The Most/Recent Articles

Your Life is Saved in Your Smartphone - Are you Doing Enough to Secure it?

Smart Phone Security

Smart phones are an important part of our lives. We use them to stay connected with friends and family, to get work done, and to stay up-to-date on the latest news and trends. As such, it is important to take steps to protect our phones from hackers and other cyber-attacks.

Here are a few simple steps that you can take to keep your phone safe and secure:

1) Use a strong password that is not easy to guess.

2) Install a reputable security app such as Norton or McAfee.

3) Only download apps from official app stores, such as Google Play or the App Store.

4) Be careful when clicking on links or opening attachments in emails.

5) Regularly back up your data so that if your phone is ever lost or stolen, you will still have your information safe and secure.

By following these simple steps, you can help to keep your phone safe from hackers and other online threats.

Why Do You Need to Secure Your Smart Phone?

Smartphones contain a wealth of personal information, from contacts and emails to bank details and passwords. As such, it is important to take steps to secure them from hackers and thieves.

One way to do this is to password protect your phone. This will make it more difficult for anyone else to access your data.

Another important step is to only download apps from reputable sources. Malicious apps can steal your data or even install spyware on your phone.

Finally, it is important to back up your data regularly. This will ensure that if your phone is ever lost or stolen, you will not lose all your information.

What Are the Risks of Not Securing Your Smart Phone?

Smart phones are like mini-computers and are just as vulnerable to cyber attacks as desktop or laptop computers. In fact, a smart phone may be even more vulnerable because it is carried around with you everywhere you go.

That's why it's so important to take the necessary steps to secure your phone and protect your data. Follow these simple steps to keep your phone safe and secure:

1. Install a good security app and make sure it is always up-to-date.

2. Set a strong password and don't use the same password for all your accounts.

3. Don't install apps from unknown sources.

4. Be careful what information you share online.

5. Regularly back up your data.

How to Set a Secure Passcode for Your Smart Phone:

Now that we know how easy it is to set a secure passcode for our smart phone, let's do it!

Your passcode is your first line of defense against hackers and thieves, so it's important to make sure it is strong and unique. You can set a passcode on your mobile device by going to the App list, tapping Settings, tapping Lock Screen, and setting your password.

Make sure your password is a combination of letters and numbers, and that it is at least six characters long. And don't use the same password for all of your accounts - that's just asking for trouble!

How to Encrypt Your Smart Phone

Smart phone security is more important than you think. In fact, your personal data may be at risk if you don't take steps to protect it.

One way to safeguard your data is to encrypt your phone. This can be done on Android devices by going to Settings > Security > Encrypt Device. Another way to encrypt your Android device is to go to Settings, then tap "Security" or "Security & location." Select "encryption & credentials" and/or "encrypt phone."

Encrypting your Android device will help keep sensitive data and photos private. So if you're not already doing so, be sure to encrypt your phone today!

How to Use Two Factor Authentication for Your Smart Phone

Your smart phone is a valuable piece of equipment, and it's important to keep it safe and secure. One way to do that is by using two-factor authentication. This security feature requires you to enter your account password and a verification code that is sent to your phone.

You can turn on two-factor authentication on your phone by going to Settings > Accounts > Google, and signing in. Or, on macOS, go to System Preferences > iCloud, sign in, click Account Details > Security > Turn on Two-Factor Authentication. With 2-Step Verification, you can add an extra layer of security to your account in case your password is stolen.

Pro Tips for Keeping Your Smart Phone Secure

Here are a few pro tips for keeping your smartphone secure:

First, to avoid giving out personal information, be sure to disable location services and Bluetooth when you're not using them. Also, make sure to use a strong password, pin or pattern to lock your phone.

Second, be careful about the apps you download. Only download apps from reputable sources, and be wary of apps that require too much access to your data.

Lastly, back up your data regularly. This way, if your phone is ever lost or stolen, you'll still have all your information backed up and safe.

Things to remember...

