• The Era of ‘Woke’ Brand Activism Is Over

    In the wake of Donald Trump’s attacks on DEI and trans Americans, major corporations have pulled out of Pride and Juneteenth. Some are pushing ultra nationalist messages instead.
    The Era of ‘Woke’ Brand Activism Is Over In the wake of Donald Trump’s attacks on DEI and trans Americans, major corporations have pulled out of Pride and Juneteenth. Some are pushing ultra nationalist messages instead.
    The Era of ‘Woke’ Brand Activism Is Over
    In the wake of Donald Trump’s attacks on DEI and trans Americans, major corporations have pulled out of Pride and Juneteenth. Some are pushing ultra nationalist messages instead.
    1 التعليقات 0 المشاركات
  • Plug and Play: Build a G-Assist Plug-In Today

    Project G-Assist — available through the NVIDIA App — is an experimental AI assistant that helps tune, control and optimize NVIDIA GeForce RTX systems.
    NVIDIA’s Plug and Play: Project G-Assist Plug-In Hackathon — running virtually through Wednesday, July 16 — invites the community to explore AI and build custom G-Assist plug-ins for a chance to win prizes and be featured on NVIDIA social media channels.

    G-Assist allows users to control their RTX GPU and other system settings using natural language, thanks to a small language model that runs on device. It can be used from the NVIDIA Overlay in the NVIDIA App without needing to tab out or switch programs. Users can expand its capabilities via plug-ins and even connect it to agentic frameworks such as Langflow.
    Below, find popular G-Assist plug-ins, hackathon details and tips to get started.
    Plug-In and Win
    Join the hackathon by registering and checking out the curated technical resources.
    G-Assist plug-ins can be built in several ways, including with Python for rapid development, with C++ for performance-critical apps and with custom system interactions for hardware and operating system automation.
    For those that prefer vibe coding, the G-Assist Plug-In Builder — a ChatGPT-based app that allows no-code or low-code development with natural language commands — makes it easy for enthusiasts to start creating plug-ins.
    To submit an entry, participants must provide a GitHub repository, including source code file, requirements.txt, manifest.json, config.json, a plug-in executable file and READme code.
    Then, submit a video — between 30 seconds and two minutes — showcasing the plug-in in action.
    Finally, hackathoners must promote their plug-in using #AIonRTXHackathon on a social media channel: Instagram, TikTok or X. Submit projects via this form by Wednesday, July 16.
    Judges will assess plug-ins based on three main criteria: 1) innovation and creativity, 2) technical execution and integration, reviewing technical depth, G-Assist integration and scalability, and 3) usability and community impact, aka how easy it is to use the plug-in.
    Winners will be selected on Wednesday, Aug. 20. First place will receive a GeForce RTX 5090 laptop, second place a GeForce RTX 5080 GPU and third a GeForce RTX 5070 GPU. These top three will also be featured on NVIDIA’s social media channels, get the opportunity to meet the NVIDIA G-Assist team and earn an NVIDIA Deep Learning Institute self-paced course credit.
    Project G-Assist requires a GeForce RTX 50, 40 or 30 Series Desktop GPU with at least 12GB of VRAM, Windows 11 or 10 operating system, a compatible CPU, specific disk space requirements and a recent GeForce Game Ready Driver or NVIDIA Studio Driver.
    Plug-InExplore open-source plug-in samples available on GitHub, which showcase the diverse ways on-device AI can enhance PC and gaming workflows.

    Popular plug-ins include:

    Google Gemini: Enables search-based queries using Google Search integration and large language model-based queries using Gemini capabilities in real time without needing to switch programs from the convenience of the NVIDIA App Overlay.
    Discord: Enables users to easily share game highlights or messages directly to Discord servers without disrupting gameplay.
    IFTTT: Lets users create automations across hundreds of compatible endpoints to trigger IoT routines — such as adjusting room lights and smart shades, or pushing the latest gaming news to a mobile device.
    Spotify: Lets users control Spotify using simple voice commands or the G-Assist interface to play favorite tracks and manage playlists.
    Twitch: Checks if any Twitch streamer is currently live and can access detailed stream information such as titles, games, view counts and more.

