ReportWire

Tag: Software

  • Vibe Coding Is the New Open Source—in the Worst Way Possible

    [ad_1]

    Just like you probably don’t grow and grind wheat to make flour for your bread, most software developers don’t write every line of code in a new project from scratch. Doing so would be extremely slow and could create more security issues than it solves. So developers draw on existing libraries—often open source projects—to get various basic software components in place.

    While this approach is efficient, it can create exposure and lack of visibility into software. Increasingly, however, the rise of vibe coding is being used in a similar way, allowing developers to quickly spin up code that they can simply adapt rather than writing from scratch. Security researchers warn, though, that this new genre of plug-and-play code is making software-supply-chain security even more complicated—and dangerous.

    “We’re hitting the point right now where AI is about to lose its grace period on security,” says Alex Zenla, chief technology officer of the cloud security firm Edera. “And AI is its own worst enemy in terms of generating code that’s insecure. If AI is being trained in part on old, vulnerable, or low-quality software that’s available out there, then all the vulnerabilities that have existed can reoccur and be introduced again, not to mention new issues.”

    In addition to sucking up potentially insecure training data, the reality of vibe coding is that it produces a rough draft of code that may not fully take into account all of the specific context and considerations around a given product or service. In other words, even if a company trains a local model on a project’s source code and a natural language description of goals, the production process is still relying on human reviewers’ ability to spot any and every possible flaw or incongruity in code originally generated by AI.

    “Engineering groups need to think about the development lifecycle in the era of vibe coding,” says Eran Kinsbruner, a researcher at the application security firm Checkmarx. “If you ask the exact same LLM model to write for your specific source code, every single time it will have a slightly different output. One developer within the team will generate one output and the other developer is going to get a different output. So that introduces an additional complication beyond open source.”

    In a Checkmarx survey of chief information security officers, application security managers, and heads of development, a third of respondents said that more than 60 percent of their organization’s code was generated by AI in 2024. But only 18 percent of respondents said that their organization has a list of approved tools for vibe coding. Checkmarx polled thousands of professionals and published the findings in August—emphasizing, too, that AI development is making it harder to trace “ownership” of code.

    [ad_2]

    Lily Hay Newman

    Source link

  • Apple takes down app that allows people to track and anonymously report sightings of ICE agents

    [ad_1]

    Apple has taken down an app that uses crowdsourcing to flag sightings of U.S. immigration agents, apparently after being pressured by U.S. authorities.

    ICEBlock, a free iPhone-only app lets users anonymously report and monitor activity by Immigration and Customs Enforcement (ICE) officers, was no longer available on Apple’s App Store as of Friday.

    “We just received a message from Apple’s App Review that #ICEBlock has been removed from the App Store due to “objectionable content’,” the developer said in a social media post. “The only thing we can imagine is this is due to pressure from the Trump Admin. We have responded and we’ll fight this!”

    The developer said last month that it had more than 1 million users. Even though it has been removed from the app marketplace, those who have already downloaded the app should still be able to use it.

    Apple did not respond immediately to a request for comment.

    “We created the App Store to be a safe and trusted place to discover apps,” the company said in a statement to other media outlets. “Based on information we’ve received from law enforcement about the safety risks associated with ICEBlock, we have removed it and similar apps from the App Store.”

    Downloads of apps like ICEblock have surged as the Trump administration steps up immigration enforcement with surprise raids. The technology has come under fire from authorities after agents were targeted.

    Officials said last month that a gunman who opened fire on an Immigration and Customs Enforcement facility in Dallas had searched for apps that tracked the presence of ICE agents.

    [ad_2]

    Source link

  • Why Are Car Software Updates Still So Bad?

    [ad_1]

    Despite years of effort and the outlay of billions of dollars, none of the world’s automakers have yet to match Tesla’s prowess in delivering over-the-air (OTA) software updates. Just like with your phone and laptop, these operating system refreshes allow owners to upgrade their cars remotely.

    Tesla introduced OTAs in 2012, but now Elon Musk’s company pumps out these updates like no other automaker. “Tesla once issued 42 updates within six months,” Jean-Marie Lapeyre, Capgemini’s CTO for automotive, tells WIRED. But for many other automakers, says Lapeyre, OTAs ship “maybe once a year.”

    For traditional car companies, software remains, or has been until very recently, merely one bolt-on component among many. In contrast, for Tesla and other digital-native automakers—among them Rivian, Lucid, Polestar, and Chinese brands such as BYD, Xpeng, and Xiaomi—it’s almost the whole shebang.

    Interestingly, GM was actually the first automaker to introduce OTA functionality, two years ahead of Tesla, but it was limited to the OnStar telematics system. OTAs from traditional automakers often add just infotainment tweaks, while OTAs from the digital-first brands can be shape-shifters, increasing range and boosting speed. They often also gift features from the puerile to the genuinely performative: fart noises on demand from Tesla, plusher suspension for Rivian owners, and car unlocking by phone from Polestar.

    Cars have had onboard microprocessors since the 1970s, but until relatively recently traditional automakers made their cars with software designed to remain largely unchanged throughout a vehicle’s 20-year lifespan. Since 2021, the complexity of the latest vehicle software platforms has increased by about 40 percent per year, estimates McKinsey. There are now 69 million OTA-capable vehicles in the US, reckons S&P Global.

    Such software-defined vehicles, or SDVs, would boost car sales, automakers hoped. According to two scorecards measuring SDV progress, Tesla leads the pack. Gartner’s Digital Automaker Index for 2025 places Chinese EV manufacturers Nio and Xiaomi in second and third positions, respectively. Wards Intelligence agrees these are the three to beat. On the other end of the scale, and similar to the Wards analysis, Nissan, Toyota, Mazda, and Jaguar Land Rover wallow at the bottom.

    Saving and Selling

    Done right, OTAs not only freshen a car’s user experience, they can also slash the cost of recalls for automakers. More than 13 million vehicles were recalled in 2024 due to software-related issues, a 35 percent increase over the prior year. Before OTAs, the average cost of an auto recall was about $500 per vehicle. OTAs may be delivered wirelessly, but they are not cost-free, either for the environment or for automakers—Harman Automotive, a supplier of OTA software, estimates that it costs an automaker $66.50 per vehicle to deliver a 1 GB update.

    But it’s usually only the digital natives sending out huge update files, because generally only they are capable of firmware over-the-air (FOTA) updates. These can update powertrains, battery management, and braking systems. FOTA capabilities require cars—usually EVs—to have good, persistent connectivity and significant computing power, much of it left latent for future updates. Lucid’s Gravity electric SUV, for instance, is equipped with the latest Nvidia Orin-X processor, with 512 GB of onboard storage, yet the vehicle’s OS fits on just 100 GB, leaving oodles of room for later OTA refreshes.

    As Western car company revenues fall, automakers are looking to make money from OTA-enabled subscriptions. Give Tesla $2,000 and, with the optional Acceleration Boost, your EV can be unlocked over-the-air to become a tire squeal quicker off the mark. For another $10 a month, Tesla’s “premium connectivity” package adds streaming data, live sentry cams, and other goodies. Want what critics claim is the misleadingly named Full Self Driving (FSD) Supervised feature? It’s yours for an additional $99 a month.

    [ad_2]

    Carlton Reid

    Source link

  • OpenAI’s Sora joins Meta in pushing AI-generated videos. Some are worried about a flood of ‘AI slop’

    [ad_1]

    If the future of the internet looks like a constant stream of amusing videos generated by artificial intelligence, then OpenAI just placed its stake in an emerging market.

    The company behind ChatGPT released its new Sora social media app on Tuesday, an attempt to draw the attention of eyeballs currently staring at short-form videos on TikTok, YouTube or Meta-owned Instagram and Facebook.

    The new iPhone app taps into the appeal of being able to make a video of yourself doing just about anything that can be imagined, in styles ranging from anime to highly realistic.

    But a scrolling flood of such videos taking over social media has some worried about “AI slop” that crowds out more authentic human creativity and degrades the information ecosystem.

    “These things are so compelling,” said Jose Marichal, a professor of political science at California Lutheran University who studies how AI is restructuring society. “I think what sucks you in is that they’re kind of implausible, but they’re realistic looking.”

    The Sora app’s official launch video features an AI-generated version of OpenAI CEO Sam Altman speaking from a psychedelic forest, and later, the moon and a stadium crowded with cheering fans watching rubber duck races. He introduces the new tool before handing it off to colleagues placed in other outlandish scenarios. The app is available only on Apple devices for now, starting in the U.S. and Canada.