Just as you protect your computer with antivirus software and your house with a security system, you need to protect your phone with security measures. Why? Because your phone has a lot of personal information on it—information that could be used to steal your identity or access your bank accounts.

Here are a few tips to help keep your phone safe:

1. Install a security app.

2. Use a strong password.

3. Set up remote wipe in case your phone is lost or stolen.

4. Don't store sensitive information on your phone.

5. Be careful what you download and install.

6. Keep your OS and apps up-to-date.

7. Avoid public Wi-Fi networks.

8. Use a privacy screen protector..

-----------
Author: Preston Summers
Tech News CITY /Austin Newsroom

Owners of EMPTY LAND are EARNING MORE than Many AirBNB Hosts, with Zero Time or Effort - All Because of THIS New Startup...

Hipcamp camping host

There's a rapidly growing community of polite people looking to get outside for camping, glamping, and RV stays during their travels - on private land.

It's called Hipcamp, and anyone with a property that allows visitors to connect with nature can be a Hipcamp Host! Whether you have an acre of primitive property near the Sierra Nevada, a hobby farm on the coast, a rural yard with a spot for a campervan, or a slice of desert on the route to Joshua Tree, odds are our community can’t wait to come!

The platform is EXPLODING, and among those who took notice have been rapper Jay-Z and actor Will Smith, who invested in the companies last fundraising round.

But when a new concept is hot, you don't need to invest to make a profit - you just need to participate, it'll cost you $0 and could earn you thousands.

In the first 8 months of after its introduction, numerous Hipcamp Hosts earned as much as $9,000, $11,000, $18,000 and even $21,000!

It's Sharing your place with our community of Hipcampers is a terrific way to connect people with nature while earning some extra income.

To encourage more people to open their land to hosting, those who sign up with code 'CampBonus' or click here to get a $100 bonus the first night they host guests on their property!

Hosts are provided with a $1,000,000 insurance coverage - at no additional cost...

A significant benefit of Hipcamp is the reassurance that you will be cared for. The Hipcamp Insurance Policy covers hosts against general liability claims of up to $1 million per incident.

It's free to list your property, they take only a 10% percent cut...

With Hipcamp, you may add as many listings and sites as you’d like so you can always make more by hosting more! This might range from $35 for a basic camping with little to no amenities to $300 group sites with exclusive lake access. 

There are simple plots of land, farms and ranches, vacation properties, and everything else. Regardless of what you have, as long as it isn't in the middle of the city surrounded by buildings - it is worthwhile to see if you're sitting on a profitable business without knowing it.

Hipcamp hosting
This couple went to see the Grand Canyon, and stayed on a host's land right outside of it!

3 Simple Steps:

1) You set the dates you want.

Hipcamp allows the blocking of any days you want to exclude from your hosting schedule.

2) Guests book their visit.

Based on the availability you provided, Hipcampers book their arrival / departure dates.

3) You get paid every week.

Set up direct deposit easily, and you will begin collecting weekly money.

Remember to use code 'CampBonus' when you sign up (or click here) you'll get a $100 bonus when your first guest stays a night!

It's being called 'the AirBNB of the outdoors' as it taps in to a whole world tent camping, RV travelers, and adventurers who would rather stay in cabins or treehouses.

Hipcamp cabin host
Vacation cabins that sat empty much of the year have become an additional income source for their owners.

Let's do the math...

Someone with open land can let people bring tents, and camp there for 165 days out of the year - at $55/night that totals $9,075 - and that's without sharing your land for the other 200 days out of the year! 

Someone with a vacation cabin can fill it on days they won't be there - at $155/night and only sharing it 100 days totals $15,500 - and they can still enjoy the cabin to themselves the other 265 days of the year! 

Visitors will be instructed to follow our guest guidelines, and a system is in place to identify and remove those who do not...

During the checkout process, each Hipcamper acknowledges having read the rules and guidelines, plus you  can also establish specific guidelines for anyone staying on your property. Any user marked for minor infractions will be contacted by Hipcamp administration and given a warning and explanation of the situation. Serious violations will result in an immediate suspension from the platform.