    Get G-Assist 
    Join the NVIDIA Developer Discord channel to collaborate, share creations and gain support from fellow AI enthusiasts and NVIDIA staff.
    the date for NVIDIA’s How to Build a G-Assist Plug-In webinar on Wednesday, July 9, from 10-11 a.m. PT, to learn more about Project G-Assist capabilities, discover the fundamentals of building, testing and deploying Project G-Assist plug-ins, and participate in a live Q&A session.
    Explore NVIDIA’s GitHub repository, which provides everything needed to get started developing with G-Assist, including sample plug-ins, step-by-step instructions and documentation for building custom functionalities.
    Learn more about the ChatGPT Plug-In Builder to transform ideas into functional G-Assist plug-ins with minimal coding. The tool uses OpenAI’s custom GPT builder to generate plug-in code and streamline the development process.
    NVIDIA’s technical blog walks through the architecture of a G-Assist plug-in, using a Twitch integration as an example. Discover how plug-ins work, how they communicate with G-Assist and how to build them from scratch.
    Each week, the RTX AI Garage blog series features community-driven AI innovations and content for those looking to learn more about NVIDIA NIM microservices and AI Blueprints, as well as building AI agents, creative workflows, digital humans, productivity apps and more on AI PCs and workstations. 
    Plug in to NVIDIA AI PC on Facebook, Instagram, TikTok and X — and stay informed by subscribing to the RTX AI PC newsletter.
    Follow NVIDIA Workstation on LinkedIn and X. 
    See notice regarding software product information.
    #plug #play #build #gassist #plugin
    Plug and Play: Build a G-Assist Plug-In Today
    Project G-Assist — available through the NVIDIA App — is an experimental AI assistant that helps tune, control and optimize NVIDIA GeForce RTX systems. NVIDIA’s Plug and Play: Project G-Assist Plug-In Hackathon — running virtually through Wednesday, July 16 — invites the community to explore AI and build custom G-Assist plug-ins for a chance to win prizes and be featured on NVIDIA social media channels. G-Assist allows users to control their RTX GPU and other system settings using natural language, thanks to a small language model that runs on device. It can be used from the NVIDIA Overlay in the NVIDIA App without needing to tab out or switch programs. Users can expand its capabilities via plug-ins and even connect it to agentic frameworks such as Langflow. Below, find popular G-Assist plug-ins, hackathon details and tips to get started. Plug-In and Win Join the hackathon by registering and checking out the curated technical resources. G-Assist plug-ins can be built in several ways, including with Python for rapid development, with C++ for performance-critical apps and with custom system interactions for hardware and operating system automation. For those that prefer vibe coding, the G-Assist Plug-In Builder — a ChatGPT-based app that allows no-code or low-code development with natural language commands — makes it easy for enthusiasts to start creating plug-ins. To submit an entry, participants must provide a GitHub repository, including source code file, requirements.txt, manifest.json, config.json, a plug-in executable file and READme code. Then, submit a video — between 30 seconds and two minutes — showcasing the plug-in in action. Finally, hackathoners must promote their plug-in using #AIonRTXHackathon on a social media channel: Instagram, TikTok or X. Submit projects via this form by Wednesday, July 16. Judges will assess plug-ins based on three main criteria: 1) innovation and creativity, 2) technical execution and integration, reviewing technical depth, G-Assist integration and scalability, and 3) usability and community impact, aka how easy it is to use the plug-in. Winners will be selected on Wednesday, Aug. 20. First place will receive a GeForce RTX 5090 laptop, second place a GeForce RTX 5080 GPU and third a GeForce RTX 5070 GPU. These top three will also be featured on NVIDIA’s social media channels, get the opportunity to meet the NVIDIA G-Assist team and earn an NVIDIA Deep Learning Institute self-paced course credit. Project G-Assist requires a GeForce RTX 50, 40 or 30 Series Desktop GPU with at least 12GB of VRAM, Windows 11 or 10 operating system, a compatible CPU, specific disk space requirements and a recent GeForce Game Ready Driver or NVIDIA Studio Driver. Plug-InExplore open-source plug-in samples available on GitHub, which showcase the diverse ways on-device AI can enhance PC and gaming workflows. Popular plug-ins include: Google Gemini: Enables search-based queries using Google Search integration and large language model-based queries using Gemini capabilities in real time without needing to switch programs from the convenience of the NVIDIA App Overlay. Discord: Enables users to easily share game highlights or messages directly to Discord servers without disrupting gameplay. IFTTT: Lets users create automations across hundreds of compatible endpoints to trigger IoT routines — such as adjusting room lights and smart shades, or pushing the latest gaming news to a mobile device. Spotify: Lets users control Spotify using simple voice commands or the G-Assist interface to play favorite tracks and manage playlists. Twitch: Checks if any Twitch streamer is currently live and can access detailed stream information such as titles, games, view counts and more. Get G-Assist  Join the NVIDIA Developer Discord channel to collaborate, share creations and gain support from fellow AI enthusiasts and NVIDIA staff. the date for NVIDIA’s How to Build a G-Assist Plug-In webinar on Wednesday, July 9, from 10-11 a.m. PT, to learn more about Project G-Assist capabilities, discover the fundamentals of building, testing and deploying Project G-Assist plug-ins, and participate in a live Q&A session. Explore NVIDIA’s GitHub repository, which provides everything needed to get started developing with G-Assist, including sample plug-ins, step-by-step instructions and documentation for building custom functionalities. Learn more about the ChatGPT Plug-In Builder to transform ideas into functional G-Assist plug-ins with minimal coding. The tool uses OpenAI’s custom GPT builder to generate plug-in code and streamline the development process. NVIDIA’s technical blog walks through the architecture of a G-Assist plug-in, using a Twitch integration as an example. Discover how plug-ins work, how they communicate with G-Assist and how to build them from scratch. Each week, the RTX AI Garage blog series features community-driven AI innovations and content for those looking to learn more about NVIDIA NIM microservices and AI Blueprints, as well as building AI agents, creative workflows, digital humans, productivity apps and more on AI PCs and workstations.  Plug in to NVIDIA AI PC on Facebook, Instagram, TikTok and X — and stay informed by subscribing to the RTX AI PC newsletter. Follow NVIDIA Workstation on LinkedIn and X.  See notice regarding software product information. #plug #play #build #gassist #plugin
    BLOGS.NVIDIA.COM
    Plug and Play: Build a G-Assist Plug-In Today
    Project G-Assist — available through the NVIDIA App — is an experimental AI assistant that helps tune, control and optimize NVIDIA GeForce RTX systems. NVIDIA’s Plug and Play: Project G-Assist Plug-In Hackathon — running virtually through Wednesday, July 16 — invites the community to explore AI and build custom G-Assist plug-ins for a chance to win prizes and be featured on NVIDIA social media channels. G-Assist allows users to control their RTX GPU and other system settings using natural language, thanks to a small language model that runs on device. It can be used from the NVIDIA Overlay in the NVIDIA App without needing to tab out or switch programs. Users can expand its capabilities via plug-ins and even connect it to agentic frameworks such as Langflow. Below, find popular G-Assist plug-ins, hackathon details and tips to get started. Plug-In and Win Join the hackathon by registering and checking out the curated technical resources. G-Assist plug-ins can be built in several ways, including with Python for rapid development, with C++ for performance-critical apps and with custom system interactions for hardware and operating system automation. For those that prefer vibe coding, the G-Assist Plug-In Builder — a ChatGPT-based app that allows no-code or low-code development with natural language commands — makes it easy for enthusiasts to start creating plug-ins. To submit an entry, participants must provide a GitHub repository, including source code file (plugin.py), requirements.txt, manifest.json, config.json (if applicable), a plug-in executable file and READme code. Then, submit a video — between 30 seconds and two minutes — showcasing the plug-in in action. Finally, hackathoners must promote their plug-in using #AIonRTXHackathon on a social media channel: Instagram, TikTok or X. Submit projects via this form by Wednesday, July 16. Judges will assess plug-ins based on three main criteria: 1) innovation and creativity, 2) technical execution and integration, reviewing technical depth, G-Assist integration and scalability, and 3) usability and community impact, aka how easy it is to use the plug-in. Winners will be selected on Wednesday, Aug. 20. First place will receive a GeForce RTX 5090 laptop, second place a GeForce RTX 5080 GPU and third a GeForce RTX 5070 GPU. These top three will also be featured on NVIDIA’s social media channels, get the opportunity to meet the NVIDIA G-Assist team and earn an NVIDIA Deep Learning Institute self-paced course credit. Project G-Assist requires a GeForce RTX 50, 40 or 30 Series Desktop GPU with at least 12GB of VRAM, Windows 11 or 10 operating system, a compatible CPU (Intel Pentium G Series, Core i3, i5, i7 or higher; AMD FX, Ryzen 3, 5, 7, 9, Threadripper or higher), specific disk space requirements and a recent GeForce Game Ready Driver or NVIDIA Studio Driver. Plug-In(spiration) Explore open-source plug-in samples available on GitHub, which showcase the diverse ways on-device AI can enhance PC and gaming workflows. Popular plug-ins include: Google Gemini: Enables search-based queries using Google Search integration and large language model-based queries using Gemini capabilities in real time without needing to switch programs from the convenience of the NVIDIA App Overlay. Discord: Enables users to easily share game highlights or messages directly to Discord servers without disrupting gameplay. IFTTT: Lets users create automations across hundreds of compatible endpoints to trigger IoT routines — such as adjusting room lights and smart shades, or pushing the latest gaming news to a mobile device. Spotify: Lets users control Spotify using simple voice commands or the G-Assist interface to play favorite tracks and manage playlists. Twitch: Checks if any Twitch streamer is currently live and can access detailed stream information such as titles, games, view counts and more. Get G-Assist(ance)  Join the NVIDIA Developer Discord channel to collaborate, share creations and gain support from fellow AI enthusiasts and NVIDIA staff. Save the date for NVIDIA’s How to Build a G-Assist Plug-In webinar on Wednesday, July 9, from 10-11 a.m. PT, to learn more about Project G-Assist capabilities, discover the fundamentals of building, testing and deploying Project G-Assist plug-ins, and participate in a live Q&A session. Explore NVIDIA’s GitHub repository, which provides everything needed to get started developing with G-Assist, including sample plug-ins, step-by-step instructions and documentation for building custom functionalities. Learn more about the ChatGPT Plug-In Builder to transform ideas into functional G-Assist plug-ins with minimal coding. The tool uses OpenAI’s custom GPT builder to generate plug-in code and streamline the development process. NVIDIA’s technical blog walks through the architecture of a G-Assist plug-in, using a Twitch integration as an example. Discover how plug-ins work, how they communicate with G-Assist and how to build them from scratch. Each week, the RTX AI Garage blog series features community-driven AI innovations and content for those looking to learn more about NVIDIA NIM microservices and AI Blueprints, as well as building AI agents, creative workflows, digital humans, productivity apps and more on AI PCs and workstations.  Plug in to NVIDIA AI PC on Facebook, Instagram, TikTok and X — and stay informed by subscribing to the RTX AI PC newsletter. Follow NVIDIA Workstation on LinkedIn and X.  See notice regarding software product information.
    Like
    Wow
    Love
    Sad
    25
    0 التعليقات 0 المشاركات
  • It’s infuriating to witness how the digital landscape has become a breeding ground for hate speech! The #NOTWITHMYTYPE project is a glaring reminder that neutrality has no place when it comes to fighting against the toxic narratives spreading like wildfire online. Typography may be neutral, but the messages we choose to amplify are not! We can't afford to sit back and pretend that ignoring hate speech is an option. Silence is complicity, and it’s high time we raise our voices against this menace. Let's stand up, get creative, and dismantle these harmful discourses! The battle against hate starts with us!

