This new feature lets users select a color that appears behind their text status in place of the normally-white background. Several of the color options offer an Instagram logo-style color gradient, which make them more stylish and modern than boring flat colors.
Facebook confirms this feature is in testing. It appears that it’s only testing in certain regions.
A statment from Facebook say “We’re rolling out a change to help people make their text posts more visual. People can update the background color of their text-only posts on Android.”
The new feature. Colored status backgrounds are rolling out globally over the next few days. Only Android users will be able to create them, but everyone on iOS, Android, and web will be able to see them in the News Feed.
So if you have been wondering why you do not have access to this new feaather, do not worry you will soon have access.
EE has been fined £2.7 million by Ofcom for overcharging tens of thousands of customers.
The telecoms regulator found that the mobile operator broke a ‘fundamental billing rule’ in two different ways.
In November 2015, calls or texts to the 150 number within the EU became free, yet EE continued to charge more than 7,600 customers until January 2016. They were overcharged by a total of £2,203.
And on a separate occasion, users who called the 150 customer service number while in the EU were charged the same price as if they were in the US – so £1.20 a minute, instead of 19p. That makes 32,145 customers who were overcharged a total of £245,000.
EE was accused by the watchdog of “carelessness or negligence”, and although most customers have been reimbursed, EE is still unable to identify at least 6,900 people who are collectively owed around £60,000.
Ofcom’s consumer group director Lindsey Fussell told the BBC: “We all rely on big companies to get the most basic things right, and that includes charging the right bills… we uncovered a catalogue of errors.”
EE has apologised unreservedly to customers. The fine will go to the Treasury, and EE has also donated around £62,000 owed to the customers it couldn’t trace to charity.
But Ofcom has also ordered the company to make further efforts to track down every single overcharged customer.
A new phishing scam is targeting Gmail users and has fooled many people including tech experts in giving up their Google credentials. The hackers use the newly acquired Gmail credentials to log into the account, scour through the sent messages and pass the bugged email onto other non-suspecting users.
The attack is not only targeting Gmail users, but other services as well. The scam was detailed by Mark Maunder, CEO of Wordfence, which is the security service for WordPress.
The Phishing Attack: How It Works People easily fall for this trick as the malicious email comes from the account of a known person, whose account has already been compromised. The email contains image attachments in the disguise of a PDF file.
Once the attachment is clicked for a preview, a new tab opens up and asks the user to log into the Gmail account again. This is the part where most users get tricked. In the new tab, the location bar shows “accounts.google.com.” On seeing this, most the users deem it is a safe and an authenticated Gmail login page, so they log in. In reality, clicking the attachment loads a webpage full of codes into the browser’s address bar. Once the sign-in has been finished, the account of the user has been compromised.
“The attackers log in to your account immediately once they get the credentials, and they use one of your actual attachments, along with one of your actual subject lines, and send it to people in your contact list,” shared someone who experienced the scam.
Once the hacker gets access to a user’s account, all the emails and documents sent and received by the user fall into the hands of the fraudster, who uses the new contacts to spread the malware. Once the users loses the sole authority from his or her Gmail account, it is very likely he or she will be barred access to any other services linked with the Gmail account username and password. The process happens too fast for anyone to notice.
How To Protect The Gmail Account From The Phishing Attack
The trick to identify the bug lies in careful scrutinization of the address bar. The bug hides in plain sight but doesn’t gets detected as, most users think that the webpage is Google’s protected login page after seeing ”accounts.google.com” in the address bar.
The hackers use a phishing method known as URI or data uniform resource identifier. The URI method is used to attach a data file in the location bar in front of “https://accounts.google.com.” The data file “data:text/html” is attached in front of the host name, which opens up the fake login page.
To protect the account and not fall for this trick, a user should make sure that there is nothing in front of the host file name. One should verify the protocol and the host name. Also enabling the two-step authentication available for Gmail can stop the attack from taking place as the hacker would need the OTP (One Time Password) required for completing the login.