top of page

195 results found

  • The Rise and Fall of Skype

    Launched in 2003, Skype quickly became a household name, pioneering voice and video calls over the internet  long before competitors like Zoom and WhatsApp entered the scene. It gained massive popularity, particularly in the early 2010s, when it was the go-to platform for international calls, business meetings, and personal video chats. However, following Microsoft’s acquisition of Skype in 2011 for $8.5 billion , the platform faced increasing competition. The rise of faster, mobile-friendly alternatives  and Microsoft’s decision to prioritize Teams for business users  led to a steady decline in Skype’s relevance. Why Is Skype Shutting Down? Microsoft cites several reasons for phasing out Skype: Declining User Base  – More people have shifted to Teams, Zoom, WhatsApp, and FaceTime , reducing Skype’s active users. Integration with Microsoft Teams  – Businesses and enterprises are now heavily invested in Teams, making Skype redundant within Microsoft’s ecosystem. Outdated Technology  – Compared to its competitors, Skype’s infrastructure has struggled to keep up with modern video conferencing needs . What Happens Next? Microsoft has assured users that Skype will remain functional until its final shutdown date, which is expected to be in [insert date if available] . The company is providing resources for users to migrate their data and conversations to Microsoft Teams  or other Microsoft services. While Skype’s shutdown marks the end of an era, its influence on digital communication is undeniable. From personal chats to professional meetings, it paved the way for the modern video-calling technology  we use today.

  • Apple Sued Over ‘Misleading’ Carbon Neutral Claims for Series 9 Watches

    San Jose, California — Apple is facing a lawsuit over its claim that the Apple Watch Series 9, SE, and Ultra 2 models are “carbon neutral.” The lawsuit, filed in California, alleges that Apple’s marketing is misleading and that the carbon offset projects it relies on do not lead to real emissions reductions. The plaintiffs, a group of consumers from multiple states, argue they were misled into purchasing the watches based on Apple’s sustainability claims. They assert that Apple's carbon neutrality efforts, including investments in offset projects in Kenya and China, fail to deliver actual reductions in emissions. The lawsuit claims these projects—located in already protected or heavily forested areas—did not generate new environmental benefits, making Apple's claims deceptive. ​ Apple launched its “carbon neutral” watches in 2023 as part of its broader commitment to sustainability, stating that these models are produced using 100% clean energy and lower-carbon materials. However, critics have questioned whether Apple's reliance on carbon offsets rather than direct emissions reductions truly qualifies as carbon neutrality. ​ The lawsuit seeks damages and an injunction to prevent Apple from marketing the watches as carbon neutral. With increasing consumer awareness around greenwashing, the case could set a precedent for corporate sustainability claims. Apple has not yet commented on the lawsuit.

  • Google Rolls Out AI Scam Detection for Android Messages and Calls

    Google has introduced new AI-powered scam detection features for Android devices, aiming to protect users from increasingly sophisticated fraudulent activities. These enhancements focus on real-time identification of scams within both text messages and phone calls, addressing the evolving tactics of cybercriminals. AI-Powered Scam Detection in Messages To combat conversational scams that often begin innocuously but escalate into harmful situations, Google has integrated advanced AI models into its Messages app. These models analyze incoming SMS, MMS, and RCS messages for suspicious patterns. When a potential scam is detected, users receive a warning notification with options to dismiss, report, or block the sender. Importantly, all processing occurs on-device, ensuring user privacy. This feature is enabled by default for conversations with unknown contacts and is currently rolling out in English to users in the U.S., U.K., and Canada, with plans for broader expansion. Real-Time Scam Detection in Phone Calls In addition to message protection, Google has enhanced its Phone app with real-time scam detection capabilities. Leveraging on-device AI, the system analyzes ongoing calls for common scam tactics, such as requests for payment via gift cards or threats from impersonated authorities. If suspicious behavior is identified, the user is alerted through audio, haptic, and on-screen warnings. This feature is currently available to English-speaking users with Pixel 9 and newer devices in the U.S., with plans to extend support to more devices and regions in the future. Commitment to User Privacy Google emphasizes that both scam detection features operate entirely on-device, meaning no audio or message content is stored or transmitted to external servers. This approach ensures that users' conversations and call content remain private while benefiting from enhanced security measures.