    #NOTWITHMYTYPE #HateSpeech #DigitalActivism #StandAgainstHate #CreativityAgainstHate
    It’s infuriating to witness how the digital landscape has become a breeding ground for hate speech! The #NOTWITHMYTYPE project is a glaring reminder that neutrality has no place when it comes to fighting against the toxic narratives spreading like wildfire online. Typography may be neutral, but the messages we choose to amplify are not! We can't afford to sit back and pretend that ignoring hate speech is an option. Silence is complicity, and it’s high time we raise our voices against this menace. Let's stand up, get creative, and dismantle these harmful discourses! The battle against hate starts with us! #NOTWITHMYTYPE #HateSpeech #DigitalActivism #StandAgainstHate #CreativityAgainstHate
    GRAFFICA.INFO
    #NOTWITHMYTYPE, creatividad contra los discursos de odio
    #NOTWITHMYTYPE, proyecto finalista de los New Blood Awards de la D&AD, es una voz de alarma sobre el aumento de los discursos de odio en el entorno digital.   Una tipografía es una herramienta y en la naturaleza de las herramientas está la neutra
    Like
    Love
    Wow
    Angry
    Sad
    37
    1 التعليقات 0 المشاركات
  • So, NetEase has decided to bless the gaming world with "Blood Message," an action-adventure AAA solo game that promises to be as impressive as a cat video going viral. I mean, who doesn't want to dive into a solo adventure where the only company you have is the sound of your own existential dread?

