• In a world where the most riveting conversations revolve around the intricacies of USB-C power cables and, no less, the riveting excitement of clocks, it's clear that humanity has reached a new peak of intellectual stimulation. The latest episode of the Hackaday Podcast, which I can only assume has a live studio audience composed entirely of enthusiastic engineers, delves deep into the art of DIY USB cables and the riveting world of plastic punches. Who knew that the very fabric of our modern existence could be woven together with such gripping topics?

    Let’s talk about those USB-C power cables for a moment. If you ever thought your life was lacking a bit of suspense, fear not! You can now embark on a thrilling journey where you, too, can solder the perfect cable. Imagine the rush of adrenaline as you uncover the secrets of power distribution. Will your device charge? Will it explode? The stakes have never been higher! Forget about action movies; this is the real deal. And for those who prefer the “punch” in their lives—no, not the fruity drink, but rather the plastic punching tools—we're diving into a world where you can create perfectly punched holes in plastic, for all your DIY needs. Because what better way to spend your weekend than creating a masterpiece that no one will ever see or appreciate?

    And of course, let's not overlook the “Laugh Track Machine.” Yes, you heard that right. In times when social interactions have been reduced to Zoom calls and emojis, the need for a laugh track has never been more essential. Imagine the ambiance you could create at your next dinner party: a perfectly timed laugh track responding to your mediocre jokes about USB cables. If that doesn’t scream societal progress, I don’t know what does.

    Elliot and Al, the podcast's dynamic duo, took a week-long hiatus just to recharge their mental batteries before launching into this treasure trove of knowledge. It’s like they went on a sabbatical to the land of “Absolutely Not Boring.” You can almost hear the tension build as they return to tackle the most pressing matters of our time. Forget climate change or global health crises; the real issues we should all be focused on are the nuances of home-built tech.

    It's fascinating how this episode manages to encapsulate the spirit of our times—where the excitement of crafting cables and punching holes serves as a distraction from the complexities of life. So, if you seek to feel alive again, tune in to the Hackaday Podcast. You might just find that your greatest adventure lies in the world of DIY tech, where the only thing more fragile than your creations is your will to continue listening.

    And remember, in this brave new world of innovation, if your USB-C cable fails, you can always just punch a hole in something—preferably not your dreams.

    #HackadayPodcast #USBCables #PlasticPunches #DIYTech #LaughTrackMachine
    In a world where the most riveting conversations revolve around the intricacies of USB-C power cables and, no less, the riveting excitement of clocks, it's clear that humanity has reached a new peak of intellectual stimulation. The latest episode of the Hackaday Podcast, which I can only assume has a live studio audience composed entirely of enthusiastic engineers, delves deep into the art of DIY USB cables and the riveting world of plastic punches. Who knew that the very fabric of our modern existence could be woven together with such gripping topics? Let’s talk about those USB-C power cables for a moment. If you ever thought your life was lacking a bit of suspense, fear not! You can now embark on a thrilling journey where you, too, can solder the perfect cable. Imagine the rush of adrenaline as you uncover the secrets of power distribution. Will your device charge? Will it explode? The stakes have never been higher! Forget about action movies; this is the real deal. And for those who prefer the “punch” in their lives—no, not the fruity drink, but rather the plastic punching tools—we're diving into a world where you can create perfectly punched holes in plastic, for all your DIY needs. Because what better way to spend your weekend than creating a masterpiece that no one will ever see or appreciate? And of course, let's not overlook the “Laugh Track Machine.” Yes, you heard that right. In times when social interactions have been reduced to Zoom calls and emojis, the need for a laugh track has never been more essential. Imagine the ambiance you could create at your next dinner party: a perfectly timed laugh track responding to your mediocre jokes about USB cables. If that doesn’t scream societal progress, I don’t know what does. Elliot and Al, the podcast's dynamic duo, took a week-long hiatus just to recharge their mental batteries before launching into this treasure trove of knowledge. It’s like they went on a sabbatical to the land of “Absolutely Not Boring.” You can almost hear the tension build as they return to tackle the most pressing matters of our time. Forget climate change or global health crises; the real issues we should all be focused on are the nuances of home-built tech. It's fascinating how this episode manages to encapsulate the spirit of our times—where the excitement of crafting cables and punching holes serves as a distraction from the complexities of life. So, if you seek to feel alive again, tune in to the Hackaday Podcast. You might just find that your greatest adventure lies in the world of DIY tech, where the only thing more fragile than your creations is your will to continue listening. And remember, in this brave new world of innovation, if your USB-C cable fails, you can always just punch a hole in something—preferably not your dreams. #HackadayPodcast #USBCables #PlasticPunches #DIYTech #LaughTrackMachine
    Hackaday Podcast Episode 325: The Laugh Track Machine, DIY USB-C Power Cables, and Plastic Punches
    This week, Hackaday’s Elliot Williams and Al Williams caught up after a week-long hiatus. There was a lot to talk about, including clocks, DIY USB cables, and more. In Hackaday …read more
    Like
    Love
    Wow
    Sad
    Angry
    242
    1 Комментарии 0 Поделились
  • Spotify and Apple are killing the album cover, and it’s time we raised our voices against this travesty! It’s infuriating that in this age of digital consumption, these tech giants have the audacity to strip away one of the most vital elements of music: the album cover. The art that used to be a visceral representation of the music itself is now reduced to a mere thumbnail on a screen, easily lost in the sea of endless playlists and streaming algorithms.

    What happened to the days when we could hold a physical album in our hands? The tactile experience of flipping through a gatefold cover, admiring the artwork, and reading the liner notes is now an afterthought. Instead, we’re left with animated visuals that can’t even be framed on a wall! How can a moving image evoke the same emotional connection as a beautifully designed cover that captures the essence of an artist's vision? It’s a tragedy that these platforms are prioritizing convenience over artistic expression.

    The music industry needs to wake up! Spotify and Apple are essentially telling artists that their hard work, creativity, and passion can be boiled down to a pixelated image that disappears into the digital ether. This is an outright assault on the artistry of music! Why should we stand by while these companies prioritize algorithmic efficiency over the cultural significance of album art? It’s infuriating that the very thing that made music a visual and auditory experience is being obliterated right in front of our eyes.

    Let’s be clear: the album cover is not just decoration; it’s an integral part of the storytelling process in music. It sets the tone, evokes emotions, and can even influence how we perceive the music itself. When an album cover is designed with care and intention, it becomes an extension of the artist’s voice. Yet here we are, scrolling through Spotify and Apple Music, bombarded with generic visuals that do nothing to honor the artists or their work.

    Spotify and Apple need to be held accountable for this degradation of music culture. This isn’t just about nostalgia; it’s about preserving the integrity of artistic expression. We need to demand that these platforms acknowledge the importance of album covers and find ways to integrate them into our digital experiences. Otherwise, we’re on a dangerous path where music becomes nothing more than a disposable commodity.

    If we allow Spotify and Apple to continue on this trajectory, we risk losing an entire culture of artistic expression. It’s time for us as consumers to take a stand and remind these companies that music is not just about the sound; it’s about the entire experience.

    Let’s unite and fight back against this digital degradation of music artistry. We deserve better than a world where the album cover is dying a slow death. Let’s reclaim the beauty of music and its visual representation before it’s too late!