    Meta launched its own feed of AI short-form videos within its Meta AI app last week. In an Instagram post announcing the new Vibes product, Meta CEO Mark Zuckerberg posted a carousel of AI videos, including a cartoon version of himself, an army of fuzzy, beady-eyed beings jumping around and a kitten kneading a ball of dough. Both Sora and Vibes are designed to be highly personalized, recommending new videos based on what people have already engaged with.

    Marichal’s own social media feeds on TikTok and other sites are already full of such videos, from a “housecat riding a wild animal from the perspective of a doorbell camera” to fake natural disaster reports that are engaging but easily debunked. He said you can’t blame people for being hard-wired to “want to know if something extraordinary is happening in the world.”

    What’s dangerous, he said, is when they dominate what we see online.

    “We need an information environment that is mostly true or that we can trust because we need to use it to make rational decisions about how to collectively govern,” he said.

    If not, “we either become super, super skeptical of everything or we become super certain,” Marichal said. “We’re either the manipulated or the manipulators. And that leads us toward things that are something other than liberal democracy, other than representative democracy.”

    OpenAI made some efforts to address those concerns in its announcement on Tuesday.

    “Concerns about doomscrolling, addiction, isolation, and (reinforcement learning)-sloptimized feeds are top of mind,” it said in a blog post. It said it would “periodically poll users on their wellbeing” and give them options to adjust their feed, with a built-in bias to recommend posts from friends rather than strangers.

    ————

    AP Technology Writer Barbara Ortutay contributed to this report.

    [ad_2]

    Source link

  • Where Do Your Passwords Go When You Die?

    [ad_1]

    It’s not fun to talk about, but there’s only one thing certain in life. You need to have a plan for your digital legacy, just like you make a plan for your physical assets; otherwise, your accounts, services, and logins will rot away in a data center before they’re inevitably erased by a data retention policy.

    Some services recognize how important digital legacy is. Apple and Facebook have legacy contacts that can gain access to your accounts, and the American Bar Association is still grappling with the legalities of accessing online accounts when someone passes away. Most online services don’t.

    Recognition of digital legacy is still spotty, and without dedicated legacy contacts, accessing the deceased’s online accounts often involves court orders or legal documentation (and plenty of time). Digital legacy doesn’t need to have so many hurdles, though. Password managers have digital legacy features built in that can unlock your digital life in the event of an emergency.

    Table of Contents

    Defining a Digital Legacy

    There’s a lot that goes into your digital legacy, from your online banking login to any digital assets you own, but even a seemingly straightforward online life can quickly snowball into a mess. Does the Netflix account just keep draining the checking account until you can break in and change the payment option? Are photos that have been uploaded to the cloud now lost in a data center, never to be recovered? Add some passkeys, maybe some social sign-on features, and you have a complex web of data that’s almost impossible to untangle.

    So-called digital executors exist, operating in the same way as the executor of the will, just for digital assets. It’s a good idea to set up a digital executor to ensure your digital assets are handled properly, but that doesn’t help in the immediate aftermath of someone passing away. The probate process can take at least a few months, and sometimes several years.

    Password managers like Bitwarden offer a shortcut. You can transfer access to a trusted relative, spouse, or even your closest friend, along with a rundown of what to do with your accounts.

    The legality of this is a little murky, with the American Bar Association noting that accessing someone else’s account, even with their username and password, isn’t legal if it violates the platform’s terms of service. The law regarding digital assets varies from state to state, so it’s still a good idea to consult an attorney for long-term access.

    Here’s the advice NordPass gave: “For anyone thinking about digital legacy, the best step is to set up Emergency Access in advance, clearly communicate the use cases of the credentials with your trusted contacts, and follow the terms of service of respective platforms.”

    Immediate access is still important, not only in the event of death but also in the event of incapacitation. If you, for whatever reason, can’t access your online accounts, you can transfer those accounts easily using an emergency contact feature available in a password manager.

    Password Managers With Digital Legacy Features

    There are some excellent password managers, and most of them have some way to unlock your account in the event of an emergency. They go about it in different ways, however. Here are the three I recommend for most people. (Read more in our Best Password Managers guide.)

    Proton Pass

    Courtesy of Proton

    Proton recently added an emergency access feature, and it’s not just restricted to Proton Pass. Unlike most password managers, Proton Pass is just one app available in the Proton suite. Proton also makes our favorite VPN, and it offers an encrypted crypto wallet, cloud storage, and even a calendar.

    Emergency access isn’t restricted to one app with Proton. Rather, it’s access to your entire account, so if you have multiple Proton apps, you can pass them along. It’s not hard to see where this could be useful, especially if you have a lot of data stored in Proton Drive or money in your crypto wallet.

    [ad_2]

    Jacob Roach

    Source link

  • Regulators struggle to keep up with the complicated landscape of AI therapy apps

    [ad_1]

    In the absence of stronger federal regulation, some states have begun regulating apps that offer AI “therapy” as more people turn to artificial intelligence for mental health advice.

    But the laws, all passed this year, don’t fully address the fast-changing landscape of AI software development. And app developers, policymakers and mental health advocates say the resulting patchwork of state laws isn’t enough to protect users or hold the creators of harmful technology accountable.

    “The reality is millions of people are using these tools and they’re not going back,” said Karin Andrea Stephan, CEO and co-founder of the mental health chatbot app Earkick.

    ___

    EDITOR’S NOTE — This story includes discussion of suicide. If you or someone you know needs help, the national suicide and crisis lifeline in the U.S. is available by calling or texting 988. There is also an online chat at 988lifeline.org.

    ___

    The state laws take different approaches. Illinois and Nevada have banned the use of AI to treat mental health. Utah placed certain limits on therapy chatbots, including requiring them to protect users’ health information and to clearly disclose that the chatbot isn’t human. Pennsylvania, New Jersey and California are also considering ways to regulate AI therapy.

    The impact on users varies. Some apps have blocked access in states with bans. Others say they’re making no changes as they wait for more legal clarity.

    And many of the laws don’t cover generic chatbots like ChatGPT, which are not explicitly marketed for therapy but are used by an untold number of people for it. Those bots have attracted lawsuits in horrific instances where users lost their grip on reality or took their own lives after interacting with them.

    Vaile Wright, who oversees health care innovation at the American Psychological Association, agreed that the apps could fill a need, noting a nationwide shortage of mental health providers, high costs for care and uneven access for insured patients.

    Mental health chatbots that are rooted in science, created with expert input and monitored by humans could change the landscape, Wright said.

    “This could be something that helps people before they get to crisis,” she said. “That’s not what’s on the commercial market currently.”

    That’s why federal regulation and oversight is needed, she said.

    Earlier this month, the Federal Trade Commission announced it was opening inquiries into seven AI chatbot companies — including the parent companies of Instagram and Facebook, Google, ChatGPT, Grok (the chatbot on X), Character.AI and Snapchat — on how they “measure, test and monitor potentially negative impacts of this technology on children and teens.” And the Food and Drug Administration is convening an advisory committee Nov. 6 to review generative AI-enabled mental health devices.

    Federal agencies could consider restrictions on how chatbots are marketed, limit addictive practices, require disclosures to users that they are not medical providers, require companies to track and report suicidal thoughts, and offer legal protections for people who report bad practices by companies, Wright said.

    From “companion apps” to “AI therapists” to “mental wellness” apps, AI’s use in mental health care is varied and hard to define, let alone write laws around.

    That has led to different regulatory approaches. Some states, for example, take aim at companion apps that are designed just for friendship, but don’t wade into mental health care. The laws in Illinois and Nevada ban products that claim to provide mental health treatment outright, threatening fines up to $10,000 in Illinois and $15,000 in Nevada.

    But even a single app can be tough to categorize.

    Earkick’s Stephan said there is still a lot that is “very muddy” about Illinois’ law, for example, and the company has not limited access there.

    Stephan and her team initially held off calling their chatbot, which looks like a cartoon panda, a therapist. But when users began using the word in reviews, they embraced the terminology so the app would show up in searches.

    Last week, they backed off using therapy and medical terms again. Earkick’s website described its chatbot as “Your empathetic AI counselor, equipped to support your mental health journey,” but now it’s a “chatbot for self care.”

    Still, “we’re not diagnosing,” Stephan maintained.