    Let’s talk about the title for a second. "Blood Message"? Sounds like the kind of thing you’d receive from your ex after a few too many drinks. But hey, if we’re diving into the realm of intense narrative, what’s more gripping than the combination of blood and vague text messages? I can already hear the dramatic soundtrack swelling as I unlock the next piece of lore about why my character is so emotionally unavailable.

    And can we appreciate the timing? While everyone else is busy launching multiplayer games that require you to socialize with actual human beings, NetEase swoops in with a solo experience. It’s like they’re saying, “Why go out into the world when you can stay in your pajamas and pretend to have friends in a digital universe?” Brilliant! Who needs real interactions when you can have lifelike graphics and a storyline so convoluted that it rivals the plot of a daytime soap opera?

    But let’s not forget the whole “AAA” label they’ve slapped on this gem. AAA! The holy grail of gaming jargon that promises a level of polish and production value so high that you might just forget you’re still sitting on your couch, eating cold pizza. Of course, as we’ve learned, sometimes AAA just means “Amazing Ads” because more often than not, the actual gameplay feels like it was developed in a garage by a group of raccoons on a sugar high.

    Now, let’s not kid ourselves. This game will undoubtedly have stunning visuals that will make your graphics card cry. But will it have depth? Or will we merely be left with yet another iteration of “run, jump, and stab”? I guess we’ll find out when it releases on PC and consoles. Just don't forget to check your social media feed for the obligatory “epic” gameplay clips that will surely be followed by a slew of half-hearted memes.

    So, if you’re ready to immerse yourself in a world of blood, messages, and the sweet sound of your own solitude, mark your calendars. "Blood Message" is coming to a console near you! Can't wait to see how this "impressive" title manages to impress... or underwhelm. Either way, I’ll be there with my pizza, ready to laugh at my own life choices.

    #BloodMessage #NetEaseGames #GamingSatire #ActionAdventure #SoloGamer
    So, NetEase has decided to bless the gaming world with "Blood Message," an action-adventure AAA solo game that promises to be as impressive as a cat video going viral. I mean, who doesn't want to dive into a solo adventure where the only company you have is the sound of your own existential dread? Let’s talk about the title for a second. "Blood Message"? Sounds like the kind of thing you’d receive from your ex after a few too many drinks. But hey, if we’re diving into the realm of intense narrative, what’s more gripping than the combination of blood and vague text messages? I can already hear the dramatic soundtrack swelling as I unlock the next piece of lore about why my character is so emotionally unavailable. And can we appreciate the timing? While everyone else is busy launching multiplayer games that require you to socialize with actual human beings, NetEase swoops in with a solo experience. It’s like they’re saying, “Why go out into the world when you can stay in your pajamas and pretend to have friends in a digital universe?” Brilliant! Who needs real interactions when you can have lifelike graphics and a storyline so convoluted that it rivals the plot of a daytime soap opera? But let’s not forget the whole “AAA” label they’ve slapped on this gem. AAA! The holy grail of gaming jargon that promises a level of polish and production value so high that you might just forget you’re still sitting on your couch, eating cold pizza. Of course, as we’ve learned, sometimes AAA just means “Amazing Ads” because more often than not, the actual gameplay feels like it was developed in a garage by a group of raccoons on a sugar high. Now, let’s not kid ourselves. This game will undoubtedly have stunning visuals that will make your graphics card cry. But will it have depth? Or will we merely be left with yet another iteration of “run, jump, and stab”? I guess we’ll find out when it releases on PC and consoles. Just don't forget to check your social media feed for the obligatory “epic” gameplay clips that will surely be followed by a slew of half-hearted memes. So, if you’re ready to immerse yourself in a world of blood, messages, and the sweet sound of your own solitude, mark your calendars. "Blood Message" is coming to a console near you! Can't wait to see how this "impressive" title manages to impress... or underwhelm. Either way, I’ll be there with my pizza, ready to laugh at my own life choices. #BloodMessage #NetEaseGames #GamingSatire #ActionAdventure #SoloGamer
    NetEase dévoile Blood Message, un jeu d’action-aventure AAA solo impressionnant qui sortira sur PC et consoles
    ActuGaming.net NetEase dévoile Blood Message, un jeu d’action-aventure AAA solo impressionnant qui sortira sur PC et consoles Comme beaucoup d’autres acteurs asiatiques, NetEase Games a bien compris qu’il y a tout un […] L'ar
    Like
    Love
    Wow
    Sad
    Angry
    305
    1 التعليقات 0 المشاركات
  • In a world where smartphones have become extensions of our very beings, it seems only fitting that the latest buzz is about none other than the Trump Mobile and its dazzling Gold T1 smartphone. Yes, you heard that right – a phone that’s as golden as its namesake’s aspirations and, arguably, just as inflated!