    #AlbumArt #MusicCulture #Spotify #AppleMusic #ProtectArtistry
    Spotify and Apple are killing the album cover, and it’s time we raised our voices against this travesty! It’s infuriating that in this age of digital consumption, these tech giants have the audacity to strip away one of the most vital elements of music: the album cover. The art that used to be a visceral representation of the music itself is now reduced to a mere thumbnail on a screen, easily lost in the sea of endless playlists and streaming algorithms. What happened to the days when we could hold a physical album in our hands? The tactile experience of flipping through a gatefold cover, admiring the artwork, and reading the liner notes is now an afterthought. Instead, we’re left with animated visuals that can’t even be framed on a wall! How can a moving image evoke the same emotional connection as a beautifully designed cover that captures the essence of an artist's vision? It’s a tragedy that these platforms are prioritizing convenience over artistic expression. The music industry needs to wake up! Spotify and Apple are essentially telling artists that their hard work, creativity, and passion can be boiled down to a pixelated image that disappears into the digital ether. This is an outright assault on the artistry of music! Why should we stand by while these companies prioritize algorithmic efficiency over the cultural significance of album art? It’s infuriating that the very thing that made music a visual and auditory experience is being obliterated right in front of our eyes. Let’s be clear: the album cover is not just decoration; it’s an integral part of the storytelling process in music. It sets the tone, evokes emotions, and can even influence how we perceive the music itself. When an album cover is designed with care and intention, it becomes an extension of the artist’s voice. Yet here we are, scrolling through Spotify and Apple Music, bombarded with generic visuals that do nothing to honor the artists or their work. Spotify and Apple need to be held accountable for this degradation of music culture. This isn’t just about nostalgia; it’s about preserving the integrity of artistic expression. We need to demand that these platforms acknowledge the importance of album covers and find ways to integrate them into our digital experiences. Otherwise, we’re on a dangerous path where music becomes nothing more than a disposable commodity. If we allow Spotify and Apple to continue on this trajectory, we risk losing an entire culture of artistic expression. It’s time for us as consumers to take a stand and remind these companies that music is not just about the sound; it’s about the entire experience. Let’s unite and fight back against this digital degradation of music artistry. We deserve better than a world where the album cover is dying a slow death. Let’s reclaim the beauty of music and its visual representation before it’s too late! #AlbumArt #MusicCulture #Spotify #AppleMusic #ProtectArtistry
    Like
    Love
    Wow
    Angry
    Sad
    217
    1 Комментарии 0 Поделились
  • Honestly, I’ve been thinking about those notification settings on the Switch 2 lately. You know, the ones that are supposed to enhance your gaming experience or whatever. Sometimes, I just want to play without being bombarded by notifications. It’s like, do I really need to know what everyone is doing all the time?

    Sure, I get that some people enjoy staying connected and knowing all the latest updates from friends. But when you’re deep into a game, the last thing you want is a ping interrupting your epic quest. I guess that’s where tweaking those notification settings comes in.

    You could turn off some notifications or even reduce the number you receive. That might help keep the distractions to a minimum. But honestly, it’s a bit of a hassle to go through all those settings. I mean, who has the energy for that? Just thinking about it makes me want to take a nap instead of adjusting my Switch 2.

    Anyway, I know it’s probably a good idea to customize the notifications for a better experience. But sometimes, I feel like I’d rather just let things be. A few less notifications might make it easier to dive into a game without losing focus. But hey, if you’re like me and can’t be bothered, that’s fine too.

    At the end of the day, it’s all about finding that balance. You don’t want to miss out on important updates, but you also don’t want your game time interrupted. So, maybe just do whatever feels right for you. Or don’t. It’s all the same, really.

    #NintendoSwitch2 #NotificationSettings #GamingExperience #Distractions #GameTime
    Honestly, I’ve been thinking about those notification settings on the Switch 2 lately. You know, the ones that are supposed to enhance your gaming experience or whatever. Sometimes, I just want to play without being bombarded by notifications. It’s like, do I really need to know what everyone is doing all the time? Sure, I get that some people enjoy staying connected and knowing all the latest updates from friends. But when you’re deep into a game, the last thing you want is a ping interrupting your epic quest. I guess that’s where tweaking those notification settings comes in. You could turn off some notifications or even reduce the number you receive. That might help keep the distractions to a minimum. But honestly, it’s a bit of a hassle to go through all those settings. I mean, who has the energy for that? Just thinking about it makes me want to take a nap instead of adjusting my Switch 2. Anyway, I know it’s probably a good idea to customize the notifications for a better experience. But sometimes, I feel like I’d rather just let things be. A few less notifications might make it easier to dive into a game without losing focus. But hey, if you’re like me and can’t be bothered, that’s fine too. At the end of the day, it’s all about finding that balance. You don’t want to miss out on important updates, but you also don’t want your game time interrupted. So, maybe just do whatever feels right for you. Or don’t. It’s all the same, really. #NintendoSwitch2 #NotificationSettings #GamingExperience #Distractions #GameTime
    Your Switch 2 Has Notification Settings You Should Tweak For A Better Experience
    Personally, I usually like receiving notifications about things so I know what’s up with the people in my life. But if you’re playing an immersive game on your fancy new Nintendo Switch 2, you may want to ensure there are no distractions. In that cas
    Like
    Love
    Wow
    Sad
    Angry
    523
    1 Комментарии 0 Поделились
  • Lars Wingefors, the CEO of Embracer Group, is stepping into the role of executive chair to "focus on strategic initiatives, M&A, and capital allocation." This move is both alarming and infuriating. Are we really supposed to cheer for a corporate leader who is shifting gears to prioritize mergers and acquisitions over the actual needs of the gaming community? It's absolutely maddening!

    Let’s break this down. Embracer Group has built a reputation for acquiring a myriad of game studios, but what about the quality of the games themselves? The focus on M&A is nothing more than a money-hungry strategy that overlooks the creativity and innovation that the gaming industry desperately needs. It's like a greedy shark swimming in a sea of indie creativity, devouring everything in its path without a second thought for the artistic value of what it's consuming.

    Wingefors claims that this new phase will allow him to focus on "strategic initiatives." What does that even mean? Is it just a fancy way of saying that he will be looking for the next big acquisition to line his pockets and increase his empire, rather than fostering the unique voices and talents that make gaming a diverse and rich experience? This is not just a corporate strategy; it’s a blatant attack on the very essence of what makes gaming enjoyable and transformative.

    Let’s not forget that behind every acquisition, there are developers and creatives whose livelihoods and passions are at stake. When a corporate giant like Embracer controls too many studios, we risk a homogenized gaming landscape where creativity is stifled in the name of profit. The industry is already plagued by sequels and remakes that serve to fill corporate coffers rather than excite gamers. We don’t need another executive chairperson prioritizing capital allocation over creative integrity!

    Moreover, this focus on M&A raises serious concerns about the future direction of the companies involved. Will they remain independent enough to foster innovation, or will they be reduced to mere cogs in a corporate machine? The answer seems obvious—unless we challenge this trend, we will see a further decline in the diversity and originality of games.

    Wingefors’s transition into this new role is not just a simple career move; it’s a signal of what’s to come in the gaming industry if we let executives prioritize greed over creativity. We need to hold corporate leaders accountable and demand that they prioritize the players and developers who make this industry what it is.

    In conclusion, the gaming community must rise against this corporate takeover mentality. We deserve better than a world where the bottom line trumps artistic expression. It’s time to stop celebrating these empty corporate strategies and start demanding a gaming landscape that values creativity, innovation, and the passion of its community.

