• Facebook sees rise in violent content and harassment after policy changes

    Meta has published the first of its quarterly integrity reports since Mark Zuckerberg walked back the company's hate speech policies and changed its approach to content moderation earlier this year. According to the reports, Facebook saw an uptick in violent content, bullying and harassment despite an overall decrease in the amount of content taken down by Meta.
    The reports are the first time Meta has shared data about how Zuckerberg's decision to upend Meta's policies have played out on the platform used by billions of people. Notably, the company is spinning the changes as a victory, saying that it reduced its mistakes by half while the overall prevalence of content breaking its rules "largely remained unchanged for most problem areas."
    There are two notable exceptions, however. Violent and graphic content increased from 0.06%-0.07% at the end of 2024 to .09% in the first quarter of 2025. Meta attributed the uptick to "an increase in sharing of violating content" as well as its own attempts to "reduce enforcement mistakes." Meta also saw a noted increase in the prevalence of bullying and harassment on Facebook, which increased from 0.06-0.07% at the end of 2024 to 0.07-0.08% at the start of 2025. Meta says this was due to an unspecified "spike" in violations in March.Those may sound like relatively tiny percentages, but even small increases can be noticeable for a platform like Facebook that sees billions of posts every day.The report also underscores just how much less content Meta is taking down overall since it moved away from proactive enforcement of all but its most serious policies like child exploitation and terrorist content. Meta's report shows a significant decrease in the amount of Facebook posts removed for hateful content, for example, with just 3.4 million pieces of content "actioned" under the policy, the company's lowest figure since 2018. Spam removals also dropped precipitously from 730 million at the end of 2024 to just 366 million at the start of 2025. The number of fake accounts removed also declined notably on Facebook from 1.4 billion to 1 billionAt the same time, Meta claims it's making far fewer content moderation mistakes, which was one of Zuckerberg's main justifications for his decision to end proactive moderation."We saw a roughly 50% reduction in enforcement mistakes on our platforms in the United States from Q4 2024 to Q1 2025," the company wrote in an update to its January post announcing its policy changes. Meta didn't explain how it calculated that figure, but said future reports would "include metrics on our mistakes so that people can track our progress."
    Meta is acknowledging, however, that there is at least one group where some proactive moderation is still necessary: teens. "At the same time, we remain committed to ensuring teens on our platforms are having the safest experience possible," the company wrote. "That’s why, for teens, we’ll also continue to proactively hide other types of harmful content, like bullying." Meta has been rolling out "teen accounts" for the last several months, which should make it easier to filter content specifically for younger users.
    The company also offered an update on how it's using large language models to aid in its content moderation efforts. "Upon further testing, we are beginning to see LLMs operating beyond that of human performance for select policy areas," Meta writes. "We’re also using LLMs to remove content from review queues in certain circumstances when we’re highly confident it does not violate our policies."
    The other major component to Zuckerberg's policy changes was an end of Meta's fact-checking partnerships in the United States. The company began rolling out its own version of Community Notes to Facebook, Instagram and Threads earlier this year, and has since expanded the effort to Reels and Threads replies. Meta didn't offer any insight into how effective its new crowd-sourced approach to fact-checking might be or how often notes are appearing on its platform, though it promised updates in the coming months.This article originally appeared on Engadget at
    #facebook #sees #rise #violent #content
    Facebook sees rise in violent content and harassment after policy changes
    Meta has published the first of its quarterly integrity reports since Mark Zuckerberg walked back the company's hate speech policies and changed its approach to content moderation earlier this year. According to the reports, Facebook saw an uptick in violent content, bullying and harassment despite an overall decrease in the amount of content taken down by Meta. The reports are the first time Meta has shared data about how Zuckerberg's decision to upend Meta's policies have played out on the platform used by billions of people. Notably, the company is spinning the changes as a victory, saying that it reduced its mistakes by half while the overall prevalence of content breaking its rules "largely remained unchanged for most problem areas." There are two notable exceptions, however. Violent and graphic content increased from 0.06%-0.07% at the end of 2024 to .09% in the first quarter of 2025. Meta attributed the uptick to "an increase in sharing of violating content" as well as its own attempts to "reduce enforcement mistakes." Meta also saw a noted increase in the prevalence of bullying and harassment on Facebook, which increased from 0.06-0.07% at the end of 2024 to 0.07-0.08% at the start of 2025. Meta says this was due to an unspecified "spike" in violations in March.Those may sound like relatively tiny percentages, but even small increases can be noticeable for a platform like Facebook that sees billions of posts every day.The report also underscores just how much less content Meta is taking down overall since it moved away from proactive enforcement of all but its most serious policies like child exploitation and terrorist content. Meta's report shows a significant decrease in the amount of Facebook posts removed for hateful content, for example, with just 3.4 million pieces of content "actioned" under the policy, the company's lowest figure since 2018. Spam removals also dropped precipitously from 730 million at the end of 2024 to just 366 million at the start of 2025. The number of fake accounts removed also declined notably on Facebook from 1.4 billion to 1 billionAt the same time, Meta claims it's making far fewer content moderation mistakes, which was one of Zuckerberg's main justifications for his decision to end proactive moderation."We saw a roughly 50% reduction in enforcement mistakes on our platforms in the United States from Q4 2024 to Q1 2025," the company wrote in an update to its January post announcing its policy changes. Meta didn't explain how it calculated that figure, but said future reports would "include metrics on our mistakes so that people can track our progress." Meta is acknowledging, however, that there is at least one group where some proactive moderation is still necessary: teens. "At the same time, we remain committed to ensuring teens on our platforms are having the safest experience possible," the company wrote. "That’s why, for teens, we’ll also continue to proactively hide other types of harmful content, like bullying." Meta has been rolling out "teen accounts" for the last several months, which should make it easier to filter content specifically for younger users. The company also offered an update on how it's using large language models to aid in its content moderation efforts. "Upon further testing, we are beginning to see LLMs operating beyond that of human performance for select policy areas," Meta writes. "We’re also using LLMs to remove content from review queues in certain circumstances when we’re highly confident it does not violate our policies." The other major component to Zuckerberg's policy changes was an end of Meta's fact-checking partnerships in the United States. The company began rolling out its own version of Community Notes to Facebook, Instagram and Threads earlier this year, and has since expanded the effort to Reels and Threads replies. Meta didn't offer any insight into how effective its new crowd-sourced approach to fact-checking might be or how often notes are appearing on its platform, though it promised updates in the coming months.This article originally appeared on Engadget at #facebook #sees #rise #violent #content
    WWW.ENGADGET.COM
