ReportWire

Tag: Software

  • One Tech Tip: All you need to know about the iPhone’s Lockdown Mode

    [ad_1]

    A little known security feature on iPhones is in the spotlight after it stymied efforts by U.S. federal authorities to search devices seized from a reporter.

    Apple’s Lockdown Mode recently prevented FBI agents from getting into Washington Post reporter Hannah Natanson ‘s iPhone.

    Agents seized the phone, as well as two MacBooks and other electronic devices, when they searched Natanson’s home last month as part of an investigation into a Pentagon contractor accused of illegally handling classified information. But the FBI reported that its Computer Analysis Response Team “could not extract” data from the iPhone because it was in Lockdown Mode, according to a court filing.

    So what is Lockdown Mode? Here’s a rundown of how it works and how to use it:

    Apple says Lockdown Mode is an “optional, extreme” protection tool designed to guard against “extremely rare and highly sophisticated cyberattacks.” It’s not for everyone, but instead for “very few individuals” who could be targeted by digital threats because of who they are or what they do.

    “Most people will never be targeted by attacks of this nature,” Apple’s support page says.

    It’s available in Apple’s newer operating systems, including iOS 16 and macOS Ventura. It works by putting strict security limits on some apps and features, or even making some unavailable, to reduce the areas that advanced spyware can attack. It also restricts the kinds of browser technologies that websites can use and limits photo sharing.

    Apple has previously rejected U.S. government requests to build so-called backdoor access for its devices.

    In 2016, Apple refused a request by authorities to help bypass lockscreen security for an encrypted iPhone belonging to a shooter who carried out a terrorist attack in San Bernardino, Calif. The company also declined to add an ability to input passcodes electronically, which would make it possible to carry out “brute force” attempts to guess the combination using computers.

    “It would be wrong to intentionally weaken our products with a government-ordered backdoor,” Apple said in explaining its decision.

    Make sure your iPhone, iPad or MacBook has been updated. You’ll have to turn the feature on separately for each of your Apple devices.

    On your iPhone, go to Settings, then to the Privacy and Security section, scroll down to the bottom and tap on Lockdown Mode. Enter your passcode — not a facial or fingerprint scan — to activate it. The device will restart and then you’ll again have to use your passcode to unlock it. On MacBooks, follow a similar procedure from the System Settings menu.

    Apple recommends that you switch it on for all of the company’s devices that you own.

    You might assume that requiring facial or fingerprint recognition to unlock your phone is good enough to protect it from snooping. But experts say passcodes are better than biometrics at protecting your devices from law enforcement, because they could compel you to unlock your device by holding your phone up to your face or forcing you to put your finger on the scanner.

    FBI agents told Natanson that they “could not compel her to provide her passcodes,” but the warrant they used to execute the search did give them the authority “to use Natanson’s biometrics, such as facial recognition or fingerprints, to open her devices.” According to a court filing, Natanson said she didn’t use biometrics to lock her devices but agents were ultimately able to unlock her MacBook with her finger.

    Apple says some apps and features will work differently when Lockdown Mode is on.

    Some websites might load slowly or not work properly, and some images and web fonts could be missing because they block “certain complex web technologies.”

    In Messages, most types of attachments are blocked, and links and link previews won’t be available. Incoming FaceTime calls are blocked unless it’s from a number you’ve called in the past month.

    In Photos, location information is stripped from shared photos and shared albums are removed from the app. Focus mode won’t work normally.

    There are also tighter restrictions on connecting your phone or computer to unsecure Wi-Fi networks or to other computers and accessories.

    When I tried it out on my own iPhone, some apps warned me that certain functions might not work. I noticed that one of my news apps started using a different font and photos on some websites didn’t appear, replaced by a question mark.

    The biggest disruption happened when I went to the gym, which involved using a web-based check-in system to scan a QR code. But my phone camera wouldn’t work so I had to turn off Lockdown Mode in order to get in. To be sure, my iPhone’s standalone Code Scanner app still worked, so the problem seemed to center on using a website to activate the camera.

    Follow the same procedure outlined above that you used to turn on Lockdown Mode. You’ll need to enter your passcode and the phone will perform a restart.

    ___

    Is there a tech topic that you think needs explaining? Write to us at onetechtip@ap.org with your suggestions for future editions of One Tech Tip.

    [ad_2]

    Source link

  • EU accuses TikTok of ‘addictive design’ and seeks changes to protect users

    [ad_1]

    LONDON — The European Union on Friday accused TikTok of breaching the bloc’s digital rules with “addictive design” features including autoplay and infinite scroll, in preliminary charges that strike at the heart of the popular video sharing app’s operating model.

    EU regulators said their investigation found that TikTok hasn’t done enough to assess how its features could harm the physical and mental health of users, including children and “vulnerable adults.”

    The European Commission said it believes TikTok should change the “basic design” of its service. The commission is the EU’s executive arm and enforcer of the 27-nation bloc’s Digital Services Act, a sweeping rulebook that requires social media companies to clean up their platforms and protect users, under threat of hefty fines.

    TikTok denied the accusations.

    “The Commission’s preliminary findings present a categorically false and entirely meritless depiction of our platform, and we will take whatever steps are necessary to challenge these findings through every means available to us,” the company said in a statement.

    TikTok now has a chance to reply to the commission’s findings, which could lead to a so-called non-compliance decision and possible fine worth up to 6% of the company’s total annual revenue.

    “Social media addiction can have detrimental effects on the developing minds of children and teens,” Henna Virkkunen, the commission’s executive vice-president for tech sovereignty, security and democracy, said in a press statement. “The Digital Services Act makes platforms responsible for the effects they can have on their users. In Europe, we enforce our legislation to protect our children and our citizens online.”

    The preliminary findings from Brussels are the latest example of pressure that TikTok and other social media platforms are facing over youth addiction.

    Australia has banned social media for under-16s while governments in Spain, France, and Denmark want to introduce similar measures. In the U.S., TikTok last month settled a landmark social media addiction lawsuit while two other companies named in the suit — Meta’s Instagram and Google’s YouTube — still face claims that their platforms deliberately addict and harm children.

    The commission said that TikTok fuels the urge to keep scrolling because it constantly rewards users with new content, leading to reduced self control.

    It said TikTok ignores signs that someone is compulsively using the app, such as the amount of time that minors spend on it at night, and how often the app is opened.

    The company has failed to put in place “reasonable, proportionate and effective” measures to offset the risks, it said.

    The commission said TikTok’s existing time management controls are easy to dismiss and “introduce limited friction,” while parental tools need “additional time and skills” from parents.

    Changes that the commission wants TikTok to make include disabling features like infinite scroll; putting in more effective breaks for screen time, including at night; and changing its “highly personalized” recommender system, which feeds users an endless stream of video shorts based on their preferences.

    TikTok says it has numerous tools, such as custom screen time limits and sleep reminders, that let users make “intentional decisions” about how they spend their time on the app.

    [ad_2]

    Source link

  • Day-By-Day Timeline in the Search for Savannah Guthrie’s Missing Mother

    [ad_1]

    Five days into the desperate search for 84-year-old Nancy Guthrie, investigators on Thursday released a detailed timeline from the hours before and after the disappearance of Guthrie, who is the mother of “Today” show host Savannah Guthrie.

    Here is a timeline of events in the disappearance.

    5:32 p.m. — Nancy Guthrie takes an Uber to her family’s home for dinner

    9:48 p.m. — Guthrie is dropped off at her Tucson, Arizona, home by her son-in-law, Tommaso Cioni. The garage door opens

    9:50 p.m. — The garage door closes

    1:47 a.m. — The doorbell camera is disconnected

    2:12 a.m. — The camera’s software detects movement, but there is no video available since Guthrie did not have an active subscription with the company, meaning the footage was not saved

    2:28 a.m. — Guthrie’s pacemaker app disconnects from her phone

    11:56 a.m. — Guthrie’s family checks on her after she did not show up at church

    12:03 p.m. — Guthrie’s family calls 911 to report a missing person

    12:15 p.m. — Investigators arrive and launch a search operation, including the use of drones and search dogs.

    6:46 p.m. — The Pima County Sheriff’s Department posts on social media to announce Guthrie’s disappearance

    9 p.m. — Pima County Sheriff Chris Nanos speaks to reporters near Guthrie’s house and says he hopes it is a search and rescue mission.

    Authorities on Monday morning announce that they believe Guthrie was kidnapped, abducted or otherwise taken against her will.

    KOLD-TV says it received an email Monday night that appears to be a ransom note. The note includes a demand for money with a deadline set for 5 p.m. Thursday and a second one for Monday, investigators said.

    Savannah Guthrie posts a message on Instagram on Monday night, asking for people’s prayers.

    Speaking to reporters in the Oval Office on Tuesday afternoon, President Donald Trump tells reporters that the situation is “terrible.”

    After turning back Guthrie’s property to her family earlier in the week, authorities on Wednesday returned to the home for a “follow-up investigation.”

    Savannah Guthrie on Wednesday night posts a video on social media in which she tells her mother’s kidnapper that her family is ready to talk, but wants proof that she is alive.

    Investigators say they have no proof that Nancy Guthrie is still alive but are holding out hope she is “still out there.” Officials reveal that a DNA test of blood found on the home’s front porch showed it came from Guthrie.

    The FBI offers a $50,000 reward for information about Guthrie’s whereabouts.

    Copyright 2026 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

    Photos You Should See – January 2026

    [ad_2]

    Associated Press

    Source link

  • France dumps Zoom and Teams as Europe seeks digital autonomy from the US

    [ad_1]

    LONDON — In France, civil servants will ditch Zoom and Teams for a homegrown video conference system. Soldiers in Austria are using open source office software to write reports after the military dropped Microsoft Office. Bureaucrats in a German state have also turned to free software for their administrative work.