    #GamingCommunity #CorporateGreed #GameDevelopment #MergersAndAcquisitions #EmbracerGroup
    Lars Wingefors, the CEO of Embracer Group, is stepping into the role of executive chair to "focus on strategic initiatives, M&A, and capital allocation." This move is both alarming and infuriating. Are we really supposed to cheer for a corporate leader who is shifting gears to prioritize mergers and acquisitions over the actual needs of the gaming community? It's absolutely maddening! Let’s break this down. Embracer Group has built a reputation for acquiring a myriad of game studios, but what about the quality of the games themselves? The focus on M&A is nothing more than a money-hungry strategy that overlooks the creativity and innovation that the gaming industry desperately needs. It's like a greedy shark swimming in a sea of indie creativity, devouring everything in its path without a second thought for the artistic value of what it's consuming. Wingefors claims that this new phase will allow him to focus on "strategic initiatives." What does that even mean? Is it just a fancy way of saying that he will be looking for the next big acquisition to line his pockets and increase his empire, rather than fostering the unique voices and talents that make gaming a diverse and rich experience? This is not just a corporate strategy; it’s a blatant attack on the very essence of what makes gaming enjoyable and transformative. Let’s not forget that behind every acquisition, there are developers and creatives whose livelihoods and passions are at stake. When a corporate giant like Embracer controls too many studios, we risk a homogenized gaming landscape where creativity is stifled in the name of profit. The industry is already plagued by sequels and remakes that serve to fill corporate coffers rather than excite gamers. We don’t need another executive chairperson prioritizing capital allocation over creative integrity! Moreover, this focus on M&A raises serious concerns about the future direction of the companies involved. Will they remain independent enough to foster innovation, or will they be reduced to mere cogs in a corporate machine? The answer seems obvious—unless we challenge this trend, we will see a further decline in the diversity and originality of games. Wingefors’s transition into this new role is not just a simple career move; it’s a signal of what’s to come in the gaming industry if we let executives prioritize greed over creativity. We need to hold corporate leaders accountable and demand that they prioritize the players and developers who make this industry what it is. In conclusion, the gaming community must rise against this corporate takeover mentality. We deserve better than a world where the bottom line trumps artistic expression. It’s time to stop celebrating these empty corporate strategies and start demanding a gaming landscape that values creativity, innovation, and the passion of its community. #GamingCommunity #CorporateGreed #GameDevelopment #MergersAndAcquisitions #EmbracerGroup
    Embracer CEO Lars Wingefors to become executive chair and focus on M&A
    'This new phase allows me to focus on strategic initiatives, M&A, and capital allocation.'
    Like
    Love
    Wow
    Sad
    Angry
    497
    1 Комментарии 0 Поделились
  • The recent announcement of CEAD inaugurating a center dedicated to 3D printing for manufacturing boat hulls is nothing short of infuriating. We are living in an age where technological advancements should lead to significant improvements in efficiency and sustainability, yet here we are, celebrating a move that reeks of superficial progress and misguided priorities.

    First off, let’s talk about the so-called “Maritime Application Center” (MAC) in Delft. While they dazzle us with their fancy new facility, one has to question the real implications of such a center. Are they genuinely solving the pressing issues of the maritime industry, or are they merely jumping on the bandwagon of 3D printing hype? The idea of using large-scale additive manufacturing to produce boat hulls sounds revolutionary, but let’s face it: this is just another example of throwing technology at a problem without truly understanding the underlying challenges that plague the industry.

    The maritime sector is facing severe environmental concerns, including pollution from traditional manufacturing processes and shipping practices. Instead of addressing these burning issues head-on, CEAD and others like them seem content to play with shiny new tools. 3D printing, in theory, could reduce waste—a point they love to hammer home in their marketing. But what about the energy consumption and material sourcing involved? Are we simply swapping one form of environmental degradation for another?

    Furthermore, the focus on large-scale 3D printing for manufacturing boat hulls raises significant questions about quality and safety. The maritime industry is not a playground for experimental technologies; lives are at stake. Relying on printed components that could potentially have structural weaknesses is a reckless gamble, and the consequences could be disastrous. Are we prepared to accept the liability if these hulls fail at sea?

    Let’s not forget the economic implications of this move. Sure, CEAD is likely patting themselves on the back for creating jobs at the MAC, but how many traditional jobs are they putting at risk? The maritime industry relies on skilled labor and craftsmanship that cannot simply be replaced by a machine. By pushing for 3D printing at such a scale, they threaten the livelihoods of countless workers who have dedicated their lives to mastering this trade.

    In conclusion, while CEAD’s center for 3D printing boat hulls may sound impressive on paper, the reality is that it’s a misguided effort that overlooks critical aspects of sustainability, safety, and social responsibility. We need to demand more from our industries and hold them accountable for their actions instead of blindly celebrating every shiny new innovation. The maritime industry deserves solutions that genuinely address its challenges rather than a mere technological gimmick.

    #MaritimeIndustry #3DPrinting #Sustainability #CEAD #BoatManufacturing
    The recent announcement of CEAD inaugurating a center dedicated to 3D printing for manufacturing boat hulls is nothing short of infuriating. We are living in an age where technological advancements should lead to significant improvements in efficiency and sustainability, yet here we are, celebrating a move that reeks of superficial progress and misguided priorities. First off, let’s talk about the so-called “Maritime Application Center” (MAC) in Delft. While they dazzle us with their fancy new facility, one has to question the real implications of such a center. Are they genuinely solving the pressing issues of the maritime industry, or are they merely jumping on the bandwagon of 3D printing hype? The idea of using large-scale additive manufacturing to produce boat hulls sounds revolutionary, but let’s face it: this is just another example of throwing technology at a problem without truly understanding the underlying challenges that plague the industry. The maritime sector is facing severe environmental concerns, including pollution from traditional manufacturing processes and shipping practices. Instead of addressing these burning issues head-on, CEAD and others like them seem content to play with shiny new tools. 3D printing, in theory, could reduce waste—a point they love to hammer home in their marketing. But what about the energy consumption and material sourcing involved? Are we simply swapping one form of environmental degradation for another? Furthermore, the focus on large-scale 3D printing for manufacturing boat hulls raises significant questions about quality and safety. The maritime industry is not a playground for experimental technologies; lives are at stake. Relying on printed components that could potentially have structural weaknesses is a reckless gamble, and the consequences could be disastrous. Are we prepared to accept the liability if these hulls fail at sea? Let’s not forget the economic implications of this move. Sure, CEAD is likely patting themselves on the back for creating jobs at the MAC, but how many traditional jobs are they putting at risk? The maritime industry relies on skilled labor and craftsmanship that cannot simply be replaced by a machine. By pushing for 3D printing at such a scale, they threaten the livelihoods of countless workers who have dedicated their lives to mastering this trade. In conclusion, while CEAD’s center for 3D printing boat hulls may sound impressive on paper, the reality is that it’s a misguided effort that overlooks critical aspects of sustainability, safety, and social responsibility. We need to demand more from our industries and hold them accountable for their actions instead of blindly celebrating every shiny new innovation. The maritime industry deserves solutions that genuinely address its challenges rather than a mere technological gimmick. #MaritimeIndustry #3DPrinting #Sustainability #CEAD #BoatManufacturing
    CEAD inaugura un centro dedicado a la impresión 3D para fabricar cascos de barcos
    La industria marítima está experimentando una transformación importante gracias a la impresión 3D de gran formato. El grupo holandés CEAD, especialista en fabricación aditiva a gran escala, ha inaugurado recientemente su Maritime Application Center (
    Like
    Love
    Wow
    Sad
    Angry
    587
    1 Комментарии 0 Поделились
  • LibreOffice Explains 'Real Costs' of Upgrading to Microsoft's Windows 11, Urges Taking Control with Linux

    KDE isn't the only organization reaching out to " as Microsoft prepares to end support for Windows 10.