    Facebook sees rise in violent content and harassment after policy changes
    Meta has published the first of its quarterly integrity reports since Mark Zuckerberg walked back the company's hate speech policies and changed its approach to content moderation earlier this year. According to the reports, Facebook saw an uptick in violent content, bullying and harassment despite an overall decrease in the amount of content taken down by Meta. The reports are the first time Meta has shared data about how Zuckerberg's decision to upend Meta's policies have played out on the platform used by billions of people. Notably, the company is spinning the changes as a victory, saying that it reduced its mistakes by half while the overall prevalence of content breaking its rules "largely remained unchanged for most problem areas." There are two notable exceptions, however. Violent and graphic content increased from 0.06%-0.07% at the end of 2024 to .09% in the first quarter of 2025. Meta attributed the uptick to "an increase in sharing of violating content" as well as its own attempts to "reduce enforcement mistakes." Meta also saw a noted increase in the prevalence of bullying and harassment on Facebook, which increased from 0.06-0.07% at the end of 2024 to 0.07-0.08% at the start of 2025. Meta says this was due to an unspecified "spike" in violations in March. (Notably, this is a separate category from the company's hate speech policies, which were re-written to allow posts targeting immigrants and LGBTQ people.) Those may sound like relatively tiny percentages, but even small increases can be noticeable for a platform like Facebook that sees billions of posts every day. (Meta describes its prevalence metric as an estimate of how often rule-breaking content appears on its platform.) The report also underscores just how much less content Meta is taking down overall since it moved away from proactive enforcement of all but its most serious policies like child exploitation and terrorist content. Meta's report shows a significant decrease in the amount of Facebook posts removed for hateful content, for example, with just 3.4 million pieces of content "actioned" under the policy, the company's lowest figure since 2018. Spam removals also dropped precipitously from 730 million at the end of 2024 to just 366 million at the start of 2025. The number of fake accounts removed also declined notably on Facebook from 1.4 billion to 1 billion (Meta doesn't provide stats around fake account removals on Instagram.) At the same time, Meta claims it's making far fewer content moderation mistakes, which was one of Zuckerberg's main justifications for his decision to end proactive moderation."We saw a roughly 50% reduction in enforcement mistakes on our platforms in the United States from Q4 2024 to Q1 2025," the company wrote in an update to its January post announcing its policy changes. Meta didn't explain how it calculated that figure, but said future reports would "include metrics on our mistakes so that people can track our progress." Meta is acknowledging, however, that there is at least one group where some proactive moderation is still necessary: teens. "At the same time, we remain committed to ensuring teens on our platforms are having the safest experience possible," the company wrote. "That’s why, for teens, we’ll also continue to proactively hide other types of harmful content, like bullying." Meta has been rolling out "teen accounts" for the last several months, which should make it easier to filter content specifically for younger users. The company also offered an update on how it's using large language models to aid in its content moderation efforts. "Upon further testing, we are beginning to see LLMs operating beyond that of human performance for select policy areas," Meta writes. "We’re also using LLMs to remove content from review queues in certain circumstances when we’re highly confident it does not violate our policies." The other major component to Zuckerberg's policy changes was an end of Meta's fact-checking partnerships in the United States. The company began rolling out its own version of Community Notes to Facebook, Instagram and Threads earlier this year, and has since expanded the effort to Reels and Threads replies. Meta didn't offer any insight into how effective its new crowd-sourced approach to fact-checking might be or how often notes are appearing on its platform, though it promised updates in the coming months.This article originally appeared on Engadget at https://www.engadget.com/social-media/facebook-sees-rise-in-violent-content-and-harassment-after-policy-changes-182651544.html?src=rss
    0 Comentários 0 Compartilhamentos
  • Is Nightreign Solo Play Really Impossible?

    Elden Ring Nightreign is a tough-as-nails game that blends the beloved roguelike and soulslike genres into something fans of both should find appealing. However, unlike most games in either genre, this one’s inherently designed around working together in a group of three. So, you may be wondering if you can strike out on your own in Elden Ring Nightreign. While the game is about to get easier for folks who choose to go it alone, right now such a style proves an exceptionally difficult challenge.Suggested ReadingThe Most Sought After Elden Ring Sword Has A Storied History

    Share SubtitlesOffEnglishview videoSuggested ReadingThe Most Sought After Elden Ring Sword Has A Storied History

    Share SubtitlesOffEnglish Elden Ring Nightreign solo?Let’s get this out of the way first: Yes, Elden Ring Nightreign offers the option for solo play. To do so, you’ll need to open the expedition menu at Roundtable Hold, then switch over to the matchmaking settings tab. At the bottom of the menu, set the Expedition Type to “Singleplayer.”The real question is whether Elden Ring Nightreign’s single-player experience is manageable or fun, and that really depends on your skill level, class choice, and patience more so than in any other similar game I can remember playing. If you really want to go at it by yourself,Ironeye or Wylder.Elden Ring Nightreign is already pretty damn challenging when running with a group of three other folks. The game’s sense of randomness adds a lot of unknowns to an expedition, and things can go wrong very quickly. But with a team, you can be revived, have someone else available to take some aggro from you when things get hairy, and use your character’s abilities to complement one another in difficult showdowns. It’s often still hard as hell, but victory usually feels possible even when things don’t go quite as planned.However, when you’re alone…Well, you’re all alone. If you die on a solo expedition, that’s it. You’re done. Back to the Roundable Hold with you, loser.With this in mind, some folks may find the anxiety-inducing pacing and chaotic showdowns enjoyable even while solo; but those who struggle to succeed without a group may find it demoralizing to watch hours go by without making any meaningful progress. And since some classes are much better for solo play than others, it can be even more frustrating to go it alone for someone who prefers to play one of the support-focused classes.If you really want to go at it by yourself, I’d recommend taking a look at Ironeye or Wylder.Ironeye’s ranged playstyle is the safest in the game, giving you a lot of freedom to tackle enemies your own way. For instance, you can take the high ground against some foes to avoid their attacks altogether, or use his sliding ability to dodge an attack and get behind an enemy for better positioning.Wylder, meanwhile, is a jack-of-all-trades character with a solid health pool and balanced stats that make him great at adapting to whatever type of loot a run provides. Simply grab any melee weapon and you’ll probably be doing alright with this fella. Plus, he has some of the coolest skins in the game. That doesn’t help you in battle, but like…come on. He looks rad.In conclusion, while things can certainly go poorly even with a team, I’d argue playing by your lonesome leaves too little room for error for a game that requires such a hefty time investment and minimal payoff for failure. Elden Ring Nightreign is designed from the ground up to be played with others, after all. Your mileage may vary, though, so play however you have fun with it! You can pick up Nightreign now on PS5, Xbox Series X/S, and Windows PCs. You’ll have to look elsewhere to pick up two other friends to play with, though.