    Around Europe, governments and institutions are seeking to reduce their use of digital services from U.S. Big Tech companies and turning to domestic or free alternatives. The push for “digital sovereignty” is gaining attention as the Trump administration strikes an increasingly belligerent posture toward the continent, highlighted by recent tensions over Greenland that intensified fears that Silicon Valley giants could be compelled to cut off access.

    Concerns about data privacy and worries that Europe is not doing enough to keep up with the United States and Chinese tech leadership are also fueling the drive.

    The French government referenced some of these concerns when it announced last week that 2.5 million civil servants would stop using video conference tools from U.S. providers — including Zoom, Microsoft Teams, Webex and GoTo Meeting — by 2027 and switch to Visio, a homegrown service.

    The objective is “to put an end to the use of non-European solutions, to guarantee the security and confidentiality of public electronic communications by relying on a powerful and sovereign tool,” the announcement said.

    “We cannot risk having our scientific exchanges, our sensitive data, and our strategic innovations exposed to non-European actors,” David Amiel, a civil service minister, said in a press release.

    Microsoft said it continues to “partner closely with the government in France and respect the importance of security, privacy, and digital trust for public institutions.”

    The company said it is “focused on providing customers with greater choice, stronger data protection, and resilient cloud services — ensuring data stays in Europe, under European law, with robust security and privacy protections.”

    Zoom, Webex and GoTo Meeting did not respond to requests for comment.

    French President Emmanuel Macron has been pushing digital sovereignty for years. But there’s now a lot more “political momentum behind this idea now that we need to de-risk from U.S. tech,” Nick Reiners, at the Eurasia Group.

    “It feels kind of like there’s a real zeitgeist shift,” Reiners said

    It was a hot topic at the World Economic Forum’s annual meeting of global political and business elites last month in Davos, Switzerland. The European Commission’s official for tech sovereignty, Henna Virkkunen, told an audience that Europe’s reliance on others “can be weaponized against us.”

    “That’s why it’s so important that we are not dependent on one country or one company when it comes to very critical fields of our economy or society,” she said, without naming countries or companies.

    A decisive moment came last year when the Trump administration sanctioned the International Criminal Court’s top prosecutor after the tribunal, based in The Hague, Netherlands, issued an arrest warrant for Israeli Prime Minister Benjamin Netanyahu, an ally of President Donald Trump.

    The sanctions led Microsoft to cancel Khan’s ICC email, a move that was first reported by The Associated Press and sparked fears of a “kill switch” that Big Tech companies can use to turn off service at will.

    Microsoft maintains it kept in touch with the ICC “throughout the process that resulted in the disconnection of its sanctioned official from Microsoft services. At no point did Microsoft cease or suspend its services to the ICC.”

    Microsoft President Brad Smith has repeatedly sought to strengthen trans-Atlantic ties, the company’s press office said, and pointed to an interview he did last month with CNN in Davos in which he said that jobs, trade and investment. as well as security, would be affected by a rift over Greenland.

    “Europe is the American tech sector’s biggest market after the United States itself. It all depends on trust. Trust requires dialogue,” Smith said.

    Other incidents have added to the movement. There’s a growing sense that repeated EU efforts to rein in tech giants such as Google with blockbuster antitrust fines and sweeping digital rule books haven’t done much to curb their dominance.

    Billionaire Elon Musk is also a factor. Officials worry about relying on his Starlink satellite internet system for communications in Ukraine.

    Washington and Brussels wrangled for years over data transfer agreements, triggered by former National Security Agency contractor Edward Snowden’s revelations of U.S. cyber-snooping.

    With online services now mainly hosted in the cloud through data centers, Europeans fear that their data is vulnerable.

    U.S. cloud providers have responded by setting up so-called “sovereign cloud” operations, with data centers located in European countries, owned by European entities and with physical and remote access only for staff who are European Union residents.

    The idea is that “only Europeans can take decisions so that they can’t be coerced by the U.S.,” Reiners said.

    The German state of Schleswig-Holstein last year migrated 44,000 employee inboxes from Microsoft to an open source email program. It also switched from Microsoft’s SharePoint file sharing system to Nextcloud, an open source platform, and is even considering replacing Windows with Linux and telephones and videoconferencing with open source systems.

    “We want to become independent of large tech companies and ensure digital sovereignty,” Digitalization Minister Dirk Schrödter said in an October announcement.

    The French city of Lyon said last year that it’s deploying free office software to replace Microsoft. Denmark’s government and the cities of Copenhagen and Aarhus have also been trying out open-source software.

    “We must never make ourselves so dependent on so few that we can no longer act freely,” Digital Minister Caroline Stage Olsen wrote on LinkedIn last year. “Too much public digital infrastructure is currently tied up with very few foreign suppliers.”

    The Austrian military said it has also switched to LibreOffice, a software package with word processor, spreadsheet and presentation programs that mirrors Microsoft 365’s Word, Excel and PowerPoint.

    The Document Foundation, a nonprofit based in Germany that’s behind LibreOffice, said the military’s switch “reflects a growing demand for independence from single vendors.” Reports also said the military was concerned that Microsoft was moving file storage online to the cloud — the standard version of LibreOffice is not cloud-based.

    Some Italian cities and regions adopted the software years ago, said Italo Vignoli, a spokesman for The Document Foundation. Back then, the appeal was not needing to pay for software licenses. Now, it’s the main reason is to avoid being locked into a proprietary system.

    “At first, it was: we will save money and by the way, we will get freedom,” Vignoli said. “Today it is: we will be free and by the way, we will also save some money.”

    ___

    Associated Press writer Molly Hague in The Hague, Netherlands contributed to this report.

    [ad_2]

    Source link

  • TikTok Finalizes Deal to Form New American Version of the App

    [ad_1]

    TikTok has finalized a deal to create a new American version of the app, avoiding the looming threat of a ban in the U.S. that has been in discussion for years.

    The social video platform company signed agreements with major investors including Oracle, Silver Lake and MGX to form the new TikTok U.S. joint venture. The new app will operate under “defined safeguards that protect national security through comprehensive data protections, algorithm security, content moderation and software assurances for U.S. users,” the company said in a statement Thursday.

    Adam Presser, who previously worked as TikTok’s head of operations and trust and safety, will lead the new venture as its CEO. He will work alongside a seven-member, majority-American board of directors that includes TikTok’s CEO Shou Chew.

    The deal marks the end of years of uncertainty about the fate of the popular video-sharing platform in the United States. After wide bipartisan majorities in Congress passed — and President Joe Biden signed — a law that would ban TikTok in the U.S. if it did not find a new owner in the place of China’s ByteDance, the platform was set to go dark on the law’s January 2025 deadline. For a several hours, it did. But on his first day in office, President Donald Trump signed an executive order to keep it running while his administration sought an agreement for the sale of the company.

    Copyright 2026 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

    Photos You Should See – January 2026

    [ad_2]

    Associated Press

    Source link

  • Google offers users option to plug AI mode into their photos, email for more personalized answers

    [ad_1]

    SAN FRANCISCO — Google is leveraging its artificial intelligence technology to open a new peephole for its dominant search engine to tailor answers that draw upon people’s interests, habits, travel itineraries and photo libraries.

    The new option rolling out Thursday will give millions of people the option of turning on a recently introduced tool called “Personal Intelligence” within the AI mode that has been available on Google’s search engine since last year. The technology will be first offered in the U.S. to Google AI Pro and Ultra subscribers, as well as an option within its experimental Labs division for anyone with a personal Google account.

    If turned on, the new tool will plug Google’s AI Mode into Gmail and the Google Photos app so the technology can learn more about each user’s life and deliver more relevant answers tailored to personal tastes.

    For instance, someone might ask for suggestions for a weekend getaway and get a quick recommendation based on past trips and experiences. Or, when in AI mode, the search engine might automatically know a person’s favorite restaurants or recognize preferred clothing styles by reviewing old pictures stored in Google Photos.

    “Personal Intelligence transforms Search into an experience that feels uniquely yours by connecting the dots across your Google apps,” Robby Stein, a vice president in Google Search, wrote in a blog post. Stein also warned Personal Intelligence won’t always deliver the best answers, a pitfall that he said users can help correct by telling AI mode with words or a thumbs-down symbol.

    Turning on the option will require users to trust Google’s search engine to protect the details that it is fed about their lives. But millions of people already have been doing that implicitly for decades while entering sometimes intimate queries into the search engine or sharing personal information within Gmail and the Photos app.

    Bringing Personal Intelligence to Google search is the latest sign of the company’s ambitions to make its arsenal of digital services even more powerful with a boost from the latest AI model, Gemini 3i, that came out in November.

    Earlier this month, Google took its first steps toward turning Gmail into a personal assistant powered by AI and now it’s getting a chance to play a bigger role in a search engine that remains the foundation of its internet empire.

    Gemini’s tentacles will even be extending into the iPhone, iPad and Mac after Apple decided last week to team up with Google to bring more AI tools to those products. The partnership will focus on a long-delayed effort to turn Apple’s often-bumbling digital assistant, Siri, into a more conversational and versatile aide.

    Although Google’s search engine was condemned as an illegal monopoly in 2024 by a U.S. federal judge, it remains the internet’s main gateway while trying to fend off competitive threats from AI-powered answer engines offered by up-and-coming innovators such as ChatGPT and Perplexity.

    The potentially revolutionary changes being wrought by AI helped persuade the judge who branded Google a monopoly to reject a proposal by the U.S. Justice Department that would have forced the company to sell its Chrome web browser to curb future abuses in the market.