    Users can set up a “panic button” to call a trusted loved one if they are in crisis and the chatbot will “nudge” users to seek out a therapist if their mental health worsens. But it was never designed to be a suicide prevention app, Stephan said, and police would not be called if someone told the bot about thoughts of self-harm.

    Stephan said she’s happy that people are looking at AI with a critical eye, but worried about states’ ability to keep up with innovation.

    “The speed at which everything is evolving is massive,” she said.

    Other apps blocked access immediately. When Illinois users download the AI therapy app Ash, a message urges them to email their legislators, arguing “misguided legislation” has banned apps like Ash “while leaving unregulated chatbots it intended to regulate free to cause harm.”

    A spokesperson for Ash did not respond to multiple requests for an interview.

    Mario Treto Jr., secretary of the Illinois Department of Financial and Professional Regulation, said the goal was ultimately to make sure licensed therapists were the only ones doing therapy.

    “Therapy is more than just word exchanges,” Treto said. “It requires empathy, it requires clinical judgment, it requires ethical responsibility, none of which AI can truly replicate right now.”

    In March, a Dartmouth University-based team published the first known randomized clinical trial of a generative AI chatbot for mental health treatment.

    The goal was to have the chatbot, called Therabot, treat people diagnosed with anxiety, depression or eating disorders. It was trained on vignettes and transcripts written by the team to illustrate an evidence-based response.

    The study found users rated Therabot similar to a therapist and had meaningfully lower symptoms after eight weeks compared with people who didn’t use it. Every interaction was monitored by a human who intervened if the chatbot’s response was harmful or not evidence-based.

    Nicholas Jacobson, a clinical psychologist whose lab is leading the research, said the results showed early promise but that larger studies are needed to demonstrate whether Therabot works for large numbers of people.

    “The space is so dramatically new that I think the field needs to proceed with much greater caution that is happening right now,” he said.

    Many AI apps are optimized for engagement and are built to support everything users say, rather than challenging peoples’ thoughts the way therapists do. Many walk the line of companionship and therapy, blurring intimacy boundaries therapists ethically would not.

    Therabot’s team sought to avoid those issues.

    The app is still in testing and not widely available. But Jacobson worries about what strict bans will mean for developers taking a careful approach. He noted Illinois had no clear pathway to provide evidence that an app is safe and effective.

    “They want to protect folks, but the traditional system right now is really failing folks,” he said. “So, trying to stick with the status quo is really not the thing to do.”

    Regulators and advocates of the laws say they are open to changes. But today’s chatbots are not a solution to the mental health provider shortage, said Kyle Hillman, who lobbied for the bills in Illinois and Nevada through his affiliation with the National Association of Social Workers.

    “Not everybody who’s feeling sad needs a therapist,” he said. But for people with real mental health issues or suicidal thoughts, “telling them, ‘I know that there’s a workforce shortage but here’s a bot’ — that is such a privileged position.”

    ___

    The Associated Press Health and Science Department receives support from the Howard Hughes Medical Institute’s Department of Science Education and the Robert Wood Johnson Foundation. The AP is solely responsible for all content.

    [ad_2]

    Source link

  • Proton Pass Finally Has the Goods to Compete With Other Password Managers

    [ad_1]

    You can rename your vaults, but you can also assign them one of a few dozen icons, as well as choose from a handful of color presets. It’s a small addition, but a little color-coding goes a long way in finding what you need at a glance.

    Beyond logins, you can also generate and store email aliases, similar to NordPass. It’s a standard feature, even if you don’t subscribe. Free users are capped at 10 aliases, while paying users can create as many as they want.

    It’s not just a fake email tied to a real one. You can set up aliases like that, but Proton allows you to forward emails to multiple addresses, create catch-all addresses, and even reply directly from the web app. I appreciate the activity log most, though. Proton automatically creates contacts for everyone who interacts with your alias, and you can block spammy addresses without ever opening your email client.

    No Desktop App

    Proton Pass via Jacob Roach

    Proton Pass was originally available only as a browser extension, but it now has apps for Windows, macOS, and even Linux, as long as you’re on a Fedora- or Debian-based distribution. I mainly used Pass in the browser, not only because it’s convenient but also because the extension is available on just about everything—Chromium-based browsers have access, and there are separate extensions for Firefox, Safari, and Brave.

    The browser app has everything you need, and it works a treat when it comes to password capture and autofill. Proton occasionally asked me to save a password a second time after initially dismissing a capture notification. But outside of that small hiccup, I never encountered an issue with autofill for forms, logins, or credit cards.

    Inside the app, you have a few features that aren’t available through the extension. The key feature is Pass Monitor, which is Proton’s security watchdog feature. It’ll show you weak passwords, accounts where you can enable 2FA, and critically, accounts that have been victims of a data breach. If you want to go further, you can turn on Proton Sentinel, as well.

    Pass Monitor is great, but breach notifications have a problem. By default, Proton only monitors the email associated with your Proton account. If you’re importing passwords from another app, as I did, and you have different emails, those aren’t a part of the monitoring by default. And Proton doesn’t tell you that. You have to click into breach details and manually add addresses.

    Proton Pass Review  Finally Standing Tall

    Proton Pass via Jacob Roach

    [ad_2]

    Jacob Roach

    Source link

  • Keep Your Old Laptop Alive by Installing ChromeOS Flex

    [ad_1]

    You’ll then be prompted to insert your USB drive and choose it from the drop-down list onscreen. Do make sure you select the correct USB drive and not an external disk that has information on it that you need. Eventually, you’ll be told your USB installer drive is ready: The necessary downloading and installing took 30 minutes or so for me but will depend on the computer you’re using and your internet connection.

    Use ChromeOS Flex on an Older Laptop

    You can try ChromeOS Flex before installing it.Courtesy of David Nield

    You then need to boot your aging PC or Mac—the one we’re giving a second life—from the USB drive you just created. This will usually involve pressing a specific key as your laptop starts up: If you’re not sure what it is, run a web search, check in your laptop’s documentation, or see Google’s list here. For Macs, start up the system either by pressing the power key and then the Option key (Intel chips) or by holding down the power key (Apple chips) until the boot options appear.

    You’ll see the ChromeOS Flex welcome screen appear, so click Get started to do just that. You’re then faced with two choices: Install ChromeOS Flex, which will overwrite Windows or macOS, and Try it first, which lets you run Google’s operating system from the USB drive without affecting anything on your laptop.

    If you’re looking to revitalize an old laptop, you’ll want to choose the first option, but Try it first lets you see what ChromeOS Flex is all about before you commit. Either way, click Next and you’ll be taken through the usual set-up process for ChromeOS, which will ask you to log in with a Google user account and start syncing your data.

    If you’re never used a Chromebook, it’s essentially a Chrome web browser with some extras, such as a taskbar along the bottom. Use the launcher button down in the bottom left corner to show all the installed apps, which will include links to web apps as well as the Files app for local files and Settings for configuring ChromeOS Flex.

    Open up the Settings and you get the usual personalization options you find in Google Chrome for Windows or macOS, plus some extras to cover input devices, Bluetooth connectivity, and network options. You should find ChromeOS Flex automatically picks up your Wi-Fi connection, trackpad, and mouse, especially if your computer is listed as certified for ChromeOS Flex.

    [ad_2]

    David Nield

    Source link

  • Scammers are abusing iCloud Calendar to send phishing emails

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Phishing attacks are becoming increasingly sophisticated, and the latest scam takes exploitation of a trusted platform to a new level. Instead of sending generic or suspicious-looking emails, attackers are now abusing Apple’s iCloud Calendar invite system to deliver phishing content directly from Apple’s own email servers.

    This clever tactic allows the fraudulent messages to bypass spam filters and appear more legitimate to unsuspecting users. The goal is to alarm you into calling a scammer’s fake support number under the pretense of disputing a fraudulent PayPal transaction. Once contacted, you are manipulated into granting remote access to your devices or sharing sensitive data.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    NEW EVITE PHISHING SCAM USES EMOTIONAL EVENT INVITATIONS TO TARGET VICTIMS

    Scammers exploit Apple’s iCloud Calendar to deliver phishing invites that bypass spam filters. (Brent Lewin/Bloomberg via Getty Images)

    How the scam uses iCloud Calendar invites to bypass security

    The heart of this scam lies in abusing Apple’s official infrastructure to lend credibility to a phishing attempt. Instead of using a suspicious or easily flagged email address, the attackers send calendar invites from Apple’s genuine domain, noreply@email.apple.com, as reported by Bleeping Computer.