    #nightreign #solo #play #really #impossible
    Is Nightreign Solo Play Really Impossible?
    Elden Ring Nightreign is a tough-as-nails game that blends the beloved roguelike and soulslike genres into something fans of both should find appealing. However, unlike most games in either genre, this one’s inherently designed around working together in a group of three. So, you may be wondering if you can strike out on your own in Elden Ring Nightreign. While the game is about to get easier for folks who choose to go it alone, right now such a style proves an exceptionally difficult challenge.Suggested ReadingThe Most Sought After Elden Ring Sword Has A Storied History Share SubtitlesOffEnglishview videoSuggested ReadingThe Most Sought After Elden Ring Sword Has A Storied History Share SubtitlesOffEnglish Elden Ring Nightreign solo?Let’s get this out of the way first: Yes, Elden Ring Nightreign offers the option for solo play. To do so, you’ll need to open the expedition menu at Roundtable Hold, then switch over to the matchmaking settings tab. At the bottom of the menu, set the Expedition Type to “Singleplayer.”The real question is whether Elden Ring Nightreign’s single-player experience is manageable or fun, and that really depends on your skill level, class choice, and patience more so than in any other similar game I can remember playing. If you really want to go at it by yourself,Ironeye or Wylder.Elden Ring Nightreign is already pretty damn challenging when running with a group of three other folks. The game’s sense of randomness adds a lot of unknowns to an expedition, and things can go wrong very quickly. But with a team, you can be revived, have someone else available to take some aggro from you when things get hairy, and use your character’s abilities to complement one another in difficult showdowns. It’s often still hard as hell, but victory usually feels possible even when things don’t go quite as planned.However, when you’re alone…Well, you’re all alone. If you die on a solo expedition, that’s it. You’re done. Back to the Roundable Hold with you, loser.With this in mind, some folks may find the anxiety-inducing pacing and chaotic showdowns enjoyable even while solo; but those who struggle to succeed without a group may find it demoralizing to watch hours go by without making any meaningful progress. And since some classes are much better for solo play than others, it can be even more frustrating to go it alone for someone who prefers to play one of the support-focused classes.If you really want to go at it by yourself, I’d recommend taking a look at Ironeye or Wylder.Ironeye’s ranged playstyle is the safest in the game, giving you a lot of freedom to tackle enemies your own way. For instance, you can take the high ground against some foes to avoid their attacks altogether, or use his sliding ability to dodge an attack and get behind an enemy for better positioning.Wylder, meanwhile, is a jack-of-all-trades character with a solid health pool and balanced stats that make him great at adapting to whatever type of loot a run provides. Simply grab any melee weapon and you’ll probably be doing alright with this fella. Plus, he has some of the coolest skins in the game. That doesn’t help you in battle, but like…come on. He looks rad.In conclusion, while things can certainly go poorly even with a team, I’d argue playing by your lonesome leaves too little room for error for a game that requires such a hefty time investment and minimal payoff for failure. Elden Ring Nightreign is designed from the ground up to be played with others, after all. Your mileage may vary, though, so play however you have fun with it! You can pick up Nightreign now on PS5, Xbox Series X/S, and Windows PCs. You’ll have to look elsewhere to pick up two other friends to play with, though. #nightreign #solo #play #really #impossible
    KOTAKU.COM
    Is Nightreign Solo Play Really Impossible?
    Elden Ring Nightreign is a tough-as-nails game that blends the beloved roguelike and soulslike genres into something fans of both should find appealing. However, unlike most games in either genre, this one’s inherently designed around working together in a group of three. So, you may be wondering if you can strike out on your own in Elden Ring Nightreign. While the game is about to get easier for folks who choose to go it alone, right now such a style proves an exceptionally difficult challenge.Suggested ReadingThe Most Sought After Elden Ring Sword Has A Storied History Share SubtitlesOffEnglishview videoSuggested ReadingThe Most Sought After Elden Ring Sword Has A Storied History Share SubtitlesOffEnglish Elden Ring Nightreign solo?Let’s get this out of the way first: Yes, Elden Ring Nightreign offers the option for solo play. To do so, you’ll need to open the expedition menu at Roundtable Hold, then switch over to the matchmaking settings tab. At the bottom of the menu, set the Expedition Type to “Singleplayer.”The real question is whether Elden Ring Nightreign’s single-player experience is manageable or fun, and that really depends on your skill level, class choice, and patience more so than in any other similar game I can remember playing. If you really want to go at it by yourself, [play as] Ironeye or Wylder.Elden Ring Nightreign is already pretty damn challenging when running with a group of three other folks. The game’s sense of randomness adds a lot of unknowns to an expedition, and things can go wrong very quickly. But with a team, you can be revived, have someone else available to take some aggro from you when things get hairy, and use your character’s abilities to complement one another in difficult showdowns. It’s often still hard as hell, but victory usually feels possible even when things don’t go quite as planned.However, when you’re alone…Well, you’re all alone. If you die on a solo expedition, that’s it. You’re done. Back to the Roundable Hold with you, loser.With this in mind, some folks may find the anxiety-inducing pacing and chaotic showdowns enjoyable even while solo; but those who struggle to succeed without a group may find it demoralizing to watch hours go by without making any meaningful progress. And since some classes are much better for solo play than others, it can be even more frustrating to go it alone for someone who prefers to play one of the support-focused classes.If you really want to go at it by yourself, I’d recommend taking a look at Ironeye or Wylder.Ironeye’s ranged playstyle is the safest in the game, giving you a lot of freedom to tackle enemies your own way. For instance, you can take the high ground against some foes to avoid their attacks altogether, or use his sliding ability to dodge an attack and get behind an enemy for better positioning.Wylder, meanwhile, is a jack-of-all-trades character with a solid health pool and balanced stats that make him great at adapting to whatever type of loot a run provides. Simply grab any melee weapon and you’ll probably be doing alright with this fella. Plus, he has some of the coolest skins in the game. That doesn’t help you in battle, but like…come on. He looks rad.In conclusion, while things can certainly go poorly even with a team, I’d argue playing by your lonesome leaves too little room for error for a game that requires such a hefty time investment and minimal payoff for failure. Elden Ring Nightreign is designed from the ground up to be played with others, after all. Your mileage may vary, though, so play however you have fun with it! You can pick up Nightreign now on PS5, Xbox Series X/S, and Windows PCs. You’ll have to look elsewhere to pick up two other friends to play with, though.
