• Private vs public AI: Which should your business use in 2025?
    www.computerweekly.com
    Imagine a Christmas where your business predicts market trends before they happen, streamlines operations effortlessly, and secures sensitive data with elf-like precision. This isn't a far-off dream it's the reality of artificial intelligence (AI) today. But AI is not a one size fits all solution there are different types of AI to consider, and steps to take to lay the groundwork for successful AI adoption. In fact, the AI industry value is projected to increase by over 13 times over the next six years due to the ever increasing advancements in this space. Two of these variations are private and public AI both with their own set of capabilities and drawbacks.As a business leader, you face a festive decision: should you harness the power of private AI, or leverage the vast resources of public AI? Public AI operates on hyperscale cloud-based platforms and tends to be accessible to multiple users and businesses. These platforms leverage vast amounts of data from various sources, providing powerful, general-purpose AI capabilities. However, this accessibility comes with trade-offs in terms of security and data privacy.Private AI, on the other hand, is tailored and confined to a specific organisation. It offers bespoke solutions, retrained to meet the unique needs of a business while ensuring data remains secure within the organisations cloud or private infrastructure. This approach mitigates the risks associated with public AI, such as unauthorised data sharing and security breaches.Security: One of the key advantages of private AI is enhanced security. By operating with a dedicated model and within a private environment, businesses can protect sensitive information and ensure compliance with data privacy regulations. This is particularly crucial for sectors handling confidential data, such as healthcare, fintech, and government agencies.Performance: Private AI can deliver a more tailored performance, customised to specific business requirements. With dedicated hardware, businesses can optimise AI workloads for speed and efficiency, leading to more accurate and timely insights.Control and customisation: Private AI offers greater control over the AI environment. Businesses can customise their AI models to align with their strategic goals and operational needs. This level of control is invaluable for developing bespoke solutions that drive competitive advantage this also provides a wider choice of customised models that can be deployed.These benefits might look tempting to business leaders, but its also important to consider the downsides.Costs: Implementing and maintaining private AI infrastructure can be expensive. The costs associated with dedicated hardware, specialised talent, and ongoing maintenance can be a significant barrier for smaller organisations.Complexity: Managing private AI requires a deep understanding of both AI technologies and the specific business context. This complexity can make it challenging to deploy and scale AI solutions effectively without the right technology partner.Scalability: While private AI offers tailored solutions, it may lack the scalability of public AI platforms. Businesses need to carefully plan their AI strategy to ensure they can scale their AI initiatives as needed without compromising performance or security.In 2024, we have seen significant advancements in AI infrastructure, making software more accessible and flexible, though hardware costs remain high. The trend towards making private AI more consumable for smaller players is expected to continue into 2025. Large organisations will continue to lead in adopting private AI, but we anticipate a shift towards more experimental and flexible AI environments, enabling businesses to develop and refine their AI capabilities internally.The introduction of regulatory frameworks like the General AI Bill will also shape the future of AI deployment. Businesses must ensure their AI models are trained on unbiased data and adhere to ethical standards, avoiding issues like AI hallucinations and misinformation.The 12 Days of AIOn the First day of AI, we explore how AI is being used in marketing, the benefits and key use cases, as well as concerns and how marketerscan best take advantage of the technology.On the Second Day of AI, we look at the importance of truly understanding what AI isto enable true organisational transformation.On the Third Day of AI, we explore some of the key trends to keep an eye on, and prepare for,in 2025.On the Fourth Day of AI, we discuss the value of adopting AI responsibly, and outlines how businesses can build responsible adoptioninto their plans.On the Fifth Day of AI, we explore how AI is reshaping HR boosting productivity, addressing concerns,and preparing organisations for the future.On the Sixth Day of AI, we explore how leveraging AI and cloud can enhance business performance and sharetips for successful implementation.On the Seventh Day of AI, we explore the double-edged sword of AI in cybersecurity and how businesses can protect themselvesagainst the cyber grinches.On the Eighth Day of AI, we explore the key considerations and strategic frameworks essential for extractingmaximum value from AI projects.On the Ninth Day of AI, we explore the critical role data plays in AI implementation and the key steps business leaders must take to prepare their datafor a successful AI future.On the Tenth Day of AI, we explore the evolving role of AI in managed services and what to expect in 2025.Adopting a hybrid AI approach, which combines the strengths of both private and public AI is an increasingly attractive proposition for business leaders. Using both ways of implementing AI can be a more accessible way to leverage certain private AI capabilities, while keeping costs and time investments to a minimum by supplementing with public AI. But adopting a hybrid approach to AI is not just a technology choice but a strategic business decision, and business leaders need to consider the following steps:Evaluate your AI needs: Assess the specific requirements of your business and determine where AI can add the most value. Identify the types of data you need to protect and the AI capabilities you require.Find the right partner: Collaborate with partners who understand the AI stack and can provide the necessary expertise and support. Look for partners with a proven track record in AI implementation and security.Focus on security and ethics: Ensure your AI solutions adhere to stringent security protocols and ethical guidelines. Implement secondary AI layers for fact-checking and to prevent AI-generated misinformation/hallucinations.Plan for scalability: Develop a roadmap for scaling your AI initiatives. Consider how you will manage and grow your AI infrastructure as your business needs evolve.By carefully considering these factors, businesses can effectively leverage AI technologies, harnessing the power of both private and public AI to drive innovation, enhance performance, and maintain a competitive edge. A hybrid approach to AI is not merely a Christmas toy; it is a strategic imperative for businesses aiming to thrive in the AI-driven future.Chris Folkerd is director of core infrastructure at ANS, a digital transformation provider and Microsofts UK Services Partner of the Year 2024. Headquartered in Manchester, it offers public and private cloud, security, business applications, low code, and data services to thousands of customers, from enterprise to SMB and public sector organisations.