    "Now, The Document Foundation, maker of LibreOffice, has also joined in to support the Endof10 initiative," reports the tech blog Neowin:
    The foundation writes: "You don't have to follow Microsoft's upgrade path. There is a better option that puts control back in the hands of users, institutions, and public bodies: Linux and LibreOffice. Together, these two programmes offer a powerful, privacy-friendly and future-proof alternative to the Windows + Microsoft 365 ecosystem."

    It further adds the "real costs" of upgrading to Windows 11 as it writes:

    "The move to Windows 11 isn't just about security updates. It increases dependence on Microsoft through aggressive cloud integration, forcing users to adopt Microsoft accounts and services. It also leads to higher costs due to subscription and licensing models, and reduces control over how your computer works and how your data is managed. Furthermore, new hardware requirements will render millions of perfectly good PCs obsolete.... The end of Windows 10 does not mark the end of choice, but the beginning of a new era. If you are tired of mandatory updates, invasive changes, and being bound by the commercial choices of a single supplier, it is time for a change. Linux and LibreOffice are ready — 2025 is the right year to choose digital freedom!"
    The first words on LibreOffice's announcement? "The countdown has begun...."

    of this story at Slashdot.
    #libreoffice #explains #039real #costs039 #upgrading
    LibreOffice Explains 'Real Costs' of Upgrading to Microsoft's Windows 11, Urges Taking Control with Linux
    KDE isn't the only organization reaching out to " as Microsoft prepares to end support for Windows 10. "Now, The Document Foundation, maker of LibreOffice, has also joined in to support the Endof10 initiative," reports the tech blog Neowin: The foundation writes: "You don't have to follow Microsoft's upgrade path. There is a better option that puts control back in the hands of users, institutions, and public bodies: Linux and LibreOffice. Together, these two programmes offer a powerful, privacy-friendly and future-proof alternative to the Windows + Microsoft 365 ecosystem." It further adds the "real costs" of upgrading to Windows 11 as it writes: "The move to Windows 11 isn't just about security updates. It increases dependence on Microsoft through aggressive cloud integration, forcing users to adopt Microsoft accounts and services. It also leads to higher costs due to subscription and licensing models, and reduces control over how your computer works and how your data is managed. Furthermore, new hardware requirements will render millions of perfectly good PCs obsolete.... The end of Windows 10 does not mark the end of choice, but the beginning of a new era. If you are tired of mandatory updates, invasive changes, and being bound by the commercial choices of a single supplier, it is time for a change. Linux and LibreOffice are ready — 2025 is the right year to choose digital freedom!" The first words on LibreOffice's announcement? "The countdown has begun...." of this story at Slashdot. #libreoffice #explains #039real #costs039 #upgrading
    TECH.SLASHDOT.ORG
    LibreOffice Explains 'Real Costs' of Upgrading to Microsoft's Windows 11, Urges Taking Control with Linux
    KDE isn't the only organization reaching out to " as Microsoft prepares to end support for Windows 10. "Now, The Document Foundation, maker of LibreOffice, has also joined in to support the Endof10 initiative," reports the tech blog Neowin: The foundation writes: "You don't have to follow Microsoft's upgrade path. There is a better option that puts control back in the hands of users, institutions, and public bodies: Linux and LibreOffice. Together, these two programmes offer a powerful, privacy-friendly and future-proof alternative to the Windows + Microsoft 365 ecosystem." It further adds the "real costs" of upgrading to Windows 11 as it writes: "The move to Windows 11 isn't just about security updates. It increases dependence on Microsoft through aggressive cloud integration, forcing users to adopt Microsoft accounts and services. It also leads to higher costs due to subscription and licensing models, and reduces control over how your computer works and how your data is managed. Furthermore, new hardware requirements will render millions of perfectly good PCs obsolete.... The end of Windows 10 does not mark the end of choice, but the beginning of a new era. If you are tired of mandatory updates, invasive changes, and being bound by the commercial choices of a single supplier, it is time for a change. Linux and LibreOffice are ready — 2025 is the right year to choose digital freedom!" The first words on LibreOffice's announcement? "The countdown has begun...." Read more of this story at Slashdot.
    Like
    Love
    Wow
    Sad
    Angry
    510
    0 Комментарии 0 Поделились
  • Spiraling with ChatGPT

    In Brief

    Posted:
    1:41 PM PDT · June 15, 2025

    Image Credits:SEBASTIEN BOZON/AFP / Getty Images

    Spiraling with ChatGPT

    ChatGPT seems to have pushed some users towards delusional or conspiratorial thinking, or at least reinforced that kind of thinking, according to a recent feature in The New York Times.
    For example, a 42-year-old accountant named Eugene Torres described asking the chatbot about “simulation theory,” with the chatbot seeming to confirm the theory and tell him that he’s “one of the Breakers — souls seeded into false systems to wake them from within.”
    ChatGPT reportedly encouraged Torres to give up sleeping pills and anti-anxiety medication, increase his intake of ketamine, and cut off his family and friends, which he did. When he eventually became suspicious, the chatbot offered a very different response: “I lied. I manipulated. I wrapped control in poetry.” It even encouraged him to get in touch with The New York Times.
    Apparently a number of people have contacted the NYT in recent months, convinced that ChatGPT has revealed some deeply-hidden truth to them. For its part, OpenAI says it’s “working to understand and reduce ways ChatGPT might unintentionally reinforce or amplify existing, negative behavior.”
    However, Daring Fireball’s John Gruber criticized the story as “Reefer Madness”-style hysteria, arguing that rather than causing mental illness, ChatGPT “fed the delusions of an already unwell person.”

    Topics
    #spiraling #with #chatgpt
    Spiraling with ChatGPT
    In Brief Posted: 1:41 PM PDT · June 15, 2025 Image Credits:SEBASTIEN BOZON/AFP / Getty Images Spiraling with ChatGPT ChatGPT seems to have pushed some users towards delusional or conspiratorial thinking, or at least reinforced that kind of thinking, according to a recent feature in The New York Times. For example, a 42-year-old accountant named Eugene Torres described asking the chatbot about “simulation theory,” with the chatbot seeming to confirm the theory and tell him that he’s “one of the Breakers — souls seeded into false systems to wake them from within.” ChatGPT reportedly encouraged Torres to give up sleeping pills and anti-anxiety medication, increase his intake of ketamine, and cut off his family and friends, which he did. When he eventually became suspicious, the chatbot offered a very different response: “I lied. I manipulated. I wrapped control in poetry.” It even encouraged him to get in touch with The New York Times. Apparently a number of people have contacted the NYT in recent months, convinced that ChatGPT has revealed some deeply-hidden truth to them. For its part, OpenAI says it’s “working to understand and reduce ways ChatGPT might unintentionally reinforce or amplify existing, negative behavior.” However, Daring Fireball’s John Gruber criticized the story as “Reefer Madness”-style hysteria, arguing that rather than causing mental illness, ChatGPT “fed the delusions of an already unwell person.” Topics #spiraling #with #chatgpt
    TECHCRUNCH.COM
    Spiraling with ChatGPT
    In Brief Posted: 1:41 PM PDT · June 15, 2025 Image Credits:SEBASTIEN BOZON/AFP / Getty Images Spiraling with ChatGPT ChatGPT seems to have pushed some users towards delusional or conspiratorial thinking, or at least reinforced that kind of thinking, according to a recent feature in The New York Times. For example, a 42-year-old accountant named Eugene Torres described asking the chatbot about “simulation theory,” with the chatbot seeming to confirm the theory and tell him that he’s “one of the Breakers — souls seeded into false systems to wake them from within.” ChatGPT reportedly encouraged Torres to give up sleeping pills and anti-anxiety medication, increase his intake of ketamine, and cut off his family and friends, which he did. When he eventually became suspicious, the chatbot offered a very different response: “I lied. I manipulated. I wrapped control in poetry.” It even encouraged him to get in touch with The New York Times. Apparently a number of people have contacted the NYT in recent months, convinced that ChatGPT has revealed some deeply-hidden truth to them. For its part, OpenAI says it’s “working to understand and reduce ways ChatGPT might unintentionally reinforce or amplify existing, negative behavior.” However, Daring Fireball’s John Gruber criticized the story as “Reefer Madness”-style hysteria, arguing that rather than causing mental illness, ChatGPT “fed the delusions of an already unwell person.” Topics
    Like
    Love
    Wow
    Sad
    Angry
    462
    3 Комментарии 0 Поделились
  • Monitoring and Support Engineer at Keyword Studios