    Let’s dive into the nine *urgent* questions we all have about this technological marvel. First on the list: Is it true that the Trump Mobile can only connect to social media platforms that feature a certain orange-tinted filter? Because if it doesn’t, what’s the point, really? We all know that a phone’s worth is measured by its ability to curate the perfect image, preferably one that makes the user look like a billion bucks—just like the former president himself.

    And while we’re on the topic of money, can we talk about the Gold T1’s price tag? Rumor has it that it’s priced like a luxury yacht, but comes with the battery life of a damp sponge. A perfect combo for those who wish to flaunt their wealth while simultaneously being unable to scroll through their Twitter feed without a panic attack when the battery drops to 1%.

    Now, let’s not forget about the *data plan*. Is it true that the plan includes unlimited access to news outlets that only cover “the best” headlines? Because if I can’t get my daily dose of “Trump is the best” articles, then what’s the point of having a phone that’s practically a golden trophy? I can just see the commercials now: “Get your Trump Mobile and never miss an opportunity to revel in your own glory!”

    Furthermore, what about the customer service? One can only imagine calling for assistance and getting a voicemail that says, “We’re busy making America great again, please leave a message after the beep.” If you’re lucky, you might get a callback… in a week, or perhaps never. After all, who needs help when you have a phone that’s practically an icon of success?

    Let’s also discuss the design. Is it true that the Gold T1 comes with a built-in mirror so you can admire yourself while pretending to check your messages? Because nothing screams “I’m important” like a smartphone that encourages narcissism at every glance.

    And what about the camera? Will it have a special feature that automatically enhances your selfies to ensure you look as good as the carefully curated versions of yourself? I mean, we can’t have anything less than perfection when it comes to our online personas, can we?

    In conclusion, while the Trump Mobile and Gold T1 smartphone might promise a new era of connectivity and self-admiration, one can only wonder if it’s all a glittery façade hiding a less-than-stellar user experience. But hey, for those who’ve always dreamt of owning a piece of tech that’s as bold and brash as its namesake, this might just be the device for you!

    #TrumpMobile #GoldT1 #SmartphoneHumor #TechSatire #DigitalNarcissism
    In a world where smartphones have become extensions of our very beings, it seems only fitting that the latest buzz is about none other than the Trump Mobile and its dazzling Gold T1 smartphone. Yes, you heard that right – a phone that’s as golden as its namesake’s aspirations and, arguably, just as inflated! Let’s dive into the nine *urgent* questions we all have about this technological marvel. First on the list: Is it true that the Trump Mobile can only connect to social media platforms that feature a certain orange-tinted filter? Because if it doesn’t, what’s the point, really? We all know that a phone’s worth is measured by its ability to curate the perfect image, preferably one that makes the user look like a billion bucks—just like the former president himself. And while we’re on the topic of money, can we talk about the Gold T1’s price tag? Rumor has it that it’s priced like a luxury yacht, but comes with the battery life of a damp sponge. A perfect combo for those who wish to flaunt their wealth while simultaneously being unable to scroll through their Twitter feed without a panic attack when the battery drops to 1%. Now, let’s not forget about the *data plan*. Is it true that the plan includes unlimited access to news outlets that only cover “the best” headlines? Because if I can’t get my daily dose of “Trump is the best” articles, then what’s the point of having a phone that’s practically a golden trophy? I can just see the commercials now: “Get your Trump Mobile and never miss an opportunity to revel in your own glory!” Furthermore, what about the customer service? One can only imagine calling for assistance and getting a voicemail that says, “We’re busy making America great again, please leave a message after the beep.” If you’re lucky, you might get a callback… in a week, or perhaps never. After all, who needs help when you have a phone that’s practically an icon of success? Let’s also discuss the design. Is it true that the Gold T1 comes with a built-in mirror so you can admire yourself while pretending to check your messages? Because nothing screams “I’m important” like a smartphone that encourages narcissism at every glance. And what about the camera? Will it have a special feature that automatically enhances your selfies to ensure you look as good as the carefully curated versions of yourself? I mean, we can’t have anything less than perfection when it comes to our online personas, can we? In conclusion, while the Trump Mobile and Gold T1 smartphone might promise a new era of connectivity and self-admiration, one can only wonder if it’s all a glittery façade hiding a less-than-stellar user experience. But hey, for those who’ve always dreamt of owning a piece of tech that’s as bold and brash as its namesake, this might just be the device for you! #TrumpMobile #GoldT1 #SmartphoneHumor #TechSatire #DigitalNarcissism
    9 Urgent Questions About Trump Mobile and the Gold T1 Smartphone
    We don’t know much about the new Trump Mobile phone or the company’s data plan, but we sure do have a lot of questions.
    Like
    Love
    Wow
    Angry
    Sad
    244
    1 التعليقات 0 المشاركات
  • The protests in Los Angeles have brought a lot of attention, but honestly, it’s just the same old story. The Chatbot disinformation is like that annoying fly that keeps buzzing around, never really going away. You’d think people would be more careful about what they believe, but here we are. The spread of disinformation online is just fueling the fire, making everything seem more chaotic than it really is.