    [ad_2]

    Source link

  • FBI warns QR code phishing used in North Korean cyber spying

    [ad_1]

    NEWYou can now listen to Fox News articles!

    The Federal Bureau of Investigation has issued a warning about a growing cyber threat that turns everyday QR codes into spying tools.

    According to the bureau, a North Korean government-sponsored hacking group is using a tactic known as quishing to target people in the United States. 

    The goal is simple. Trick you into scanning a QR code that sends you to a malicious website. From there, attackers can steal login credentials, install malware or quietly collect device data.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    WHATSAPP WEB MALWARE SPREADS BANKING TROJAN AUTOMATICALLY

    The FBI is warning Americans about a growing cyber threat that uses QR codes to steal data and spy on victims, tying the attacks to a North Korean hacking group. (Photo by Kevin Carter/Getty Images)

    What quishing is and why it works

    Quishing is short for QR code phishing. Instead of clicking a suspicious link in an email, the victim scans a QR code that hides the real destination. QR codes themselves are harmless. The danger lies in the link embedded inside them. Once scanned, the link can redirect users to fake login pages, malware downloads or tracking sites. Because QR codes feel familiar and fast, many people scan them without thinking twice. That split second of trust is exactly what attackers rely on.

    Who is behind the attacks

    The FBI says the activity is tied to a hacking group known as Kimsuky. The group has operated for years as a cyber espionage arm for North Korea. What is new is the delivery method. According to the FBI, the QR code-based attacks began in May 2025. In one example, attackers posed as a foreign policy advisor and emailed a think tank leader with a QR code that linked to a fake questionnaire. Scanning the code sent the victim to a malicious site designed to harvest information.

    What happens after you scan the QR code

    Once a victim lands on one of these sites, several things can happen. Some pages prompt users to download files that contain malware. Others mimic mobile login portals for popular services such as Okta, Microsoft 365 or VPN services. Even if no form is filled out, the site can still collect device details. That includes IP address, operating system, browser type and approximate location. Over time, that data helps attackers build intelligence profiles on their targets.

    Why QR code phishing attacks are highly targeted

    The FBI describes these campaigns as spear phishing rather than mass spam. That means the emails are crafted for specific individuals. The language context and sender details are tailored to look relevant and credible. When an email feels personal, people are more likely to trust it. That is why these attacks are especially dangerous for professionals, researchers, executives and anyone working in policy or technology.

    Why QR code phishing threats are growing

    QR codes are everywhere now. Restaurants, parking meters, event tickets and ads all rely on them. As their use grows, so does the opportunity for abuse. Attackers know people are conditioned to scan without hesitation. That makes caution more important than ever.

    Ways to stay safe from QR code phishing

    The FBI says one of the best defenses against quishing is slowing down. QR codes remove the visual clues people rely on, so a few extra checks can make a big difference.

    1) Be cautious with unexpected QR codes

    Treat QR codes like links in emails. If you did not expect it, do not scan it. QR codes sent by email, text or messaging apps are a common entry point for quishing attacks. Criminals rely on curiosity and urgency to push you into scanning without thinking.

    2) Verify the source before scanning

    Always confirm who sent the QR code. If a message claims to come from a coworker, vendor or organization, reach out through a separate channel before scanning. A quick call or direct message can stop a phishing attempt cold.

    JANUARY SCAMS SURGE: WHY FRAUD SPIKES AT THE START OF THE YEAR

    Hacker using a laptop.

    Federal investigators say hackers are using “quishing,” or QR code phishing, to lure victims to malicious websites that steal credentials and device data. (Jens Schlueter/Getty Images)

    3) Never enter logins after scanning a QR code

    QR code phishing often leads to fake mobile login pages. Attackers mimic sign-in screens for email, VPNs and cloud services to steal usernames and passwords. If a QR code takes you to a login page, close it and visit the site manually instead.

    4) Inspect the website URL carefully

    Once a QR code opens a page, check the address bar. Look for misspellings, extra words or unfamiliar domain endings. A strange URL is often the only warning sign that the site is malicious.

    5) Use strong antivirus software for QR-based threats

    Strong antivirus software adds an extra layer of protection against quishing. Security tools can block known phishing sites, stop malicious downloads and warn you before harmful pages load. This is especially important on mobile devices, where QR codes are most often scanned.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    6) Use a data removal service to limit exposure

    Some quishing sites collect device and location data even if you do nothing. A data removal service helps reduce how much personal information is publicly available online. That makes it harder for attackers to target you with convincing spear phishing emails that include QR codes.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    7) Avoid QR code downloads entirely

    Do not download files from QR code links unless you are absolutely certain they are safe. Malware delivered through QR codes can quietly install spyware or remote access tools without obvious warning signs.

    INSTAGRAM PASSWORD RESET SURGE: PROTECT YOUR ACCOUNT

    Hacker typing code on his laptop.

    A North Korea-linked cyber group is targeting U.S. professionals by embedding harmful links inside seemingly harmless QR codes, according to the FBI. (Jaap Arriens/NurPhoto via Getty Images)

    Kurt’s key takeaways

    QR codes are convenient, but convenience can lower defenses. As this FBI warning shows, attackers are evolving and using familiar tools in dangerous ways. A moment of verification can prevent weeks or months of damage.

    When was the last time you stopped to question a QR code before scanning it? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Illinois DHS data breach exposes 700K residents’ records

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Illinois residents are once again being reminded how fragile government data systems can be. The Illinois Department of Human Services has confirmed a data breach that exposed sensitive records belonging to roughly 700,000 people.

    The breach is believed to have exposed two distinct sets of records. One is personal and program-related data tied to more than 672,000 Medicaid and Medicare Savings Program recipients, including addresses, case numbers, demographic details and medical assistance plan names, and another 32,000 Division of Rehabilitation Services customers whose names, addresses, case details and referral information were also exposed over multiple years.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    FIBER BROADBAND GIANT INVESTIGATES BREACH AFFECTING 1M USERS

    The Illinois Department of Human Services confirmed a data breach that exposed sensitive records tied to roughly 700,000 residents, including Medicaid and disability services recipients. (Jakub Porzycki/NurPhoto via Getty Images)

    What happened in the Illinois DHS data breach

    As spotted by Bleeping Computer, the Illinois Department of Human Services disclosed that unauthorized access to one of its systems led to the exposure of records tied to approximately 700,000 Illinois residents. The affected data was connected to individuals who interacted with DHS programs, which can include benefits, assistance services and support programs across the state.

    According to the agency, the breach involved personally identifiable information. While officials have not publicly released every technical detail, DHS confirmed that sensitive records were accessed, prompting notifications to impacted individuals. As is typical in cases like this, the investigation is ongoing, and the full scope of how the intrusion occurred is still being reviewed.

    For residents, the key issue is not just that data was accessed, but the type of data DHS holds. Government agencies like DHS often store names, addresses, dates of birth, case numbers and, in some instances, Social Security numbers or benefits-related information. Once that data escapes, it can be misused in ways that last for years.

    Why breaches like this are especially risky

    When a private company is breached, you can often change a password or close an account. Government data is different. You can’t change your Social Security number easily. You can’t erase past interactions with public assistance programs. That makes breaches involving state agencies particularly dangerous.

    Exposed records can be used for identity theft, fraudulent benefit claims, phishing scams and long-term impersonation. Criminals often combine government data with information from other breaches to build detailed profiles that make scams far more convincing. Even if there’s no immediate misuse, stolen data frequently resurfaces months or years later.

    As with many large breaches, DHS has stated that it is taking steps to secure its systems and prevent similar incidents in the future. That’s an expected response. But for affected residents, the burden of protection now shifts largely to you.

    We reached out to the Illinois Department of Human Services for comment, but did not receive a response before our deadline.

    JANUARY SCAMS SURGE: WHY FRAUD SPIKES AT THE START OF THE YEAR

    Hacker committing cybercrimes.

    Personal information from Illinois DHS programs was accessed without authorization, raising concerns about long-term identity theft and fraud risks. (Philip Dulian/picture alliance via Getty Images)

    7 steps you can take to stay safe after the Illinois DHS breach

    If you received a notification from Illinois DHS, or if you’ve ever interacted with DHS programs, these steps can help reduce your risk.

    1) Enroll in identity theft protection if it’s offered

    If DHS provides free identity monitoring or credit protection, sign up. These services can alert you to suspicious activity involving your Social Security number or credit file before the damage spreads. Beyond basic monitoring, full identity theft services can help with recovery, paperwork and financial reimbursement if fraud occurs. This can be especially useful after large-scale government breaches.

    Identity Theft companies can monitor personal information like your Social Security number, phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    2) Use a password manager immediately

    A password manager helps you create and store strong, unique passwords for every account. If your personal data is leaked, attackers often try the same credentials across multiple services. Unique passwords stop one breach from turning into many.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    3) Run strong antivirus software on your devices

    Strong antivirus tools do more than scan files. They monitor suspicious behavior, phishing attempts and malicious links that often follow large data breaches. This matters because breach victims are frequently targeted with follow-up scams.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    4) Place a fraud alert or credit freeze on your credit file

    A fraud alert tells lenders to verify your identity before opening new accounts. A credit freeze goes further by blocking new credit entirely unless you lift it. If Social Security numbers were exposed, a freeze is often the safest option.

    5) Use a personal data removal service

    Once your information leaks, it often spreads to data broker sites that sell personal details. Personal data removal services work to request takedowns and reduce how much of your information is publicly available. While they can’t erase everything, they significantly lower your exposure.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    6) Watch for phishing and impersonation scams

    After breaches involving government agencies, scammers often pretend to be state officials, benefits offices, or support hotlines. Don’t click links or share information unless you independently verify the source through official websites or phone numbers.

