LG V10 leaked in render ahead of official launch event

LG V10 is supposed to be some sort of dual-screen smartphone and, thanks to the eternally vigilant @evleaks, we can now see a render of the device, just ahead of its official unveiling on October 1st. This new image shows us the front of the device with a small glimpse at the secondary “auxiliary ticker display” on top of the main screen.


LG V10


The secondary display is filled with five app shortcuts: camera, messages, contacts and gallery included. You can also spot two sensors just besides the secondary display. The speaker grille and sensors are placed above the secondary display. The device hints at on-screen buttons as we can see no physical buttons near the LG logo below the touchscreen.


This auxiliary ticker display for the LG V10 is said to be able to be used as an RSS feed update announcer or a secondary notification device within a device. This is all still a little fuzzy and we will have to wait for the official unveiling of LG’s newest creation to be sure what this secondary display within a display is all about. We’ll keep you posted!

UPDATE: now we can even be amazed by the awesome teaser for the double display thingy:


Source: NDTV


Android Lock exploit allows devices to be unlocked with a long string of characters

Android Lock exploit is a real thing and everyone knows about it. This discovery was made by the University of Austin, Texas, where a new report revealed an exploit that hackers can use a very large code to easily bypass the lock screen of Android devices. This works with devices running on Android 5.0 to Android 5.1.1 with a password-based lock, and it does not matter if you have enabled encryption on the device. Recent Google numbers put Android Lollipop versions running on 21% of all Android devices, which means they all could be easily hacked.





Hacking your Android Lollipop device could be as easy as inserting a very very long password via this Android Lock exploit. Hackers could infect a phone by simply swiping left from the lock screen in order to open the camera app and then they can access the “Settings” menu from the notifications panel. When they tap the Settings menu they would be prompted to enter a password. After introducing a long string of characters, hackers can crash the device to the home screen. There they can access different apps or take information and expose data.


There’s more than one way to go about this Android Lock exploit. Hackers can copy a large string of characters into the Android clipboard and they can paste into the password prompt. They can also use the emergency dialing field to type long lists of codes that can be used on the password prompt as well.


As luck would have it, Google took action and managed to fix the problem via a security update that began to roll-out to devices last week. You will find it in the Android build LMY48M. The fix for this Android lock exploit could take months to reach all affected devices though, as we all know carrier-locked devices take more time to update than others. Nexus devices already got this fix.