    0 Comentários 0 Compartilhamentos
  • DexCare AI Platform Tackles Health Care Access, Cost Crisis

    Care management platform DexCare is applying artificial intelligencein an innovative way to fix health care access issues. Its AI-driven platform helps health systems overcome rising costs, limited capacity, and fragmented digital infrastructure.
    As Americans face worsening health outcomes and soaring costs, DexCare Co-founder Derek Streat sees opportunity in the crisis and is leading a push to apply AI and machine learningto health care’s toughest operational challenges — from overcrowded emergency rooms to disconnected digital systems.
    No stranger to using AI to solve health care issues, Streat is guiding DexCare as it leverages AI and ML to confront the industry’s most persistent pain points: spiraling costs, resource constraints, and the impossible task of doing more with less. Its platform helps liberate data silos to orchestrate care better and deliver a “shoppable” experience.
    The combination unlocks patient access to care and optimizes health care resources. DexCare enables health systems to see 40% more patients with existing clinical resources.
    Streat readily admits that some advanced companies use AI to enhance clinical and medical research. However, advanced AI tools such as conversational generative AI are less common in the health care access space. DexCare addresses that service gap.
    “Access is broken, and our fundamental belief is that there haven’t been enough solutions to balance patient, provider, and health system needs and objectives,” he told TechNewsWorld.
    Improving Patient Access With Predictive AI
    Achieving that balance depends on the underlying information drawn from health care providers’ neural networks, ML models, classification systems, and advancements in generative AI. These elements build on one another.
    Derek Streat, Co-founder of DexCare
    With the goal of a better customer experience, DexCare’s platform helps care providers optimize the algorithm so everyone benefits. The focus is on ensuring patients get what matches their intent and motivations while respecting the providers’ capacity and needs, explained Streat.
    He describes the platform’s technology as a foundational pyramid based on data that AI optimizes and manages. Those components ensure high-fidelity outcome predictions for recommended care options.
    “It could be a doctor in a clinic or a nurse in a virtual care system,” he suggested. “I’m not talking about clinical outcomes. I’m talking about what you’re looking for.”
    Ultimately, that managed balance will not burn out all your providers. It will make this a sustainable business line for the health system.
    From Providence Prototype to Scalable Solution
    Streat defined DexCare as an access optimization company. He shared that the platform originated from a ground-floor build within the Providence Health System.
    After four years of development and validation, he launched the technology for broader use across the health care industry.
    “It’s well tested and very effective in what it does. That allowed us to have something scalable across organizations as well. Our expansion makes health care more discoverable to consumers and patients and more sustainable for medical providers and the health systems we serve,” he said.
    Digital Marquee for Consumers, Service Management for Providers
    DexCare’s AI works on multiple levels. It provides health care system or medical facility services as a contact center. That part attracts and curates audiences, consumers, and patients. Its digital assets could be websites, landing pages, or screening kiosks.
    Another part of the platform intelligently navigates patients to the safest and best care option. This process engages the accumulated data and automatically allocates the health system’s resources.

    “It manages schedules and available staff and facilities and automatically allocates them when and where they can be most productively employed,” explained Streat.
    The platform excels at load balancing. It uses AI to rationalize all those components. The decision engine uses AI to ensure that the selected resources and needed services match so the medical treatment can be done most efficiently and effectively to accommodate the patient and the organization.
    How DexCare Integrates With CRM Platforms
    According to Streat, DexCare is not customer relationship management software. Instead, the platform is a tie-in that infuses its AI tools and data services that blend with other platforms such as Salesforce and Oracle.
    “We make it as flexible as we can. It is pretty scalable to the point where now we can touch about 20% of the U.S. population through our health system partners,” he offered.
    Patients do not realize they are interacting with the DexCare-powered experience console under the brands Kaiser, Providence, and SSM Health, some of the DexCare platform’s health systems users. The platform is flexible and adapts to the needs of various health agencies.
    For instance, fulfillment technologies book appointments and supply synchronous virtual solutions.
    “Whatever the modality or setting is, we can either connect with whatever you’re using as a health system, or you can use your own underlying pieces as well,” said Streat.
    He noted that the intelligent data acquisition built into the DexCare platform accesses the electronic medical record, which includes patients’ demographics, medical history, diagnoses, medications, allergies, immunization records, lab results, and treatment plans.
    “The application programming interfacegives us real-time availability, allows us to predict a certain provider’s capacity, and maintains EMR as a source of truth,” said Streat.
    AI’s Long-Term Role in Health Care Access
    Health care management by conversational generative AI provides insights into where organizations struggle, need to adjust their operations, or reassign staff to manage patient flow. That all takes place on the platform’s back end.
    According to Streat, the front-end value proposition is pretty simple. It helps get 20% to 30% more patients into the health system. Organizations generate nine times the initial visit value in downstream revenue for additional services, Streat said.
    He assured that the other part of the value proposition is a lower marginal cost of delivering each visit. That results from matching resources with patients in a way that allows balancing the load across the organization’s network.

    “That depends on the specific use case, but we find up to a 40% additional capacity within the health system without hiring additional resources,” he said.
    How? That is where the underlying AI data comes into play. It helps practitioners make more informed decisions about which patients should be matched with which providers.
    “Not everybody needs to see an expensive doctor in a clinic,” Streat contended. “Sometimes, a nurse in a virtual visit or educational information will be just fine.”
    Despite all the financial metrics, patients want medical treatment and to move on, which is really what the game is here, he surmised.
    Why Generative AI Lags in Health Care
    Streat lamented the rapidly developing sophistication of generative AI, which includes conversational interfaces, analytical capability, and predictive mastery. These technologies are being applied throughout other industries and businesses, but are not yet widely adopted in health care systems.
    He indicated that part of that lag is that health care access needs are different and not as suited for conversational AI solutions hastily layered onto legacy systems. Ultimately, changing health care requires delivering things at scale.
    “Within a health system, its infrastructure, and the plumbing required to respect the systems of records, it’s just a different world,” he said.
    Streat sees AI making it possible for us to move away from searching through a long list of doctors online to booking through a robot operator with a pleasant accent.