    7) Review your credit reports regularly

    You’re entitled to free credit reports from major credit bureaus. Check them for unfamiliar accounts, inquiries or address changes. Early detection makes identity theft far easier to contain.

    COVENANT HEALTH DATA BREACH AFFECTS NEARLY 500,000 PATIENTS

    Hacker typing in code.

    State officials say the breach involved Medicaid, Medicare Savings Program and rehabilitation services records spanning multiple years. (Silas Stein/picture alliance via Getty Images)

    Kurt’s key takeaway

    Even government agencies are not immune to large-scale security failures. When nearly 700,000 residents are affected, the impact goes far beyond a single system or department. While DHS works through its investigation, protecting your identity now depends largely on the steps you take next. Acting early, layering protections and staying vigilant can make the difference between a breach being an inconvenience or a long-term nightmare.

    Do you trust state agencies to protect your personal data? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Aimed at young Chinese who live alone, a new app asks: ‘Are you dead?’

    [ad_1]

    BEIJING — In China, the names of things are often either ornately poetic or jarringly direct. A new, wildly popular app among young Chinese people is definitively the latter.

    It’s called, simply, “Are You Dead?”

    In a vast country whose young people are increasingly on the move, the new, one-button app — which has taken the country by digital storm this month — is essentially exactly what it says it is. People who live alone in far-off cities and may be at risk — or just perceived as such by friends or relatives — can push an outsized green circle on their phone screens and send proof of life over the network to a friend or loved one. The cost: 8 yuan (about $1.10).

    It’s simple and straightforward — essentially a 21st-century Chinese digital version of those American pendants with an alert button on them for senior citizens that gave birth to the famed TV commercial: “I’ve fallen, and I can’t get up!”

    Developed by three young people in their 20s, “Are You Dead?” became the most downloaded paid app on the Apple App Store in China last week, according to local media reports. It is also becoming a top download in places as diverse as Singapore and the Netherlands, Britain and India and the United States — in line with the developers’ attitude that loneliness and safety aren’t just Chinese issues.

    “Every country has young people who move to big cities to chase their dreams,” Ian Lü, 29, one of the app’s developers, said Thursday.

    Lü, who worked and lived alone in the southern city of Shenzhen for five years, experienced such loneliness himself. He said the need for a frictionless check-in is especially strong among introverts. “It’s unrealistic,” he said, “to message people every day just to tell them you’re still alive.”

    Against the backdrop of modern and increasingly frenetic Chinese life, the market for the app is understandable.

    Traditionally, Chinese families have tended to live together or at least in close proximity across generations — something embedded deep in the nation’s culture until recent years. That has changed in the last few decades with urbanization and rapid economic growth that have sent many Chinese to join what is effectively a diaspora within their own nation — and taken hundreds of millions far from parents, grandparents, aunts and uncles.

    Today, the country has more than 100 million households with only one person, according to an annual report from the National Bureau of Statistics of China in 2024.

    Consider Chen Xingyu, 32, who has lived on her own for years in Kunming, the capital of southern China’s Yunnan province. “It is new and funny. The name ’Are You Dead?’ is very interesting,” Chen said.

    Chen, a “lying flat” practitioner who has rejected the grueling, fast-paced career of many in her age group, would try the app but worries about data security. “Assuming many who want to try are women users, if information of such detail about users gets leaked, that’d be terrible,” she said.

    Yuan Sangsang, a Shanghai designer, has been living on her own for a decade and describes herself as a “single cow and horse.” She’s not hoping the app will save her life — only help her relatives in the event that she does, in fact, expire alone.

    “I just don’t want to die with no dignity, like the body gets rotten and smelly before it is found,” said Yuan, 38. “That would be unfair for the ones who have to deal with it.”

    While such an app might at first seem best suited to elderly people — regardless of their smartphone literacy — all reports indicate that “Are You Dead?” is being snapped up by younger people as the wry equivalent of a social media check-in.

    “Some netizens say that the ‘Are you dead?’ greeting feels like a carefree joke between close friends — both heartfelt and gives a sense of unguarded ease,” the business website Yicai, the Chinese Business Network, said in a commentary. “”It likely explains why so many young people unanimously like this app.”

    The commentary, by writer He Tao, went further in analyzing the cultural landscape. He wrote that the app’s immediate success “serves as a darkly humorous social metaphor, reminding us to pay attention to the living conditions and inner world of contemporary young people. Those who downloaded it clearly need more than just a functional security measure; they crave a signal of being seen and understood.”

    Death is a taboo subject in Chinese culture, and the word itself is shunned to the point where many buildings in China have no fourth floor because the word for “four” and the word for “death” sound the same — “si.” Lü acknowledged that the app’s name sparked public pressure.

    “Death is an issue every one of us has to face,” he said. “Only when you truly understand death do you start thinking about how long you can exist in this world, and how you want to realize the value of your life.”

    Early Friday, the app had disappeared from Apple’s App Store in China, at least for the time being. The developers wouldn’t say why, only that the incident “occurred suddenly.”

    A few days ago, though, the developers said on their official account on China’s Weibo social platform that they’d be pivoting to a new name. Their choice: the more cryptic “Demumu,” which they said they hoped could “serve more solo dwellers globally.”

    Then, a twist: Late Wednesday, the app team posted on its Weibo account that workshopping the name Demumu didn’t turn out “as well as expected.” The app team is offering a reward for whoever offers a new name that will be picked this weekend. Lü said more than 10,000 people have weighed in.

    The reward for the new moniker: $96 — or, in China, 666 yuan.

    ___

    Fu Ting reported from Washington. AP researcher Shihuan Chen in Beijing contributed to this report.

    [ad_2]

    Source link

  • Apple calls on Google to help smarten up Siri and bring other AI features to iPhone

    [ad_1]

    Apple will rely on Google to help finish its efforts to smarten up its virtual assistant Siri and bring other artificial intelligence features to the iPhone as the trendsetting company plays catch up in technology’s latest craze.

    The deal allowing Apple to tap into Google’s AI technology was disclosed Monday in a joint statement from the Silicon Valley powerhouses. The partnership will draw upon Google’s Gemini technology to customize a suite of AI features dubbed “Apple Intelligence” on the iPhone and other products.

    After Google and others took the early lead in the AI race, Apple promised to plant its first big stake in the field with an array of new features that were supposed to be coming to the iPhone in 2024 as part of a ballyhooed software upgrade.

    But many of Apple’s AI features remain in the development phase, while Google and Samsung have been rolling out more of the technology on their own devices. One of the most glaring AI omissions on the iPhone has been a promised overhaul of Siri that was supposed to transform the often-confused assistant into a more conversational and versatile multitasker.

    Google even subtly mocked the iPhone’s AI shortcomings in ads promoting the release of its latest Pixel phone last summer.

    Apple’s AI missteps prompted the Cupertino, California, company to acknowledge last year that its Siri upgrade wouldn’t happen until some point during 2026.

    Getting Apple to endorse its AI implicitly represents a coup for Google, which has been steadily releasing more features built on its Gemini technology in its search engine and Gmail. The progress has intensified Google’s competition with OpenAI and its ChatGPT chatbot, which already has a deal with Apple that makes it an option on the iPhone.

    Wedbush Securities analyst Dan Ives hailed the Apple deal as a “major validation moment for Google,” in a Monday research note.

    Google’s AI inroads have helped its corporate parent, Alphabet Inc., become slightly more valuable than Apple in the assessment of investors. Alphabet marked a milestone Monday when it surpassed a market value of $4 trillion for the first time during early morning trading before slipping back below that threshold later in the session.

    Even so, Alphabet’s market value remained about $150 billion above Apple, which for years ranked as the world’s most valuable company before the rise of AI changed the stakes.

    Three other companies have joined the $4 trillion club in the past year, with AI chipmaker Nvidia becoming the first last July. Apple and Microsoft also broke the barrier last year, although the market values of those two longtime rivals are now below $4 trillion.

    Nvidia’s market value briefly topped $5 trillion in late October, before backtracking amid recurring worries that the hundreds of billions of dollars pouring into AI technology may be creating an investment bubble that will eventually burst. With its chipsets designed for AI still in high demand, Nvidia remains atop the heap with a $4.5 trillion market value.

    Alphabet’s stock price has been on a tear since early September when Google dodged the U.S. government’s attempt to break up its internet empire following a ruling last year that branded its ubiquitous search engine an illegal monopoly.

    In an effort to prevent further abuses, a federal judge overseeing the case ordered a shake-up that investors widely interpreted as a relative slap on the wrist, resulting in a 36% increase in Alphabet’s stock price since then that has created an additional $1.4 trillion in shareholder wealth.

    The ruling also left the door open for a long-running alliance in search between Google and Apple. Google pays Apple more than$20 billion annually to be the preferred search engine on the iPhone and other Apple products — an arrangement that is still allowed with a few modifications under the judge’s decision in the search case.

    [ad_2]

    Source link

  • What’s ‘algorithmic coercion,’ and why is it making things we buy more expensive? – WTOP News

    [ad_1]

    One company choosing to use a quick and reactive pricing algorithm could lead its competitors to increase prices, leading customers to face higher costs, according to a University of Virginia economist.

    One company choosing to use a quick and reactive pricing algorithm could lead its competitors to increase prices, leading to customers facing higher costs across the board, according to a recent study led by a University of Virginia economist.

    Alexander MacKay, an associate professor of economics at the University of Virginia, said the research published by the National Bureau of Economic Research reviewed a concept called algorithmic coercion.

    It’s what could happen when an algorithm leads an entire market to increase its prices for the same items, discouraging rival companies from trying to compete based on price and making mundane goods universally more expensive.