Hipcamp's key principle is "Leave it Better," and all community members are encouraged to uphold this objective by adhering to the 'Leave No Trace' standard when cleaning up.

So far this hasn't been an issue - Hipcamp reports that Hosts frequently compliment Hipcampers' appreciation for their property!

Interested in giving hosting a shot? 

Visit Hipcamp for more info, and check out what some of the other hosts are offering. Remember to sign up using code 'CampBonus' for the EXTRA $100 when your first guest spends their first night!

--------
Author: Garrett Kaine
Silicon Valley Newsroom
Tech News CITY




Replacing Hard Drives With... GLASS!? Microsoft Proves The Shocking Ability for Glass to hold MASSIVE Amounts of Data...


Microsoft's Project Silica is an effort to demonstrate that the company is capable of storing data for an extended period of time utilizing glass as the storage medium. Glass is the medium of the future for the storage of long-term data.

The Superman film from 1978 was etched onto a piece of glass through a collaborative effort between Microsoft and Warner Bros., which involved the use of lasers. This was done with the intention of demonstrating that the technology could be applied in environments other than the laboratory.


Video courtesy of CNET

China is Creating DNA Records for EVERY American - Using a Combination of Hacking, and Buying US Businesses To Get It...

This is story everyone should be aware of, yet few have heard.

Initially reported over a year ago, verified by both the NY Times and 60 Minutes, this isn't something anyone is still wondering "is it true?" - it is. 

But even those who became aware of it as a result of those initial reports are likley unaware of all of the disturbing details we've learned since then.

Chinese firms are gathering genetic data from around the world, part of an effort by the Chinese government and corporations to develop the world’s largest bio-database.

These are the claims made in an alarming declassified official American intelligence report...

In the report, the National Counterintelligence and Security Center asserted that the United States must improve the security of vital technologies, such as artificial intelligence, quantum computing, semiconductors, and other technology relevant to the so-called bioeconomy.

Michael Orlando, the interim director of the counterintelligence center, a division of the Office of the Director of National Intelligence, stated that China and other countries are attempting to dominate these technologies by using both legal and unlawful tactics to gain American know-how.

China and other nations have long targeted the American private sector in an effort to steal American technology and intellectual property.

Other countries, such as Russia, continue to pose a threat, but China's economic power makes it the greatest threat, according to officials.

China believes that dominating these fields will provide it with an economic advantage, and American companies are also spending extensively in these areas. Artificial intelligence and machine learning have the potential to transform numerous facets of society, including military operations. Quantum computing would enable nations to break the most secure encryption now in use, and semiconductors are essential not only for computers but also for many consumer goods.

Officials are now now emphasizing the convergence of technology, genetic, and biological research as a competitive and espionage-prone field. Edward You, the national counterintelligence officer for new and disruptive technologies, stated that the Chinese government was gathering worldwide medical, health, and genetic data. The nation that has the best database of knowledge will have an advantage in discovering remedies for future pandemics, he stated, and China is already in the lead.

Among the most extreme theories on why China would want this data: Bioweapons that target specific DNA sequences common among US citizens, and rare among Chinese...

In recent years, the FBI and the counterintelligence center have increased their wide warnings to corporations and institutions regarding Chinese attempts to steal American technology. Some of these overtures have been met with skepticism, especially by colleges that fear the U.S. government may be attempting to restrict the number of Chinese students studying at American universities.

While the U.S. government can review many Chinese purchases of American firms, other Chinese investments are more difficult to monitor. Mr. Orlando stated that an American corporation collaborating with a Chinese company should take precautions to safeguard its data.

----------
Alex Benningram
TechNews.CITY / New York Newsroom


What Artificial Intelligence Discovered After Studying How Kids With Autism from Around The World Communicate…

AI Autism Kids

Northwestern University and Hong Kong researchers collaborated on a study to provide insight on the causes and diagnostics of this condition. This method employs machine learning to identify Cantonese and English-like speech patterns in autistic youngsters. Researchers may now be able to distinguish between genetic and environmental influences on the communication skills of autistic persons, allowing them to better understand the disorder's causes and develop novel therapies. Recently, the astounding results were also published in the journal PLOS One.