    The attacker embeds the phishing message in the “Notes” section of the calendar event, making it appear as a legitimate notification. They send the calendar invite to a Microsoft 365 email address they control, which is part of a mailing list. As a result, the invite is automatically forwarded to multiple real targets, broadening the scam’s reach.

    Typically, when emails are forwarded, SPF (Sender Policy Framework) checks fail because the forwarding server isn’t listed as an authorized sender. However, Microsoft 365 uses a technique called the Sender Rewriting Scheme (SRS), which rewrites the return path so that the message still passes SPF checks.

    This makes the email appear fully legitimate to both the recipient’s inbox and automated spam filters. As a result, the message is far more likely to reach a user’s inbox without being flagged, increasing the chance the victim will take the bait.

    SCAMMERS ARE USING DOCUSIGN EMAILS TO PUSH APPLE PAY FRAUD

    Hospital phishing warning.

    Cybercriminals leverage Microsoft 365 forwarding and Apple’s email domain to outsmart filters. (Lindsey Nicholson/UCG/Universal Images Group via Getty Images)

    Why these phishing scams are particularly dangerous

    What makes this campaign especially dangerous is the sense of legitimacy it conveys. Because Apple’s official servers send the email directly, users are far less likely to suspect foul play. The message itself aims to panic the recipient by falsely claiming a large PayPal transaction occurred without the recipient’s consent. The message includes a phone number to “contact support” and dispute the charge, but, in reality, it connects the victim to a scammer.

    Once the victim calls the number, the scammer poses as a technical support agent and attempts to convince the caller that the computer has been compromised. The next step is typically to ask the victim to download remote access software under the guise of issuing a refund or securing the account.

    In reality, this access is used to steal banking information, install malware or exfiltrate personal data. Because the original message passed security checks and seemed credible, victims often don’t think twice before acting.

    DON’T FALL FOR THIS BANK PHISHING SCAM TRICK

    Graphic of a hacker wearing a Guy Fawkes mask.

    Fraudsters are hijacking iCloud Calendar invites to trick users into calling fake support lines. (Jonathan Raa/NurPhoto via Getty Images)

    6 ways you can stay safe from iCloud Calendar scammers

    I have listed some useful steps you can take to protect yourself from falling victim to these increasingly sophisticated phishing scams:

    1) Treat unexpected calendar invites with caution

    If you receive an unexpected calendar invite, especially one containing a strange message or alarming claims, don’t open it or respond. Legitimate companies rarely send payment disputes or security warnings through calendar invites. Always verify suspicious claims by logging into your official account directly.

    2) Avoid calling numbers listed in emails or calendar invites

    Phishing scams often include phone numbers that connect you to fraudsters posing as support agents. Instead of calling the number in the message, use official contact details found on the company’s official website.

    3) Install trusted antivirus software

    Antivirus programs protect your computer from malware and phishing sites by blocking suspicious downloads and warning you about unsafe websites.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Also, keeping your antivirus updated ensures it can defend against the latest threats.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    4) Remove your personal data from public listings

    Hackers are able to send you these phishing emails because they have your data. Using a personal data removal service helps scrub your personal information from data broker websites. This makes it significantly harder for attackers to gather details about you and craft convincing, targeted phishing attacks.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    5) Use a password manager

    A password manager helps you generate and securely store strong, unique passwords for every account. This reduces the risk of reusing weak passwords that scammers can easily exploit to gain unauthorized access to your accounts.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    6) Keep software and systems updated

    Regularly updating your operating system, browser and applications helps patch security vulnerabilities that attackers often exploit in phishing scams. Staying current with updates minimizes your exposure to known threats.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    Scammers are taking phishing attacks in a disturbing new direction by manipulating trusted platforms to deliver malicious content. The safest approach is to treat any unexpected calendar invite, especially those with alarming messages or strange contact numbers, with extreme caution. Never call the number provided in the message or click on any links. Instead, go directly to official websites or your account’s official dashboard to verify suspicious activity.

    Have you ever been targeted by a phishing scam disguised as an official message? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • How to (Mostly) Get Rid of Liquid Glass

    [ad_1]

    On an iPhone or iPad, the process is only slightly different. Open System Settings, go to the Accessibility section, then the Display & Text Size section. From here you can tap the Reduce Transparency toggle. Do so and all the various glassy bits of the user interface will become solid.

    I recommend changing this setting and seeing how you like it. It’s not a perfect fix, but it disables the most distracting part of Liquid Glass: the constant distorted transparency. I also tested this tweak on an old iPad that was feeling slow after the iPadOS 26 update, and it’s downright snappy now.

    A Few Other Suggestions

    Reducing transparency really undoes the worst part of Liquid Glass, but you can go a little further. Here are a few more tips.

    The Increase Contrast option is in the same menu as Reduce Transparency. Toggling it will put an outline around all the arguably too-subtle edges and outlines throughout the operating system. It makes the interface elements on the screen look outright retro, which some people may not love, but give it a shot if you find it hard to see the edges of things while using your devices.

    If you’re finding your older device runs slowly, even with reduced transparency, I recommend also toggling the Reduce Motion setting, which you can find in Accessibility > Motion. Toggle this setting and the various animations used by the operating system will be simplified. This should result in a device that feels faster and more responsive.

    Before and after: On the right, you can see the elements on the iPhone’s screen are less transparent, the text is easier to read, and the background is free of visual clutter.

    Courtesy of Justin Pot

    Finally, on your iPhone, the toolbar in Safari, the default web browser, has been condensed in the latest update. Doing things like seeing all of your tabs now requires multiple taps. You can get the old toolbar back in System Settings by heading to Applications > Safari and scrolling down to the Tab Style section. Tap Bottom or Top, depending on your preferences, and you’ll find the old toolbar back.

    Like I said: None of this will give you back the old, pre-Glass operating system you preferred. These tweaks do roll back the worst parts of the changes, though, so give them a shot if you’re annoyed.

    [ad_2]

    Justin Pot

    Source link

  • AI-cloning of Lara Croft’s voice has ‘Tomb Raider’ fans and actors up in arms

    [ad_1]

    PARIS — A lifelong fan of “Tomb Raider,” French gamer Romain Bos was on tenterhooks when an update of the popular video game went online in August.

    But his excitement quickly turned to anger.

    The gamer’s ears — and those of other “Tomb Raider” fans — picked up something amiss with the French-language voice of Lara Croft, the game’s protagonist.

    It sounded robotic, lifeless even — shorn of the warmth, grace and believability that French voice actor Françoise Cadol has given to Croft since she started playing the character in 1996.

    Gamers and Cadol herself came to the same conclusion: A machine had cloned her voice and replaced her.

    “It’s pathetic,” says Cadol, who straight away called her lawyer. “My voice belongs to me. You have no right to do that.”

    “It was absolutely scandalous,” says Bos. “It was artificial intelligence.”

    Aspyr, the game developer based in Austin, Texas, didn’t respond to e-mailed questions from The Associated Press. But it acknowledged in a post last week on its website that what it described as “unauthorized AI generated content” had been incorporated into its Aug. 14 update of “Tomb Raider IV–VI Remastered” that angered fans.

    “We’ve addressed this issue by removing all AI voiceover content,” Aspyr’s post said. “We apologize for any inconvenience this may have caused.”

    Still, the affair has triggered alarms in the voiceover community, with campaigners saying it’s a sobering example of dangers that AI poses to human workers and their jobs.

    “If we can replace actors, we’ll be able to replace accountants, and a whole range of other professions that could also be automated,” says Patrick Kuban, a French-language voice actor who is also a co-president of United Voice Artists, an international federation of voiceover artists.

    “So we need to ask ourselves the right questions: How far should we go, and how do we regulate these machines?”

    Hollywood has seen similar concerns, with video game performers striking for 11 months for a new contract this year that included AI guardrails.

    “This is happening pretty much everywhere. We’re getting alerts from all over the world — from Brazil to Taiwan,” Kuban said in an Associated Press interview.

    “Actors’ voices are being captured, either to create voice clones — not perfect ones — but for illicit use on social media by individuals, since there are now many apps for making audio deepfakes,” Kuban said.

    “These voices are also being used by content producers who aren’t necessarily in the same country,” he said. “So it’s very difficult for actors to reclaim control over their voices, to block these uses.”