  • North Korean Spyware Disguised as Utility Apps Infiltrates Google Play Store

    Security researchers have uncovered that North Korean state-sponsored hackers have successfully infiltrated the Google Play Store by disguising spyware as legitimate utility applications. These malicious apps, which posed as file managers and software update tools, were designed to covertly extract sensitive user information, including text messages, location data, call logs, files, audio recordings, and screenshots. The spyware, identified as KoSpy, has been active for at least three years, targeting English and Korean-speaking Android users. The KoSpy malware operates by masquerading as harmless applications, enticing users to install them. Once installed, the spyware gains unauthorized access to various device functions, enabling it to monitor and steal a wide array of personal data. Notably, these malicious apps managed to bypass Google's security measures and were available for download on the official Play Store, increasing their potential reach and impact. In response to the discovery, Google has removed the identified malicious apps from the Play Store and deactivated associated Firebase projects used for data collection. However, users who had previously downloaded these applications may still be at risk. It is recommended that Android users review their installed apps and uninstall any suspicious software. Additionally, enabling Google Play Protect can provide an added layer of security by scanning for harmful apps and alerting users to potential threats.

  • Trump Introduces CBP Home App to Encourage Voluntary Deportation

    The Trump administration has launched a new immigration app, CBP Home, aimed at facilitating the voluntary departure of undocumented immigrants. This app replaces the previous CBP One, which was used for asylum appointments but was deactivated on Trump's first day back in office. Homeland Security Secretary Kristi Noem stated that the app provides migrants with a way to leave the U.S. voluntarily, potentially preserving their chances of legal reentry in the future. While supporters see CBP Home as a cost-effective and humane alternative to forced deportations, critics warn of potential risks. Immigration advocates argue that self-deportation initiatives often exploit fear and misinformation, and some legal experts caution against relying on the app without proper legal guidance. Privacy concerns have also been raised, with worries that collected data could be used for surveillance or enforcement actions beyond voluntary departures. This initiative comes amid an intensified crackdown on undocumented immigration, with ICE reporting over 32,000 arrests in the first 50 days of Trump's second term. The administration hopes that CBP Home will ease the burden on detention facilities and streamline enforcement efforts. However, the app’s effectiveness and ethical implications remain points of debate in the ongoing national conversation on immigration policy.

  • How To Interact With Alexa?

    If you’ve yet to hear about Amazon’s virtual assistant, Alexa, you’re missing out on its features! Alexa, much like Apple’s Siri, is designed to interact with users through voice commands. It can perform many different tasks, such as answering questions, playing music, setting up alarms and calendars, providing weather and temperature updates, and can even control smart home devices! There’s a lot more to Alexa than just those, you can read more about its features here. But of course, aside from practical use, Alexa can also be fun as it can entertain you with games, tell you jokes, and can even engage in light conversation. So, whether you’re looking to set up your day and home seamlessly, or simply looking for a quick bit of fun, Alexa has you covered on that! This guide will walk you through a quick step-by-step overview on how to connect your Amazon devices and interact with Alexa. How To Access Alexa Step 1. Get a Device that Supports Alexa. Alexa is built into many Amazon devices  such as the Amazon Echo line  of speakers , Echo Buds , or use the Alexa app  on your smartphone. Step 2. Download the Alexa App. Before everything else, make sure you have the Alexa app . You can download the Alexa app  in iOS’ app store  and  Android’s play store . Step 3. Sign in to Your Amazon Account. Once you’ve downloaded the Alexa app  on your mobile device , sign in  with your Amazon account  and complete the setup process . Step 4. Set Up Alexa Devices. Open the Alexa app  on your smartphone  and tap the “Devices ” icon at the bottom. Hit the “+”  icon to start adding a new device , then choose the type of Alexa device  you’re setting up from the list. Whether it’s an Echo Buds or Echo Show, the app will walk you through connecting to Wi-Fi and any other setup steps. Make sure your device is on and ready to pair! Step 5. Select Which Device You Would Like to Set Up. A list of compatible devices  that you can set up will appear on the app. Just pick a device , like an Echo , Echo Buds , or any other product that has Alexa built in. Prompts will appear, simply follow the instructions for the device of your choice. Step 6. Use Voice Command to Test if Alexa Responds. To test if Alexa  would respond to a command, use the wake command “Alexa,”  followed by a command like “What’s the weather today? ” or “Play music.”  If Alexa responds , then your setup is successful!  You may then explor e more commands  and  features  in the app, like controlling smart home appliances , creating reminders , or you can even ask for a joke ! Step 7. Customize Alexa’s Settings Once you’ve confirmed that Alexa  is responding to commands, you may go to the settings  in the Alexa app  to customize preferences to your liking. You can change the wake word , adjust voice response settings , or create voice profiles  for different users to personalize interactions however you wish to! Step 8. Connect and Manage Smart Home Devices If you have other smart home devices , add them to the “Devices”  section of the app to add and manage them. Just follow the instructions to connect each device, such as smart lights , plugs , thermostats , or security cameras .

