The Most/Recent Articles

Showing posts with label gadgets. Show all posts
Showing posts with label gadgets. Show all posts

Apple Will Soon Halt Support for Older iPad Models...


According to recent reports, Apple has decided to discontinue technical support for the first and fifth generation iPads. This means that owners of these iPad models will no longer be able to receive assistance from Apple's technical support team, either over the phone or at an Apple Store.

This move is not uncommon for Apple, as they often phase out support for older devices in order to focus on their newer products. This decision may come as a disappointment to some iPad owners, but it is important to note that Apple will still continue to provide support for newer iPad models.

Video courtesy of ABC News

After Exclusively Targeting PCs For YEARS, RANSOMWARE Targeting MAC Users Being Developed By Known Cyber-Criminal Group...


Mac Ransomware

Mac users - you're no longer immune. After years with of dozens of versions plaguing the PC world, Mac may soon join them as targets of Ransomware attacks.

In short, Ransomware renders a computer unusable, and all its data inaccessible, until a 'ransom' is paid to the criminals who created it.

Behind it is the group behind the infamous LockBit ransomware, setting their sights on macOS for the first time with the goal of becoming the first major ransomware operation to target the platform...

According to cybersecurity researcher MalwareHunterTeam, the LockBit gang has developed new ransomware encryptors for macOS, ARM, FreeBSD, MIPS, and SPARC CPUs, all of which were discovered in a ZIP archive on VirusTotal.

Among the encryptors found in the archive is the 'locker_Apple_M1_64', which is designed to target newer Macs running on Apple Silicon, as well as PowerPC CPUs, which older Macs use. The archive was also found to contain previously unknown encryptors for ARM, FreeBSD, MIPS, and SPARC CPUs.

While these encryptors are still in development, cybersecurity experts warn that they could pose a significant threat to consumers and small businesses, especially those targeted by LockBit affiliates. However, according to Cisco Talos researcher Azim Khodjibaev, the encryptors were meant as a test and were never intended for deployment in live cyberattacks.

MacOS cybersecurity expert Patrick Wardle also confirmed that the encryptor is far from complete and missing the required functionality to encrypt Macs properly. In fact, the LockBit developer must first figure out how to bypass TCC and get notarized before becoming a functional encryptor.

But the fact a group has decided to focus on the previously-safe Mac shouldn't be downplayed - there's a good chance they'll figure it out. 

Now Experts are Wondering: Are Mac Users Prime Targets Specifically Because They're *NOT* Expecting It?

Because they haven't been targeted before, Mac users may have their guard down.

Mac users need to begin doing the things PC users had to be vigilante about for years. Keep your operating system updated, avoid opening unknown attachments and executables, generate offline backups, and use strong and unique passwords at every site you visit. Stay safe out there, folks!

-----------
Author: Trevor Kingsley
Tech News CITY /New York Newsroom

Sony & Honda Team Up and Target TESLA with an Electric Vehicle of Their Own...

 

Sony Honda Mobility

We're learning more about the concept behind Sony and Honda forming an alliance to launch a new Electric Vehicle, called "Mobility".

The focus: Entertaining those inside the vehicle, while the car handles the driving...

Cars will soon feel like hanging out in a room on wheels, as automated driving will remove the need for a driver to be focused on the road, as well as the need for passengers to not distract the driver. 

As a child, you may have had a parent raise their voice once or twice with a lecture about how "important it is not to distract the driver" as you and a sibling or friend forgot you were in the back seat of a car and began to get a little too rowdy "so sit still, we'll be there soon" the adult would end with.

But soon, rowdy kids in the back seat of car will transition from a potential danger to everyone on the road, to nothing more than 'annoying' to the adults who have to share a vehicle with them.  Parents will demand the family "sit still, we'll be there soon" but can now skip the lecture about distracting the driver - they'll be annoyed that the kids are making it hard to watch their movie or something.

Sony and Honda have made it clear they imagine a very similar future...

We learned this week they are considering integrating the Playstation 5 into its upcoming EVs, which are due to be released under their new joint venture.

The president of Sony Honda Mobility, Izumi Kawanishi, says that Sony’s strength in the entertainment and gaming industry is something the company plans to use to its advantage.