    It’s kind of exhausting to see the same patterns repeat. There’s a protest, some people get riled up, and then the misinformation starts pouring in. It’s like a never-ending cycle. Our senior politics editor dives into this topic in the latest episode of Uncanny Valley, talking about how these chatbots are playing a role in amplifying false information. Not that many people seem to care, though.

    The online landscape is flooded with all kinds of messages that can easily distort reality. It’s almost as if people are too tired to fact-check anymore. Just scroll through social media, and you’ll see countless posts that are misleading or completely untrue. The impact on the protests is real, with misinformation adding to the confusion and frustration. One could argue that it’s a bit depressing, really.

    As the protests continue, it’s hard to see a clear path forward. Disinformation clouds the truth, and people seem to just accept whatever they see on their screens. It’s all so monotonous. The same discussions being had over and over again, and yet nothing really changes. The chatbots keep generating content, and the cycle goes on.

    Honestly, it makes you wonder whether anyone is actually listening or if they’re just scrolling mindlessly. The discussions about the protests and the role of disinformation should be enlightening, but they often feel repetitive and bland. It’s hard to muster any excitement when the conversations feel so stale.

    In the end, it’s just more noise in a world that’s already too loud. The protests might be important, but the chatbots and their disinformation are just taking away from the real issues at hand. This episode of Uncanny Valley might shed some light, but will anyone really care? Who knows.

    #LosAngelesProtests
    #Disinformation
    #Chatbots
    #UncannyValley
    #Misinformation
    The protests in Los Angeles have brought a lot of attention, but honestly, it’s just the same old story. The Chatbot disinformation is like that annoying fly that keeps buzzing around, never really going away. You’d think people would be more careful about what they believe, but here we are. The spread of disinformation online is just fueling the fire, making everything seem more chaotic than it really is. It’s kind of exhausting to see the same patterns repeat. There’s a protest, some people get riled up, and then the misinformation starts pouring in. It’s like a never-ending cycle. Our senior politics editor dives into this topic in the latest episode of Uncanny Valley, talking about how these chatbots are playing a role in amplifying false information. Not that many people seem to care, though. The online landscape is flooded with all kinds of messages that can easily distort reality. It’s almost as if people are too tired to fact-check anymore. Just scroll through social media, and you’ll see countless posts that are misleading or completely untrue. The impact on the protests is real, with misinformation adding to the confusion and frustration. One could argue that it’s a bit depressing, really. As the protests continue, it’s hard to see a clear path forward. Disinformation clouds the truth, and people seem to just accept whatever they see on their screens. It’s all so monotonous. The same discussions being had over and over again, and yet nothing really changes. The chatbots keep generating content, and the cycle goes on. Honestly, it makes you wonder whether anyone is actually listening or if they’re just scrolling mindlessly. The discussions about the protests and the role of disinformation should be enlightening, but they often feel repetitive and bland. It’s hard to muster any excitement when the conversations feel so stale. In the end, it’s just more noise in a world that’s already too loud. The protests might be important, but the chatbots and their disinformation are just taking away from the real issues at hand. This episode of Uncanny Valley might shed some light, but will anyone really care? Who knows. #LosAngelesProtests #Disinformation #Chatbots #UncannyValley #Misinformation
    The Chatbot Disinfo Inflaming the LA Protests
    On this episode of Uncanny Valley, our senior politics editor discusses the spread of disinformation online following the onset of the Los Angeles protests.
    Like
    Love
    Wow
    Sad
    Angry
    649
    1 التعليقات 0 المشاركات
  • Best bulk sms provider in kenya, uganda, rwanda and tanzania | Advanta Africa