    “We will focus on the back-end intelligence and continue to apply it to these lower-friction ways for people to interact with the health system. That’s incredibly exciting to me,” he concluded.
    #dexcare #platform #tackles #health #care
    DexCare AI Platform Tackles Health Care Access, Cost Crisis
    Care management platform DexCare is applying artificial intelligencein an innovative way to fix health care access issues. Its AI-driven platform helps health systems overcome rising costs, limited capacity, and fragmented digital infrastructure. As Americans face worsening health outcomes and soaring costs, DexCare Co-founder Derek Streat sees opportunity in the crisis and is leading a push to apply AI and machine learningto health care’s toughest operational challenges — from overcrowded emergency rooms to disconnected digital systems. No stranger to using AI to solve health care issues, Streat is guiding DexCare as it leverages AI and ML to confront the industry’s most persistent pain points: spiraling costs, resource constraints, and the impossible task of doing more with less. Its platform helps liberate data silos to orchestrate care better and deliver a “shoppable” experience. The combination unlocks patient access to care and optimizes health care resources. DexCare enables health systems to see 40% more patients with existing clinical resources. Streat readily admits that some advanced companies use AI to enhance clinical and medical research. However, advanced AI tools such as conversational generative AI are less common in the health care access space. DexCare addresses that service gap. “Access is broken, and our fundamental belief is that there haven’t been enough solutions to balance patient, provider, and health system needs and objectives,” he told TechNewsWorld. Improving Patient Access With Predictive AI Achieving that balance depends on the underlying information drawn from health care providers’ neural networks, ML models, classification systems, and advancements in generative AI. These elements build on one another. Derek Streat, Co-founder of DexCare With the goal of a better customer experience, DexCare’s platform helps care providers optimize the algorithm so everyone benefits. The focus is on ensuring patients get what matches their intent and motivations while respecting the providers’ capacity and needs, explained Streat. He describes the platform’s technology as a foundational pyramid based on data that AI optimizes and manages. Those components ensure high-fidelity outcome predictions for recommended care options. “It could be a doctor in a clinic or a nurse in a virtual care system,” he suggested. “I’m not talking about clinical outcomes. I’m talking about what you’re looking for.” Ultimately, that managed balance will not burn out all your providers. It will make this a sustainable business line for the health system. From Providence Prototype to Scalable Solution Streat defined DexCare as an access optimization company. He shared that the platform originated from a ground-floor build within the Providence Health System. After four years of development and validation, he launched the technology for broader use across the health care industry. “It’s well tested and very effective in what it does. That allowed us to have something scalable across organizations as well. Our expansion makes health care more discoverable to consumers and patients and more sustainable for medical providers and the health systems we serve,” he said. Digital Marquee for Consumers, Service Management for Providers DexCare’s AI works on multiple levels. It provides health care system or medical facility services as a contact center. That part attracts and curates audiences, consumers, and patients. Its digital assets could be websites, landing pages, or screening kiosks. Another part of the platform intelligently navigates patients to the safest and best care option. This process engages the accumulated data and automatically allocates the health system’s resources. “It manages schedules and available staff and facilities and automatically allocates them when and where they can be most productively employed,” explained Streat. The platform excels at load balancing. It uses AI to rationalize all those components. The decision engine uses AI to ensure that the selected resources and needed services match so the medical treatment can be done most efficiently and effectively to accommodate the patient and the organization. How DexCare Integrates With CRM Platforms According to Streat, DexCare is not customer relationship management software. Instead, the platform is a tie-in that infuses its AI tools and data services that blend with other platforms such as Salesforce and Oracle. “We make it as flexible as we can. It is pretty scalable to the point where now we can touch about 20% of the U.S. population through our health system partners,” he offered. Patients do not realize they are interacting with the DexCare-powered experience console under the brands Kaiser, Providence, and SSM Health, some of the DexCare platform’s health systems users. The platform is flexible and adapts to the needs of various health agencies. For instance, fulfillment technologies book appointments and supply synchronous virtual solutions. “Whatever the modality or setting is, we can either connect with whatever you’re using as a health system, or you can use your own underlying pieces as well,” said Streat. He noted that the intelligent data acquisition built into the DexCare platform accesses the electronic medical record, which includes patients’ demographics, medical history, diagnoses, medications, allergies, immunization records, lab results, and treatment plans. “The application programming interfacegives us real-time availability, allows us to predict a certain provider’s capacity, and maintains EMR as a source of truth,” said Streat. AI’s Long-Term Role in Health Care Access Health care management by conversational generative AI provides insights into where organizations struggle, need to adjust their operations, or reassign staff to manage patient flow. That all takes place on the platform’s back end. According to Streat, the front-end value proposition is pretty simple. It helps get 20% to 30% more patients into the health system. Organizations generate nine times the initial visit value in downstream revenue for additional services, Streat said. He assured that the other part of the value proposition is a lower marginal cost of delivering each visit. That results from matching resources with patients in a way that allows balancing the load across the organization’s network. “That depends on the specific use case, but we find up to a 40% additional capacity within the health system without hiring additional resources,” he said. How? That is where the underlying AI data comes into play. It helps practitioners make more informed decisions about which patients should be matched with which providers. “Not everybody needs to see an expensive doctor in a clinic,” Streat contended. “Sometimes, a nurse in a virtual visit or educational information will be just fine.” Despite all the financial metrics, patients want medical treatment and to move on, which is really what the game is here, he surmised. Why Generative AI Lags in Health Care Streat lamented the rapidly developing sophistication of generative AI, which includes conversational interfaces, analytical capability, and predictive mastery. These technologies are being applied throughout other industries and businesses, but are not yet widely adopted in health care systems. He indicated that part of that lag is that health care access needs are different and not as suited for conversational AI solutions hastily layered onto legacy systems. Ultimately, changing health care requires delivering things at scale. “Within a health system, its infrastructure, and the plumbing required to respect the systems of records, it’s just a different world,” he said. Streat sees AI making it possible for us to move away from searching through a long list of doctors online to booking through a robot operator with a pleasant accent. “We will focus on the back-end intelligence and continue to apply it to these lower-friction ways for people to interact with the health system. That’s incredibly exciting to me,” he concluded. #dexcare #platform #tackles #health #care