    0 Comments ·0 Shares ·113 Views
  • Top 10 business applications stories of 2024
    www.computerweekly.com
    Blue Planet Studio - stock.adobeNewsTop 10 business applications stories of 2024Business applications are now AI-enabled, but it is not easy to deploy these products successfully to improve business metrics ByCliff Saran,Managing EditorPublished: 16 Dec 2024 17:50 There is no denying the impact artificial intelligence (AI) in particular, generative AI (GenAI) is having on business applications. In many ways, the intensity of industry excitement over AI suggests the technology is at the peak of the Gartner hype cycle, which means businesses are about to realise how complex doing AI well really is.The challenge for many is finding use cases that can deliver a fast return on investment and scale beyond a pilot roll-out cost-effectively. This is particularly relevant when deploying applications that use large language models (LLMs) as costs can quickly escalate.From what Computer Weekly is seeing, there appears to be a shift in business away from public LLMs to small language models and AI models that can be tuned and run on-premise.A key message coming from industry experts with regards to training AI using internal data sources is that the data needs to be of high quality. Enterprise data is often spread across multiple applications and there is generally no single version of the truth. Trying to consolidate data into one store can be a challenge as applications are owned by different areas of the business and a single data architecture may not seem like a high priority.AI is often linked to enterprise resource planning (ERP) providers strategies to migrate customers onto their cloud services. This can be a challenge for many organisations, which tend to run heavily customised versions of an ERP system. Migrating these customisations is extremely costly, even when the project goal is not to customise the software. For instance, when Birmingham City Council began a migration from an SAP ERP system it had been running for years, the project to move to Oracle cost the council millions more than had been budgeted for. The migration also needed manual steps, which prevented the council from completing its annual financial report, leaving a gaping hole in its budget.One of the issues IT leaders face during a multi-year ERP upgrade project is that the software acquired at the start of the project may not be what is needed a year or so later. IT leaders have always needed to deal with shelfware. Sometimes, software providers offer tempting discounts on product bundles. However, while the purchase price may be tempting, ongoing software maintenance can quickly erode these savings.Third-party support providers can offer a way to reduce these ongoing costs and help IT departments keep older enterprise software platforms running for longer. In effect, the third party software support provider has access to any of the patches and support documentation a customer has downloaded, before they switch over. After switching, subsequent patches and support are no longer available from the software provider. However, given that many of the products that move to third-party support have been run for several years, entirely new issues that require code changes are unlikely.Here are Computer Weeklys top 10 business applications articles this year.control of SaaS costsThe ease with which someone with a corporate credit card can buy a software-as-a-service (SaaS) product can lead to runaway costs and data leakage risks.VMware cost increases after Broadcom ends discountsUK non-profit London Grid for Learning and Belgian university KU Leuven are just two of the academic organisations facing huge licensing cost increases after Broadcom scraps VMware academic discount scheme.failed Birmingham Oracle implementationBirmingham City Councils Oracle system the biggest of its kind in Europe went live in April 2022, resulting in a catastrophic IT failure.GenAI in actionMany organisations are testing out uses for generative AI, but how are they getting on? We speak to five early adopters to find out the lessons learned so far.long-term SAP Rise strategyIndependent UK and Ireland SAP User Group chair describes upgrade as a marathon, not a sprint, but says SAP Rise is also inevitable.AI readiness: What is it, and is your business ready?Artificial intelligence readiness encompasses all the elements, processes and steps needed to prepare an organisation to implement AI systems.AI assurance platform for enterprisesThe platform is designed to drive demand for the UKs artificial intelligence assurance sector and help build greater trust in the technology by helping businesses identify and mitigate a range of AI-related risks.AI platform for business transformationWe report on how a deal between ServiceNow and Rimini Street may offer IT leaders an alternative route to enterprise AI.customer experienceThe flag carrier of the Philippines discusses how its digital transformation journey has improved customer experience and streamlined internal processes.Open source is not a trust issue, its an innovation issueBusinesses are seeing greater value from open source software, such as greater levels of productivity and reduced operational costs.In The Current Issue:CIO interview: Steve OConnor, Aston MartinNCSC boss calls for sustained vigilance in an aggressive worldDownload Current IssueMicrosoft Copilot: A Year of Learning Write side up - by Freeform DynamicsPrint Industry Trends, 2025 Quocirca InsightsView All Blogs
    0 Comments ·0 Shares ·98 Views
  • This powerful firewall delivers enterprise-level security at a home office price
    www.zdnet.com
    Jason Perlow/ZDNETZDNET's key takeawaysThe Firewalla Gold Pro is available now for $889.It offers enterprise-level security with high performance, advanced features like deep packet inspection and multi-WAN support, and user-friendly configuration.It's larger and more expensive than basic consumer firewalls, requires an external access point for Wi-Fi monitoring, and may require advanced configuration knowledge for some features.In 2022,I upgraded to the fastest residential broadband available-- 2 Gbps fiber. As we approach the end of 2024, internet service providers (ISPs) are pushing the limits, offering speeds up to a staggering 10,000 Mbps (10 Gbps). Fiber internet remains the gold standard for speed and reliability in the US, with top providers offering ultra-fast plans:AT&T:Up to 5,000 MbpsGoogle Fiber:Up to 8,000 MbpsXfinity:Up to 10,000 Mbps details View at Firewalla Such high speeds are crucial if you work with large data volumes, like video editors, 3D modelers, and organizations using Generative AI that need fast data transfer at the edge of their networks. Many of these users also require fast, reliable VPN connections. While a computer can initiate aVPN, it consumes significant processing power, affecting performance. A dedicated device for continuous site-to-site VPN connections ensures encrypted data is processed efficiently, maintaining near-wired speeds. Standard broadband gateway devices from ISPs usually include simple NAT routers with basic rules but lack advanced packet processing, VPN management, and threat detection. For users with high-speed broadband, a dedicated hardware firewall is essential. Traditional high-speed firewalls from SMB and enterprise vendors are often prohibitively expensive, designed for large sites, requiring extensive networking knowledge, and costly ongoing updates and management subscriptions. Also: How to secure your home and office network: The best DNS blockers and firewallsEnter Firewalla, a company founded by former Cisco engineers. Firewalla aims to make unified threat management accessible for small and home offices and remote professionals. Its products offer high-speed firewall solutions that are both user-friendly and cost-effective. Having extensively used and recommended Firewalla products, I was eager to review the company's latest offering -- theFirewalla Gold Pro. I had high expectations, but this new device still managed to impress. Here's an overview of the current Firewalla product line to help you choose the best model for your needs. FeaturePurple SEPurpleGold SEGold PlusGold ProEthernet Interfaces500 Mbps1 Gbps2 x 2.5 Gbps and 2 x 1 Gbps4 x 2.5 Gbps2 x 10 Gbps and 2 x 2.5 GbpsDeep Packet Inspection500 Mbps1 Gbps2 Gbps5 Gbps10 GbpsVPN SupportBuilt-in VPN server and clientBuilt-in VPN server and clientBuilt-in VPN server and clientBuilt-in VPN server and client2 Gbps WireGuard, Built-in VPN server and clientVPN Speed220 Mbps WireGuard, 60 Mbps OpenVPN500 Mbps WireGuard, 120 Mbps OpenVPN350 Mbps WireGuard, 100 Mbps OpenVPN500 Mbps WireGuard, 120 Mbps OpenVPN2 Gbps WireGuard, 500 Mbps OpenVPNProtection from CyberattacksYesYesYesYesYesNetwork InsightsYesYesYesYesYesData SafeguardingYesYesYesYesYesDynamic Content FilteringYesYesYesYesYesMonitor & Control Internet UsageYesYesYesYesYesAd BlockingYesYesYesYesYesNetwork SegmentationYesYesYesYesYesSmart QueueAdvancedAdvancedAdvancedAdvancedAdvancedMulti-WANNoNoYesYesYesNo Monthly FeesYesYesYesYesYesTargeted End CustomerHome users with basic needsHome users and small businessesSMB and advanced home usersPower users and SMBSMB and advanced power usersPrice$229$359$449$589Under $900SummaryCost-effective entry-level security with essential