  • Understanding the Cybersecurity Implications of AI-Powered Chatbots

    AI chatbots have become an integral part of modern communication, providing users with assistance in various domains , including customer service , healthcare , and personal productivity . However, these systems also introduce  significant privacy risks . This paper explores the  potential threats associated with AI chatbots  and offers best practices  for users to interact with them safely . Privacy Risks of AI Chatbots Involuntary Data Collection User interactions may be  logged and stored without explicit consent , making it difficult to control personal data. Data Memorization  AI models may inadvertently retain personal information  from training data, leading to potential leaks. Surveillance & Law Enforcement Access  Conversations may be monitored or shared  with authorities without user awareness. Identity Theft & Fraud AI tools can be exploited for spear-phishing, voice cloning, or other cyber threats . Safe Usage Practices Limit Personal Information Sharing Users should avoid sharing sensitive personal data , such as social security numbers , financial details , or medical records , with AI chatbots. Review Privacy Policies Before using a chatbot, users should review the provider’s privacy policy  to understand how their data will be  collected , stored , and shared . Regularly Clear Chat History Where possible, users should delete their chat history  or limit the retention period to prevent unnecessary data accumulation. Stay Vigilant Against Phishing Attempts Users should be cautious of chatbots requesting personal  or financial information  and verify the authenticity  of such requests before responding.

  • How to Recognize and Avoid Social Engineering Attacks

    In a social engineering  attack, the attacker obtains or compromises information  about a company or its  computer systems  through human interaction  (social skills). By posing as a researcher, repairman,  or new hire  and even providing credentials to back up their identification, an attacker may appear humble  and trustworthy . On the other hand, he or she could be able to gather enough information  by asking questions to get access to an organization's network. An attacker may contact another source within the same organization if they are unable to obtain sufficient information from one source, then use the information from the first source to strengthen their credibility. Common Types of Social Engineering Attacks Baiting Baiting  is a social engineering attack where an attacker lures  a victim into performing a specific action, often by offering something enticing , like free software , a USB drive , or an exclusive offer . Once the victim interacts with the bait, it can lead to malware infections, data breaches,  or  unauthorized access  to sensitive information. Phishing Phishing is a cyberattack where attackers impersonate trusted entities  to trick individuals into revealing sensitive information , such as passwords, credit card details , or personal data . This is often done through deceptive emails, messages, or fake websites designed to look legitimate. Vishing and Smishing These social engineering attacks are variants of phishing , also referred to as voice fishing , which is a method of simply calling and asking for information. The attacker may appear to be a coworker, such as asking login credentials  from the IT helpdesk. Instead, smishing tries to get this information through SMS messages. Pretexting Pretexting is a social engineering attack in which an attacker creates a situation in order to manipulate victims  into e xposing private information . Attackers obtain access to private, financial, or private information by posing as a reliable individual, such as an authority figure or a representative of the company. Ways To Avoid Social Engineering Attacks Step 1: Use a spam filter You may want to change the settings if your email application isn't filtering emails  as suspicious or filtering out enough spam. To identify which emails are most likely to be spam , effective spam filters  apply many kinds of information. They may have a blacklist of suspicious IP addresses or sender IDs , identify questionable files or links, or examine message content to identify potentially fake ones. Step 2: Don’t provide personal information Avoid sharing personal information  online, such as your full name , address , phone number , or financial information , to protect your privacy. You risk a chance of i dentity theft , scams , or unauthorized access  to your accounts if you share sensitive information. Before providing them any personal information, be cautious  and confirm the credentials of websites or people. Step 3: Enforce multi factor authentication (MFA) Enabling multi-factor authentication (MFA) , which provides an additional layer of security  on top of a password, will improve your security. With MFA, users must confirm their identity using a number of methods, such a fingerprint scan  or a c ode texted  to their phone. Even in the case that credentials are hacked, this helps stop unwanted access. Step 4: Install and maintain anti-virus software Installing  and keeping anti-virus software  on your devices allows you to detect  and stop ransomware , malware , and other cyber threats . Updating your program guarantees that it can successfully defend against the most recent security threats. Frequent scans and real-time security keep your device operating smoothly, your data safe, and your system safe.