    WWW.TECHNEWSWORLD.COM
    DexCare AI Platform Tackles Health Care Access, Cost Crisis
    Care management platform DexCare is applying artificial intelligence (AI) in an innovative way to fix health care access issues. Its AI-driven platform helps health systems overcome rising costs, limited capacity, and fragmented digital infrastructure. As Americans face worsening health outcomes and soaring costs, DexCare Co-founder Derek Streat sees opportunity in the crisis and is leading a push to apply AI and machine learning (ML) to health care’s toughest operational challenges — from overcrowded emergency rooms to disconnected digital systems. No stranger to using AI to solve health care issues, Streat is guiding DexCare as it leverages AI and ML to confront the industry’s most persistent pain points: spiraling costs, resource constraints, and the impossible task of doing more with less. Its platform helps liberate data silos to orchestrate care better and deliver a “shoppable” experience. The combination unlocks patient access to care and optimizes health care resources. DexCare enables health systems to see 40% more patients with existing clinical resources. Streat readily admits that some advanced companies use AI to enhance clinical and medical research. However, advanced AI tools such as conversational generative AI are less common in the health care access space. DexCare addresses that service gap. “Access is broken, and our fundamental belief is that there haven’t been enough solutions to balance patient, provider, and health system needs and objectives,” he told TechNewsWorld. Improving Patient Access With Predictive AI Achieving that balance depends on the underlying information drawn from health care providers’ neural networks, ML models, classification systems, and advancements in generative AI. These elements build on one another. Derek Streat, Co-founder of DexCare With the goal of a better customer experience (CX), DexCare’s platform helps care providers optimize the algorithm so everyone benefits. The focus is on ensuring patients get what matches their intent and motivations while respecting the providers’ capacity and needs, explained Streat. He describes the platform’s technology as a foundational pyramid based on data that AI optimizes and manages. Those components ensure high-fidelity outcome predictions for recommended care options. “It could be a doctor in a clinic or a nurse in a virtual care system,” he suggested. “I’m not talking about clinical outcomes. I’m talking about what you’re looking for.” Ultimately, that managed balance will not burn out all your providers. It will make this a sustainable business line for the health system. From Providence Prototype to Scalable Solution Streat defined DexCare as an access optimization company. He shared that the platform originated from a ground-floor build within the Providence Health System. After four years of development and validation, he launched the technology for broader use across the health care industry. “It’s well tested and very effective in what it does. That allowed us to have something scalable across organizations as well. Our expansion makes health care more discoverable to consumers and patients and more sustainable for medical providers and the health systems we serve,” he said. Digital Marquee for Consumers, Service Management for Providers DexCare’s AI works on multiple levels. It provides health care system or medical facility services as a contact center. That part attracts and curates audiences, consumers, and patients. Its digital assets could be websites, landing pages, or screening kiosks. Another part of the platform intelligently navigates patients to the safest and best care option. This process engages the accumulated data and automatically allocates the health system’s resources. “It manages schedules and available staff and facilities and automatically allocates them when and where they can be most productively employed,” explained Streat. The platform excels at load balancing. It uses AI to rationalize all those components. The decision engine uses AI to ensure that the selected resources and needed services match so the medical treatment can be done most efficiently and effectively to accommodate the patient and the organization. How DexCare Integrates With CRM Platforms According to Streat, DexCare is not customer relationship management software. Instead, the platform is a tie-in that infuses its AI tools and data services that blend with other platforms such as Salesforce and Oracle. “We make it as flexible as we can. It is pretty scalable to the point where now we can touch about 20% of the U.S. population through our health system partners,” he offered. Patients do not realize they are interacting with the DexCare-powered experience console under the brands Kaiser, Providence, and SSM Health, some of the DexCare platform’s health systems users. The platform is flexible and adapts to the needs of various health agencies. For instance, fulfillment technologies book appointments and supply synchronous virtual solutions. “Whatever the modality or setting is, we can either connect with whatever you’re using as a health system, or you can use your own underlying pieces as well,” said Streat. He noted that the intelligent data acquisition built into the DexCare platform accesses the electronic medical record (EMR), which includes patients’ demographics, medical history, diagnoses, medications, allergies, immunization records, lab results, and treatment plans. “The application programming interface [API] gives us real-time availability, allows us to predict a certain provider’s capacity, and maintains EMR as a source of truth,” said Streat. AI’s Long-Term Role in Health Care Access Health care management by conversational generative AI provides insights into where organizations struggle, need to adjust their operations, or reassign staff to manage patient flow. That all takes place on the platform’s back end. According to Streat, the front-end value proposition is pretty simple. It helps get 20% to 30% more patients into the health system. Organizations generate nine times the initial visit value in downstream revenue for additional services, Streat said. He assured that the other part of the value proposition is a lower marginal cost of delivering each visit. That results from matching resources with patients in a way that allows balancing the load across the organization’s network. “That depends on the specific use case, but we find up to a 40% additional capacity within the health system without hiring additional resources,” he said. How? That is where the underlying AI data comes into play. It helps practitioners make more informed decisions about which patients should be matched with which providers. “Not everybody needs to see an expensive doctor in a clinic,” Streat contended. “Sometimes, a nurse in a virtual visit or educational information will be just fine.” Despite all the financial metrics, patients want medical treatment and to move on, which is really what the game is here, he surmised. Why Generative AI Lags in Health Care Streat lamented the rapidly developing sophistication of generative AI, which includes conversational interfaces, analytical capability, and predictive mastery. These technologies are being applied throughout other industries and businesses, but are not yet widely adopted in health care systems. He indicated that part of that lag is that health care access needs are different and not as suited for conversational AI solutions hastily layered onto legacy systems. Ultimately, changing health care requires delivering things at scale. “Within a health system, its infrastructure, and the plumbing required to respect the systems of records, it’s just a different world,” he said. Streat sees AI making it possible for us to move away from searching through a long list of doctors online to booking through a robot operator with a pleasant accent. “We will focus on the back-end intelligence and continue to apply it to these lower-friction ways for people to interact with the health system. That’s incredibly exciting to me,” he concluded.