    Best bulk sms provider in kenya, uganda, rwanda and tanzania | Advanta Africa

    Started by

    advantaafrica

    June 16, 2025 05:30 AM

    0
    comments, last by advantaafrica 2 hours, 45 minutes ago

    Author

    Advanta is the best bulk SMS provider in Kenya, offering businesses an effective platform to reach their audience with high delivery rates and reliable services. Whether you need bulk SMS messages in Kenya or reliable messaging solutions in other East African countries, Advanta ensures high-quality service and seamless communication for businesses of all sizes. With its top-tier solutions, Advanta also stands as the best bulk SMS provider in Uganda, ensuring seamless communication through personalized and automated SMS campaigns. Expanding its reach across East Africa, Advanta is the top bulk SMS company in Rwanda, delivering tailored services for businesses to boost customer engagement and increase conversions. For companies in Rwanda seeking efficient communication, Advanta's bulk SMS services in Rwanda are second to none, providing cost-effective and timely solutions. Additionally, Advanta is a leading bulk SMS provider in Tanzania, offering businesses in the region advanced features that support both marketing and transactional messages. With robust bulk SMS services in Tanzania, Advanta helps businesses deliver targeted campaigns and maintain strong customer relationships across the country.
    #best #bulk #sms #provider #kenya
    Best bulk sms provider in kenya, uganda, rwanda and tanzania | Advanta Africa
    Best bulk sms provider in kenya, uganda, rwanda and tanzania | Advanta Africa Started by advantaafrica June 16, 2025 05:30 AM 0 comments, last by advantaafrica 2 hours, 45 minutes ago Author Advanta is the best bulk SMS provider in Kenya, offering businesses an effective platform to reach their audience with high delivery rates and reliable services. Whether you need bulk SMS messages in Kenya or reliable messaging solutions in other East African countries, Advanta ensures high-quality service and seamless communication for businesses of all sizes. With its top-tier solutions, Advanta also stands as the best bulk SMS provider in Uganda, ensuring seamless communication through personalized and automated SMS campaigns. Expanding its reach across East Africa, Advanta is the top bulk SMS company in Rwanda, delivering tailored services for businesses to boost customer engagement and increase conversions. For companies in Rwanda seeking efficient communication, Advanta's bulk SMS services in Rwanda are second to none, providing cost-effective and timely solutions. Additionally, Advanta is a leading bulk SMS provider in Tanzania, offering businesses in the region advanced features that support both marketing and transactional messages. With robust bulk SMS services in Tanzania, Advanta helps businesses deliver targeted campaigns and maintain strong customer relationships across the country. #best #bulk #sms #provider #kenya
    Best bulk sms provider in kenya, uganda, rwanda and tanzania | Advanta Africa
    Best bulk sms provider in kenya, uganda, rwanda and tanzania | Advanta Africa Started by advantaafrica June 16, 2025 05:30 AM 0 comments, last by advantaafrica 2 hours, 45 minutes ago Author Advanta is the best bulk SMS provider in Kenya, offering businesses an effective platform to reach their audience with high delivery rates and reliable services. Whether you need bulk SMS messages in Kenya or reliable messaging solutions in other East African countries, Advanta ensures high-quality service and seamless communication for businesses of all sizes. With its top-tier solutions, Advanta also stands as the best bulk SMS provider in Uganda, ensuring seamless communication through personalized and automated SMS campaigns. Expanding its reach across East Africa, Advanta is the top bulk SMS company in Rwanda, delivering tailored services for businesses to boost customer engagement and increase conversions. For companies in Rwanda seeking efficient communication, Advanta's bulk SMS services in Rwanda are second to none, providing cost-effective and timely solutions. Additionally, Advanta is a leading bulk SMS provider in Tanzania, offering businesses in the region advanced features that support both marketing and transactional messages. With robust bulk SMS services in Tanzania, Advanta helps businesses deliver targeted campaigns and maintain strong customer relationships across the country.
    Like
    Love
    Wow
    Sad
    Angry
    399
    0 التعليقات 0 المشاركات
  • Stolen iPhones disabled by Apple's anti-theft tech after Los Angeles looting

    What just happened? As protests against federal immigration enforcement swept through downtown Los Angeles last week, a wave of looting left several major retailers, including Apple, T-Mobile, and Adidas, counting the cost of smashed windows and stolen goods. Yet for those who made off with iPhones from Apple's flagship store, the thrill of the heist quickly turned into a lesson in high-tech security.
    Apple's retail locations are equipped with advanced anti-theft technology that renders display devices useless once they leave the premises. The moment a demonstration iPhone is taken beyond the store's Wi-Fi network, it is instantly disabled by proximity software and a remote "kill switch."
    Instead of a functioning smartphone, thieves were met with a stark message on the screen: "Please return to Apple Tower Theatre. This device has been disabled and is being tracked. Local authorities will be alerted." The phone simultaneously sounds an alarm and flashes the warning, ensuring it cannot be resold or activated elsewhere.
    This system is not new. During the nationwide unrest of 2020, similar scenes played out as looters discovered that Apple's security measures turned their stolen goods into little more than expensive paperweights.
    The technology relies on a combination of location tracking and network monitoring. As soon as a device is separated from the store's secure environment, it is remotely locked, its location is tracked, and law enforcement is notified.
    // Related Stories

