contacts, Microphone, Location, etc.


Using these permissions they can easily access our private information such as passwords, user IDs, documents, media files, etc.

How third-party apps are dangerous to our phone's security?


These apps are often embedded (attached from inside) with an unidentifiable or hidden piece of codes or scripts.    
                                                      
Malware Scripts
Usually, our phones don't come up with a preinstalled firewall that's why such codes are not usually detectable by the operating system.


Once we install such vulnerable (suspicious) apps and grant permission to use our phone's resources we give them access to do whatever they want to do with our private data and connected devices.

Types of embedded vulnerable scripts

Madwares 

Often get installed without our consent and collects data of our likes and dislikes to suggest to us relevant advertisements by companies but can also be used for password predictions.

Spywares

Spywares collect data of our searches, contacts, and locations visited and send this information to be analyzed.

Viruses

They are often found attached with genuine-looking apps to extract important information stored in our devices such as banking user ID or passwords.

Trojans

Trojans are often attached to the back end of such apps to mine confidential information and attack our device.

Graywares 

Not completely malicious but leak information partially

Phishing Apps

Apps that pretend to be genuine and make ourselves to enter important information.

Drive-by Downloads

Whenever we download something they get downloaded and lead us to some malicious link.

Security measures to avoid Cyberattacks

Install applications with an editor's choice mark (like Google's Playstore or iOS Store) to download apps.


Don't download apk files from untrusted websites.

Don't grant permissions to the irrelevant interest of your phone's resources (like keyboards usually don't require storage or contact permissions).

Always keep "Installation from unknown sources" disabled.

Don't accept cookies from untrusted websites.

Don't use free antiviruses or firewalls as they could be potentially harmful instead of providing security.

Don't save private information like passwords or usernames of your bank account access in your browser.

While accessing your banking services always use a virtual keyboard.

Instantly clear your cache and cookies from untrusted websites.

Nowadays many companies use 25% of app development's duration on testing so they could target you to test their apps.

If it gets very important to download a 3rd-party app, please conduct at least one Google search to check whether it has negative reviews, if it is there then it is better to avoid the download.

Never share OTPs.

Today our phone has become our identity and also a key to unlock our bank accounts, So keep them at the safest place.









Comments

Popular Posts.......

Cell Phones | Working Principle, Radio Waves

Cell phones are basically full-duplex radio transmitters and receivers , that are capable of transmitting and receiving radio signals using an  antenna . Full duplex means both the sender and recipient can talk at the same time but at different frequencies. A cell phone uses two frequencies per call, one for speaking and one listening. Digital Cell phone Radio waves occupy the range of  30 Hz to 300 GHz with wavelengths of 10000 km to 1 mm respectively in the electromagnetic spectrum. Why Radio waves are used in communication? Radio waves are transmitted easily through the air. They don't cause damage to the human body. These waves can be easily reflected to change their direction. How cell phones work? Your phone converts the radio waves into electrical signals and then into voice, similarly, voice is converted into electrical signals and then into radio waves . Cell phones operate within the cells . Each cell has a hexagonal shape . A typical cell occupies an area of 26 s...

Quantum Computing | Qubit, Basic Structure, Difference with Classical Computers, Applications and More

Computational problems, Yes, the Solution of computational problems, that can never be solved in a feasible time period by the existing supercomputers is the basic need of a Quantum computer.  Quantum Computers use quantum-mechanical phenomena like Superposition and Entanglement to perform computation. Superposition refers to the presence of a quantum particle like an atom or a photon in two states simultaneously, exactly it is not simultaneous but it spins so quickly that it appears to be in both positions at the same time. Entanglement is a physical phenomenon in which a group of quantum particles, interact, share spatial proximity in such a way that their quantum states remain dependent on one other even if they get separated by larger distance. Such particles show wave-like properties, and when frequency and waveform of these particles become identical, they are said to be in Coherence. Coherence is a mandatory condition to perform computing. In a Quantum System, Superposi...

5G Technology | Bands, Millimetre Wave 5G, Beam Steering, Applications

What is 5G? 5G or Fifth Generation technology standard for Mobile Networks enables users to use ultra-high-speed data transmission facility, a peak speed of 20 Gbps with a maximum latency of 4 milliseconds . 5G Cellular Network Such high-speed data transmission is attained by higher-frequency radio-waves . The higher frequency radio waves have a shorter range (c   = f • λ ), so to provide a wide range  5G network requires more number of cells. 5G network technologies operate on bands like Low band 5G (600-700 MHz, a little faster than 4G) Mid band 5G (2.5-3.7 GHz, download speed   100-900  Mbps ) High band 5G (25-39 GHz, download speed 1 Gbps) Millimeter Waves 5G (30-300 GHz, download speed 20 Gbps) How much faster than 4G LTE (Long Term Evolution) The bandwidth of 4G LTE is  600-700 MHz  with a peak speed of 5-12 Mbps while the bandwidth of 5G is 25-300  GHz with a peak speed of 20Gbps The peak latency of 4G LTE is 20ms while 5G gives us the ma...