The research group successfully developed a supervised machine learning method to identify speech variations associated with autism. The training dataset consists of recordings of young children with and without autism narrating in English and Cantonese their interpretations of the events recounted in the wordless children's picture book "Frog, Where Are You?"

Observations indicate that children with autism frequently speak more slowly than typically developing children. Tone, intonation, and rhythm are other distinguishing characteristics of their speech. It is extremely difficult to consistently and objectively explain "prosodic" distinctions, and decades have passed since their origins were established.

Given the structural differences between English and Cantonese, the researchers anticipated that any commonalities identified in the speech patterns of autistic children across both languages were likely related to genetics...

In addition, the researchers saw a spectrum of variance that indicated more malleable parts of speech that could be used as intervention targets. Researchers made significant progress by employing machine learning to identify the speech patterns most symptomatic of autism. Prior to this, they were limited by the bias of the English language in autism research and the subjectivity of humans when it came to categorizing speech discrepancies between individuals with and without autism.

The research led to the identification of speech characteristics, with rhythm emerging as the most crucial in terms of its ability to properly predict an autism diagnosis. The experts have high hopes that this research will increase our understanding of autism. In addition, they believe AI has the potential to facilitate autism diagnosis by reducing the burden on medical professionals and streamlining the process. Additionally, the study seeks to identify and grasp the function of certain genes and brain processing systems associated with an inherited susceptibility to autism. 

Their ultimate goal is to better comprehend the factors that contribute to the speech differences of autistic individuals. The team will study if processing differences in the brain contribute to previously identified behavioral speech patterns and their underlying neural genetics. They are quite keen to explore this new terrain further.

-----------
Author: Trevor Kingsley
Tech News CITY /New York Newsroom



Ads That FOLLOW and TRACK You are REAL - The (Free) Chrome Extension That Blocks Them...

Ad tracking privacy online

 Consider the advertisements that are tailored to your interests that you see online. You do a search for a new pair of shoes, and almost immediately afterward, you start to see advertisements for them wherever you go online.

What can be done to put an end to this creepy behavior? To begin, you have to determine who is looking and what they are able to see. 

It is not easy to opt out of receiving interest-based advertisements from Google and all of the other companies that work with the technology giant. We were fortunate enough to find a browser extension that makes the process quite simple.

What you need is this addon for the Chrome browser that disables these ads.

IBA stands for 'internet based advertising", the above Chrome extension, which Google has given the somewhat unassuming name IBA Opt-out, does precisely what its name suggests it will accomplish. While you are surfing the web, you can use it to opt out of receiving targeted advertisements from Google. According to Google, the extension allows users to opt out of the use of the DoubleClick advertising cookie, which is used by Google and its advertising partners to show you interest-based advertisements.

When it comes to the download and the installation, there isn't really any of either: You only need to add the extension to your browser, and then everything will work properly. After doing so, you will no longer be subject to interest-based advertisements from Google.

The following is a list of features that come with this extension:

  • A number of websites that work with Google will no longer display advertisements tailored to users' interests.

  • Install once, and you're done.

  • Even if you delete all of the cookies from your browser, your decision to opt out will still be honored.

You want even more browser extensions to keep you safe while you're browsing the internet, right? You don't need to worry about a thing. You may increase the safety of your browsing experience by installing one of these three browser extensions.

Things to take into consideration regarding the IBA Opt-Out

It is essential to keep in mind a few factors that the people who reviewed the extension might have neglected to mention. Even if you opt out of having interest-based advertisements displayed on websites you visit, you will still view general advertisements.

You should still expect to receive advertisements from Google and its other advertising partners. What you won't see, though, are ads that have been specifically targeted to you using Google's marketing data.