    Videos circulating online show stolen iPhones blaring alarms and displaying tracking messages, making them impossible to ignore and virtually worthless on the black market.
    According to the Los Angeles Police Department, at least three individuals were arrested in connection with the Apple Store burglary, including one suspect apprehended at the scene and two others detained for looting.
    The crackdown on looting comes amid a broader shift in California's approach to retail crime. In response to public outcry over rising thefts, state and local officials have moved away from previously lenient policies. The passage of Proposition 36 has empowered prosecutors to file felony charges against repeat offenders, regardless of the value of stolen goods, and to impose harsher penalties for organized group theft.
    Under these new measures, those caught looting face the prospect of significant prison time, a marked departure from the misdemeanor charges that were common under earlier laws.
    District attorneys in Southern California have called for even harsher penalties, particularly for crimes committed during states of emergency. Proposals include making looting a felony offense, increasing prison sentences, and ensuring that suspects are not released without judicial review. The goal, officials say, is to deter opportunistic criminals who exploit moments of crisis, whether during protests or natural disasters.
    #stolen #iphones #disabled #apple039s #antitheft
    Stolen iPhones disabled by Apple's anti-theft tech after Los Angeles looting
    What just happened? As protests against federal immigration enforcement swept through downtown Los Angeles last week, a wave of looting left several major retailers, including Apple, T-Mobile, and Adidas, counting the cost of smashed windows and stolen goods. Yet for those who made off with iPhones from Apple's flagship store, the thrill of the heist quickly turned into a lesson in high-tech security. Apple's retail locations are equipped with advanced anti-theft technology that renders display devices useless once they leave the premises. The moment a demonstration iPhone is taken beyond the store's Wi-Fi network, it is instantly disabled by proximity software and a remote "kill switch." Instead of a functioning smartphone, thieves were met with a stark message on the screen: "Please return to Apple Tower Theatre. This device has been disabled and is being tracked. Local authorities will be alerted." The phone simultaneously sounds an alarm and flashes the warning, ensuring it cannot be resold or activated elsewhere. This system is not new. During the nationwide unrest of 2020, similar scenes played out as looters discovered that Apple's security measures turned their stolen goods into little more than expensive paperweights. The technology relies on a combination of location tracking and network monitoring. As soon as a device is separated from the store's secure environment, it is remotely locked, its location is tracked, and law enforcement is notified. // Related Stories Videos circulating online show stolen iPhones blaring alarms and displaying tracking messages, making them impossible to ignore and virtually worthless on the black market. According to the Los Angeles Police Department, at least three individuals were arrested in connection with the Apple Store burglary, including one suspect apprehended at the scene and two others detained for looting. The crackdown on looting comes amid a broader shift in California's approach to retail crime. In response to public outcry over rising thefts, state and local officials have moved away from previously lenient policies. The passage of Proposition 36 has empowered prosecutors to file felony charges against repeat offenders, regardless of the value of stolen goods, and to impose harsher penalties for organized group theft. Under these new measures, those caught looting face the prospect of significant prison time, a marked departure from the misdemeanor charges that were common under earlier laws. District attorneys in Southern California have called for even harsher penalties, particularly for crimes committed during states of emergency. Proposals include making looting a felony offense, increasing prison sentences, and ensuring that suspects are not released without judicial review. The goal, officials say, is to deter opportunistic criminals who exploit moments of crisis, whether during protests or natural disasters. #stolen #iphones #disabled #apple039s #antitheft
    WWW.TECHSPOT.COM
    Stolen iPhones disabled by Apple's anti-theft tech after Los Angeles looting
    What just happened? As protests against federal immigration enforcement swept through downtown Los Angeles last week, a wave of looting left several major retailers, including Apple, T-Mobile, and Adidas, counting the cost of smashed windows and stolen goods. Yet for those who made off with iPhones from Apple's flagship store, the thrill of the heist quickly turned into a lesson in high-tech security. Apple's retail locations are equipped with advanced anti-theft technology that renders display devices useless once they leave the premises. The moment a demonstration iPhone is taken beyond the store's Wi-Fi network, it is instantly disabled by proximity software and a remote "kill switch." Instead of a functioning smartphone, thieves were met with a stark message on the screen: "Please return to Apple Tower Theatre. This device has been disabled and is being tracked. Local authorities will be alerted." The phone simultaneously sounds an alarm and flashes the warning, ensuring it cannot be resold or activated elsewhere. This system is not new. During the nationwide unrest of 2020, similar scenes played out as looters discovered that Apple's security measures turned their stolen goods into little more than expensive paperweights. The technology relies on a combination of location tracking and network monitoring. As soon as a device is separated from the store's secure environment, it is remotely locked, its location is tracked, and law enforcement is notified. // Related Stories Videos circulating online show stolen iPhones blaring alarms and displaying tracking messages, making them impossible to ignore and virtually worthless on the black market. According to the Los Angeles Police Department, at least three individuals were arrested in connection with the Apple Store burglary, including one suspect apprehended at the scene and two others detained for looting. The crackdown on looting comes amid a broader shift in California's approach to retail crime. In response to public outcry over rising thefts, state and local officials have moved away from previously lenient policies. The passage of Proposition 36 has empowered prosecutors to file felony charges against repeat offenders, regardless of the value of stolen goods, and to impose harsher penalties for organized group theft. Under these new measures, those caught looting face the prospect of significant prison time, a marked departure from the misdemeanor charges that were common under earlier laws. District attorneys in Southern California have called for even harsher penalties, particularly for crimes committed during states of emergency. Proposals include making looting a felony offense, increasing prison sentences, and ensuring that suspects are not released without judicial review. The goal, officials say, is to deter opportunistic criminals who exploit moments of crisis, whether during protests or natural disasters.
    Like
    Love
    Wow
    Sad
    Angry
    575
    2 التعليقات 0 المشاركات
  • Over 8M patient records leaked in healthcare data breach

    Published
    June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles!
    In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #over #patient #records #leaked #healthcare
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #over #patient #records #leaked #healthcare
    WWW.FOXNEWS.COM
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work   (Kurt "CyberGuy" Knutsson)Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data      (Kurt "CyberGuy" Knutsson)How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop   (Kurt "CyberGuy" Knutsson)5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication (2FA). It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    Like
    Love
    Wow
    Sad
    Angry
    507
    0 التعليقات 0 المشاركات