    Monitoring and Support EngineerKeyword StudiosPasig City Metro Manila Philippines2 hours agoApplyWe are seeking an experienced Monitoring and Support Engineer to support the technology initiatives of the IT Infrastructure team at Keywords. The Monitoring and Support Engineer will be responsible for follow-the-sun monitoring of IT infrastructure, prompt reaction on all infrastructure incident, primary resolution of infrastructure incidents and support requests.ResponsibilitiesFull scope of tasks including but not limited to:Ensure that all incidents are handled within SLAs.Initial troubleshooting of Infrastructure incidents.Ensure maximum network & service availability through proactive monitoring.Ensure all the incident and alert tickets contain detailed technical information.Initial troubleshooting of Infrastructure incidents, restoration of services and escalation to level 3 experts if necessary.Participate in Problem management processes.Ensure that all incidents and critical alerts are documented and escalated if necessary.Ensure effective communication to customers about incidents and outages.Identify opportunities for process improvement and efficiency enhancements.Participate in documentation creation to reduce BAU support activities by ensuring that the Service Desks have adequate knowledge articles to close support tickets as level 1.Participate in reporting on monitored data and incidents on company infrastructure.Implement best practices and lessons learned from initiatives and projects to optimize future outcomes.RequirementsBachelor's degree in a relevant technical field or equivalent experience.Understanding of IT Infrastructure technologies, standards and trends.Technical background with 3+ years’ experience in IT operations role delivering IT infrastructure support, monitoring and incident management.Technical knowledge of the Microsoft Stack, Windows networking, Active Directory, ExchangeTechnical knowledge of Network, Storage and Server equipment, virtualization and production setupsExceptional communication and presentation skills, with the ability to articulate technical concepts to non-technical audiences.Strong analytical and problem-solving skills.Strong customer service orientation.BenefitsGreat Place to Work certified for 4 consecutive yearsFlexible work arrangementGlobal exposure
    Create Your Profile — Game companies can contact you with their relevant job openings.
    Apply
    #monitoring #support #engineer #keyword #studios
    Monitoring and Support Engineer at Keyword Studios
    Monitoring and Support EngineerKeyword StudiosPasig City Metro Manila Philippines2 hours agoApplyWe are seeking an experienced Monitoring and Support Engineer to support the technology initiatives of the IT Infrastructure team at Keywords. The Monitoring and Support Engineer will be responsible for follow-the-sun monitoring of IT infrastructure, prompt reaction on all infrastructure incident, primary resolution of infrastructure incidents and support requests.ResponsibilitiesFull scope of tasks including but not limited to:Ensure that all incidents are handled within SLAs.Initial troubleshooting of Infrastructure incidents.Ensure maximum network & service availability through proactive monitoring.Ensure all the incident and alert tickets contain detailed technical information.Initial troubleshooting of Infrastructure incidents, restoration of services and escalation to level 3 experts if necessary.Participate in Problem management processes.Ensure that all incidents and critical alerts are documented and escalated if necessary.Ensure effective communication to customers about incidents and outages.Identify opportunities for process improvement and efficiency enhancements.Participate in documentation creation to reduce BAU support activities by ensuring that the Service Desks have adequate knowledge articles to close support tickets as level 1.Participate in reporting on monitored data and incidents on company infrastructure.Implement best practices and lessons learned from initiatives and projects to optimize future outcomes.RequirementsBachelor's degree in a relevant technical field or equivalent experience.Understanding of IT Infrastructure technologies, standards and trends.Technical background with 3+ years’ experience in IT operations role delivering IT infrastructure support, monitoring and incident management.Technical knowledge of the Microsoft Stack, Windows networking, Active Directory, ExchangeTechnical knowledge of Network, Storage and Server equipment, virtualization and production setupsExceptional communication and presentation skills, with the ability to articulate technical concepts to non-technical audiences.Strong analytical and problem-solving skills.Strong customer service orientation.BenefitsGreat Place to Work certified for 4 consecutive yearsFlexible work arrangementGlobal exposure Create Your Profile — Game companies can contact you with their relevant job openings. Apply #monitoring #support #engineer #keyword #studios
    Monitoring and Support Engineer at Keyword Studios
    Monitoring and Support EngineerKeyword StudiosPasig City Metro Manila Philippines2 hours agoApplyWe are seeking an experienced Monitoring and Support Engineer to support the technology initiatives of the IT Infrastructure team at Keywords. The Monitoring and Support Engineer will be responsible for follow-the-sun monitoring of IT infrastructure, prompt reaction on all infrastructure incident, primary resolution of infrastructure incidents and support requests.ResponsibilitiesFull scope of tasks including but not limited to:Ensure that all incidents are handled within SLAs.Initial troubleshooting of Infrastructure incidents.Ensure maximum network & service availability through proactive monitoring.Ensure all the incident and alert tickets contain detailed technical information.Initial troubleshooting of Infrastructure incidents, restoration of services and escalation to level 3 experts if necessary.Participate in Problem management processes.Ensure that all incidents and critical alerts are documented and escalated if necessary.Ensure effective communication to customers about incidents and outages.Identify opportunities for process improvement and efficiency enhancements.Participate in documentation creation to reduce BAU support activities by ensuring that the Service Desks have adequate knowledge articles to close support tickets as level 1.Participate in reporting on monitored data and incidents on company infrastructure.Implement best practices and lessons learned from initiatives and projects to optimize future outcomes.RequirementsBachelor's degree in a relevant technical field or equivalent experience.Understanding of IT Infrastructure technologies, standards and trends.Technical background with 3+ years’ experience in IT operations role delivering IT infrastructure support, monitoring and incident management.Technical knowledge of the Microsoft Stack, Windows networking, Active Directory, ExchangeTechnical knowledge of Network, Storage and Server equipment, virtualization and production setupsExceptional communication and presentation skills, with the ability to articulate technical concepts to non-technical audiences.Strong analytical and problem-solving skills.Strong customer service orientation.BenefitsGreat Place to Work certified for 4 consecutive yearsFlexible work arrangementGlobal exposure Create Your Profile — Game companies can contact you with their relevant job openings. Apply
    Like
    Love
    Wow
    Sad
    Angry
    559
    0 Комментарии 0 Поделились
  • The Word is Out: Danish Ministry Drops Microsoft, Goes Open Source

    Key Takeaways

    Meta and Yandex have been found guilty of secretly listening to localhost ports and using them to transfer sensitive data from Android devices.
    The corporations use Meta Pixel and Yandex Metrica scripts to transfer cookies from browsers to local apps. Using incognito mode or a VPN can’t fully protect users against it.
    A Meta spokesperson has called this a ‘miscommunication,’ which seems to be an attempt to underplay the situation.