    Airlines and hotels have used some variation of pricing algorithms for years, MacKay said, but “one of the big changes is monitoring rivals’ prices and reacting to that in real time.”

    Online retailers are using software that monitors prices on competitors’ websites, and then they’ll change their prices in response, motivated to beat the prices they encounter.

    “The role of economic theory and the research that we do is to look at, ‘well, what’s the implication of this for the consumer?’” MacKay said. “And what we’re pointing out is that this could actually lead to higher prices.”

    Previously, traditional human pricing was used, allowing a person to set the price of an item. But pricing algorithms — formulas for setting prices based on inputted information — are becoming more common, MacKay said.

    MacKay said if one company uses software that can collect a rival company’s prices quickly, and the technology can react in a fast way, “then that piece of software might be capable of disciplining any company that tries to lower their price.”

    “And as a result, if the algorithm is powerful enough and the company is sort of large enough, it can really discourage any of its rivals from competing based on price,” MacKay said. “As a result, everyone’s going to set a much higher price.”

    In some cases, MacKay said, the use of advanced pricing algorithms could result in prices that would be “higher than what you might get in a competitive market.”

    “We also show in our paper that the prices could actually be so high that it would be worse for consumers than if the market participants got together and colluded on price,” he said. “So the potential of algorithmic coercion to raise prices is actually pretty substantial.”

    MacKay said his research didn’t explore which companies are using the practice and what the impacts are, but it’s “quite possible that this is happening in a number of different industries.” He noted some online retailers and retail gasoline stations as specific examples.

    [ad_2]

    Scott Gelman

    Source link

  • Fake error popups are spreading malware fast

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A dangerous cybercrime tool has surfaced in underground forums, making it far easier for attackers to spread malware. 

    Instead of relying on hidden downloads, this tool pushes fake error messages that pressure you into fixing problems that never existed. Security researchers say this method is spreading quickly because it feels legitimate. The page looks broken. The warning feels urgent. The fix sounds simple. 

    That combination is proving alarmingly effective for cybercriminals.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    How fake error malware attacks actually work

    These attacks begin with a compromised website. When a visitor lands on the page, something looks wrong right away. Text appears broken. Fonts look scrambled. Visual elements seem corrupted. A pop-up then appears claiming the issue can be fixed with a browser update or a missing system font. A button offers to repair the problem instantly. 

    Clicking that button copies a command to the clipboard and displays instructions to paste it into PowerShell or a system terminal. That single step launches the infection.

    MALICIOUS CHROME EXTENSIONS CAUGHT STEALING SENSITIVE DATA

    Fake error popups make a website look broken by scrambling text or fonts to create urgency and panic. (Jens Büttner/picture alliance via Getty Images)

    Why this new tool changes the threat landscape

    The tool behind these attacks is called ErrTraffic. It automates the entire process and removes the technical barriers that once limited cybercrime operations. For about $800, attackers get a full package with a control panel and scripted payload delivery. Analysts at the Hudson Rock Threat Intelligence Team identified the tool after tracking its promotion on Russian-language forums in early December 2025. 

    ErrTraffic works through a simple JavaScript injection. A single line of code connects a hacked site to the attacker’s dashboard. From there, everything adapts automatically. The script detects the operating system and browser. It then displays a customized fake error message in the correct language. The attack works across Windows, Android, macOS and Linux.

    MOST PARKED DOMAINS NOW PUSH SCAMS AND MALWARE

    Teen using their laptop.

    The popups often claim a browser update or missing system font is needed to fix the problem. (Daniel Acker/Bloomberg via Getty Images)

    Why security software struggles to stop it

    Traditional malware defenses look for suspicious downloads or unauthorized installations. ErrTraffic avoids both. Browsers see normal text copying. Security tools see a legitimate system utility being opened manually. Nothing appears out of place. That design allows the attack to slip through protections that would normally stop malware in its tracks.

    The success rate is deeply concerning

    Data pulled from active ErrTraffic campaigns shows conversion rates approaching 60%. That means more than half of the visitors who see the fake error message follow the instructions and install malware. Once active, the tool can deliver infostealers like Lumma or Vidar on Windows devices. Android targets often receive banking trojans instead. The control panel even includes geographic filtering, with built-in blocks for Russia and neighboring regions to avoid drawing attention from local authorities.

    What happens after infection?

    Once malware is installed, credentials and session data are stolen. Those compromised logins are then used to breach additional websites. Each newly hacked site becomes another delivery vehicle for the same attack. That cycle allows the campaign to grow without direct involvement from the original operator.

    FAKE WINDOWS UPDATE PUSHES MALWARE IN NEW CLICKFIX ATTACK

    Man looks distressed while at his computer

    Following the on-screen instructions can quietly trigger malware that steals passwords and personal data. (Kurt Knutsson)

    Ways to stay safe from fake error malware

    A few smart habits can significantly reduce risk when facing fake error pop-ups and browser-based traps.

    1) Never run commands suggested by a website

    Legitimate websites never ask you to copy and paste commands into PowerShell or a system terminal. Fake error malware relies on convincing messages that pressure you into doing exactly that. If a page instructs you to run code to fix a problem, close it immediately.

    2) Close pages that claim your system is corrupted

    Fake error campaigns often use broken text, scrambled fonts or warnings about missing files to grab attention. As a result, these visuals create urgency and trigger fear. In reality, a real system problem never announces itself through a random website, so close the page right away.

    3) Install updates only through official system settings

    Real browser and operating system updates come from built-in update tools, not pop-ups on websites. If an update is needed, your device will notify you directly through system settings or trusted app stores.

    4) Install strong antivirus software on every device

    Strong antivirus software can help block malicious scripts, detect infostealers and stop suspicious behavior before damage spreads. This is especially important since fake error malware targets Windows, Android, macOS and Linux systems.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Use a data removal service to reduce exposure

    Stolen credentials fuel the spread of fake error malware. Removing personal information from data broker sites can reduce the impact if login details are compromised and limit how far an attack can spread.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    6) Treat font and browser update pop-ups with suspicion

    Claims about missing fonts or outdated browsers are a hallmark of these attacks. Modern systems manage fonts automatically, and browsers update themselves. A webpage has no reason to request manual fixes.

    If a real update is needed, the operating system will request it directly. A random webpage never should.

    Kurt’s key takeaways 

    Fake error malware works because it plays on a very human reaction. When something on a screen suddenly looks broken, most people want to fix it fast and move on. That split-second decision is exactly what attackers are counting on. Tools like ErrTraffic show how polished these scams have become. The messages look professional. The instructions feel routine. Nothing about the moment screams danger. But behind the scenes, one click can quietly hand over passwords, banking access and personal data. The good news is that slowing down makes a real difference. Closing a suspicious page and trusting built-in system updates can stop these attacks cold. When it comes to pop-ups claiming your device is broken, walking away is often the smartest fix.

    Have you ever seen a pop-up or error message that made you stop and wonder if it was real? Tell us what it looked like and how you handled it by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • One Tech Tip: Spend quality time with loved ones, not a screen, over the holidays

    [ad_1]

    The Christmas holiday season is a time to step back from the busy pace of modern life and connect with our nearest and dearest instead of screens, apps and chatbots.

    Here are some suggestions on how to unplug from the online world for the next few weeks as you sit down for a festive meal, exchange gifts or take time out for some self-reflection.

    Your phone already has built-in features that can help you stop getting distracted.

    To temporarily silence all those attention-seeking notifications, use the Focus setting on your iPhone or Android device. This mode is designed to stop interruptions when you want to concentrate. You can customize it by blocking specific apps or muting only when you’re doing certain things, like sleeping or reading.

    Android and iOS also have related screen time controls to manage overall device usage. Too much Instagram scrolling? Limit yourself to a daily total of 20 minutes.

    There are other tricks you could try, like turning the screen gray to make it less appealing. On iPhones or Android devices, tweak the color filter or adjustment settings. On Android, activating Bedtime Mode also turns the screen gray.

    If you need to be more strict with yourself, then delete any or apps you’re addicted to. An effective way to stop looking at your phone is by removing those apps that you spend the most time scrolling through, even if temporarily. You can always reinstall them again if the withdrawal symptoms become too much.

    When the temperature drops, it’s tempting to hunker down inside and stay cozy. But don’t sit on the couch all day. Head outdoors, away from Wi-Fi signals. If it’s been snowing where you are, have a snowball fight or go sledding. To keep your hands warm, don’t forget to put on bulky mittens — which your phone’s touch screen won’t respond to.

    Even if there’s no snow, take a walk in the woods, a park or along some tree-lined streets. Time spent outdoors, and away from screens, can benefit your mental health and physical well-being. There’s even a term for it: forest bathing.

    There’s an app you can use to force yourself to — literally — get back in touch with nature. Touch Grass takes its name from a viral catchphrase for when someone has lost their connection to the real world because they’re consumed by what’s on their screens.

    It’s similar to other apps designed to restrict screen time by forcing users to take a timeout from scrolling. The difference is that Touch Grass requires users to go outside and take a picture of themselves physically touching some grass.

    Touch Grass has a free service level that allows you to block two apps. I found it was quite effective at stopping me from opening two of my favorite time-wasters, Reddit and Instagram, though I ended up spending more time on other apps like Facebook. To block all apps, you’ll have to shell out for a subscription — $6 a month or $50 annually.

    If you can’t find grass because it’s winter, there’s also the option to touch snow or sand. It’s only available for iPhones so far, but there are copycat versions for both iOS and Android, though we haven’t tested them.

    When was the last time you sent a Christmas card? Most digital natives find it easier to type out holiday greetings or send digital cards over chat apps, than to put pen to paper.