features and 500 Mbps speedsIdeal for those needing robust protection and 1 Gbps speeds without enterprise complexityStrong performance for demanding setups with advanced features like Multi-WANHigh-performance model with advanced features like Multi-WAN, ideal for demanding usersTop-tier model for maximum performance and securityThe Firewalla Gold Pro is the company's largest and heaviest product, built with solid metal for durability and enterprise-grade quality. Weighing 38.5 oz (1,090 g) and measuring 8.54 x 6.5 x 1.69 inches (21.7 x 16.5 x 4.3 cm), it meets the robust standards of SMB-level network equipment. Despite its size, the Gold Pro operates efficiently and silently with a 110V AC power brick, drawing up to 33W.While it functions well in typical residential and small office setups, it's best to connect the Firewalla Gold Pro to a pure sine wave UPS to protect against power fluctuations. The unit is fan-cooled but should be placed in a well-ventilated area, as the aluminum case can reach up to 140F when fully loaded, especially in warmer environments. An optional rackmount enclosure is available to integrate the Gold Pro into a standard datacenter-style rack.The Firewalla Gold Pro includes two 10 Gbps ports (one typically used for WAN but configurable) and two 2.5 Gbps ports. I recommend supplementing it with an additional 10 Gbps or 5 Gbps switch for optimal performance.In my setup:The 10 Gbps WAN connection is linked to a 5 Gbps Ethernet port on my AT&T BGW320 fiber gateway.Another 10Gbps port connects to a 16-port 10 Gbps switch, linking servers, Wi-Fi 6E access points, a 5 Gbps high-speed desktop switch in my office, and storage.This configuration maximizes the Firewalla Gold Pro's performance and ensures optimal connectivity across my network. Installation Network statistics in the Firewalla Gold Pro app for iOS (iPad) Jason Perlow/ZDNETThanks to the iOS and Android smartphone apps, setting up the Firewalla Gold Pro is straightforward. The setup and configuration procedure uses Bluetooth, which is provided if Ethernet connectivity is disrupted or the device needs to be managed or reconfigured out of band.When the app prompts you during initial setup, scan the QR code on the bottom of the device to pair it with the app. If you're an existing Firewalla user, you can "clone" your current configuration, preserving all settings, including rules, device groupings, segmentation, and ISP configurations. In my case, selecting "Replace Device" made the process seamless.New users must choose between "Router Mode" and "Transparent Bridge Mode":Router Mode: Firewalla functions as the primary router, managing all network traffic with full functionality.Transparent Bridge Mode:I recommend Router Mode because Transparent Bridge Mode disables key Layer 3 (IP layer) services like VPN Client, Policy-Based Routing, Smart Queue, Site-to-Site VPN, and Device Monitoring. If you opt for Router Mode, the setup may vary slightly depending on your ISP. Firewalla provides detailed documentation for various ISPs.For example, as an AT&T Fiber user, I needed to configure my gateway forIP Passthrough, allowing Firewalla to manage the network. This involved logging into the gateway, navigating to the Firewall menu, selecting "IP Passthrough," choosing "DHCPS-fixed," and selecting the Firewalla device from a dropdown list. Once configured, all traffic is routed through Firewalla, bypassing the gateway's router functions.Also:How to change the DNS settings on your Windows PC - and why you'd want toOne limitation is that Firewalla cannot monitor the built-in Wi-Fi of a residential gateway. Even in IP Passthrough mode, devices connected directly to the gateway's Wi-Fi bypass Firewalla's protection. To avoid this, dedicate a Wi-Fi access point behind Firewalla for all wireless connections. For smaller households or offices, a consumer-grade Wi-Fi router or mesh node in "bridge" mode (not NAT) also works well -- I previously used a three-node Eero Pro 6 mesh setup with Firewalla Gold, which worked flawlessly. The key is to avoid a double-NAT scenario. Firewalla should handle primary NAT, create your IP scope and segments, and act as your DHCP server.Firewalla Gold's Pro's performance Firewalla Gold Pro performance on 2Gbps AT&T Fiber connection in the Firewalla app for iOS (iPad) Jason Perlow/ZDNETOnce configured in Router Mode or Transparent Bridge Mode, the Firewalla Gold Pro intercepts all traffic at the deep packet inspection level. Thanks to its powerful Intel 12th-generation processor and 8GB of RAM, this process occurs without any performance loss.Also:Firewalla launches Purple: Its must-have network security deviceIn our tests on a 2 Gbps AT&T Fiber service, the fastest available to us, we successfully pushed the broadband connection to its 2 Gbps limit. Internal tests achieved Ethernet link speeds of 10 Gbps, with data transferring at that rate.Significantly, we pushed WireGuard connections beyond 1 Gbps to a metropolitan-connected Linux host in a test cloud region, limited only by the target system's broadband capacity. Live throughput of monitored devices on the Firewalla Gold Pro, in the Firewalla app for iOS (iPad) Jason Perlow/ZDNETThe smartphone app provides a detailed view of historical WAN and WiFi performance and live throughput for every device on the network. The system also runs periodic tests to verify whether your provider delivers the advertised speeds. Network protection overview Blocked flows as viewed through Firewalla MSP Jason Perlow/ZDNETI've found that Firewalla's security intelligence system, both on the device and in the cloud, is incredibly robust. The company tracks over 129 million security objects, including IP/domain histories and other critical data, and enables the device to effectively safeguard your network, constantly adapting to new threats as they emerge.When it comes to protection, Firewalla's approach is comprehensive. All data packets are meticulously filtered through multiple layers, including Block Lists, Ad Block Lists, and Static and Dynamic Block Lists, alongside IDS/IPS (Intrusion Detection/Prevention) and the Behavior Module. This multi-layered strategy gives you a continuous sense of security, knowing that known and emerging threats are being addressed.One feature I particularly appreciate is the pre-configured Target Lists that come with each Firewalla device, like OISD and Log4j attackers, which automatically block malicious websites and IPs. Additionally, the ability to create custom target lists means I can tailor the protection to fit my specific needs, making the experience even more personalized.Also: Firewalla hands-on: Easy to set up with plenty of features to help protect your home networkFirewalla also makes it easy to manage devices on the network. It automatically detects all devices and groups them by function (e.g., "Computers," "IoT"), which simplifies applying rules across multiple devices. This is especially handy for devices with MAC randomization, like iPhones using private Wi-Fi addresses. Disabling this feature has improved visibility and made it easier to apply rules.The IDS/IPS system is another critical layer of defense in my network. It detects and blocks unauthorized access attempts, like SSH intrusions or known exploits such as Heartbleed, which should give any network security professional at an SMB peace of mind. Firewalla device management view (iPad) Jason Perlow/ZDNETFinally, the Behavior Module stands out as a vigilant guardian. It monitors network traffic for unusual patterns, such as a typically low-traffic device suddenly sending large amounts of data. When this happens, the module sends an alert, allowing you to address potential threats before they escalate.It's this kind of proactive monitoring that has really reinforced my trust in Firewalla.Configuration and management Security dashboard in Firewalla MSP Jason Perlow/ZDNETOne of the things I appreciate about Firewalla products is how user-friendly they are, especially for a small office and home office setup like mine. The initial configuration through the Firewalla smartphone app is straightforward, and for most tasks, it's all I need. For more detailed management, the my.firewalla.com website provides a handy dashboard for viewing flows, configuring rules, and monitoring network activity.In April 2023, Firewalla introduced the Managed Security Portal (MSP) subscription service, which offers even greater functionality. While the MSP service has various plans, the Free plan with 24-hour flow storage for a home office is probably sufficient. It covers basic network management well and offers enough visibility into network activity for my needs. More advanced home users and small businesses who require more extended visibility into their flow data might want to go with the 30-day flow plan, which is only $39 per year.Also: Upgrading my network to 2.5Gbps with the fastest small business and residential firewall: Firewalla Gold PlusFor organizations with multiple Firewalla devices and branches, Firewalla's MSP also offers different seat options depending on how much detail you need to monitor your devices. The No Flows Seat works fine for basic monitoring, but there are options for more in-depth analysis if you need it. MSP also provides VPN Mesh capabilities to link your branch networks over the internet using encrypted tunnels with WireGuard.Even though MSP adds many new features, I still find that certain configurations, like VPN settings and live network monitoring, are best handled through the smartphone app. It's a good balance between ease of use and advanced features.ZDNET's buying adviceTheFirewalla Gold Prois an exceptional choice if you need powerful, high-performance network protection without the complexity and cost typically associated with enterprise-grade firewalls. With its robust build quality, advanced features like deep packet inspection, and seamless configuration through an intuitive app, the Gold Pro delivers enterprise-level security and performance in a package accessible to small offices, home offices, and power users.Whether you're pushing the limits of your fiber connection, managing extensive VPNs, or securing a complex home network, the Firewalla Gold Pro excels in every category. The recent introduction of the MSP service adds even more flexibility and control, making it easier than ever to manage your network.For anyone looking to future-proof their network with a versatile and user-friendly firewall solution, the Firewalla Gold Pro is a top contender, offering unparalleled value and performance.Featured reviews