    0 Comentários 0 Compartilhamentos
  • Hackers are bypassing fingerprint scanners to steal your identity

    Published
    May 25, 2025 10:00am EDT close A skydiver lost his iPhone during a 14,000-foot fall, but, miraculously, it survived without a scratch A skydiver lost his iPhone during a 14,000-foot fall, but the phone miraculously survived without a scratch. Fingerprint sensors have been around for quite some time, and they’ve become a standard feature in most smartphones. Apple introduced Touch ID on the iPhone 5s in 2013. Since then, it has appeared on 12 major iPhone models. Though Apple removed it from most phones after the iPhone 8, it’s still found in the iPhone SE series. On the flip side, almost every Android phone on the market has a fingerprint scanner. But are fingerprint scanners impossible to bypass? Frank from Deerton, Michigan, asked a similar question that I want to highlight and address because it helps all of us:"Can a website be hacked/compromised with password and fingerprint protection?"I get what you’re saying, Frank. You’d think that since a fingerprint scanner literally requires your fingerprint, it couldn’t be bypassed. But you’d be wrong. While fingerprint scanners are generally more secure than facial recognition and passwords, they’re not foolproof. In fact, there are several ways bad actors can bypass them to steal your identity. A smartphone on a table  5 ways bad actors can bypass fingerprint scannersThere are multiple ways hackers use to bypass fingerprint scanners. Below, I will discuss five of the more prominent methods. 1. Masterprints and DeepMasterPrintsHackers exploit the concept of "masterprints," which are fingerprints engineered to match multiple individuals' prints. Researchers at NYU Tandon developed "DeepMasterPrints" using machine learning to generate synthetic fingerprints that can deceive sensors by mimicking common fingerprint features. These artificial prints can match with a significant percentage of stored fingerprints, especially on devices with less stringent security settings. 2. Forged fingerprints using 3D printingAnother trick hackers use is making fake fingerprints. They can lift prints off things you’ve touched and then use stuff like fabric glue or even 3D printers to make molds. For example, researchers at Cisco Talos tried out a bunch of different ways to do this using 3D printing and tested them on phones like the iPhone 8 and Samsung S10; laptops like the Samsung Note 9, Lenovo Yoga and HP Pavilion X360; and even smart gadgets like padlocks.On average, the fake fingerprints worked about 80% of the time. They were able to fool the sensors at least once. Interestingly, they couldn’t crack the biometric systems on Windows 10 devices, but they pointed out that doesn’t necessarily mean those are more secure. It just means this particular method didn’t work on them.19 BILLION PASSWORDS HAVE LEAKED ONLINE: HOW TO PROTECT YOURSELF3. Brute force attacks via BrutePrintAttackers have found a cheap way to break into smartphones by brute force fingerprint authentication. The method, called BrutePrint, lets attackers get around the usual limits that stop too many failed fingerprint attempts. It works by taking advantage of two previously unknown flaws in the fingerprint system. These flaws, named Cancel-After-Match-Failand Match-After-Lock, exist because of weak protection for fingerprint data on a part of the hardware called the Serial Peripheral Interface.Basically, BrutePrint uses a hardware-based man-in-the-middle attack to hijack fingerprint data. It sits between the fingerprint sensor and the phone’s secure areaand tries as many fingerprint images as needed until it finds a match. The relieving part is that the attacker needs to have physical access to the phone for this method to work.4. Side-channel attacks with PrintListenerPrintListener is a side-channel attack that captures the sound of a finger swiping on a screen to extract fingerprint features. It might sound like something out of a sci-fi movie, but researchers have already built a proof of concept. By analyzing the friction sounds, attackers can reconstruct fingerprint patterns, potentially enhancing the effectiveness of masterprint attacks.5. Exploiting unsecured fingerprint data storageSome devices store fingerprint data without adequate encryption. If attackers gain access to this unprotected data, they can replicate fingerprints to bypass authentication. For example, in 2024, a misconfigured server exposed nearly 500 GB of sensitive biometric data, including fingerprints, facial scans and personal details of law enforcement applicants. Image of a smartphone  So, can you trust fingerprint scanners?Fingerprint scanners make it easy and fairly secure to unlock your devices. Since everyone has unique fingerprints, you don’t need to remember complicated passwords. Just a quick touch and you are in. Most modern devices store your fingerprint data in secure parts of the system, and they use things like liveness detection to make sure someone is not trying to trick the scanner with a fake finger.Still, no security method is perfect. Skilled attackers have found ways to get past fingerprint scanners using high-resolution photos or 3D-printed fingers or by taking advantage of flaws in how the scanner communicates with the rest of the device. The risk really depends on how well the scanner is designed and how much effort someone puts into breaking it. For most people, fingerprint authentication is quick, easy and secure enough. However, if you are dealing with very sensitive information, relying only on biometrics might not be the best idea. A person using a fingerprint for security verification purposes   6 ways to protect your fingerprint dataSafeguard your biometric identity with these essential security measures.1. Choose trusted phone brands: If you're buying a phone, stick with well-known brands like Apple, Samsung or Google. These companies take extra steps to protect your fingerprint data by storing it in secure areas of the phone that are harder to access. Cheaper or lesser-known brands may not have these protections, which makes it easier for attackers to steal your data.2. Keep your phone updated: Phone updates are not just about new features. They fix security problems that hackers might use to break into your device. If your phone asks you to install an update, do it. Most phones also let you turn on automatic updates, so you don’t have to worry about remembering. Keeping your software updated is one of the easiest and most important ways to stay protected.3. Use strong antivirus software: Install strong antivirus software to detect malware that could compromise biometric data storage. Strong antivirus software offers real-time threat detection, anti-phishing and privacy features to block unauthorized access to fingerprint data. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.WHAT IS ARTIFICIAL INTELLIGENCE?4. Don’t rely only on your fingerprint: Using a fingerprint to unlock your phone is convenient, but it shouldn’t be your only line of defense, especially for sensitive apps like banking or email. Always set up a PIN, password or pattern as a backup on your iPhone and Android. This way, even if someone manages to copy your fingerprint, they still need another piece of information to get in.5. Be careful about who handles your phone: If someone else uses your phone, especially a stranger or someone you don’t know well, they might be able to copy your fingerprint from the screen. It’s rare, but it happens. To reduce this risk, avoid handing your phone to people unnecessarily and wipe your screen occasionally to remove any clear fingerprints.6. Only use fingerprint login with trusted apps: Not every app that asks for your fingerprint is trustworthy. It’s safest to use fingerprint login only with apps from known and reliable companies, like your bank, phone manufacturer or email provider. If an unfamiliar app asks for fingerprint access, it’s better to skip it and use your password instead.7. Consider using a personal data removal service: Even fingerprint scanners can be bypassed, and large amounts of personal and biometric data have been exposed in breaches. Using a personal data removal service helps reduce your risk by removing your sensitive information from public databases and data broker sites, making it harder for hackers to piece together details that could be used to steal your identity. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web.Kurt’s key takeawayPasswords are generally easier to hack than biometric data like fingerprints or facial recognition. However, the key difference is that passwords can be changed if they’re compromised. Your biometrics cannot. Most modern devices allow both options, and biometrics can offer an extra layer of security by making it harder for someone else to access your phone or apps. They're also fast and convenient, since you don’t need to remember or type anything. That said, in most cases, your device still falls back on a password or PIN when biometric identification doesn’t work, so both systems often go hand in hand.CLICK HERE TO GET THE FOX NEWS APPWith the increasing sophistication of methods to bypass fingerprint security, what should companies be doing to stay ahead of these threats and better protect user data? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #hackers #are #bypassing #fingerprint #scanners