    The consequence of all the time that we spend tapping, typing or swiping on our devices is that handwriting is becoming something of a dying art. But there are neurological and cognitive benefits of handwriting, research suggests. For example, taking notes by hand is a better way for students to learn and to remember information.

    So use this time of year to write a thoughtful message to someone special, a letter to a long-lost friend, or thank you notes for presents received.

    If you still don’t know what you want for Christmas, why not ask for a book? It’s easy to find inspiration and ideas at this time of year, when many people like to share the books they’ve read over the past 12 months, and outlets including The Associated Press compile their list of the year’s best books.

    Reading long-form literature or non-fiction has many benefits that can’t be gained from glancing at short-form bursts of text on your device, including a deeper understanding of a topic, developing empathy, increasing your focus and concentration and more.

    If you’re looking for a last-minute gift, how about a time-lock vault to put your devices out of reach for, say, 15 minutes, a few hours or even weeks?

    There are plenty of versions for sale online. For about $30, I bought a battery-powered gray plastic model that can hold several smartphones. The instruction leaflet says it’s intended to “enhance self-discipline.”

    Punch in the amount of time — up to 30 days — and a digital display will count down until it unlocks. The lid has portholes so you can thread in cables for charging while you wait.

    One evening, I locked my phone up for an hour and then grabbed my laptop to do some online Christmas shopping. But my plans were foiled because I forgot that authentication requests for my credit card and Amazon went to my phone.

    For another gift idea, consider putting a brick phone under the tree. Also known as a feature phone, these devices cater to those who want a back-to-basics phone without all the digital stimulation that comes with a smartphone.

    Retro devices from Nokia evoke the early days of the cellphone era — no touch screens, numeric keypads and throwback video games like Snake. Most can only make voice calls and send text messages.

    If that sounds too primitive, there are so-called digital minimalist phones that serve a similar market niche. Devices from Light, Punkt and Balance offer sleek, modern designs but with a stripped-down experience.

    ___

    Is there a tech topic that you think needs explaining? Write to us at onetechtip@ap.org with your suggestions for future editions of One Tech Tip.

    [ad_2]

    Source link

  • France probes ‘foreign interference’ after remote control malware found on passenger ferry

    [ad_1]

    PARIS — France’s counterespionage agency is investigating a suspected cyberattack plot targeting an international passenger ferry, authorities said Wednesday.

    A Latvian crew member is in custody facing charges of having acted for an unidentified foreign power, French officials said. But Interior Minister Laurent Nunez appeared to hint that Russia is suspected, saying: “At the moment, foreign interference very often comes from same country.”

    France and other European allies of Ukraine allege that Russia is waging “hybrid warfare” against them, using sabotage, assassinations, cyberattacks, disinformation and other hostile acts that are often hard to quickly trace back to Moscow.

    Intelligence shared by Italian authorities tipped off the General Directorate of Internal Security — France’s special counterespionage and counterterror intelligence service — that software sometimes used by cybercriminals may have infected computer systems aboard a ferry docked in the French Mediterranean port of Sète, the Paris prosecutor’s office said.

    The so-called RAT software — which allows users to control computer systems remotely — could have been used to take control of the ferry’s computers, the prosecutor’s office said. Its statement did not name ferry.

    Nunez told public broadcaster France Info that “individuals tried to gain access to a ship’s data-processing system.” He described it as “a very serious affair.” Asked if the suspected intention was to hijack the vessel, he said: “We don’t know.”

    He added: “The investigators appear to be following a trail of interference … foreign interference.”

    Police on Friday arrested two of the ferry’s crew members — one Latvian, the other Bulgarian — who Italian authorities had identified as suspects, the prosecutor’s office said. The Bulgarian was subsequently released without charge after questioning.

    The Latvian national is being held on a preliminary criminal conspiracy charge and two preliminary charges of hacking-related offenses with the goal of serving the interests of an unnamed foreign power, the prosecutor’s office said.

    It said search raids were also carried out in Latvia. Latvian state police said they had no comment.

    The ferry is now back in operation after being held in port for security checks to its computer system, the prosecutor’s office said.

    ___

    AP European Security Correspondent Emma Burrows in London contributed.

    [ad_2]

    Source link

  • Following Australia’s lead, Denmark plans to ban social media for children under 15

    [ad_1]

    COPENHAGEN, Denmark — As Australia began enforcing a world-first social media ban for children under 16 years old this week, Denmark is planning to follow its lead and severely restrict social media access for young people.

    The Danish government announced last month that it had secured an agreement by three governing coalition and two opposition parties in parliament to ban access to social media for anyone under the age of 15. Such a measure would be the most sweeping step yet by a European Union nation to limit use of social media among teens and children.

    The Danish government’s plans could become law as soon as mid-2026. The proposed measure would give some parents the right to let their children access social media from age 13, local media reported, but the ministry has not yet fully shared the plans.

    Many social media platforms already ban children younger than 13 from signing up, and a EU law requires Big Tech to put measures in place to protect young people from online risks and inappropriate content. But officials and experts say such restrictions don’t always work.

    Danish authorities have said that despite the restrictions, around 98% of Danish children under age 13 have profiles on at least one social media platform, and almost half of those under 10 years old do.

    The minister for digital affairs, Caroline Stage, who announced the proposed ban last month, said there is still a consultation process for the measure and several readings in parliament before it becomes law, perhaps by “mid to end of next year.”

    “In far too many years, we have given the social media platforms free play in the playing rooms of our children. There’s been no limits,” Stage said in an interview with The Associated Press last month.

    “When we go into the city at night, there are bouncers who are checking the age of young people to make sure that no one underage gets into a party that they’re not supposed to be in,” she added. “In the digital world, we don’t have any bouncers, and we definitely need that.”

    Under the new Australian law, Facebook, Instagram, Kick, Reddit, Snapchat, Threads, TikTok, X and YouTube face fines of up to 50 million Australian dollars ($33 million) if they fail to take reasonable steps to remove accounts of Australian children younger than 16.

    Some students say they are worried that similar strict laws in Denmark would mean they will lose touch with their virtual communities.

    “I myself have some friends that I only know from online, and if I wasn’t fifteen yet, I wouldn’t be able to talk with those friends,” 15-year-old student Ronja Zander, who uses Instagram, Snapchat and TikTok, told the AP.

    Copenhagen high school student Chloé Courage Fjelstrup-Matthisen, 14, said she is aware of the negative impact social media can have, from cyberbullying to seeing graphic content. She said she saw video of a man being shot several months ago.

    “The video was on social media everywhere and I just went to school and then I saw it,” she said.

    Line Pedersen, a mother from Nykøbing in Denmark, said she believed the plans were a good idea.

    “I think that we didn’t really realize what we were doing when we gave our children the telephone and social media from when they were eight, 10 years old,” she said. “I don’t quite think that the young people know what’s normal, what’s not normal.”

    Danish officials are yet to share how exactly the proposed ban would be enforced and which social media platforms would be affected.

    However, a new “digital evidence” app, announced by the Digital Affairs Ministry last month and expected to launch next spring, will likely form the backbone of the Danish plans. The app will display an age certificate to ensure users comply with social media age limits, the ministry said.

    “One thing is what they’re saying and another thing is what they’re doing or not doing,” Stage said, referring to social media platforms. “And that’s why we have to do something politically.”

    Some experts say restrictions, such as the ban planned by Denmark, don’t always work and they may also infringe on the rights of children and teenagers.

    “To me, the greatest challenge is actually the democratic rights of these children. I think it’s sad that it’s not taken more into consideration,” said Anne Mette Thorhauge, an associate professor at the University of Copenhagen.

    “Social media, to many children, is what broadcast media was to my generation,” she added. “It was a way of connecting to society.”

    Currently, the EU’s Digital Services Act, which took effect two years ago, requires social media platforms to ensure there are measures including parental controls and age verification tools before young users can access the apps.

    EU officials have acknowledged that enforcing the regulations aiming at protecting children online has proven challenging because it requires cooperation between member states and many resources.

    Denmark is among several countries that have indicated they plan to follow in Australia’s steps. The Southeast Asian country of Malaysia is expected to ban social media account s for people under the age of 16 starting at the beginning of next year, and Norway is also taking steps to restrict social media access for children and teens.

    China — which manufacturers many of the world’s digital devices — has set limits on online gaming time and smartphone time for kids.

    [ad_2]

    Source link

  • Following Australia’s Lead, Denmark Plans to Ban Social Media for Children Younger Than 15

    [ad_1]

    The Danish government announced last month that it had secured an agreement by three governing coalition and two opposition parties in parliament to ban access to social media for anyone under the age of 15. Such a measure would be the most sweeping step yet by a European Union nation to limit use of social media among teens and children.

    The Danish government’s plans could become law as soon as mid-2026. The proposed measure would give some parents the right to let their children access social media from age 13, local media reported, but the ministry has not yet fully shared their plans.

    Many social media platforms already ban children younger than 13 from signing up, and a EU law requires Big Tech to put measures in place to protect young people from online risks and inappropriate content. But officials and experts say such restrictions don’t always work.

    Danish authorities have said that despite the restrictions, around 98% of Danish children under age 13 have profiles on at least one social media platform, and almost half of those under 10 years old do.

    The minister for digital affairs, Caroline Stage, who announced the proposed ban last month, said there is still a consultation process for the measure and several readings in parliament before it becomes law, perhaps by “mid to end of next year.”

    “In far too many years, we have given the social media platforms free play in the playing rooms of our children. There’s been no limits,” Stage said in an interview with The Associated Press last month.

    “When we go into the city at night, there are bouncers who are checking the age of young people to make sure that no one underage gets into a party that they’re not supposed to be in,” she added. “In the digital world, we don’t have any bouncers, and we definitely need that.”