    0 Comments ·0 Shares ·106 Views
  • The best security keys of 2024: Expert tested
    www.zdnet.com
    Since data breaches are now a daily problem, traditional username and password combinations are nowhere near enough to protect online accounts.Many online service providers now enforce alternative ways to secure accounts. Two-factor and multi-factor authentication (2FA/MFA) methods have become widely adopted alongside passwordless authentication methods in the enterprise. Another option is to verify yourself using a physical security key. Even if a cybercriminal has obtained your username and password or compromised your mobile device, they won't be able to access your data without the key. Security keys are affordable and user-friendly, prevent phishing attacks, and are significantly more secure than SMS-based two-factor authentication. What is the best security key right now? ZDNET's favorite security key is the Yubico YubiKey 5 NFC. It offers excellent security and convenience, making it a worthwhile investment for anyone looking to safeguard their online accounts. This key is compatible with a vast array of protocols and can be configured to provide easy authentication on mobile.ZDNET has tested many security keys throughout the years and frequently tracks market developments and changes. Many of us use security keys ourselves and lean upon our personal experience, customer feedback, and extensive research to shape our recommendations. Below, you will find our top picks for security keys in 2024. Sort by All Best security keys of 2024 Show less View now at Amazon The YubiKey 5 NFC combines useful USB-A connectivity with the versatility of wireless NFC, enabling broad compatibility with a wide range of devices.It is FIDO-certified, which allows it to work with Google Chrome and any FIDO-compliant application on Windows, macOS, or Linux. In addition, its NFC capability makes it compatible with iOS and Android mobile devices, giving you the option to authenticate quickly via your smartphone or tablet. Overall, this makes the YubiKey 5 NFC an excellent option for consumers and businesses alike.The YubiKey USB authenticator has multi-protocol support, including FIDO2, FIDO U2F, Yubico OTP, OATH-TOTP, OATH-HOTP, smart card (PIV), OpenPGP, and challenge-response capabilities, providing solid hardware-based authentication. Considering it is dust, water, and tamper-proof, this key is a great all-rounder for your security needs.Each key costs $50. Customer feedback indicates that this popular key is an excellent option, although you will need some rudimentary technological knowledge to use it effectively.Yubico YubiKey 5 NFC features:USB-A and NFC compatibility |Compact design | No battery required | Water, dust, and tamper-resistant | FIDO certified | Multi-protocol support | Compatible with iOS and Android mobile devices through NFC Pros Broad versatility NFC makes it compatible with both iPhone and Android devices Cons Expensive, especially if you need two Technical knowledge may be required The YubiKey 5 NFC combines useful USB-A connectivity with the versatility of wireless NFC, enabling broad compatibility with a wide range of devices.It is FIDO-certified, which allows it to work with Google Chrome and any FIDO-compliant application on Windows, macOS, or Linux. In addition, its NFC capability makes it compatible with iOS and Android mobile devices, giving you the option to authenticate quickly via your smartphone or tablet. Overall, this makes the YubiKey 5 NFC an excellent option for consumers and businesses alike.The YubiKey USB authenticator has multi-protocol support, including FIDO2, FIDO U2F, Yubico OTP, OATH-TOTP, OATH-HOTP, smart card (PIV), OpenPGP, and challenge-response capabilities, providing solid hardware-based authentication. Considering it is dust, water, and tamper-proof, this key is a great all-rounder for your security needs.Each key costs $50. Customer feedback indicates that this popular key is an excellent option, although you will need some rudimentary technological knowledge to use it effectively.Yubico YubiKey 5 NFC features:USB-A and NFC compatibility |Compact design | No battery required | Water, dust, and tamper-resistant | FIDO certified | Multi-protocol support | Compatible with iOS and Android mobile devices through NFC Read More Show Expert Take Show less Show less View now at Amazon The FIDO2 is a USB-A key that functions with the latest Chrome browser and operating systems such as Windows, macOS, or Linux. This option also has backward compatibility with online services complying with U2F protocols.FIDO2 provides passwordless authentication using the FIDO and HOTP protocols. You'll find the most compatibility with desktop and PC applications as there are marginally more restrictions with iOS and Android functionality. What makes this key stand out, however, is how easy it is to setup, making it a great option for first-time security key users.The key is designed with a 360-degree rotating metal cover, shielding the USB connector when not in use. It is also made from durable aluminum alloy to safeguard it against drops, bumps, and scratches.Overall, this security key is reasonably priced at $25. However, it does not have advanced features such as a fingerprint reader, and you will want to buy more than one. Despite this, customers like its sleek and discreet design and find it easy to set up and use.Thetis Fido U2F Security Key features:Tough and durable alloy shell |360-degree design with rotating aluminum alloy cover | Looks like a USB flash drive | Backward-compatible with U2F protocol | Compatible with latest Chrome browser on Windows, macOS, and Linux Pros Great price Discreet design Sturdy Cons No NFC so no support for iPhone and Android Doesn't support macOS logins The FIDO2 is a USB-A key that functions with the latest Chrome browser and operating systems such as Windows, macOS, or Linux. This option also has backward compatibility with online services complying with U2F protocols.FIDO2 provides passwordless authentication using the FIDO and HOTP protocols. You'll find the most compatibility with desktop and PC applications as there are marginally more restrictions with iOS and Android functionality. What makes this key stand out, however, is how easy it is to setup, making it a great option for first-time security key users.The key is designed with a 360-degree rotating metal cover, shielding the USB connector when not in use. It is also made from durable aluminum alloy to safeguard it against drops, bumps, and scratches.Overall, this security key is reasonably priced at $25. However, it does not have advanced features such as a fingerprint reader, and you will want to buy more than one. Despite this, customers like its sleek and discreet design and find it easy to set up and use.Thetis Fido U2F Security Key features:Tough and durable alloy shell |360-degree design with rotating aluminum alloy cover | Looks like a USB flash drive | Backward-compatible with U2F protocol | Compatible with latest Chrome browser on Windows, macOS, and Linux Read More Show Expert Take Show less Show less View now at Amazon The Yubico YubiKey 5 Nano is a discreet, tiny security key that provides the features you need to lock your devices and services while you're on the road. The key supports PCs and other devices via USB-A and is compatible with the Yubico Authenticator app. However, keep in mind that there is no USB-C support.This security key is compatible with various password managers, including 1Password, Keeper, and LastPass Premium, IAM platforms, cloud storage apps, and social media accounts. The Yubico YubiKey 5 Nano will likely work if an application is FIDO-certified.It is also tamper, dust, and water-resistant. Customer feedback shows that users find the key works well across multiple platforms and consider it straightforward to set up and use.Priced at $60, this is slightly more expensive than many on the market, but if you're looking for one of the smallest, portable, and most discreet keys on the market, this could be the right option for you.Yubico YubiKey 5 Nanofeatures:FIDO, FIDO2 certified |Multi-protocol| Supports USB-A | Protects against phishing and cyber attacks | IP68 rated | 1GB memory Pros Water and dust resistant Easy setup FIDO certified Small form factor Cons Expensive No NFC compatibility The Yubico YubiKey 5 Nano is a discreet, tiny security key that provides the features you need to lock your devices and services while you're on the road. The key supports PCs and other devices via USB-A and is compatible with the Yubico Authenticator app. However, keep in mind that there is no USB-C support.This security key is compatible with various password managers, including 1Password, Keeper, and LastPass Premium, IAM platforms, cloud storage apps, and social media accounts. The Yubico YubiKey 5 Nano will likely work if an application is FIDO-certified.It is also tamper, dust, and water-resistant. Customer feedback shows that users find the key works well across multiple platforms and consider it straightforward to set up and use.Priced at $60, this is slightly more expensive than many on the market, but if you're looking for one of the smallest, portable, and most discreet keys on the market, this could be the right option for you.Yubico YubiKey 5 Nanofeatures:FIDO, FIDO2 certified |Multi-protocol| Supports USB-A | Protects against phishing and cyber attacks | IP68 rated | 1GB memory Read More Show Expert Take Show less Show less View now at Amazon An alternative Yubico security key is the $29 C NFC model. The USB-C key is best suited for small businesses that want to implement physical 2FA procedures without spending a fortune.The key is compatible with Android, Windows 10, and iOS devices, as well as services such as AWS, Okta, Google accounts, Apple iCloud, Microsoft, Salesforce, and Cloudflare.These "tap and go" models do not support the Yubico Authenticator app. Instead, they have been designed for affordability and rapid security checks via USB-C, NFC, and FIDO protocols (a 5 series model is best suited if you want more extensive features).The company also offers a Yubico subscription to businesses that want to provide their teams with keys, so this could be the best solution for businesses that need to provide their teams with physical security keys. Customers say the key 'just works', but customer support could be improved.Yubico Security Key C NFC features:FIDO certified, FIDO2/U2F compatible| USB-C | NFC connectivity | No battery required | Suitable for Android, Windows 10, iOS devices and apps | Defends against phishing and account takeovers Pros Slim, lightweight design IP68 rated Subscription alternatives available Cons Only supports FIDO protocols An alternative Yubico security key is the $29 C NFC model. The USB-C key is best suited for small businesses that want to implement physical 2FA procedures without spending a fortune.The key is compatible with Android, Windows 10, and iOS devices, as well as services such as AWS, Okta, Google accounts, Apple iCloud, Microsoft, Salesforce, and Cloudflare.These "tap and go" models do not support the Yubico Authenticator app. Instead, they have been designed for affordability and rapid security checks via USB-C, NFC, and FIDO protocols (a 5 series model is best suited if you want more extensive features).The company also offers a Yubico subscription to businesses that want to provide their teams with keys, so this could be the best solution for businesses that need to provide their teams with physical security keys. Customers say the key 'just works', but customer support could be improved.Yubico Security Key C NFC features:FIDO certified, FIDO2/U2F compatible| USB-C | NFC connectivity | No battery required | Suitable for Android, Windows 10, iOS devices and apps | Defends against phishing and account takeovers Read More Show Expert Take Show less Show less View now at Amazon The Kensington Verimark Fingerprint Key utilizes advanced biometric technology, offering excellent performance, 360-degree readability, and anti-spoofing protection.With Microsoft's built-in Windows Hello login feature, you can log into your Windows computer using your fingerprint. Users can store up to 10 fingerprints, allowing multiple individuals to access the same computer without remembering different usernames or passwords.The Kensington Verimark Fingerprint Key is FIDO U2F certified, meaning your fingerprint can be used as a second-factor authentication to secure cloud-based accounts such as Google, Dropbox, GitHub, and Facebook.You may need to download additional drivers from Kensington's website for different Windows operating systems, and some users report recognition problems. However, it is still a top choice -- especially as the key is available for only $19.Kensington Verimark Fingerprint Key features:Built-in biometrics for added security | Compatible with Windows Hello login feature | Compact and unobtrusive design | Stores up to 10 different fingerprints | FIDO U2F certified for cloud-based account security Pros Compact and unobtrusive Built-in fingerprint reader Affordable Cons USB-A only No support for macOS and ChromeOS May need to download additional drivers The Kensington Verimark Fingerprint Key utilizes advanced biometric technology, offering excellent performance, 360-degree readability, and anti-spoofing protection.With Microsoft's built-in Windows Hello login feature, you can log into your Windows computer using your fingerprint. Users can store up to 10 fingerprints, allowing multiple individuals to access the same computer without remembering different usernames or passwords.The Kensington Verimark Fingerprint Key is FIDO U2F certified, meaning your fingerprint can be used as a second-factor authentication to secure cloud-based accounts such as Google, Dropbox, GitHub, and Facebook.You may need to download additional drivers from Kensington's website for different Windows operating systems, and some users report recognition problems. However, it is still a top choice -- especially as the key is available for only $19.Kensington Verimark Fingerprint Key features:Built-in biometrics for added security | Compatible with Windows Hello login feature | Compact and unobtrusive design | Stores up to 10 different fingerprints | FIDO U2F certified for cloud-based account security Read More Show Expert Take Show less Show less View now at Google The Google Titan security key line, which supports up to 250 passkeys, is an affordable way to bolster your online security. The $30 key is USB-C-compatible and a USB-C to USB-A adapter is included for legacy devices.This stylish option is based on FIDO standards, and it can connect most Android and iOS devices, as well as most devices able to run Google Chrome. If you're looking for a key suitable for most platforms, including Google services, this key is for you -- and as a bonus, it is reasonably priced.Titan security keys are compatible with Google's Advanced Protection Program, a scheme you may be required to join if you are considered at higher risk of cyberattacks -- including phishing and email-based attacks -- than the average consumer. Compatibility requirements are listed here. Setup is easy, but we've found that, on occasion, you may end up in verification loops when you try to register a new device with your key.Google Titan security key features:FIDO-certified security key |USB-A/NFC, USB-C/NFC |USB-C to USB-A adapter | Supports 250 passkeys | Multi-platform | Works with Google's Advanced Protection Program Pros High security standards USB-C adapter included Affordable Cons No biometrics The Google Titan security key line, which supports up to 250 passkeys, is an affordable way to bolster your online security. The $30 key is USB-C-compatible and a USB-C to USB-A adapter is included for legacy devices.This stylish option is based on FIDO standards, and it can connect most Android and iOS devices, as well as most devices able to run Google Chrome. If you're looking for a key suitable for most platforms, including Google services, this key is for you -- and as a bonus, it is reasonably priced.Titan security keys are compatible with Google's Advanced Protection Program, a scheme you may be required to join if you are considered at higher risk of cyberattacks -- including phishing and email-based attacks -- than the average consumer. Compatibility requirements are listed here. Setup is easy, but we've found that, on occasion, you may end up in verification loops when you try to register a new device with your key.Google Titan security key features:FIDO-certified security key |USB-A/NFC, USB-C/NFC |USB-C to USB-A adapter | Supports 250 passkeys | Multi-platform | Works with Google's Advanced Protection Program Read More Show Expert Take Show less What is the best security key? As testers of security keys over the years, we recommend the Yubico YubiKey 5 NFC as the best security key available on the market today. It offers unbeatable security and convenience, making it a worthwhile investment for anyone looking to safeguard their online accounts. However, if this one doesn't suit you, the key features of our other favorites are listed below.Security keyPriceConnector typeNFC supportBluetooth supportWaterproofingSupported servicesCompatible devicesYubico YubiKey 5 NFC$50USB-A and NFCYesYesWater- and dust-resistantGoogle Chrome, FIDO-compliant appsWindows, macOS, Linux, iOS, AndroidThetis Fido U2F Security Key$25USB-ANoNoN/AU2F servicesWindows, macOS, LinuxYubico