There are some individuals who like interest-based advertisements to generic ones. They believe that it is preferable to view advertisements for things that are relevant to them rather than material that is completely unrelated to them. This add-on for your browser gives you control over the kinds of advertisements that appear on your screen. Happy surfing!

--------
Author: Garrett Kaine
Silicon Valley Newsroom
Tech News CITY


NASA's Recently Aborted Artemis I Launch Could Face Major DELAY - Next Attempt May Be 2 MONTHS Away...

Artemis

NASA aborted its second attempt to launch the Artemis I mission into lunar orbit on Saturday morning. This time, a liquid hydrogen leak appeared as the crew was loading the core stage of the rocket. During a news conference later in the day, Jim Free, an associate administrator at NASA Headquarters, stated that we should not anticipate a third launch attempt before Tuesday.

According to the space agency, the leak occurred "while loading propellant into the core stage of the Space Launch System rocket," and "multiple troubleshooting attempts to address the area of the leak by reseating a seal in the quick disconnect where liquid hydrogen is fed to the rocket did not resolve the issue."

The Artemis I mission has now been postponed for the second time. The first launch attempt was set for Monday, but launch director Charlie Blackwell-Thompson had to abort that effort as well due to a persistent difficulty with an engine bleed test. (This procedure is designed to allow the engines to reach the proper temperature by releasing a little quantity of gasoline.)

Tuesday during a press briefing, Artemis mission manager Mike Serafin stated, "We were unable to get the engines to the required thermal conditions for launch." "Additionally, we encountered an issue with a bent valve on the core stage, and at that time the team decided to cancel the launch attempt for the day."

On Monday or early Tuesday, we will have further information regarding the next launch window for Artemis I...

However, Serafin added that it may occur as late as the end of October and claimed it is not impossible to move the SLS off the pad and back into the Vehicle Assembly Building.

"As part of this maiden test flight, we are becoming acquainted with the vehicle. We are learning how to control the vehicle, as well as all the necessary skills for flight "Sarafin remarked. "We are currently learning as we go in order to safely launch this spacecraft, so our focus is on comprehending the problem and developing schedule- and risk-sensitive solutions."

Now we wait and see.

-----------
Author: Preston Summers
Tech News CITY /Austin Newsroom

Browser Startups Say They Can't Fairly Compete With Chrome and Safari, and they may get Regulators to take Action...

Rivals in the web-browser market are raising concerns about the dominance of Apple’s Safari and Google’s Chrome, and global regulators are taking notice as they focus more on the power of big tech companies.

How Safari and Chrome became so big and what moves regulators are considering...

 Video Courtesy Of WSJ

OHMConnect Energy Texas Review and EXCLUSIVE BONUS as CA Power Company That PAYS Customers Expands to the Lone Star State…

 OHMConnect OHM Power Texas Review

"Switch to a company that will help you keep your lights on while putting cash in your pocket" says California energy company OHM Connect, as they begin Texas service...

OhmConnect Energy has arrived in Texas with technology that empowers you to save energy for cash rewards and help prevent power outages, all while lowering your bill. Today we’ll review OHMConnect’s main reasons for their success thus far  

How Does A Power Company PAY Me?

A common question the company gets is 'Where does the money come from?'

Well, during the periods of high energy demand, their customers will receive a text message asking if you can turn anything off to save power (just for a 1 hour period) this reduces stress on the grid.

They then sell the power their customers saved back to the grid - and share the profits with you.

"Texans are seeing a series of highly disruptive extreme weather events as of late" said Don Whaley, President of OhmConnect Energy. "Whether it's freeze-outs or heat waves, OCE offers Texas consumers the chance to be a part of the solution needed to stabilize the grid: we'll pay you to help us keep the lights on. This is how we're bringing innovation to an industry untouched by change for the last 20 years."

How much can this REALLY benefit someone?

One customer has earned more than $3000 last year, bringing her total since she signed up to $11,000, just for powering down during energy savings hours. Keep in mind you'll only be asked to lower usage for one hour, and not more than once per week.