    Cadol says that within minutes of the release of the “Tomb Raider” update, her phone began erupting with messages, emails and social media notifications from upset fans.

    “I took a look and I saw all this emotion — anger, sadness, confusion. And that’s how I found out that my voice had been cloned,” she said in an AP interview.

    Cadol says 12 years of recording French-language voiceovers for Lara Croft — from 1996 to 2008 — built an intimate bond with her fans. She calls them the “guardians” of her work.

    Once the initial shock subsided, she resolved to fight back. Her Paris lawyer, Jonathan Elkaim, is seeking an apology from Aspyr and financial redress.

    In the update, new chunks of voiceover appear to have been added to genuine recordings that Cadol says she made years ago.

    Most notably, fans picked up on one particularly awkward segment. In it, a voice instructs players how to use their game controllers to make Lara Croft climb onto an obstacle, intoning in French: “Place toi devant et appuyez sur avancer” — Stand in front and press ‘advance.’

    Not only does it sound clunky but it also rings as grammatically incorrect to French speakers — mixing up the polite and less polite forms of language that they use, depending on who they’re addressing.

    Gamers were up in arms. Bos posted a video on his YouTube channel that same evening, lamenting: “It’s half Françoise Cadol, half AI. It’s horrible ! Why have they done that?”

    “I was really disgusted,” the 34-year-old said in an AP interview. “I grew up with Françoise Cadol’s voice. I’ve been a ‘Tomb Raider’ fan since I was young kid.”

    “Lara Croft is a bit — how should I say — a bit sarcastic at times in some of her lines. And I think Françoise played that very, very well,” he said.

    “That’s exactly why now is the time to set boundaries,” he added. “It’s so that future generations also have the chance to experience talented actors.”

    [ad_2]

    Source link

  • 1Password Is Still the Gold Standard for Securely Managing Your Passwords

    [ad_1]

    Password managers are spotty on Android and iOS in general, and 1Password isn’t above that issue. I’d estimate somewhere around 10 to 15 percent of the fields I encounter on mobile just don’t register with 1Password, sending me out to the app to copy my password over manually. This is more of an issue with how apps categorize different fields and expose them to other apps running, and less of a 1Password-specific problem.

    1Password at least attempts to get around this with linked apps. As you start signing into apps using entries in your vault, 1Password will connect your login to whatever app you’re logging into. That doesn’t eliminate autofill problems on mobile, but it helps in the cases where 1Password is looking for a specific URL to autofill, and the mobile app isn’t operating with that URL.

    Outside of autofill, using 1Password on Android and iOS is a breeze. You can enter your account password each time you unlock your account if you want, but 1Password supports biometric authentication on Android and iOS, including Face ID support. After a certain amount of time has passed (you can change the amount of time in the settings), 1Password will ask you to re-enter your account password. Thankfully, if you don’t want to use biometrics, you can set up a PIN or passcode, as well.

    Quick access is important because 1Password is extremely limited on mobile, and that’s a good thing. Even switching to another app or locking your phone will also lock your account, and if you swipe through your list of open apps, you’ll only see the 1Password login screen.

    You’re free to change these settings, from the amount of time you need to re-enter your account password to when 1Password should clear your keyboard history. The defaults work well, but if you can’t be bothered, you can turn these extra security measures off.

    Unique Security

    1Password may function similarly to other password managers, but its security design is unique. The company has a white paper you can read through for all the gory details, and it maintains a list of certifications and recent penetration testing. The core of 1Password’s security, however, is a zero-knowledge approach. It’s designed in such a way that, even if 1Password wanted to, it has no means to decrypt the contents of your vault.

    This works due to what 1Password calls two-secret key derivation, or 2SKD. It takes your account password and a secret key that’s generated on your device when you first sign up for 1Password, and uses them to derive a key encryption key (KEK). Also on your device, 1Password generates a public-private key pair. Your private key is encrypted with the KEK, while your public key is shared.

    There are several layers of nested encryption beyond this, but what’s important is that 1Password doesn’t have a copy of your private key, nor a copy of your account password that’s necessary to derive the KEK. And when you authenticate, everything happens locally on your device, including encryption and decryption. Your KEK, master password, and private key never leave your device.

    [ad_2]

    Jacob Roach

    Source link

  • Why Non-Tech Founders Hold the Advantage in the AI-First Era | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    I’ve spent 15+ years building across multiple tech ventures and cultures — starting in Vietnam, sharpening my craft in Japan and Singapore, then expanding to the U.S., Australia and Europe. Each stop taught me how different ecosystems turn constraints into capability: how to ship products under pressure, build companies from zero, grow talent pipelines and lead teams through the hardest execution challenges.

    Along the way, I co-founded ventures across domains — from cloud content security and AI-driven fraud detection in finance to AI-powered talent vetting and AI-powered graphic design and marketing.

    That journey left me with a simple conviction: AI is fundamentally changing how we build software, how we build companies and how we build the skills to operate at a new level of business innovation. The shift is so deep that non-tech founders, entrepreneurs and SME owners must rethink how they imagine products, platforms and transformation — or risk shipping the right features on the wrong foundations. This is why I’m sharing what I’ve learned about building AI-first products and AI-first companies now.

    Related: AI Is Taking Over Coding at Microsoft, Google, and Meta

    Software’s evolution through the decades

    For most of the last forty years, we’ve lived through clear eras in software. Before the year 2000, the PC and operating system era was defined by “software in a box.” You bought a CD, installed it onto your personal computer and hoped it would work smoothly.

    Updates were rare, often requiring another CD or manual patch and builders operated on a simple model: ship a big release and trust that it would run on as many machines as possible. Microsoft Office is a classic example of this model — self-contained, tied to the machine and static until the next big update.

    In the early 2000s, the world shifted into the Cloud and SaaS era—software delivered through the browser. Suddenly, the constraint of a single device disappeared. You could log in anywhere, at any time and access your tools. Gmail replaced desktop email clients, Salesforce and Shopify scaled into massive business backbones and updates became continuous and invisible.

    The builder’s mindset changed too: the challenge was no longer compatibility with local machines but designing systems for massive scale, elastic infrastructure and recurring subscription revenue. Releases shrank from multi-year cycles to weekly or even daily pushes, as software transformed into a living service rather than a fixed product.

    We are in an AI-first era

    Now, we are entering what can only be described as the AI-first era — a world where the model itself becomes the new runtime. Instead of clicking buttons or typing into form fields, we state our goals in plain language and intelligent agents take on the work of planning steps, calling tools and escalating back to us only when needed.

    The leap here isn’t just convenience; it’s a redefinition of interaction. Everyday examples are already here: a support assistant that drafts responses for you or a finance copilot that reconciles books.

    Related: Here’s How People Are Actually Using ChatGPT, According to OpenAI

    From clicks to conversions

    What’s actually happening under the hood is profound. We are moving from clicks to conversation: where yesterday’s software waited for us to press buttons, today’s systems can understand goals expressed in natural language and translate them into action.

    We are moving from apps to agents: software that doesn’t just sit idle but proactively plans, integrates with CRMs, ERPs or payment systems and delivers back results with an audit trail. And we are moving from “it works” to “it works, is safe and proves it,” layering in guardrails, evaluation metrics and rollback systems so AI not only performs but stays aligned and compliant.

    Even infrastructure itself is shifting — from the brute force of bigger servers to intelligent placement, with some AI running in the cloud while other tasks live at the edge, close to the user, for privacy and instant responsiveness.

    The takeaway for founders is clear: moving from OS to Cloud to Model-as-Runtime is not simply another product cycle — it’s a mindset change. Thinking in yesterday’s categories, whether screens, clicks or tickets, means you’ll end up bolting AI awkwardly on top of an old product.

    Thinking in today’s categories — goals, agents, tools, guardrails and proof — unlocks AI-first products and, more importantly, AI-first companies. The shift matters because it directly affects how organizations will operate and where profit and loss will be shaped.

    Related: How to Turn Your ‘Marketable Passion’ Into Income After Retirement

    The impact on non-technical founders

    Perhaps most importantly, this moment is uniquely suited to non-technical founders and entrepreneurs. For decades, building software required deep technical expertise. But in the AI-first world, domain knowledge becomes the true advantage. If you already know the realities of freight, healthcare clinics, food and beverage, construction or retail finance, you’re in a better position than ever before to turn that expertise into AI-first operations.