YubiKey 5 Nano$60USB-ANoNoIP68 water- and dust-resistantU2F and FIDO2 servicesWindows, macOS, LinuxYubico Security Key C NFC$29USB-C and NFCYesYesIP68 water- and dust-resistantFIDO-enabled servicesWindows, Android, iOSKensington Verimark Fingerprint Key$19USB-ANoNoN/AGoogle, Dropbox, GitHub, Facebook, and moreWindowsGoogle Titan security key$30USB-C, NFC, and BluetoothYesYesNo official IP ratingFIDO, Google Chrome services, various appsWindows, macOS, Android, Google Chome compatible devicesNote: Prices and compatibility information may vary based on location and specific devices. This table is based on the information provided in the given descriptions and is subject to change. Show more What's the right security key for you? Choose this security keyIf you wantYubico YubiKey 5 NFCThe best security key out there with broad versatility and compatibility. This FIDO-certified key is an excellent all-rounder with multi-platform compatibility.Thetis Fido U2F Security KeyA cheap, no-frills, tough USB-A security key suitable for beginners. It has a rather stylish design but does lack advanced features.Yubico YubiKey 5 NanoA high-quality, extremely small security key. This key is a great option if you want a security solution you can take with you on your travels thanks to its tiny form factor.Yubico Security Key C NFCThe best value key for small business, considering its compatibility with services including AWS, Okta, Google accounts, Apple iCloud, Microsoft, and Cloudflare.Kensington Verimark Fingerprint KeyA simple USB-A security key with built-in biometrics. This key is discreet, compact, and user-friendly, although it has limited compatibility.Google Titan security keyAn affordable, multi-platform key suitable for Chrome and Google services, Android, and iOS apps . Users can store up to 250 passkeys. Show more Factors to consider when choosing a security key Security keys are an investment in time and money and so it is best to select the right one for you before you connect one to your online accounts, especially as rolling back this decision can be a lengthy process. While you're deciding what security key is right for you, consider the following factors:Service compatibility: Ensure that the key you're interested in is compatible with your primary services, such as your email provider or business tools and platforms.One, or two?: We recommend that you purchase a key and a backup. You can often buy two packs of security keys, but in some cases, you may have to spend more. A backup key that you can store in a safe place is crucial to ensuring you aren't accidentally locked out of your accounts.Security standards: Security keys should adhere to modern security standards, including FIDO2. Check that your choice meets these standards to ensure you receive the best protection possible.Connectivity: Hardware-based security keys use different forms of connectivity, so you should consider what type works best for you, whether USB-based, Bluetooth, or NFC.Hardware: You might need hardware that complies with particular standards or has specific ports for connecting to your devices, so check on your key's specifications before purchase.Environment: If you plan to keep a security key with your house or car key, for example, opt for a model that is resistant to dust, water, and shocks. This may be especially important if you often travel. Price: Choose a security key that matches your budget, keeping in mind you will need to buy two if you want a backup key. Show more How did we choose these security keys? Extensive research has been conducted on every security key that is listed here across a wide range of devices and services. In some cases, this includes testing the keys on different operating systems, web browsers, and services to ensure they work smoothly and efficiently.It was also important to analyze the feedback left by other users who have purchased and used these keys over time. This has helped to determine the long-term reliability of each key and to identify any potential compatibility issues that users might encounter.Our main criteria for selecting these security keys are:Ease of use: There is often a learning curve associated with adopting a new security mechanism or gadget. We wanted to ensure that the next security key you buy is as close to seamless as possible, with easy setup and reasonable compatibility with devices and online services.Durability: As a physical device securing the keys to your digital kingdom, the products we recommend mustn't easily break. After all, they should be reliable enough to be a long-term security measure.Form factors: We include different form factors, such as standard key designs and nano options.Security features: Naturally, the security features of a security key are paramount. We considered each device's support for different authentication protocols alongside security measures, including passwordless authentication and biometrics.Platform, mobile compatibility: We like to see security keys that are compatible with multiple platforms, including the most popular operating systems. It's always a bonus if NFC and mobile support are available.Price point: The cost of your next security key is an important factor to consider. As they are physical, we recommend that you pick up two, just in case one ends up lost. As a result, we wanted to ensure this was affordable. Show more Security key FAQs What are security keys and how do they work? A security key is a physical device that generates a unique code used with a password to authenticate your identity when logging into a website or application. It uses public-key cryptography and is more secure than traditional 2FA methods. You usually plug your key into a trusted device to authenticate yourself. Show more What does FIDO mean? The FIDO Alliance consortium has developed open standards for authentication protocols. The authentication standard is based on public key cryptography.Devices that are FIDO certified allow users to quickly sign into their accounts using physical keys or biometric passkeys and have also achieved FIDO protection and security standards. Show more Why are security keys better than SMS-based 2FA? SMS is open to SIM hijacking, while a physical key cannot be copied or the data intercepted. Think about it this way: 2FA verification codes sent via SMS messaging may be intercepted if your smartphone has been infected with malware, including spyware, but unless an attacker has your physical security key in their hand, they cannot grab the code required to access your account. Show more How many security keys do I need? We recommend purchasing at least two -- one that you use day-to-day and one to keep as a backup. For example, you can keep one in your home office or attached to a keychain if you're on the road, while one is stashed safely away to cover you if you lose your primary key. Show more Can security keys be hacked? Security keys are one of the best authentication methods on the market today and they have very little exploitable attack surface, making them difficult to 'hack' in any way. While there are cases of keys being cloned for academic purposes, as security keys are not constantly connected to the Internet, you don't have to worry about the most common attack vectors having any impact on them. Just keep your key in a safe place. Show more How do security keys prevent phishing? In layman's terms, security keys use encryption and security tokens that only work on genuine websites rather than fake phishing domains. Public and private keys work together to authenticate a user session, but the private key is held on the physical device, reducing the attack surface. Show more Can I use a security key for multiple accounts? Yes, absolutely. Although, the number of accounts can vary depending on the security key you choose. The key's compatibility with different protocols and online services may also determine what accounts you can protect by using one device. Show more What happens if I lose my security key? The answer to this question depends on the provider and the account registered with your key. If you don't have a backup authentication method, such as an authenticator app, try removing the key from your account and registering a new one. If you are locked out, you may also have to contact relevant IT teams or fill out a request, such as the one provided by Google for free Gmail accounts. Show more Are there alternative security keys worth considering? Here are alternatives on the market that could be worth investigating if none of our top recommendations appeal to you. It's not possible to showcase every single worthy security key product on the market, so other options we like the look of are below: Show more Further ZDNET Tech Coverage Smartphones Smartwatches Tablets Laptops TVs Other Tech Resources ZDNET Recommends
    0 Comments ·0 Shares ·104 Views
  • Waymo Robotaxis Are Heading To Tokyo For Their First Overseas Road Tests
    www.forbes.com