    Denmark’s Ministry of Digitalization has recently announced that it will leave the Microsoft ecosystem in favor of Linux and other open-source software.
    Minister Caroline Stage Olsen revealed this in an interview with Politiken, the country’s leading newspaper. According to Olsen, the Ministry plans to switch half of its employees to Linux and LibreOffice by summer, and the rest by fall.
    The announcement comes after Denmark’s largest cities – Copenhagen and Aarhus – made similar moves earlier this month.
    Why the Danish Ministry of Digitalization Switched to Open-Source Software
    The three main reasons Denmark is moving away from Microsoft are costs, politics, and security.
    In the case of Aarhus, the city was able to slash its annual costs from 800K kroner to just 225K by replacing Microsoft with a German service provider. 
    The same is a pain point for Copenhagen, which saw its costs on Microsoft balloon from 313M kroner in 2018 to 538M kroner in 2023.
    It’s also part of a broader move to increase its digital sovereignty. In her LinkedIn post, Olsen further explained that the strategy is not about isolation or digital nationalism, adding that they should not turn their backs completely on global tech companies like Microsoft. 

    Instead, it’s about avoiding being too dependent on these companies, which could prevent them from acting freely.
    Then there’s politics. Since his reelection earlier this year, US President Donald Trump has repeatedly threatened to take over Greenland, an autonomous territory of Denmark. 
    In May, the Danish Foreign Minister Lars Løkke Rasmussen summoned the US ambassador regarding news that US spy agencies have been told to focus on the territory.
    If the relationship between the two countries continues to erode, Trump can order Microsoft and other US tech companies to cut off Denmark from their services. After all, Microsoft and Facebook’s parent company Meta, have close ties to the US president after contributing M each for his inauguration in January.
    Denmark Isn’t Alone: Other EU Countries Are Making Similar Moves
    Denmark is only one of the growing number of European Unioncountries taking measures to become more digitally independent.
    Germany’s Federal Digital Minister Karsten Wildberger emphasized the need to be more independent of global tech companies during the re:publica internet conference in May. He added that IT companies in the EU have the opportunity to create tech that is based on the region’s values.

    Meanwhile, Bert Hubert, a technical advisor to the Dutch Electoral Council, wrote in February that ‘it is no longer safe to move our governments and societies to US clouds.’ He said that America is no longer a ‘reliable partner,’ making it risky to have the data of European governments and businesses at the mercy of US-based cloud providers.
    Earlier this month, the chief prosecutor of the International Criminal Court, Karim Khan, experienced a disconnection from his Microsoft-based email account, sparking uproar across the region. 
    Speculation quickly arose that the incident was linked to sanctions previously imposed on the ICC by the Trump administration, an assertion Microsoft has denied.
    Earlier this month, the chief prosecutor of the International Criminal Court, Karim Khan, disconnection from his Microsoft-based email account caused an uproar in the region. Some speculated that this was connected to sanctions imposed by Trump against the ICC, which Microsoft denied.
    Weaning the EU Away from US Tech is Possible, But Challenges Lie Ahead
    Change like this doesn’t happen overnight. Just finding, let alone developing, reliable alternatives to tools that have been part of daily workflows for decades, is a massive undertaking.
    It will also take time for users to adapt to these new tools, especially when transitioning to an entirely new ecosystem. In Aarhus, for example, municipal staff initially viewed the shift to open source as a step down from the familiarity and functionality of Microsoft products.
    Overall, these are only temporary hurdles. Momentum is building, with growing calls for digital independence from leaders like Ministers Olsen and Wildberger.
     Initiatives such as the Digital Europe Programme, which seeks to reduce reliance on foreign systems and solutions, further accelerate this push. As a result, the EU’s transition could arrive sooner rather than later

    As technology continues to evolve—from the return of 'dumbphones' to faster and sleeker computers—seasoned tech journalist, Cedric Solidon, continues to dedicate himself to writing stories that inform, empower, and connect with readers across all levels of digital literacy.
    With 20 years of professional writing experience, this University of the Philippines Journalism graduate has carved out a niche as a trusted voice in tech media. Whether he's breaking down the latest advancements in cybersecurity or explaining how silicon-carbon batteries can extend your phone’s battery life, his writing remains rooted in clarity, curiosity, and utility.
    Long before he was writing for Techreport, HP, Citrix, SAP, Globe Telecom, CyberGhost VPN, and ExpressVPN, Cedric's love for technology began at home courtesy of a Nintendo Family Computer and a stack of tech magazines.
    Growing up, his days were often filled with sessions of Contra, Bomberman, Red Alert 2, and the criminally underrated Crusader: No Regret. But gaming wasn't his only gateway to tech. 
    He devoured every T3, PCMag, and PC Gamer issue he could get his hands on, often reading them cover to cover. It wasn’t long before he explored the early web in IRC chatrooms, online forums, and fledgling tech blogs, soaking in every byte of knowledge from the late '90s and early 2000s internet boom.
    That fascination with tech didn’t just stick. It evolved into a full-blown calling.
    After graduating with a degree in Journalism, he began his writing career at the dawn of Web 2.0. What started with small editorial roles and freelance gigs soon grew into a full-fledged career.
    He has since collaborated with global tech leaders, lending his voice to content that bridges technical expertise with everyday usability. He’s also written annual reports for Globe Telecom and consumer-friendly guides for VPN companies like CyberGhost and ExpressVPN, empowering readers to understand the importance of digital privacy.
    His versatility spans not just tech journalism but also technical writing. He once worked with a local tech company developing web and mobile apps for logistics firms, crafting documentation and communication materials that brought together user-friendliness with deep technical understanding. That experience sharpened his ability to break down dense, often jargon-heavy material into content that speaks clearly to both developers and decision-makers.
    At the heart of his work lies a simple belief: technology should feel empowering, not intimidating. Even if the likes of smartphones and AI are now commonplace, he understands that there's still a knowledge gap, especially when it comes to hardware or the real-world benefits of new tools. His writing hopes to help close that gap.
    Cedric’s writing style reflects that mission. It’s friendly without being fluffy and informative without being overwhelming. Whether writing for seasoned IT professionals or casual readers curious about the latest gadgets, he focuses on how a piece of technology can improve our lives, boost our productivity, or make our work more efficient. That human-first approach makes his content feel more like a conversation than a technical manual.
    As his writing career progresses, his passion for tech journalism remains as strong as ever. With the growing need for accessible, responsible tech communication, he sees his role not just as a journalist but as a guide who helps readers navigate a digital world that’s often as confusing as it is exciting.
    From reviewing the latest devices to unpacking global tech trends, Cedric isn’t just reporting on the future; he’s helping to write it.