“This program has always been a blessing to our family” said McDermott. “When we started participating we were living paycheck to paycheck. OhmConnect helped us through some hard times, and by referring others to it, I’ve been able to pass the blessing on to so many other families too.”  

Beating The System - OHMConnect Hacks...

I found someone posting on social media how they're getting the maximum amount of money possible, and it's so simple - keep your devices charged! 

The post says "When I get the text saying to lower energy usage for the next hour - i'll just switch off my desktop computer and whatever else I can, then turn on the laptop which is running off of it's battery. So I'm no longer using power from the grid, I'm earning every minute while I watch an hour of Netflix."

Is OhmConnect worth it? If it's this easy I have to say yes.

Get First Payment IMMEDIATELY - Everyone who signs up this month gets an instant 'welcome' cash bonus... 

All you need to do is spent the 3 minutes it takes to make your free account, b
ut you must go to https://bit.ly/OHMbonus to claim the signup bonus!

---------
Author: Don Kennedy
Austin Newsdesk 

The "Nothing" Phone HANDS ON - Does It Meet The Hype?



'Technology should fade into the background and feel like Nothing' claims the new company 'Nothing' who is releasing their debut product.

When the company first shared images of their design, they started getting lots of attention. Finally - the phone is ready for a hands-on look to see if it meets the hype!

Video Courtesy of CNET

Does AI think and feel? Why Two Google Engineers are Saying "Yes" - Because They've Seen it For Themselves...



Is it feasible for artificial intelligence to think and have feelings? In spite of the fact that the answer is "no," two Google engineers are of the opinion that this is not actually the situation. Now that we've reached this point, it would appear that the Turing test has been successfully passed.

Video Courtesy of Cold Fusion TV

Be CAREFUL Out There Today - More Smartphones are Lost/Stolen/Broken on 4th Of July than Any Other Day....

4th of july smartphone losses

Insurance data reveals that more smartphones are lost, stolen, or just stop working on the Fourth of July than on any other day of the year.

Given that boats, pools, and beaches are busier in the summer than at any other time of year, this may not be a huge surprise. It ought to serve as a reminder.

Marvin Maldonado, a device expert with the tech care company Asurion, reports a 37 percent rise in the number of mishaps involving electronic gadgets on July 4 of last year.

Asurion's annual report is based on the number of claims company receives for damaged cellphones and other devices...

 Asurion owns the national chain of device repair centers UBreakIFix. Over the past few years, more insurance claims have been filed on July 4 than on any of the other 364 days. Maldonado reports that the number of visitors increased despite the closure of pools and beaches due to the coronavirus.

"Everyone has been at home, so we anticipate a significant increase in people going on vacation and wanting to leave," he said. "We anticipate an enormous growth, even greater than last year's."

On the Fourth of July, claims and repairs for water damage and damaged screens are the most prevalent. Lost and stolen electronics also rank highly. Some misplaced phones are somewhere at the bottom of a lake, having fallen from a deck or their owners' hands.

"We know that cellphones are water-resistant, but a waterproof case, specifically a floating waterproof case, will prevent this from occurring," Maldonado explains. A floating phone case will keep a smartphone or other gadget afloat until it can be recovered.

While the majority of modern smartphones can survive a brief immersion in water, chlorine and salt can destroy any smartphone if they enter through a port or speaker opening. Instead of using rice, Maldonado proposes placing silica gel packs in a Ziploc bag overnight.

You should not place a damp phone in direct sunlight to dry it because the heat can damage the device. Another cause of smartphone failure is heat.

If your smartphone's screen or back is already broken, you should consider twice before exposing it to extreme heat. The humidity alone can cause irreparable damage to the phone by allowing moisture to leak through the crevices.

Maldonado's top piece of advice is to back up your phone before traveling.

"Ensure that all of your data is secure so that, in the event of an accident, you can always restore your data," he advised.

Enjoy the holiday, but watch out for that pricey phone you're holding.


-----------
Author: Preston Summers
Tech News CITY /Austin Newsroom