    A Waymo robotaxi in San Francisco.Gado via Getty ImagesWaymo, the top U.S. robotaxi company, is looking to expand the business internationally with plans to begin its first overseas tests in Tokyo early next year, while it also continues to expand the service to more U.S. cities.The Alphabet Inc. subsidiary will send a fleet of electric Jaguar I-Pace SUVs to Japan early next year to begin mapping some of the densest districts of central Tokyo. To aid that effort, Waymo said its partnering with Nihon Kotsu, Japans biggest taxi operator, and taxi app operator GO. The company didnt offer a timeframe for when it expects the driverless vehicles to be in commercial service.The news comes on the heels of Waymos plan to launch its ride service in Miami next year, along with Austin and Atlanta. Currently, its available in Phoenix, San Francisco and Los Angeles, where every week it carries more than 150,000 riders combined. The company doesnt share financial details for the service, though its annualized revenue is tracking at more than $150 million based on the weekly ridership rate.Last week, General Motors announced it was pulling the plug on Cruise, its competing robotaxi service and Waymos biggest U.S. rival, deciding instead to focus its autonomous driving tech efforts on personal vehicles. Elon Musks Tesla aspires to be a leader in robotaxis something thats helping boost its stock price in the wake of Donald Trumps election win but the company hasnt demonstrated that it has the ability to do that.Despite the name, Teslas Autopilot and Full Self-Driving features are classified as advanced driver-assist technologies that arent capable of operating a vehicle without a human at the wheel, ready to take over. By contrast, Waymos robotaxis operate with no human driver, though the company does have staff monitoring them and who can provide some remote backup assistance.In November, Waymo said it had raised $5.6 billion in its biggest-ever funding round ahead of major expansion plans. Additionally, it intends to begin sourcing electric vehicles from Hyundai starting next year, which cost about 40% less than the I-Pace model it uses, as it also shifts to lower-cost computing and sensor hardware.More From Forbes
    0 Comments ·0 Shares ·95 Views
  • SoftBanks $100 Billion Promise To Trump Is More Than Its Entire Market Cap
    www.forbes.com
    SoftBank announced a $100 billion commitment to U.S. projects over the span of Trump's presidency.Getty ImagesOn Monday, SoftBank Group CEO Masayoshi Son and President-elect Donald Trump jointly announced a bold commitment: The Japanese tech conglomerate aims to invest $100 billion in U.S. projects over the next four years. It was a glitzy pledge from a global tech leader, teaming up with the incoming president with a promise to create at least 100,000 new American jobs in artificial intelligence and other emerging technologies.The announcement eclipses a similar one Son made in 2016 as Trump first took office a $50 billion pledge and 50,000 jobs. President Trump is a double down president, Son said during a press conference at Mar-a-Lago, Trumps private residence in Palm Beach, Florida. Im going to have to double down.Theres just one hitch: SoftBank doesnt actually have $100 billion at the moment. As of market close on Monday, its entire market cap was $97 billion, and it has $29 billion in cash on hand. Its unclear how the company would finance its pledge and Son didnt bother to detail how during its announcement.The commitment is over the span of Trumps presidency, so SoftBank will have years to make good on its promise. The company did fulfill its 2016 vow of $50 billion, with investments in dozens of companies including Slack and DoorDash. Its more difficult to determine if it created that number of jobs, and the company did not provide an estimate at the end of Trumps last term.SoftBank didnt respond to a request for comment.The companys most valuable asset is a majority stake in Arm Holdings, the British semiconductor company that went public last year. Arms market cap is currently $152.6 billion, with SoftBanks roughly 90% stake valued at $137.3 billion. If liquidated, it would easily cover the companys commitment. Its unlikely, of course, that SoftBank would sell off its entire stake. Offloading large amounts of stock would probably cause the share price to crater. It could use its Arm stock as leverage to take out debt that would finance this commitment; but SoftBank has already taken out $8 billion in margin loans against its Arm stock.In reaching into the Arm piggy bank, SoftBank doesnt want to repeat missteps it took with Alibaba. In 2000, SoftBank invested $20 million in the Chinese ecommerce company, which went public in 2014 in the largest tech IPO ever, raising $25 billion. SoftBank reportedly owned 24% of the company at the time a stake that dwindled to 7% in 2022, and down to half a percent by last May.SoftBanks announcement comes as several tech executives have tried to curry favor with Trump as he returns to power. In the last few days, Facebook parent Meta, Amazon and OpenAI have reportedly promised to donate $1 million each to Trumps inauguration fund. With key supporters like Tesla CEO Elon Musk and venture capitalist Marc Andreessen, Silicon Valley has struck a different tone from when Trump first took office four years ago. Metas Mark Zuckerberg recently made a visit to Mar-a-Lago, and Google CEO Sundar Pichai reportedly has a visit in the works.SoftBank is best known for its Vision Fund, a $100 million venture fund it announced in 2017 for investing in tech companies worldwide, with half the funds raised from the sovereign wealth funds of Middle East countries like Saudi Arabia and the United Arab Emirates. But the Vision Fund came to be known for misplaced bets, including the ill-fated coworking real estate company WeWork, and Softbank posted an $18 billion loss. In 2020, the activist investor Elliott Management bought a $2.5 billion stake in the Vision Fund and pushed for restructuring and more transparency. By the time Softbank set out to raise more money for a Vision Fund 2, the company had trouble courting investors because of the first funds issues.In trying to hit the $100 billion mark, the company could potentially count already-announced commitments to its tally. For example, Softbank reportedly invested another $1.5 billion in OpenAI last month through an employee tender offer. In May, the Japanese company said it would commit $9 billion a year to AI investments, though it didnt specify where it would make its bets.Trump, who described Son as one of the most accomplished business leaders of our time, didnt seem worried about where the money would come from, and even pushed for more. Ive looked at their books and they do have the possibility of doing more, Trump said Monday. Im going to ask them to do a little bit more.He then challenged Son to double his promise again to $200 billion. While remaining noncommittal, Son laughed and said he would try to make it happen. Hes a great negotiator, he said.Additional reporting by Iain Martin.
    0 Comments ·0 Shares ·94 Views
  • Scammers use gamified tactics to prey on job seekers, FTC reports $220M in losses
    www.techspot.com
    A hot potato: According to recent data highlighted by the FTC, user complaints regarding online job scams designed around game-like tasks are skyrocketing. These so-called "task scams" have experienced a massive increase in popularity over the last four years, going from zero in 2020 to 5,000 in 2023. Despite its growing popularity, gamification remains a very controversial and polarizing issue. Systems, services, and organizations are increasingly designed to simulate a gaming experience to motivate or engage users, and even cyber-criminals are now employing similar tactics.In just the first half of 2024, reported task scams have quadrupled to about 20,000. Criminals usually try to reach their target with a text or WhatsApp message, the FTC warns, enticing potential victims with online job offers. If the target shows interest, the scammers say the job is to complete tasks related to app optimization, product boosting, or other menial, tedious things.Once the online tasks start, users will receive a small sum for the "job." Afterward, the scammers show their true colors by asking the victims to invest in the system to complete an even more lucrative set of tasks. If the victim buys into it, the scammers make off with the money and are never heard from again.The standard dress code for scammersRegulators say that scammers usually ask for payment in cryptocurrency. The FTC has seen a two-fold overall increase in cryptocurrency losses to job scams year-over-year. Scammers stole over $41 million in crypto in the first half of 2024. In total, task scams accounted for nearly 40 percent of losses to job-related scams in the first half of 2024 ($220 million). // Related StoriesThe FTC warns that if work feels more like an online game than an actual job, it's likely a task scam. Most fraud goes unreported, meaning the 20,000 individual complaints received in the first six months of 2024 are only a tiny fraction of the task scam "market."Regulators advise users to protect themselves against task scams by ignoring generic and unrequested communication attempts via text or WhatsApp, especially regarding sketchy job offers."Real employers will never contact you that way," the agency said.Furthermore, no one should pay to get paid. Rating or "liking" things online is not a job. Almost 100 percent of the time, these are scammers trying to set you up. No respectable company will pay people to do this.As Glenn Frey famously sung in Smuggler's Blues: "It's the lure of easy money, it's got a very strong appeal."