    Under the new Australian law, Facebook, Instagram, Kick, Reddit, Snapchat, Threads, TikTok, X and YouTube face fines of up to 50 million Australian dollars ($33 million) if they fail to take reasonable steps to remove accounts of Australian children younger than 16.

    Some students say they are worried that similar strict laws in Denmark would mean they will losing touch with their virtual communities.

    “I myself have some friends that I only know from online, and if I wasn’t fifteen yet, I wouldn’t be able to talk with those friends,” 15-year-old student Ronja Zander, who uses Instagram, Snapchat and TikTok, told the AP.

    Copenhagen high school student Chloé Courage Fjelstrup-Matthisen, 14, said she is aware of the negative impact social madia can have, from cyberbullying to seeing graphic content. She said she saw video of a man being shot several months ago.

    “The video was on social media everywhere and I just went to school and then I saw it,” she said.

    Line Pedersen, a mother from Nykøbing in Denmark, said she believed the plans were a good idea.

    “I think that we didn’t really realize what we were doing when we gave our children the telephone and social media from when they were eight, ten years old,” she said. “I don’t quite think that the young people know what’s normal, what’s not normal.”


    Age certificate likely part of the plan

    Danish officials are yet to share how exactly the proposed ban would be enforced and which social media platforms would be affected.

    However, a new “digital evidence” app, announced by the Digital Affairs Ministry last month and expected to launch next spring, will likely form the backbone of the Danish plans. The app will display an age certificate to ensure users comply with social media age limits, the ministry said.

    “One thing is what they’re saying and another thing is what they’re doing or not doing,” Stage said, referring to social media platforms. “And that’s why we have to do something politically.”

    Some experts say restrictions, such as the ban planned by Denmark, don’t always work and they may also infringe on the rights of children and teenagers.

    “To me, the greatest challenge is actually the democratic rights of these children. I think it’s sad that it’s not taken more into consideration,” said Anne Mette Thorhauge, an associate professor at the University of Copenhagen.

    “Social media, to many children, is what broadcast media was to my generation,” she added. “It was a way of connecting to society.”

    Currently, the EU’s Digital Services Act, which took effect two years ago, requires social media platforms to ensure there are measures including parental controls and age verification tools before young users can access the apps.

    EU officials have acknowledged that enforcing the regulations aiming at protecting children online has proven challenging because it requires cooperation between member states and many resources.

    Denmark is among several countries that have indicated they plan to follow in Australia’s steps. The Southeast Asian country of Malaysia is expected to ban social media account s for people under the age of 16 starting at the beginning of next year, and Norway is also taking steps to restrict social media access for children and teens.

    Copyright 2025 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

    Photos You Should See – December 2025

    [ad_2]

    Associated Press

    Source link

  • Airlines adopt software fix for Airbus A320 after plane has sudden altitude drop

    [ad_1]

    Airlines around the world canceled and delayed flights heading into the weekend to fix software on a widely used commercial aircraft after an analysis found the computer code may have contributed to a sudden drop in the altitude of a JetBlue plane last month.

    Airbus said Friday that an examination of the JetBlue incident revealed that intense solar radiation may corrupt data critical to the functioning of flight controls on the A320 family of aircraft.

    The FAA joined the European Union Aviation Safety Agency in requiring airlines to address the issue with a new software update. More than 500 U.S.-registered aircraft will be impacted.

    The EU safety agency said it may cause “short-term disruption” to flight schedules. The problem was introduced by a software update to the plane’s onboard computers, according to the agency.

    In Japan, All Nippon Airways, which operates more than 30 planes, canceled 65 domestic flights for Saturday. Additional cancellations on Sunday were possible, it said.

    The software change comes as U.S. passengers were beginning to head home from the Thanksgiving holiday, which is the busiest travel time in the country.

    American Airlines has about 480 planes from the A320 family, of which 209 are affected. The fix should take about two hours for many aircraft and updates should be completed for the overwhelming majority on Friday, the airline said. A handful will be finished Saturday.

    American expected some delays but it said it was focused on limiting cancellations. It said safety would be its overriding priority.

    Air India said via the social platform X that its engineers were working on the fix and completed the reset on more 40% of aircraft that need it. There were no cancellations, it said.

    Delta said it expected the issue to affect less than 50 of its A321neo aircraft. United said six planes in its fleet are affected and it expects minor disruptions to a few flights. Hawaiian Airlines said it was unaffected.

    Mike Stengel, a partner with the aerospace industry management consulting firm AeroDynamic Advisory, said the fix could be addressed between flights or on overnight plane checks.

    “Definitely not ideal for this to be happening on a very ubiquitous aircraft on a busy holiday weekend,” Stengel said from Ann Arbor, Michigan. “Although again the silver lining being that it only should take a few hours to update the software.”

    At least 15 JetBlue passengers were injured and taken to the hospital after the Oct. 30 incident on board the flight from Cancun, Mexico, to Newark, New Jersey. The plane was diverted to Tampa, Florida.

    Airbus, which is registered in the Netherlands but has its main headquarters in France, is one of the world’s biggest airplane manufacturers, alongside Boeing.

    The A320 is the primary competitor to Boeing’s 737, Stengel said. Airbus updated its engine in the mid-2010s, and planes in this category are called A320neo, he said.

    The A320 is the world’s bestselling single-aisle aircraft family, according to Airbus’ website.

    ___

    Associated Press writers Mari Yamaguchi in Tokyo and Jennifer Kelleher in Honolulu contributed.

    [ad_2]

    Source link

  • Airlines work to fix software glitch on A320 aircraft and some flights are disrupted

    [ad_1]

    Airlines around the world reported short-term disruptions heading into the weekend as they fixed software on a widely used commercial aircraft, after an analysis found the computer code may have contributed to a sudden drop in the altitude of a JetBlue plane last month.

    Airbus said Friday that an examination of the JetBlue incident revealed that intense solar radiation may corrupt data critical to the functioning of flight controls on the A320 family of aircraft.

    The FAA joined the European Union Aviation Safety Agency in requiring airlines to address the issue with a new software update. More than 500 U.S.-registered aircraft will be impacted.

    The EU safety agency said it may cause “short-term disruption” to flight schedules. The problem was introduced by a software update to the plane’s onboard computers, according to the agency.

    In Japan, All Nippon Airways, which operates more than 30 planes, canceled 65 domestic flights for Saturday. Additional cancellations on Sunday were possible, it said.

    The software change comes as U.S. passengers were beginning to head home from the Thanksgiving holiday, which is the busiest travel time in the country.

    American Airlines has about 480 planes from the A320 family, of which 209 are affected. The fix should take about two hours for many aircraft and updates should be completed for the overwhelming majority on Friday, the airline said. A handful will be finished Saturday.

    American expected some delays but it said it was focused on limiting cancellations. It said safety would be its overriding priority.

    Air India said on X that its engineers were working on the fix and completed the reset on more 40% of aircraft that need it. There were no cancellations, it said.

    Delta said it expected the issue to affect less than 50 of its A321neo aircraft. United said six planes in its fleet are affected and it expects minor disruptions to a few flights. Hawaiian Airlines said it was unaffected.

    Pope Leo XIV is on his inaugural foreign trip, to Turkey and Lebanon, and is flying along with the papal delegation and press corps aboard an ITA Airways Airbus A320neo charter.

    The Vatican spokesman, Matteo Bruni, said Saturday that ITA was working on the issue. He said the necessary component to update the aircraft was on its way to Istanbul along with the technician to install it. Leo was scheduled to fly from Istanbul, Turkey to Beirut, Lebanon on Sunday afternoon.

    In France, Transport Minister Philippe Tabarot said the situation has stabilized as several software updates had already been installed. He said the impact was limited in the country with an “almost complete return to normal in French airports.”

    In the U.K., disruption also was minimal. British Airways, for example, said only three of its aircraft required the update, while EasyJet indicated there may be changes to its flying schedule as a result of the update, in which case passengers will be informed.

    Germany’s Lufthansa said most software updates were completed during the night and on Saturday morning. No Lufthansa Group Airlines flights are expected to be canceled due to the current situation, but there may be minor delays over the weekend, it said.

    Scandinavia’s SAS said its flights were operating as normal Saturday, after teams worked overnight to install the required software.

    Mike Stengel, a partner with the aerospace industry management consulting firm AeroDynamic Advisory, said the fix could be addressed between flights or on overnight plane checks.

    “Definitely not ideal for this to be happening on a very ubiquitous aircraft on a busy holiday weekend,” Stengel said from Ann Arbor, Michigan. “Although again the silver lining being that it only should take a few hours to update the software.”

    At least 15 JetBlue passengers were injured and taken to the hospital after the Oct. 30 incident on board the flight from Cancun, Mexico, to Newark, New Jersey. The plane was diverted to Tampa, Florida.

    Airbus, which is registered in the Netherlands but has its main headquarters in France, is one of the world’s biggest airplane manufacturers, alongside Boeing.

    The A320 is the primary competitor to Boeing’s 737, Stengel said. Airbus updated its engine in the mid-2010s, and planes in this category are called A320neo, he said.

    The A320 is the world’s bestselling single-aisle aircraft family, according to Airbus’ website.

    ___

    Associated Press writers Mari Yamaguchi in Tokyo, Jennifer Kelleher in Honolulu, Geir Moulson in Berlin, Pan Pylas in London and Nicole Winfield in Istanbul contributed to this report.

    [ad_2]

    Source link

  • 3 reasons to switch to virtual set design

    [ad_1]

    Key points:

    If you’ve attended a professional show or musical recently, chances are you’ve seen virtual set design in action. This approach to stage production has gained so much traction it’s now a staple in the industry. After gaining momentum in professional theater, it has made its way into collegiate performing arts programs and is now emerging in K-12 productions as well.