"Sony has content, services and entertainment technologies that move people ...this is our strength against Tesla" said Kawanishi.

When could we seen these on the road? Well, the project is open about the very early phase they are currently in, saying they "will have to evolve considerably" until the ideas become a functional vehicle ready for the public roads.

--------
Author: Takashi Iccho
Tokyo Newsroom | TechNewsCITY

Apple’s Reasoning Behind their Decisions on USB-C Charging Ports and Privacy Issues...

 

Apple is currently at the center of two things in tech that are facing some changes: privacy rights that have shaken the digital ad market, and Europe’s move toward a standard charging method for devices.

From WSJ’s Tech Live conference, Apple executives Craig Federighi and Greg Joswiak answer questions on these topics.


Video courtesy of the Wall Street Journal

Beyond Hard Drives: The New Ways We're Storing MASSIVE Amounts Of Data...

We’re storing more data than ever before - but as the hard disk drives we rely on are reach their physical limits, new innovation is taking their place. 

Take a look at how scientists are working on methods to increase capacity and find new ways to house our data, as we examine these new methods and see how they all compare.

Video Courtesy of The Wall Street Journal

Your Life is Saved in Your Smartphone - Are you Doing Enough to Secure it?

Smart Phone Security

Smart phones are an important part of our lives. We use them to stay connected with friends and family, to get work done, and to stay up-to-date on the latest news and trends. As such, it is important to take steps to protect our phones from hackers and other cyber-attacks.

Here are a few simple steps that you can take to keep your phone safe and secure:

1) Use a strong password that is not easy to guess.

2) Install a reputable security app such as Norton or McAfee.

3) Only download apps from official app stores, such as Google Play or the App Store.

4) Be careful when clicking on links or opening attachments in emails.

5) Regularly back up your data so that if your phone is ever lost or stolen, you will still have your information safe and secure.

By following these simple steps, you can help to keep your phone safe from hackers and other online threats.

Why Do You Need to Secure Your Smart Phone?

Smartphones contain a wealth of personal information, from contacts and emails to bank details and passwords. As such, it is important to take steps to secure them from hackers and thieves.

One way to do this is to password protect your phone. This will make it more difficult for anyone else to access your data.

Another important step is to only download apps from reputable sources. Malicious apps can steal your data or even install spyware on your phone.

Finally, it is important to back up your data regularly. This will ensure that if your phone is ever lost or stolen, you will not lose all your information.

What Are the Risks of Not Securing Your Smart Phone?

Smart phones are like mini-computers and are just as vulnerable to cyber attacks as desktop or laptop computers. In fact, a smart phone may be even more vulnerable because it is carried around with you everywhere you go.

That's why it's so important to take the necessary steps to secure your phone and protect your data. Follow these simple steps to keep your phone safe and secure:

1. Install a good security app and make sure it is always up-to-date.

2. Set a strong password and don't use the same password for all your accounts.

3. Don't install apps from unknown sources.

4. Be careful what information you share online.

5. Regularly back up your data.

How to Set a Secure Passcode for Your Smart Phone:

Now that we know how easy it is to set a secure passcode for our smart phone, let's do it!

Your passcode is your first line of defense against hackers and thieves, so it's important to make sure it is strong and unique. You can set a passcode on your mobile device by going to the App list, tapping Settings, tapping Lock Screen, and setting your password.

Make sure your password is a combination of letters and numbers, and that it is at least six characters long. And don't use the same password for all of your accounts - that's just asking for trouble!

How to Encrypt Your Smart Phone

Smart phone security is more important than you think. In fact, your personal data may be at risk if you don't take steps to protect it.

One way to safeguard your data is to encrypt your phone. This can be done on Android devices by going to Settings > Security > Encrypt Device. Another way to encrypt your Android device is to go to Settings, then tap "Security" or "Security & location." Select "encryption & credentials" and/or "encrypt phone."

Encrypting your Android device will help keep sensitive data and photos private. So if you're not already doing so, be sure to encrypt your phone today!

How to Use Two Factor Authentication for Your Smart Phone

Your smart phone is a valuable piece of equipment, and it's important to keep it safe and secure. One way to do that is by using two-factor authentication. This security feature requires you to enter your account password and a verification code that is sent to your phone.