    Large enterprises are trying to adapt, too, but their size slows them down. That friction creates opportunity. Even management consultants are admitting that agentic AI demands a reset in the way organizations approach transformation. For smaller founders, the window is open: you can describe outcomes in plain language, wire them to existing tools and keep human oversight where judgment truly matters.

    At DigiEx Group, we built our company on the idea of combining a Tech Talent Hub, an AI Factory and a Startup Studio to meet our region’s needs. This approach has powered everything from self-cleaning catalog systems to risk-detecting logistics agents with multilingual communication.

    The biggest challenge wasn’t the technology, but helping teams shift their mindset — where change management and open communication proved more important than the code.

    Focus on impact

    Another lesson: focus on impact first. Not every workflow benefits from AI. We resisted the temptation to sprinkle automation everywhere and instead prioritized areas where it could make the biggest difference — speed, quality or decision-making power. From there, we scaled what worked. And finally, we learned to automate with intention. If AI didn’t enhance quality, speed things up or improve decisions, we left it out. Discipline turned out to be just as important as imagination.

    That is why this era matters. If the 2000s were about cloud-first design, the 2020s and beyond are about AI-first thinking. This isn’t about slapping new features on top of old software; it’s about adopting a new way of building. The model is the runtime, language is the interface, agents are the services and LLMOps is the new production discipline. Companies that internalize this won’t just ship faster — they’ll operate differently, measuring quality, trust and cost per task with the same seriousness that older generations measured uptime.

    For non-technical founders, small business owners and entrepreneurs with real-world expertise, the door is wide open. You can scale globally from day one, gain tenfold productivity where it hurts the most, and access insights that used to cost consultant-level fees. For the first time in decades, the playing field tilts toward those who understand the problem best, not those who can only write the code.

    I’ve spent 15+ years building across multiple tech ventures and cultures — starting in Vietnam, sharpening my craft in Japan and Singapore, then expanding to the U.S., Australia and Europe. Each stop taught me how different ecosystems turn constraints into capability: how to ship products under pressure, build companies from zero, grow talent pipelines and lead teams through the hardest execution challenges.

    Along the way, I co-founded ventures across domains — from cloud content security and AI-driven fraud detection in finance to AI-powered talent vetting and AI-powered graphic design and marketing.

    That journey left me with a simple conviction: AI is fundamentally changing how we build software, how we build companies and how we build the skills to operate at a new level of business innovation. The shift is so deep that non-tech founders, entrepreneurs and SME owners must rethink how they imagine products, platforms and transformation — or risk shipping the right features on the wrong foundations. This is why I’m sharing what I’ve learned about building AI-first products and AI-first companies now.

    The rest of this article is locked.

    Join Entrepreneur+ today for access.

    [ad_2]

    Johnny LE

    Source link

  • Microsoft resolves European Union probe into Teams

    [ad_1]

    LONDON — European Union regulators have accepted Microsoft’s proposed changes to Teams, resolving a long-running antitrust investigation that targeted the company’s messaging and videoconferencing app.

    The European Commission said in a statement Friday that Microsoft’s final commitments to unbundle Teams from its Office software suite, including further tweaks following a market test in May and June, are enough to satisfy competition concerns.

    The legally binding commitments will remain in force for up to 10 years and allow the company to avoid a potentially hefty fine.

    “We appreciate the dialogue with the Commission that led to this agreement, and we turn now to implementing these new obligations promptly and fully,” Microsoft’s vice president of European government affairs, Nanna-Louise Linde, said in a statement.

    The Commission, acting on a complaint filed by Slack Technologies, accused Microsoft of “possibly abusive” practices after an investigation, saying that it was tying the Teams app to its widely used Office business software suite, which includes Word, Excel and Outlook. Slack, now owned by Salesforce, makes popular workplace messaging software.

    Microsoft responded by proposing to make its Office 365 and Microsoft 365 software packages available at a discount without Teams, and to let customers switch to packages without Teams. The company also promised to make it easier for rival software to work with Teams and for users to move their data to competing products.

    “Today’s decision therefore opens up competition in this crucial market, and ensures that businesses can freely choose the communication and collaboration product that best suits their needs,” said Teresa Ribera, the European Commission’s executive vice-president overseeing competition affairs.

    The announcement comes a week after the Commission, the 27-nation bloc’s top antitrust authority, fined Google nearly 3 billion euros ($3.5 billion) because its ad-tech business breached competition rules, prompting President Donald Trump to threaten retaliation.

    [ad_2]

    Source link

  • Apple’s Best New iOS 26 Feature Has Been on Pixel Phones for Years

    [ad_1]

    Ever since I was a child, I’ve despised answering the phone when an unknown number calls. Who could be on the other end? Literally anyone: an acquaintance, a telemarketer, a serial killer who’s menacingly breathing into the mouthpiece.

    While Apple’s upcoming Liquid Glass refresh in iOS 26 is likely to be the most immediately noticeable aspect of the software update as it starts rolling out to the public on September 15, I believe a smaller addition in iOS 26 might even have a bigger impact on how iPhone owners use their devices.

    The iPhone is finally getting call screening. Hallelujah. At launch, the feature will support calls coming in from nine languages, including English, Spanish, and Japanese.

    Once your iPhone updates to iOS 26, you can opt in and have the software automatically screen calls that come from unknown numbers. In this case, an unknown number is any phone number you haven’t interacted with before.

    When your phone automatically picks up the call, a robotic voice asks the caller for their name as well as why they want to get in contact with you. Only after that information is collected, the iPhone will ring and show you these details in a notification bubble so you can decide whether to answer.

    I was ecstatic to see this new option as I experimented with a beta version of iOS 26. I’m constantly getting calls from so many unknown numbers that I’ve completely given up answering the phone for anyone not saved in my contacts list.

    With the imminent release of iOS 26, I can make informed decisions to ignore or answer these calls. And while most of the calls will still be ignored, I no longer have to wait until the caller starts leaving a voicemail and the live transcription appears on the screen to make a decision.

    Call screening will be new for iPhones owners this fall, but users of some Android smartphones, like Google’s Pixel, have had a version of this tool, named Call Screen, available to them for years. Lyubov Farafonova, a product manager at Google, says in a statement emailed to WIRED that millions of Pixel users are using the feature in the US alone. “It is one of our fan favorite features,” she says.

    Since its release of call screening in 2018, Google has worked to make the synthetic voice sound more natural for incoming callers. It’s also started showing relevant replies as tappable options while the screening is in progress so users can easily communicate with unknown callers without actually answering the phone. Further leaning into this feature, Google plans to roll out call screening to additional markets this fall.

    “Pixel 10 owners in India can start experimenting with the beta version of manual Call Screen. This feature will be initially working in English and Hindi, with more languages and dialects on the way,” Farafonova says. “It will have a functionality to not only transcribe but also translate what the caller says to the Call Screen bot, to make life easier for those who don’t speak the same language as the caller.” Options for call screenings, manual or automatic, are coming soon to Pixel owners in Australia, Canada, Ireland, and the UK as well.

    [ad_2]

    Reece Rogers

    Source link

  • How to protect your privacy at hotels

    [ad_1]

    NEWYou can now listen to Fox News articles!

    You don’t have to be a celebrity to want hotel privacy. Many guests, like Carol from Wisconsin, wonder if hidden cameras or security lapses could affect their next trip.

    The good news: most hotels value guest privacy because it’s central to their business. Still, being aware and taking a few smart steps can give you extra peace of mind during your stay.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    SCHOOLS’ SAFETY TOOLS ARE SPYING ON KIDS — EVEN AT HOME

    The bottom line on hotel privacy: Risk is low, but awareness helps

    Hotels do not place cameras in guest rooms. Surveillance usually exists only in public spaces like lobbies, elevators or hallways. Even so, it’s worth learning how to check your surroundings and spot potential issues before settling in.

    Hotels stress guest privacy, yet a quick room sweep can ease concerns. (D.A. Varela/Miami Herald/Tribune News Service via Getty Images)

    How to do a hotel room sweep for hidden cameras

    Start by inspecting your room:

    • Shine your phone’s flashlight in dark corners. Camera lenses reflect light.
    • Check common hiding spots: smoke detectors, alarm clocks, USB chargers, lamps and picture frames.
    • Try the fingernail mirror test: touch your fingernail to a mirror. If the reflection meets your nail without a gap, it could be two-way glass.
    • Listen for faint buzzing or clicks that might come from disguised devices.