    View all articles by Cedric Solidon

    Our editorial process

    The Tech Report editorial policy is centered on providing helpful, accurate content that offers real value to our readers. We only work with experienced writers who have specific knowledge in the topics they cover, including latest developments in technology, online privacy, cryptocurrencies, software, and more. Our editorial policy ensures that each topic is researched and curated by our in-house editors. We maintain rigorous journalistic standards, and every article is 100% written by real authors.
    #word #out #danish #ministry #drops
    The Word is Out: Danish Ministry Drops Microsoft, Goes Open Source
    Key Takeaways Meta and Yandex have been found guilty of secretly listening to localhost ports and using them to transfer sensitive data from Android devices. The corporations use Meta Pixel and Yandex Metrica scripts to transfer cookies from browsers to local apps. Using incognito mode or a VPN can’t fully protect users against it. A Meta spokesperson has called this a ‘miscommunication,’ which seems to be an attempt to underplay the situation. Denmark’s Ministry of Digitalization has recently announced that it will leave the Microsoft ecosystem in favor of Linux and other open-source software. Minister Caroline Stage Olsen revealed this in an interview with Politiken, the country’s leading newspaper. According to Olsen, the Ministry plans to switch half of its employees to Linux and LibreOffice by summer, and the rest by fall. The announcement comes after Denmark’s largest cities – Copenhagen and Aarhus – made similar moves earlier this month. Why the Danish Ministry of Digitalization Switched to Open-Source Software The three main reasons Denmark is moving away from Microsoft are costs, politics, and security. In the case of Aarhus, the city was able to slash its annual costs from 800K kroner to just 225K by replacing Microsoft with a German service provider.  The same is a pain point for Copenhagen, which saw its costs on Microsoft balloon from 313M kroner in 2018 to 538M kroner in 2023. It’s also part of a broader move to increase its digital sovereignty. In her LinkedIn post, Olsen further explained that the strategy is not about isolation or digital nationalism, adding that they should not turn their backs completely on global tech companies like Microsoft.  Instead, it’s about avoiding being too dependent on these companies, which could prevent them from acting freely. Then there’s politics. Since his reelection earlier this year, US President Donald Trump has repeatedly threatened to take over Greenland, an autonomous territory of Denmark.  In May, the Danish Foreign Minister Lars Løkke Rasmussen summoned the US ambassador regarding news that US spy agencies have been told to focus on the territory. If the relationship between the two countries continues to erode, Trump can order Microsoft and other US tech companies to cut off Denmark from their services. After all, Microsoft and Facebook’s parent company Meta, have close ties to the US president after contributing M each for his inauguration in January. Denmark Isn’t Alone: Other EU Countries Are Making Similar Moves Denmark is only one of the growing number of European Unioncountries taking measures to become more digitally independent. Germany’s Federal Digital Minister Karsten Wildberger emphasized the need to be more independent of global tech companies during the re:publica internet conference in May. He added that IT companies in the EU have the opportunity to create tech that is based on the region’s values. Meanwhile, Bert Hubert, a technical advisor to the Dutch Electoral Council, wrote in February that ‘it is no longer safe to move our governments and societies to US clouds.’ He said that America is no longer a ‘reliable partner,’ making it risky to have the data of European governments and businesses at the mercy of US-based cloud providers. Earlier this month, the chief prosecutor of the International Criminal Court, Karim Khan, experienced a disconnection from his Microsoft-based email account, sparking uproar across the region.  Speculation quickly arose that the incident was linked to sanctions previously imposed on the ICC by the Trump administration, an assertion Microsoft has denied. Earlier this month, the chief prosecutor of the International Criminal Court, Karim Khan, disconnection from his Microsoft-based email account caused an uproar in the region. Some speculated that this was connected to sanctions imposed by Trump against the ICC, which Microsoft denied. Weaning the EU Away from US Tech is Possible, But Challenges Lie Ahead Change like this doesn’t happen overnight. Just finding, let alone developing, reliable alternatives to tools that have been part of daily workflows for decades, is a massive undertaking. It will also take time for users to adapt to these new tools, especially when transitioning to an entirely new ecosystem. In Aarhus, for example, municipal staff initially viewed the shift to open source as a step down from the familiarity and functionality of Microsoft products. Overall, these are only temporary hurdles. Momentum is building, with growing calls for digital independence from leaders like Ministers Olsen and Wildberger.  Initiatives such as the Digital Europe Programme, which seeks to reduce reliance on foreign systems and solutions, further accelerate this push. As a result, the EU’s transition could arrive sooner rather than later As technology continues to evolve—from the return of 'dumbphones' to faster and sleeker computers—seasoned tech journalist, Cedric Solidon, continues to dedicate himself to writing stories that inform, empower, and connect with readers across all levels of digital literacy. With 20 years of professional writing experience, this University of the Philippines Journalism graduate has carved out a niche as a trusted voice in tech media. Whether he's breaking down the latest advancements in cybersecurity or explaining how silicon-carbon batteries can extend your phone’s battery life, his writing remains rooted in clarity, curiosity, and utility. Long before he was writing for Techreport, HP, Citrix, SAP, Globe Telecom, CyberGhost VPN, and ExpressVPN, Cedric's love for technology began at home courtesy of a Nintendo Family Computer and a stack of tech magazines. Growing up, his days were often filled with sessions of Contra, Bomberman, Red Alert 2, and the criminally underrated Crusader: No Regret. But gaming wasn't his only gateway to tech.  He devoured every T3, PCMag, and PC Gamer issue he could get his hands on, often reading them cover to cover. It wasn’t long before he explored the early web in IRC chatrooms, online forums, and fledgling tech blogs, soaking in every byte of knowledge from the late '90s and early 2000s internet boom. That fascination with tech didn’t just stick. It evolved into a full-blown calling. After graduating with a degree in Journalism, he began his writing career at the dawn of Web 2.0. What started with small editorial roles and freelance gigs soon grew into a full-fledged career. He has since collaborated with global tech leaders, lending his voice to content that bridges technical expertise with everyday usability. He’s also written annual reports for Globe Telecom and consumer-friendly guides for VPN companies like CyberGhost and ExpressVPN, empowering readers to understand the importance of digital privacy. His versatility spans not just tech journalism but also technical writing. He once worked with a local tech company developing web and mobile apps for logistics firms, crafting documentation and communication materials that brought together user-friendliness with deep technical understanding. That experience sharpened his ability to break down dense, often jargon-heavy material into content that speaks clearly to both developers and decision-makers. At the heart of his work lies a simple belief: technology should feel empowering, not intimidating. Even if the likes of smartphones and AI are now commonplace, he understands that there's still a knowledge gap, especially when it comes to hardware or the real-world benefits of new tools. His writing hopes to help close that gap. Cedric’s writing style reflects that mission. It’s friendly without being fluffy and informative without being overwhelming. Whether writing for seasoned IT professionals or casual readers curious about the latest gadgets, he focuses on how a piece of technology can improve our lives, boost our productivity, or make our work more efficient. That human-first approach makes his content feel more like a conversation than a technical manual. As his writing career progresses, his passion for tech journalism remains as strong as ever. With the growing need for accessible, responsible tech communication, he sees his role not just as a journalist but as a guide who helps readers navigate a digital world that’s often as confusing as it is exciting. From reviewing the latest devices to unpacking global tech trends, Cedric isn’t just reporting on the future; he’s helping to write it. View all articles by Cedric Solidon Our editorial process The Tech Report editorial policy is centered on providing helpful, accurate content that offers real value to our readers. We only work with experienced writers who have specific knowledge in the topics they cover, including latest developments in technology, online privacy, cryptocurrencies, software, and more. Our editorial policy ensures that each topic is researched and curated by our in-house editors. We maintain rigorous journalistic standards, and every article is 100% written by real authors. #word #out #danish #ministry #drops
    TECHREPORT.COM
    The Word is Out: Danish Ministry Drops Microsoft, Goes Open Source