  • How to Detect Fake Apps and Downloads

    As the use of mobile applications continues to grow, so does the risk of downloading malicious apps, which has also increased. Cybercriminals achieve this by creating fake apps that are exactly the original ones but send malware or steal information. Such malicious apps may look quite real and can put your security and privacy at risk. Therefore, knowing how to detect fake apps before downloading is essential. This guide provides useful methods to help you verify app authenticity and avoid falling victim to fake apps that can harm your device or data . By following these steps, you can protect yourself from malicious downloads and enjoy a safer app experience . Methods to Spot Fake Apps Step 1: Download from Official App Stores. Use a web browser on a computer or mobile device to access the Google Play store . Always download apps from the official Google Play Store , as it uses advanced security measures . Afterward , click the search bar  at the top of the screen and type the name of the app you wish to download. Step 2: Check the Developer’s Information. Verify the app developer’s name by reviewing the details under “ App support ”. There you should find information about the developer, including the developer's email and website . Step 3: Read Reviews and Ratings Carefully. Go through user   reviews  and check the app’s rating . Be cautious of apps with few reviews, overly positive comments, or repetitive feedback, as these could be fake. Step 4: Review the Number of Downloads. Popular apps  usually have millions of downloads. If an app claims to be well-known but has very few downloads, it might be suspicious . Step 5: Examine the App Description. To view the app description  click the arrow under “ About this app ”. Next , check for spelling mistakes  or poorly written content , as these can be signs of a fake app . Step 6: Analyze App Permissions. Pay attention to the permissions the app requests. Scroll down to find “ App Info ”, then click on “ App Permissions ”. Select “ See More ” to review the full list of permissions.  Eventually, check if the app requests access to sensitive data  that is not necessary for its functionality. If it does, don't download it . Step 7: Look for Recent Updates. Legitimate apps  are regularly updated for security and performance . Under the “ App info ”, check the “ Updated on ”. If an app has not been updated for a long time, it may not be reliable . Step 8: Verify the App’s Website and Contact Info. Authentic apps usually include a link to an official website in the Play Store   description . Visit the website to confirm that it is genuine . Step 9: Enable Google Play Protect. Turn on Google Play Protect  by going to “ Settings”,  then click  “ Security”  followed by Google Play Protect . It scans apps for harmful behavior  regularly. Step 10: Trust Your Instincts. If something feels off whether it’s the app’s icon , description , or behavior , avoid downloading it. But if the app meets all the criteria and appears legitimate , you can proceed with downloading it with greater confidence.