    Use your smartphone to detect hidden devices in hotels

    Your smartphone can help uncover suspicious devices.

    • Open your camera app to spot infrared lights. Many hidden cameras emit IR that shows up on screens.
    • Use scanning apps like Fing to check the Wi-Fi network for unusual device names like “IP Camera.” Remember: not all devices will appear.

    High-tech tools for finding hidden cameras in hotels

    For longer trips or high-security situations, dedicated devices add reassurance:

    • IR lens detectors locate hidden camera reflections.
    • RF (radio-frequency) scanners pick up wireless signals from covert devices.

    These gadgets complement a manual sweep; they don’t replace it.

    Hidden camera detector apps for iPhone and Android

    If you’re worried about hidden cameras during a hotel stay, several iOS and Android apps claim to help, though their accuracy and costs vary.

    iOS

    • Hidden Camera Detector – Peek (Kupertino Labs)Has a clean interface and a high user rating. But some users say it only scans the Wi‑Fi network and may prompt a subscription to see results.
    • Spy Camera Scanner (AI APPS SRL)Promises IR signal detection and Bluetooth scanning. Simple, but again, the full functionality is gated behind a subscription.

    Android

    • Hidden Camera Detector (FutureApps)Uses your phone’s magnetic sensor to alert you near electronics and also scans for infrared light. But reviews suggest the free version can feel gimmicky, especially for magnetic detection.
    • Camera Detector: Hidden Spy (AppVillage Global)Offers a combo of Wi‑Fi scanning, magnetic sensor detection and metal detection, plus tips on common hiding spots. Visible complaints include relentless ads and paywalls.

    5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONE

    Side view of a hotel room.

    Simple steps like locking doors and covering peepholes boost hotel security. (Martin Berry/UCG/Universal Images Group via Getty Images)

    What to do if you find a hidden camera in your hotel

    • Do not remove or tamper with the device.
    • Document with photos.
    • Notify hotel management immediately. Platforms like Airbnb and Vrbo ban undisclosed cameras.
    • For serious concerns, contact law enforcement before contacting the property owner.

    Smart security habits for every stage of your stay

    From check-in to check-out, taking a few simple precautions can help protect your privacy and keep you in control.

    1) Before you arrive

    Call ahead and ask:

    • 24/7 security: Confirm whether the hotel has round-the-clock protection.
    • Guest floor access: Ask if elevators and hallways are restricted to key holders.

    2) While you check in

    • Incognito listing: Request to be listed as “incognito” or use an alias.
    • Visitor control: Let staff know you are not expecting visitors.

    3) While in your room

    • Do Not Disturb: Ask the operator to block outside calls to your room line.
    • Mobile phone: Use your cell phone instead of the in-room phone.
    • Door security: Lock your door and use deadbolts or extra latches.
    • Window privacy: Close curtains and cover the peephole with tape or a sticker.
    • Sensitive transactions: Avoid banking or entering private logins on public Wi-Fi whenever possible.
    • VPN protection: Use a VPN when on hotel Wi-Fi to encrypt your connection and keep browsing private.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.

    Pro Tip: Install strong antivirus protection on all your devices before your trip. Use it to block malware, phishing attempts and other threats that often spread through hotel Wi-Fi.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    4) When away from your room

    • Secure extra keycards: Keep any spares locked in the room safe to prevent misuse.
    • Rely on hotel safes when needed: Electronic safes are generally secure, but you can also log valuables with staff for an extra layer of protection.
    • Use built-in anti-theft tools for devices: Features like Find My iPhone or Find My Device (Android/Windows) help you locate or remotely wipe phones, laptops and tablets if they’re stolen.

    Try additional anti-theft apps: Tools such as iAlertU for MacBooks and PreyProject.com for Android and Windows laptops can add extra protection. Some even send you a photo if someone tampers with your device.

    5 DIRTIEST SPOTS IN HOTEL ROOMS: WHAT EXPERTS SAY TO DO AT CHECK-IN

    View of the hotel room from the entrance.

    Smartphones can reveal infrared signals from hidden spy devices. (Photo by: Martin Berry/UCG/Universal Images Group via Getty Images)

    Kurt’s key takeaways

    Your privacy matters, whether you’re staying one night or a full week. Most hotels respect guests, but technology has made it easier for bad actors to abuse trust. With these tips, apps and gadgets, you can stay in control and protect yourself.

    Would you feel safer if hotels were required to disclose their guest privacy and security practices before you book? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • These are the Password Managers You Should Use Instead of Your Browser

    [ad_1]

    Setting up and migrating to Dashlane from another password manager is simple, and you’ll use a secret key to encrypt your passwords, much like BitWarden’s setup process. In practice, Dashlane is very similar to the others on this list. Dashlane offers a 30-day free trial, so you can test it out before committing.

    After signing up, download the app for Android and iOS, and grab the browser extensions for Firefox, Chrome, and Edge.


    Best for Bundled Services

    Photograph: Nordpass

    You might know Nord better for its VPN service, but the company also offers a password manager, NordPass, and a pretty nice online storage system, NordLocker. A part of the appeal of NordPass comes in bundling it with the company’s other services for some compelling deals. As a password manager, NordPass offers everything you need. It uses a zero-knowledge setup in which all data is encrypted on your device before it’s uploaded to the company’s servers. Unlike most services here, NordPass uses XChaCha20 for encryption. It would require a deep dive into cryptography to get into the differences, but the short story is that it’s just as secure and maybe slightly faster than the AES-256 encryption used by other services.

    There’s a personal information storage feature to keep your address, phone number, and other personal data safe and secure, but easy to access. NordPass also offers an emergency access feature, which allows you to grant another NordPass user emergency access to your vault. It works just like the same feature in 1Password, allowing trusted friends or family to access your account if you cannot.

    Other nice features include support for two-factor authentication to sign in to your account, as well as security tools to evaluate the strength of your passwords and alert you if any of your data is compromised. Note that NordPass Premium is theoretically $3 a month, but there are always sales that bring that much lower.

    The downside, and my one gripe about all Nord services, is that there is no monthly plan. As noted above, the best deal comes in combining NordPass, NordVPN, and NordLocker for a bundled deal. A free version of NordPass is available, but it’s restricted to only a single device.

    After signing up, download the app for Android and iOS, and grab the browser extensions for Firefox, Chrome, and Edge.


    Best DIY Options (Self-Hosted)

    Want to retain more control over your data in the cloud? Sync your password vault yourself. The services below do not store any of your data on their servers. This means attackers have nothing to target. Instead of storing your passwords, these services use a local vault to store your data, and then you can sync that vault using a file-syncing service like Dropbox, NextCloud, or Edward Snowden’s recommended service, SpiderOak. There are two services to keep track of in this scenario, making it a little more complex. But if you’re already using a file-syncing file service, this can be a good option.

    You can also properly host your own vault with network-attached storage or a local server.

    Screenshot of Enpass password manager app on desktop

    Courtesy of Enpass

    Enpass does not store any data on its servers. Syncing is handled through third-party services. Enpass doesn’t do the syncing, but it does offer apps on every platform. That means once you have syncing set up, it works just like any other service. And you don’t have to worry about Enpass being hacked, because your data isn’t on its servers. Enpass supports syncing through Dropbox, Google Drive, OneDrive, iCloud, Box, Nextcloud, or any service using WebDAV. Alas, SpiderOak is not currently supported. You can also synchronize your data over a local WLAN or Wi-Fi network.

    All of the features you expect in a password manager are here, including auto-generating passwords, breach-monitoring, biometric login (for devices that support it), auto-filling passwords, and options to store other types of data, like credit cards and identification data. There’s also a password audit feature to highlight any weak or duplicate passwords in your vault. One extra I particularly like is the ability to tag passwords for easier searching. Enpass also makes setting up the syncing through the service of your choice very easy. Enpass added support for passkeys, too.

    [ad_2]

    Scott Gilbertson, Jacob Roach

    Source link

  • Parenting 101: 5 Lessons to keep kids safe online for the new school year

    [ad_1]

    The back-to-school season is exciting – new knowledge, new digital tools, and new discoveries. But it also brings higher cybersecurity risks for both schools and children. Cybersecurity experts are urging children, parents, and school communities to stay extra alert during this period.