    0 Comments ·0 Shares ·94 Views
  • Apple's redesigned Magic Mouse should address ergonomics and poorly-placed charging port
    www.techspot.com
    In context: There are two types of Mac users those who like the Magic Mouse and those who hate it. The device has unique functionality, which is impossible to find in a regular wireless mouse. However, it has some physical design issues that turn many people away. Apple means to change the physical design of its Magic Mouse for the first time in 15 years. Bloomberg's reputable Apple disher Mark Gurman notes that the company is completely reimagining the Mac/iPad peripheral. Insiders say engineers have already created several prototypes over the last few months. The team aims to remodel the accessory to "fit the modern era."While the sources didn't have specific details, they did say that Apple wants to address some of the most common complaints about the Magic Mouse. The device's ergonomics and charging port placement are two of the biggest gripes from sustomers and reviewers.When Apple introduced the Magic Mouse in 2009, it brought many features you couldn't find in other brands. Its touch-sensitive surface provided users with shortcuts for various functions. For example, users could right and left swipe with one finger in a browser to go forward and back on web pages.However, the Magic Mouse was not without its critics. The initial gripe was that the mouse was not ergonomic. While that might be a deal breaker for some, many users found the device's features worth putting up with a non-ergonomic design. However, it would get worse.In 2015, Apple released the "Magic Mouse 2." It was lighter and had fewer moving parts than the first generation. It had longer battery life, better Bluetooth connectivity, and was compatible with the iPad. However, one "improvement" doomed the mouse to further bad reviews the rechargeable Li-ion battery.It wasn't the battery itself that was the problem. It actually provided longer uptime than the first generation's replaceable AA alkalines (or NiCad rechargeables, if you were like me). It was Apple's choice of a charging port that ruined the improvement. // Related StoriesThe mouse's front and back are very low-profile, so they aren't suitable for hosting a charging port. Therefore, the Magic Mouse 2 has a Lightning port (later USB-C) on the bottom. This design choice prevented it from being used while charging. It also made it a game-breaker for some, who would have preferred using the mouse as it charged.Gurman suggests that port location is one of the changes Apple is considering as it continues to prototype the peripheral. Will it still have the touch-sensitive surface and the other features people liked? It's too early to say, but knowing Apple, it will try to fix the criticisms while differentiating the mouse from competitors. We'll have to wait 12 to 18 months to see what engineers have in store.Image credit: Syced
    0 Comments ·0 Shares ·100 Views
  • I tried out Googles latest AI tool that generates images in a fun, new way
    www.digitaltrends.com
    GoogleGoogles latest AI tool helps you automate image generation even further. The tool is called Whisk, and its based on Googles latest Imagen 3 image generation model. Rather than relying solely on text prompts, Whisk helps you create your desired images using other images as the base prompt.Whisk is currently in an experimental phase, but once set up its fairly easy to navigate. Google detailed in a blog post introducing Whisk that it is intended for rapid visual exploration, not pixel-perfect edits.Recommended VideosExploring the tool has a fast-paced feel, in comparison to other text-based tools, that are more contingent on the details and accuracy of the words to produce an image. After going through the Welcome page, which lists the important details you should know about how the tool functions, the page asking if youd like to sign up for emails, and the privacy policy, youll load right into the main page of Whisk. I saw a prompt with a dinosaur plushie as the image style, but the other options are an enamel pin and sticker. I just went with the first.GoogleNext, youre directed to upload an image for the subject. I uploaded a photograph of a smartwatch on my wrist and quickly realized this wasnt going to work. The third option on the right was in a perpetual loading mode, so I tried again, with a more cartoonish image I found on my hard drive, and this loaded right away into plushie figurines of three mythical creatures.RelatedOnce the image was generated, I was able to go into an editing section, with a text prompt area. Simply using the suggested prompt the character is eating ice cream, I generated additional images with the same creatures holding ice cream cones.Alternatively, you can scroll down below the main prompt creation and select start from scratch. This will allow you to upload all your own images or enter your own text. You can also add additional text from the beginning so that your characters can do an action. If youre lost for what images to add or text to type, you can click the Inspire Me button, and Whisk will fill in images.GoogleThe tool also allows you to access a My Library section, where you can view all of the images youve created. In this section, you can enable or disable the library if youd prefer to not save your creations. You can also delete images individually or delete library data as a whole.The Whisk tool is reminiscent of the Microsoft Designer prompt that allows users to create Funko Pop! figures. As a whole, you can use Microsoft Designer to generate a range of whimsical or realistic images. However, the AI generator runs solely on text prompts.As said, Whisk still includes the opportunity to add text prompts, which Google noted is included due to the tools potential to miss the mark, so you always have the option to fill in prompts when needed.Editors Recommendations
    0 Comments ·0 Shares ·93 Views
  • Catly does not use generative AI or contain NFTs, devs say
    www.digitaltrends.com
    After stirring up controversy at The Game Awards, Catlydeveloper SuperAuthenti Co. has clarified that its game does not use generative AI or blockchain technology, Digital Trends confirms.Catly is an upcoming open-world adventure game that got a teaser trailer at this years Game Awards. As soon as it aired, social media users began speculating about whether the photorealistic trailer used generative AI. When Digital Trends first asked a PR representative for SuperAuthenti if the trailer or project, which is described as being technologically innovative and featuring unique cats for every user, uses AI, we were initially told that the studio would not be answering further questions until 2025.Recommended VideosIn the wake of speculation, a SuperAuthneti Co. spokesperson has now confirmed that no generative AI was used to produce the video and the game. Digital Trends also viewed a progress video showing off how the trailer was made, which did highlight underlying 3D models. This information matches what was told to both IGN and Game Developer earlier today.Catly Trailer 4K - THE GAME AWARDS 2024The spokesperson also claims that the project is not a blockchain game nor does it use NFTs. That became a topic of speculation after users connected SuperAuthenti co-founder Kevin Yeung to TenthPlanet, a web3 studio that was working on a blockchain game called Alien Meowin 2022, which had a similar description to Catly, according to GamesBeat.Please enable Javascript to view this contentEven with that confirmation, there are still several unanswered questions around Catly. Though the studio says that AI was not used in the production of its reveal trailer, its statement does not confirm whether it was used in addition marketing assets. That includes its Steam page, which some have speculated used AI to generate its game description. Its also unclear what Catlys advertised technological innovation is and how it will be able to give each player a unique cat. Then theres the question of how an open-world MMO will work on an Apple Watch. Well have to wait longer for those answers; further details will not be revealed until 2025, the spokesperson says.The final mystery lies around the newly founded studio itself, whose ownership outside of Yeung is still unknown. Digital Trends asked if TenthPlanet co-founder William Wei Chen is involved with SuperAuthenti, but the studio isnt revealing details about its staff or connections to previous companies yet.Catly is scheduled to release in 2025 for PC, Apple Watch, and Nintendo Switch.Editors RecommendationsUbisoft, Tencent will begin using Nvidias AI-generated NPC tools
    0 Comments ·0 Shares ·92 Views