    Virtual set design offers a modern alternative to traditional physical stage sets, using technology and software to create immersive backdrops and environments. This approach unlocks endless creative possibilities for schools while also providing practical advantages.

    Here, I’ll delve into three key benefits: increasing student engagement and participation, improving efficiency and flexibility in productions, and expanding educational opportunities.

    Increasing student engagement and participation

    Incorporating virtual set design into productions gets students excited about learning new skills while enhancing the storytelling of a show. When I first joined Churchill High School in Livonia, Michigan as the performing arts manager, the first show we did was Shrek the Musical, and I knew it would require an elaborate set. While students usually work together to paint the various backdrops that bring the show to life, I wanted to introduce them to collaborating on virtual set design.

    We set up Epson projectors on the fly rail and used them to project images as the show’s backdrops. Positioned at a short angle, the projectors avoided any shadowing on stage. To create a seamless image with both projectors, we utilized edge-blending and projection mapping techniques using just a Mac® laptop and QLab software. Throughout the performance, the projectors transformed the stage with a dozen dynamic backdrops, shifting from a swamp to a castle to a dungeon.

    Students were amazed by the technology and very excited to learn how to integrate it into the set design process. Their enthusiasm created a real buzz around the production, and the community’s feedback on the final results were overwhelmingly positive.

    Improving efficiency and flexibility

    During Shrek the Musical, there were immediate benefits that made it so much easier to put together a show. To start, we saved money by eliminating the need to build multiple physical sets. While we were cutting costs on lumber and materials, we were also solving design challenges and expanding what was possible on stage.

    This approach also saved us valuable time. Preparing the sets in the weeks leading up to the show was faster, and transitions during performances became seamless. Instead of moving bulky scenery between scenes or acts, the stage crew simply switched out projected images making it much more efficient.

    We saw even more advantages in our spring production of She Kills Monsters. Some battle scenes called for 20 or 30 actors to be on stage at once, which would have been difficult to manage with a traditional set. By using virtual production, we broke the stage up with different panels spaced apart and projected designs, creating more space for performers. We were able to save physical space, as well as create a design that helped with stage blocking and made it easier for students to find their spots.

    Since using virtual sets, our productions have become smoother, more efficient, and more creative.

    Expanding educational opportunities

    Beyond the practical benefits, virtual set design also creates valuable learning opportunities for students. Students involved in productions gain exposure to industry-level technology and learn about careers in the arts, audio, and video technology fields. Introducing students to these opportunities before graduating high school can really help prepare them for future success.

    Additionally, in our school’s technical theater courses, students are learning lessons on virtual design and gaining hands-on experiences. As they are learning about potential career paths, they are developing collaboration skills and building transferable skills that directly connect to college and career readiness.

    Looking ahead with virtual set design

    Whether students are interested in graphic design, sound engineering, or visual technology, virtual production brings countless opportunities to them to explore. It allows them to experiment with tools and concepts that connect directly to potential college majors or future careers.

    For schools, incorporating virtual production into high school theater offers more than just impressive shows. It provides a cost-effective, flexible, and innovative approach to storytelling. It is a powerful tool that benefits productions, enriches student learning, and prepares the next generation of artists and innovators.

    Latest posts by eSchool Media Contributors (see all)

    [ad_2]

    Jared Cole, Churchill High School, Livonia Public Schools

    Source link

  • Frustrations grow in Russia over cellphone internet outages that disrupt daily life

    [ad_1]

    TALLINN, Estonia (AP) — When Russians look back at 2025, they might remember it as the year when the government took even tighter control of the internet.

    Credit cards that won’t buy a ticket on public transport. ATMs that don’t connect to a network. Messaging apps that are down. Cellphones that don’t receive texts or data after a trip abroad. Mothers of diabetic children even complain with alarm that they can’t monitor their kids’ blood glucose levels during outages.

    The cellphone internet shutdowns, ostensibly to thwart Ukrainian drone attacks, have hit dozens of Russian regions for months. Popular messaging apps also are restricted, with the government promoting a state-controlled app seen by critics as a possible surveillance tool.

    Although broadband and Wi-Fi internet access remain unaffected, Russians contacted by The Associated Press described digital disruptions to their daily lives. All spoke on condition of not being fully identified for their own safety.

    Blackouts and ‘white lists’ are part of Russian strategy

    Widespread cellphone internet shutdowns began in May and persisted through summer and into the fall. In November, 57 Russian regions on average reported daily disruptions to cellphone links, according to Na Svyazi, an activist group monitoring shutdowns.

    Authorities say these outages are designed to prevent Ukrainian drones from tapping mobile networks for navigation.

    Kremlin spokesman Dmitry Peskov said they are “absolutely justified and necessary,” but analyst Kateryna Stepanenko of the Washington-based Institute for the Study of War said they haven’t been effective in curbing the intensity of Ukraine’s drone attacks, “given the amount of strikes we’ve seen in recent months on Russian oil refineries.”

    In many regions, only a handful of government-approved Russian websites and online services — designated as being on “white lists” — are available during connectivity blackouts.

    What’s available on the “white lists” varies by provider and includes official websites, email and social media platforms, two online markets, and the Russian search engine Yandex and its services. One provider offers access to a banking app, but others don’t. Authorities have promised to expand the lists.

    Marina, who lives in the Pacific coast city of Vladivostok, described her anxiety when she discovered only one app for a government-controlled bank was working during a mobile internet outage and she wondered what this meant for the future.

    “For me, this is the scariest thing,” she said. “The loss of information, the loss of freedom, essentially, is the most depressing thing for me.”

    In the Volga River city of Ulyanovsk, about 700 kilometers (435 miles) east of Moscow, one resident described how his credit card didn’t work when he tapped it on the payment terminal on a tram during an outage. He wasn’t carrying enough cash.

    Families with diabetic children say they can’t monitor their children’s glucose levels via special apps when they are at school and cellphone internet is down. Mothers in social media posts explain that children often can miss the moment when their blood sugar levels change, requiring an intervention, and special apps allowed parents to see that remotely and warn them. Connection outages disrupt that.

    Authorities have tried touting the joys of reconnecting with a technology-free lifestyle.

    Internet regulatory agency Roskomnadzor posted a cartoon on social media showing two views of a young man: one in a dark apartment staring at his phone and another strolling happily in a park, carrying a cup of coffee and a book.

    Going offline “doesn’t mean losing touch. Sometimes it means getting in touch with yourself,” the cartoon advised.

    But the post mostly drew angry and sarcastic comments.

    Restrictions set on SIM cards

    One recent anti-drone restriction sets 24-hour “cooling periods” during which data and texts are blocked from SIM cards that were carried abroad or have been inactive for 72 hours. The owner can unblock it via a link received by text message.

    Unblocking becomes impossible, however, if a SIM card is used in internet-connected appliances or equipment without interfaces for receiving text messages, like portable Wi-Fi routers, cars or meter boxes.

    Lawmaker Andrei Svintsov noted that Russia has many electricity meters with SIM cards that transmit readings once a month.

    “Does this mean they’ll all die? All the heating boilers will shut down, and all the Chinese cars will stop working? This is a massive problem, and I don’t know if the government is even aware of it,” he said.

    Messaging apps are targeted

    Other restrictions targeted two popular messaging apps: WhatsApp, with about 96 million monthly users in October, and Telegram, with 91 million, according to media monitoring group Mediascope.

    Authorities began restricting calls on these apps in August, supposedly to stop phone scams, and are throttling them in some parts of Russia. Yelena, in the southern city of Krasnodar, recalled a time in October when Telegram wasn’t available at all, affecting the work of her and her colleagues.

    Neither app is on the government “white list.”

    On the list is Russian messaging service MAX. Authorities actively promote it and since September the service is required to be preinstalled on all smartphones in Russia. Critics see it as a surveillance tool as MAX openly declares it will share user data with authorities upon request. Experts also say it doesn’t use end-to-end encryption.

    State institutions, officials and businesses are being encouraged to move communications and blogs to MAX. Marina, the Vladivostok resident, said her employers are insisting on people using MAX, to little enthusiasm. She said she doesn’t plan to install it, and neither do others contacted by the AP.

    MAX developers boast of about 50 million users registering on the platform that it says provides messaging and other services.

    Mediascope said MAX had about 48 million monthly users in October, but only 18.9 million average daily users, which is far less than the average daily totals of 81 million for WhatsApp and 68 million for Telegram.

    Russians shrug at restrictions

    Denis Volkov, director of the Levada Center, Russia’s top independent pollster, said many Russians regard the restrictions the same way they feel about the weather: Ultimately, you can do nothing about it.

    The authorities’ strategy appears to be to make it difficult for average users to access “alternative content” so that they eventually stop seeking it, Volkov said. Those “who are not that interested will pick simpler channels and ways” to navigate the internet, he said.

    That sentiment was echoed by the Ulyanovsk resident who said he uses a virtual private network to access some of the blocked websites and platforms, but VPNs also are routinely blocked, so he must install a new one every few months.

    His tight circle of friends trade recommendations on VPNs, but he believes most people won’t make that much effort.

    Mikhail Klimarev, executive director of the Internet Protection Society activist group, says the internet is tied to too many economic activities to shut it totally.

    “Groceries are being shipped to stores — this is being done via internet, the ordering, the processing, and so on,” he said. “A truck is on the road, it is connected to an information system, maps, navigation, all of it.”

    But he forecasts more stifling of websites, VPNs and platforms including totally blocking messenger apps Telegram and WhatsApp and possibly other, unexpected measures.

    “Honestly, I’m watching it all with raised eyebrows. They seem to have come up with everything already, and they’re still coming up with something more,” he said.

    [ad_2]

    Source link