You can turn on two-factor authentication on your phone by going to Settings > Accounts > Google, and signing in. Or, on macOS, go to System Preferences > iCloud, sign in, click Account Details > Security > Turn on Two-Factor Authentication. With 2-Step Verification, you can add an extra layer of security to your account in case your password is stolen.

Pro Tips for Keeping Your Smart Phone Secure

Here are a few pro tips for keeping your smartphone secure:

First, to avoid giving out personal information, be sure to disable location services and Bluetooth when you're not using them. Also, make sure to use a strong password, pin or pattern to lock your phone.

Second, be careful about the apps you download. Only download apps from reputable sources, and be wary of apps that require too much access to your data.

Lastly, back up your data regularly. This way, if your phone is ever lost or stolen, you'll still have all your information backed up and safe.

Things to remember...

Just as you protect your computer with antivirus software and your house with a security system, you need to protect your phone with security measures. Why? Because your phone has a lot of personal information on it—information that could be used to steal your identity or access your bank accounts.

Here are a few tips to help keep your phone safe:

1. Install a security app.

2. Use a strong password.

3. Set up remote wipe in case your phone is lost or stolen.

4. Don't store sensitive information on your phone.

5. Be careful what you download and install.

6. Keep your OS and apps up-to-date.

7. Avoid public Wi-Fi networks.

8. Use a privacy screen protector..

-----------
Author: Preston Summers
Tech News CITY /Austin Newsroom

Replacing Hard Drives With... GLASS!? Microsoft Proves The Shocking Ability for Glass to hold MASSIVE Amounts of Data...


Microsoft's Project Silica is an effort to demonstrate that the company is capable of storing data for an extended period of time utilizing glass as the storage medium. Glass is the medium of the future for the storage of long-term data.

The Superman film from 1978 was etched onto a piece of glass through a collaborative effort between Microsoft and Warner Bros., which involved the use of lasers. This was done with the intention of demonstrating that the technology could be applied in environments other than the laboratory.


Video courtesy of CNET

What Artificial Intelligence Discovered After Studying How Kids With Autism from Around The World Communicate…

AI Autism Kids

Northwestern University and Hong Kong researchers collaborated on a study to provide insight on the causes and diagnostics of this condition. This method employs machine learning to identify Cantonese and English-like speech patterns in autistic youngsters. Researchers may now be able to distinguish between genetic and environmental influences on the communication skills of autistic persons, allowing them to better understand the disorder's causes and develop novel therapies. Recently, the astounding results were also published in the journal PLOS One.

The research group successfully developed a supervised machine learning method to identify speech variations associated with autism. The training dataset consists of recordings of young children with and without autism narrating in English and Cantonese their interpretations of the events recounted in the wordless children's picture book "Frog, Where Are You?"

Observations indicate that children with autism frequently speak more slowly than typically developing children. Tone, intonation, and rhythm are other distinguishing characteristics of their speech. It is extremely difficult to consistently and objectively explain "prosodic" distinctions, and decades have passed since their origins were established.

Given the structural differences between English and Cantonese, the researchers anticipated that any commonalities identified in the speech patterns of autistic children across both languages were likely related to genetics...

In addition, the researchers saw a spectrum of variance that indicated more malleable parts of speech that could be used as intervention targets. Researchers made significant progress by employing machine learning to identify the speech patterns most symptomatic of autism. Prior to this, they were limited by the bias of the English language in autism research and the subjectivity of humans when it came to categorizing speech discrepancies between individuals with and without autism.

The research led to the identification of speech characteristics, with rhythm emerging as the most crucial in terms of its ability to properly predict an autism diagnosis. The experts have high hopes that this research will increase our understanding of autism. In addition, they believe AI has the potential to facilitate autism diagnosis by reducing the burden on medical professionals and streamlining the process. Additionally, the study seeks to identify and grasp the function of certain genes and brain processing systems associated with an inherited susceptibility to autism. 

Their ultimate goal is to better comprehend the factors that contribute to the speech differences of autistic individuals. The team will study if processing differences in the brain contribute to previously identified behavioral speech patterns and their underlying neural genetics. They are quite keen to explore this new terrain further.

-----------
Author: Trevor Kingsley
Tech News CITY /New York Newsroom