    Key Takeaways Meta and Yandex have been found guilty of secretly listening to localhost ports and using them to transfer sensitive data from Android devices. The corporations use Meta Pixel and Yandex Metrica scripts to transfer cookies from browsers to local apps. Using incognito mode or a VPN can’t fully protect users against it. A Meta spokesperson has called this a ‘miscommunication,’ which seems to be an attempt to underplay the situation. Denmark’s Ministry of Digitalization has recently announced that it will leave the Microsoft ecosystem in favor of Linux and other open-source software. Minister Caroline Stage Olsen revealed this in an interview with Politiken, the country’s leading newspaper. According to Olsen, the Ministry plans to switch half of its employees to Linux and LibreOffice by summer, and the rest by fall. The announcement comes after Denmark’s largest cities – Copenhagen and Aarhus – made similar moves earlier this month. Why the Danish Ministry of Digitalization Switched to Open-Source Software The three main reasons Denmark is moving away from Microsoft are costs, politics, and security. In the case of Aarhus, the city was able to slash its annual costs from 800K kroner to just 225K by replacing Microsoft with a German service provider.  The same is a pain point for Copenhagen, which saw its costs on Microsoft balloon from 313M kroner in 2018 to 538M kroner in 2023. It’s also part of a broader move to increase its digital sovereignty. In her LinkedIn post, Olsen further explained that the strategy is not about isolation or digital nationalism, adding that they should not turn their backs completely on global tech companies like Microsoft.  Instead, it’s about avoiding being too dependent on these companies, which could prevent them from acting freely. Then there’s politics. Since his reelection earlier this year, US President Donald Trump has repeatedly threatened to take over Greenland, an autonomous territory of Denmark.  In May, the Danish Foreign Minister Lars Løkke Rasmussen summoned the US ambassador regarding news that US spy agencies have been told to focus on the territory. If the relationship between the two countries continues to erode, Trump can order Microsoft and other US tech companies to cut off Denmark from their services. After all, Microsoft and Facebook’s parent company Meta, have close ties to the US president after contributing $1M each for his inauguration in January. Denmark Isn’t Alone: Other EU Countries Are Making Similar Moves Denmark is only one of the growing number of European Union (EU) countries taking measures to become more digitally independent. Germany’s Federal Digital Minister Karsten Wildberger emphasized the need to be more independent of global tech companies during the re:publica internet conference in May. He added that IT companies in the EU have the opportunity to create tech that is based on the region’s values. Meanwhile, Bert Hubert, a technical advisor to the Dutch Electoral Council, wrote in February that ‘it is no longer safe to move our governments and societies to US clouds.’ He said that America is no longer a ‘reliable partner,’ making it risky to have the data of European governments and businesses at the mercy of US-based cloud providers. Earlier this month, the chief prosecutor of the International Criminal Court (ICC), Karim Khan, experienced a disconnection from his Microsoft-based email account, sparking uproar across the region.  Speculation quickly arose that the incident was linked to sanctions previously imposed on the ICC by the Trump administration, an assertion Microsoft has denied. Earlier this month, the chief prosecutor of the International Criminal Court (ICC), Karim Khan, disconnection from his Microsoft-based email account caused an uproar in the region. Some speculated that this was connected to sanctions imposed by Trump against the ICC, which Microsoft denied. Weaning the EU Away from US Tech is Possible, But Challenges Lie Ahead Change like this doesn’t happen overnight. Just finding, let alone developing, reliable alternatives to tools that have been part of daily workflows for decades, is a massive undertaking. It will also take time for users to adapt to these new tools, especially when transitioning to an entirely new ecosystem. In Aarhus, for example, municipal staff initially viewed the shift to open source as a step down from the familiarity and functionality of Microsoft products. Overall, these are only temporary hurdles. Momentum is building, with growing calls for digital independence from leaders like Ministers Olsen and Wildberger.  Initiatives such as the Digital Europe Programme, which seeks to reduce reliance on foreign systems and solutions, further accelerate this push. As a result, the EU’s transition could arrive sooner rather than later As technology continues to evolve—from the return of 'dumbphones' to faster and sleeker computers—seasoned tech journalist, Cedric Solidon, continues to dedicate himself to writing stories that inform, empower, and connect with readers across all levels of digital literacy. With 20 years of professional writing experience, this University of the Philippines Journalism graduate has carved out a niche as a trusted voice in tech media. Whether he's breaking down the latest advancements in cybersecurity or explaining how silicon-carbon batteries can extend your phone’s battery life, his writing remains rooted in clarity, curiosity, and utility. Long before he was writing for Techreport, HP, Citrix, SAP, Globe Telecom, CyberGhost VPN, and ExpressVPN, Cedric's love for technology began at home courtesy of a Nintendo Family Computer and a stack of tech magazines. Growing up, his days were often filled with sessions of Contra, Bomberman, Red Alert 2, and the criminally underrated Crusader: No Regret. But gaming wasn't his only gateway to tech.  He devoured every T3, PCMag, and PC Gamer issue he could get his hands on, often reading them cover to cover. It wasn’t long before he explored the early web in IRC chatrooms, online forums, and fledgling tech blogs, soaking in every byte of knowledge from the late '90s and early 2000s internet boom. That fascination with tech didn’t just stick. It evolved into a full-blown calling. After graduating with a degree in Journalism, he began his writing career at the dawn of Web 2.0. What started with small editorial roles and freelance gigs soon grew into a full-fledged career. He has since collaborated with global tech leaders, lending his voice to content that bridges technical expertise with everyday usability. He’s also written annual reports for Globe Telecom and consumer-friendly guides for VPN companies like CyberGhost and ExpressVPN, empowering readers to understand the importance of digital privacy. His versatility spans not just tech journalism but also technical writing. He once worked with a local tech company developing web and mobile apps for logistics firms, crafting documentation and communication materials that brought together user-friendliness with deep technical understanding. That experience sharpened his ability to break down dense, often jargon-heavy material into content that speaks clearly to both developers and decision-makers. At the heart of his work lies a simple belief: technology should feel empowering, not intimidating. Even if the likes of smartphones and AI are now commonplace, he understands that there's still a knowledge gap, especially when it comes to hardware or the real-world benefits of new tools. His writing hopes to help close that gap. Cedric’s writing style reflects that mission. It’s friendly without being fluffy and informative without being overwhelming. Whether writing for seasoned IT professionals or casual readers curious about the latest gadgets, he focuses on how a piece of technology can improve our lives, boost our productivity, or make our work more efficient. That human-first approach makes his content feel more like a conversation than a technical manual. As his writing career progresses, his passion for tech journalism remains as strong as ever. With the growing need for accessible, responsible tech communication, he sees his role not just as a journalist but as a guide who helps readers navigate a digital world that’s often as confusing as it is exciting. From reviewing the latest devices to unpacking global tech trends, Cedric isn’t just reporting on the future; he’s helping to write it. View all articles by Cedric Solidon Our editorial process The Tech Report editorial policy is centered on providing helpful, accurate content that offers real value to our readers. We only work with experienced writers who have specific knowledge in the topics they cover, including latest developments in technology, online privacy, cryptocurrencies, software, and more. Our editorial policy ensures that each topic is researched and curated by our in-house editors. We maintain rigorous journalistic standards, and every article is 100% written by real authors.
    Like
    Love
    Wow
    Sad
    Angry
    526
    2 Комментарии 0 Поделились
  • Over 8M patient records leaked in healthcare data breach

    Published
    June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles!
    In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #over #patient #records #leaked #healthcare
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #over #patient #records #leaked #healthcare
    WWW.FOXNEWS.COM
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work   (Kurt "CyberGuy" Knutsson)Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data      (Kurt "CyberGuy" Knutsson)How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop   (Kurt "CyberGuy" Knutsson)5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication (2FA). It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    Like
    Love
    Wow
    Sad
    Angry
    507
    0 Комментарии 0 Поделились
Расширенные страницы
CGShares https://cgshares.com