    “The back-to-school period requires additional efforts to keep children and school communities safe online. A new beginning means new digital tools, online searches, and registrations for learning platforms. All of that increases cyber risks that must be taken seriously,” said Karolis Arbačiauskas, head of product at NordPass, in a media release

    A new study by NordPass, in collaboration with NordStellar, reveals a worrying truth: many educational institutions are still using shockingly weak passwords to protect sensitive data. Entries like “123456”, “Edifygroup@1”, and “principal@2021” appeared frequently, showing a widespread reliance on predictable or outdated credentials that are easy for hackers to guess.

    This is why the back-to-school season is the perfect moment to talk to children about cyber hygiene – the dos and don’ts in digital environments – and to help them build strong habits for digital security and privacy. “Learning about cybersecurity can be fun. Many families of cybersecurity professionals make it a game – they host a small party with snacks and guide their children through five simple but essential exercises,” said Arbačiauskas.

    Cybersecurity experts advise to take these steps to preserve your own cybersecurity and that of your family members (it can also be used as inspiration for your family’s Cyber Party):

    • Create strong and unique passwords. Make sure every account in your family – whether it’s yours, your parents’, your significant other’s, or your children’s – uses a strong and unique password. The easiest way to do it? Use a trusted password manager to generate, store, and share them securely.
    • Turn on multi-factor authentication (MFA). Add an extra layer of security wherever you can, especially to access school portals, email accounts, and social apps. MFA helps keep hackers out even if a password gets breached – and they get breached more often than you think. A recent study by NordPass revealed that many educational institutions still use shockingly weak passwords.
    • Update devices and apps. Keep phones, tablets, and laptops up to date with the latest software. Outdated apps can contain vulnerabilities that hackers take advantage of to get backdoor access into your device. Updates patch these security holes so that cybercriminals can no longer exploit them.
    • Talk about phishing. Discuss cybersecurity with your family and why it matters. Teach them to never click suspicious links or open unknown attachments – especially in emails or messages claiming to be from the school. When in doubt, verify with the sender by using a website checker.
    • Adjust privacy settings. Review and tighten privacy settings on social media, online games, and school platforms. Limit what personal info is publicly visible and who can contact your kids online.

    – JC

    [ad_2]

    Source link

  • WhatsApp patches exploit allowing hackers to target Apple users

    [ad_1]

    NEW YORK — WhatsApp has patched a security vulnerability that allowed sophisticated attacks against the Apple devices of “specific targeted users.”

    The messaging app, owned by Meta Platforms, said in a blog post that its vulnerability, chained with a bug found in iOS and iPadOS, allowed hackers to exploit and steal information from Apple devices.

    In a post on X, Amnesty’s Security Lab researcher Donncha Ó Cearbhaill said the malicious campaign lasted about 90 days. He said other apps beyond WhatsApp may also have been affected.

    WhatsApp said in a statement that less than 200 users were targeted and that the company had notified those affected. All users have been encouraged to update their app to the latest version to fix the issue.

    It’s not immediately clear who, or which spyware vendor, is behind the attacks.

    Apple also acknowledged the vulnerability in its systems and issued patches to fix the flaws.

    [ad_2]

    Source link

  • Judge orders search shakeup in Google monopoly case, but keeps hands off Chrome

    [ad_1]

    SAN FRANCISCO — A federal judge on Tuesday ordered a shake-up of Google’s search engine in an attempt to curb the corrosive power of an illegal monopoly while rebuffing the U.S. government’s attempt to break up the company and impose other restraints.

    The 226-page decision made by U.S. District Judge Amit Mehta in Washington, D.C., will likely ripple across the technological landscape at a time when the industry is being reshaped by breakthroughs in artificial intelligence — including conversational “answer engines” as companies like ChatGPT and Perplexity try to upend Google’s long-held position as the internet’s main gateway.

    The innovations and competition being unleashed by AI also reshaped the judge’s approach to the remedies in the nearly five-year-old antitrust case brought by the U.S. Justice Department during President Donald Trump’s first administration and carried onward by President Joe Biden’s administration.

    “Unlike the typical case where the court’s job is to resolve a dispute based on historic facts, here the court is asked to gaze into a crystal ball and look to the future. Not exactly a judge’s forte,” Mehta wrote.

    The judge is trying to rein in Google by prohibiting some of the tactics the company deployed to drive traffic to its search engine and other services. The ruling also will pry open some of the prized databases of closely guarded information about search that have provided Google with a seemingly insurmountable advantage.

    The handcuffs being slapped on Google will preclude contracts that give its search engine, Gemini AI app, Play Store for Android and virtual assistant an exclusive position on smartphone, personal computers and other devices.

    But Mehta stopped short of banning the multi-billion dollar deals that Google has been making for years to lock in its search engine as the default on smartphones, personal computers and other devices. Those deals, involving payments of more than $26 billion annually, were one of the main issues that prompted the judge to conclude Google’s search engine was an illegal monopoly, but he decided banning them in the future would do more harm than good.

    The judge also rejected the U.S. Justice Department’s effort to force Google to sell its popular Chrome browser, concluding it was an unwarranted step that “would be incredibly messy and highly risky.”

    Partially because he is allowing the default deals to continue, Mehta is ordering Google to give its current and would-be rivals access to some of its search engine’s secret sauce — the data stockpiled from trillions of queries that it used to help improve the quality of its search results. That is a measure that Google had also fiercely opposed, contending it was unfair and would raise privacy and security risk for the billions of people who have posed questions to its search engine — sometimes delving into sensitive issues.

    The Justice Department’s antitrust chief, Gail Slater, hailed the decision as a “major win for the American people,” even though the agency didn’t get everything it sought. “We are now weighing our options and thinking through whether the ordered relief goes far enough,” Slater wrote in a post.

    In its own post, Google framed Mehta’s ruling as a vindication of its long-held position that the case never should have been brought. The decision “recognizes how much the industry has changed through the advent of AI, which is giving people so many more ways to find information,” wrote Lee-Anne Mulholland, Google’s vice president of regulatory affairs. “This underlines what we’ve been saying since this case was filed in 2020: Competition is intense and people can easily choose the services they want.”

    The Mountain View, California, company has already vowed to appeal the judge’s monopoly findings issued 13 months ago that led to Tuesday’s ruling.

    “You don’t find someone guilty of robbing a bank and then sentence him to writing a thank you note for the loot,” said Nidhi Hegde, executive director of the American Economic Liberties Project.

    Investors seemed to interpret the ruling as a relatively light slap on the wrist for Google, as the stock price of its corporate parent, Alphabet Inc., surged more than 7% in extended trading. That would translate into a nearly $200 billion increase in Alphabet’s market value, if the shares follow a similar trajectory in Wednesday’s regular trading session.

    Allowing the default search deals to continue is more than just a victory for Google. It’s also a win for Apple, which receives more than $20 billion annually from Google, and other recipients of the payments.

    In hearings earlier this year, Apple warned the judge that banning the contracts would deprive the company of money that it funnels into its own innovative research. The Cupertino, California, company also cautioned that the ban could have the unintended consequence of making Google even more powerful by pocketing the money it had been spending on deals while most consumers will still end up flocking to Google’s search engine anyway.

    Others, such as the owners of the Firefox search engine, asserted that losing the Google contracts would threaten their future survival by depriving them of essential revenue.

    Apple’s shares rose 3% in extended trading after the ruling came out.

    Mehta refrained from ordering a sale of Chrome because he decided there wasn’t adequate proof the browser served as an essential ingredient in Google’s search monopoly, making a divestiture “a poor fit for this case.”

    Chrome would have been a hot commodity had the judge forced Google to put it on the auction block. Perplexity submitted an unsolicited $34.5 billion offer to buy Chrome last month. And during court testimony earlier this year, a ChatGPT executive left no doubt that service’s owner, OpenAI, would be interested in be interested in buying Chrome, too.

    But the judge decided forcing Google to open up parts of its search data to rivals such as DuckDuckGo, Bing, and others will offer he best and fairest way to foster more compelling competition. In doing so, Mehta still narrowed the scope of the Justice Department’s request and will limit the access to Google’s search index and query histories.

    While the wrangling over Mehta’s ruling continues, Google is facing another potentially debilitating threat in another antitrust case brought by the Justice Department targeting the digital ad empire that was built up around its search engine. After different federal judge in Virginia declared that some of the technology underlying the ad network to be an illegal monopoly earlier this year, the Justice Department plans to make its case for another proposed breakup in a trial scheduled to begin later this month.

    [ad_2]

    Source link