  • How to Protect Your Webcam from Hackers

    Webcams can be extremely useful for security, education, and communication, but they also present a serious risk to privacy when they are hacked. Users are spied on, private data is taken, or worse, blackmailed, when hackers obtain unauthorized access. Protecting your devices might be the best course of action to preserve your privacy and peace of mind to avoid this terrible circumstance. The experts' recommendations are as follows. Firmware and software updates for devices guard against vulnerabilities that hackers could take advantage of. Unauthorized access is more difficult to achieve when two-factor authentication is used and strong, one-of-a-kind passwords are used. Certain physical precautions, such as covering your webcam when not in use, are simple to implement. The final precaution is to be wary of phishing scams and to stay away from dubious links or attachments that could compromise your webcam and infect it with malware. To maintain your digital safety, you must take some crucial actions. Go to the   Avast   and Metacompliance   websites to learn more about webcams, how easily they may be compromised, and how to keep them safe from criminals. Ways to Secure Your Webcam Against Hackers Step 1. Cover Your Webcam When Not in Use. The simplest and most efficient solution, when you are not using your webcam, is to cover it physically . Tape , a webcam cover , or even just a sticky note  on the camera lens might be used for this. When your webcam is turned on, hackers can view it from anywhere, but if it is hidden, they won't be able to see anything. You can shop for the best webcam covers  on these sites: Digital Trends   and My Best . Step 2. Update Your Software. Always ensure that your device has an up-to-date operating system  and an antivirus program . Most of the security vulnerabilities are corrected with updates, and hackers often gain access using out-of-date software . To remain one step ahead of such risks, you can activate automatic updates. To update the operating system , go to your device Settings , click Windows Update , and click  Check for Updates , If there are necessary updates needed, click Download and Install . Wait  until the installation process  is completed . Once done, restart your device  for update implementation. Windows Defender automatically updates  so there’s no need for you to manually update it.  Step 3. Enable Two-Factor Authentication (2FA). An extra layer of security can also be included for accounts that allow access to your webcam , such as your  social media or video conferencing apps . An additional layer of verification, such as a code sent to your phone would be required even if the hacker managed to obtain your password. Steps on how to enable 2FA are explained in greater detail here: How to Implement Two-Factor Authentication (2FA) . Step 4. Use Strong, Unique Passwords. Your various online accounts  - especially those reliant on video calls  or other kinds of communication should always have strong , unique passwords ; not to be found anywhere else nor in an easily guessing format. Some examples of these accounts are Zoom , Microsoft Teams , Google Meet , and Cisco Webex .  To   test your password strength, you can use Bitwarden . You may also consider using   Google Password Manager   to secure complicated passwords. To store passwords on Manager , go to your  browser . Click the  three-dot menu  on the upper right part of your screen. Choose  Google Password Manager under  Passwords and Autofill .   Click  Add  and   type your  email  and  password  for a specific account, then   click  Save . Your site password will now be added to your Passwords List. Step 5. When You Are Not Using Your Webcam, Turn It Off. You can turn off the webcam completely on most devices. If you are not using it for a particular purpose, consider  turning it off in your system settings . This way, hackers cannot access it remotely when it is not in use. To do this, go to your Device Settings . Click Privacy and Security . Choose Camera under  Privacy and Security . Turn off Camera Access  to disable the camera for all apps. If you want to disable the camera on a specific app , scroll down and turn it off. Step 6. Install Security Software. Installing high-quality security software  will guard your device  from multiple threats occurring in the virtual world, among them webcam hacking. Webcam guarding features in security programs will send out an alarm in case there's an unauthenticated application that aims to operate with the camera on the device. Some examples of security software  that include webcam protection features  are Norton 360 , McAfee Total Protection , Bitdefender Total Security , Kaspersky Total Security , ESET NOD32 Antivirus , Trend Micro Maximum Security , and AVG AntiVirus Free . To install security software, simply go to their official site , download  the application, and follow the prompts  to complete  the installation process . Most of these applications require payment  before using their products/services. Make sure to choose the plan  that is right for you. Step 7. Be Aware of Phishing Scams. Phishing emails or fake links  will play a trick on you to install some dangerous software . Always take maximum precautions  when you click on any unknown websites  or receive some attachments from unrecognized sources . Confirm the sender's details and URL before you give away your personal information. To know the  detailed steps  on how to protect yourself from phishing attacks, read this blog post  from Privarase , titled: How To Recognize and Avoid Phishing Attacks .

bottom of page