Articles

Mon
10
Mar
John Lister's picture

New Foldable iPhone: Game-Changer or Just Hype?

Apple is reportedly working on a foldable iPhone with no visible crease in the screen. While several manufacturers have already introduced folding phones, Apple has seemingly held off, possibly due to concerns about design aesthetics. The ... introduction of an Apple foldable device could set a new benchmark in the industry, but it is expected to come with a hefty price tag. Folding Phones: Gimmick or Innovation? Folding phones have evolved from a niche concept to a somewhat legitimate category within the smartphone industry. The idea behind them is simple: they offer the compact portability of a ... (view more)

Fri
07
Mar
John Lister's picture

iPhone Dictation Replaces 'Racist' with 'Trump'

Apple has fixed a supposed bug that caused iPhones to mix up the words "Trump" and "racist". But a speech recognition expert says Apple's explanation was implausible. The issue was with the Dictation tool in iPhones that lets users speak and have ... their words transcribed ready to use as text, for example to send as a message. Numerous videos posted online by users showed them saying the word "racist" but their phone showing the word "Trump" before correcting the error shortly afterwards. Although Apple quickly fixed the issue after the videos went viral, it does appear the videos are genuine. ... (view more)

Wed
05
Mar
John Lister's picture

Google: SMS Text Security Codes No Longer Secure

Gmail is to stop using SMS text messages as a way to authenticate accounts. It's concluded the security measure is no longer secure or efficient. The SMS message test is a common example of two-factor authentication, the idea that accounts should ... always be protected by two different factors, often including something the customer knows (such as a password), something they have (such as a smartphone), and where they are (using an IP address). This means most of the time the customer can simply log in with a password from their normal location or IP address. With two-factor authentication ... (view more)

Mon
03
Mar
John Lister's picture

Report: 'Dark Mode' Effects Limited in Real Life

So-called video display "dark modes" on mobile devices may use more energy than ordinary display modes according to new research. The effect of the modes on human behavior may be counterproductive. The claim comes from BBC Research ... (view more)

Fri
28
Feb
John Lister's picture

Edge Browser Gets up to 40 Percent Faster

Microsoft claims it has made key parts of the Edge browser dramatically faster. The update affects specific features of the browser rather than simply the page loading time. According to Microsoft, 14 different features have been sped up, with an ... average boost of 40 percent. However, it's only specifically listed a few of the affected features: Browser Essentials: a status windows that lists some of the key performance features such as which tabs have been put into sleeping mode to minimize memory user. Downloads: the display of which files the user has downloaded (or is midway through ... (view more)

Wed
26
Feb
John Lister's picture

Google OKs Controversial Tracking Technique

Google is to allow advertisers to use a controversial tactic for tracking Chrome users online. It had previously described the 'fingerprinting' technique as "wrong". The idea of fingerprinting is to identify an individual user even if they don't ... have the ability or permission to install a cookie on a user's computer. It's a way to more accurately identify somebody without relying solely on an IP address, which may be shared between multiple users or even change between different online sessions. Fingerprinting adds in specific pieces of data which individually don't reveal much about the user ... (view more)

Mon
24
Feb
John Lister's picture

Report: Mercenaries and Rogue Gov'ts Fuel Cybercrime

Politically and financially motivated hacking groups are increasingly working together, according to new research. This collaboration has led to a dangerous pooling of resources, making cybercriminals more effective than ever. The research, ... conducted by Mandiant (a security firm owned by Google's parent company), suggests that hackers are becoming more specialized in their skill sets and working in partnership to maximize their impact. Just as in the corporate world, these cybercriminals are forming networks where each group focuses on a particular aspect of hacking - whether it's gaining ... (view more)

Fri
21
Feb
John Lister's picture

Chrome Could Automatically Change Leaked Passwords

Chrome may soon make it even easier to change a password after a data breach. An in-test feature would actively change the password on the user's behalf. The change would affect what happens when Google auto-fills a password field using a stored ... password. The browser already checks such stored passwords against a database of passwords that have been breached and released publicly. At the moment Chrome will simply warn users about such a breach and prompt them to change it. However, the user will need to manually go to the password settings section or account settings on the website in ... (view more)

Tue
18
Feb
Dennis Faas's picture

What Happens When Windows 10 Reaches End of Life?

Infopackets Reader Dennis J. writes: " Dear Dennis, What happens when Windows 10 reaches end of life after October 14, 2025? My computer isn't compatible with upgrading to Windows 11. Will I still be able to operate using Windows 10 safely? I have ... MalwareBytes but I don't understand these things. I'm retired, and just shy of 80, and can't afford a new computer this year. I'd appreciate your advice thank you. " My response: Thanks for your question. As you mentioned, after October 14, 2025 your Windows 10 PC will no longer receive security updates. One option is to pay Microsoft for Extended ... (view more)

Mon
17
Feb
John Lister's picture

Windows 11 Start Menu Gets Search Revamp

Microsoft is to more clearly label search results in the Windows 11 Start Menu. It will better highlight which results come from the computer itself and which are from the Internet. The change will initially apply only to users in the European ... Economic Area and appears to be a way of complying with new rules on the continent. It's not clear yet if Microsoft intends to roll the changes out to all users. It's all to do with the search feature that appears in the Start Menu itself. The current setup means typing a word or phrase will bring up results that include documents and applications on ... (view more)

Wed
12
Feb
John Lister's picture

Tapestry: View Social Media, Blogs in One App

A new app offers to bring together multiple social media, messaging and content tools into a single "timeline". Tapestry is made by the people behind a previous app that aimed to improve the experience of what was then called Twitter. That app, ... Twitterific, stopped working in 2023 when Twitter blocked third-party access to its service. That ongoing block means the new app doesn't support the rebranded X service. Instead, Tapestry brings together multiple apps into a single chronological timeline showing all posts that meet the user's criteria. The developers believe many users prefer that to ... (view more)

Mon
10
Feb
John Lister's picture

Broadband Lag Could Be Limited

Comcast is experimenting with a new technology for reducing latency and lag online. It could be particularly useful for video calls and online gaming. While most analysis of Internet speed is about uploading or downloading data, latency - also ... called lag - is all about response time. In effect, it's how quickly the connection starts transferring data after you (and your device) start the process. Although variations in latency are usually measured in fractions of a second, they can cause serious problems for some Internet use. For video calls they can cause a notable gap between somebody on ... (view more)

Fri
07
Feb
John Lister's picture

Google Play to Limit Permissions on Rogue Apps

Google is to take stronger actions against apps that turn out to be potentially harmful. It may revoke permissions where the app is already on a user's device. One of the most notable aspects of Google's management of Android apps is its particular ... balance of security and privacy. Although it will remove apps suspected or confirmed to be malicious from the Play Store, it doesn't usually do much if anything about devices which already have the app installed. The optional Google Play Protect can technically deactivate suspicious apps, but usually it's left to users to hear about the issue (for ... (view more)

Wed
05
Feb
John Lister's picture

Edge Browser Finally Combats Tech Support Scams

Microsoft's Edge browser now has a "scareware blocker" available for optional use. It attempts to recognize bogus claims that a computer has been compromised by malware. Scareware can come from a deliberate scam website, a compromised site, or a ... pop-up window running on a legitimate site that hijacks or takes advantage of advertising space. Whatever the source, the effect is normally the same: highly visible warnings of a supposed malware infestation, often in a full-screen window that's difficult to escape. Some versions even include an audio warning. The idea is to panic the user into ... (view more)

Mon
03
Feb
Dennis Faas's picture

Opinion: Would You Use DeepSeek?

Would you entrust your data to an AI system that may be subject to one of the world's most sophisticated surveillance regimes ? Recently, DeepSeek has gained national headlines as a disruptive AI pricing model. On one hand, the promise of cheaper AI ... services is tempting, especially for businesses and individuals who rely on AI for content generation, data analysis, and automation. On the other hand, DeepSeek is owned and operated by a Chinese entity, raising serious concerns about privacy, security, and potential government overreach. DeepSeek: High-Performance AI at a Low Cost DeepSeek has ... (view more)

Subscribe to Articles