    Hackers are bypassing fingerprint scanners to steal your identity
    Published May 25, 2025 10:00am EDT close A skydiver lost his iPhone during a 14,000-foot fall, but, miraculously, it survived without a scratch A skydiver lost his iPhone during a 14,000-foot fall, but the phone miraculously survived without a scratch. Fingerprint sensors have been around for quite some time, and they’ve become a standard feature in most smartphones. Apple introduced Touch ID on the iPhone 5s in 2013. Since then, it has appeared on 12 major iPhone models. Though Apple removed it from most phones after the iPhone 8, it’s still found in the iPhone SE series. On the flip side, almost every Android phone on the market has a fingerprint scanner. But are fingerprint scanners impossible to bypass? Frank from Deerton, Michigan, asked a similar question that I want to highlight and address because it helps all of us:"Can a website be hacked/compromised with password and fingerprint protection?"I get what you’re saying, Frank. You’d think that since a fingerprint scanner literally requires your fingerprint, it couldn’t be bypassed. But you’d be wrong. While fingerprint scanners are generally more secure than facial recognition and passwords, they’re not foolproof. In fact, there are several ways bad actors can bypass them to steal your identity. A smartphone on a table  5 ways bad actors can bypass fingerprint scannersThere are multiple ways hackers use to bypass fingerprint scanners. Below, I will discuss five of the more prominent methods. 1. Masterprints and DeepMasterPrintsHackers exploit the concept of "masterprints," which are fingerprints engineered to match multiple individuals' prints. Researchers at NYU Tandon developed "DeepMasterPrints" using machine learning to generate synthetic fingerprints that can deceive sensors by mimicking common fingerprint features. These artificial prints can match with a significant percentage of stored fingerprints, especially on devices with less stringent security settings. 2. Forged fingerprints using 3D printingAnother trick hackers use is making fake fingerprints. They can lift prints off things you’ve touched and then use stuff like fabric glue or even 3D printers to make molds. For example, researchers at Cisco Talos tried out a bunch of different ways to do this using 3D printing and tested them on phones like the iPhone 8 and Samsung S10; laptops like the Samsung Note 9, Lenovo Yoga and HP Pavilion X360; and even smart gadgets like padlocks.On average, the fake fingerprints worked about 80% of the time. They were able to fool the sensors at least once. Interestingly, they couldn’t crack the biometric systems on Windows 10 devices, but they pointed out that doesn’t necessarily mean those are more secure. It just means this particular method didn’t work on them.19 BILLION PASSWORDS HAVE LEAKED ONLINE: HOW TO PROTECT YOURSELF3. Brute force attacks via BrutePrintAttackers have found a cheap way to break into smartphones by brute force fingerprint authentication. The method, called BrutePrint, lets attackers get around the usual limits that stop too many failed fingerprint attempts. It works by taking advantage of two previously unknown flaws in the fingerprint system. These flaws, named Cancel-After-Match-Failand Match-After-Lock, exist because of weak protection for fingerprint data on a part of the hardware called the Serial Peripheral Interface.Basically, BrutePrint uses a hardware-based man-in-the-middle attack to hijack fingerprint data. It sits between the fingerprint sensor and the phone’s secure areaand tries as many fingerprint images as needed until it finds a match. The relieving part is that the attacker needs to have physical access to the phone for this method to work.4. Side-channel attacks with PrintListenerPrintListener is a side-channel attack that captures the sound of a finger swiping on a screen to extract fingerprint features. It might sound like something out of a sci-fi movie, but researchers have already built a proof of concept. By analyzing the friction sounds, attackers can reconstruct fingerprint patterns, potentially enhancing the effectiveness of masterprint attacks.5. Exploiting unsecured fingerprint data storageSome devices store fingerprint data without adequate encryption. If attackers gain access to this unprotected data, they can replicate fingerprints to bypass authentication. For example, in 2024, a misconfigured server exposed nearly 500 GB of sensitive biometric data, including fingerprints, facial scans and personal details of law enforcement applicants. Image of a smartphone  So, can you trust fingerprint scanners?Fingerprint scanners make it easy and fairly secure to unlock your devices. Since everyone has unique fingerprints, you don’t need to remember complicated passwords. Just a quick touch and you are in. Most modern devices store your fingerprint data in secure parts of the system, and they use things like liveness detection to make sure someone is not trying to trick the scanner with a fake finger.Still, no security method is perfect. Skilled attackers have found ways to get past fingerprint scanners using high-resolution photos or 3D-printed fingers or by taking advantage of flaws in how the scanner communicates with the rest of the device. The risk really depends on how well the scanner is designed and how much effort someone puts into breaking it. For most people, fingerprint authentication is quick, easy and secure enough. However, if you are dealing with very sensitive information, relying only on biometrics might not be the best idea. A person using a fingerprint for security verification purposes   6 ways to protect your fingerprint dataSafeguard your biometric identity with these essential security measures.1. Choose trusted phone brands: If you're buying a phone, stick with well-known brands like Apple, Samsung or Google. These companies take extra steps to protect your fingerprint data by storing it in secure areas of the phone that are harder to access. Cheaper or lesser-known brands may not have these protections, which makes it easier for attackers to steal your data.2. Keep your phone updated: Phone updates are not just about new features. They fix security problems that hackers might use to break into your device. If your phone asks you to install an update, do it. Most phones also let you turn on automatic updates, so you don’t have to worry about remembering. Keeping your software updated is one of the easiest and most important ways to stay protected.3. Use strong antivirus software: Install strong antivirus software to detect malware that could compromise biometric data storage. Strong antivirus software offers real-time threat detection, anti-phishing and privacy features to block unauthorized access to fingerprint data. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.WHAT IS ARTIFICIAL INTELLIGENCE?4. Don’t rely only on your fingerprint: Using a fingerprint to unlock your phone is convenient, but it shouldn’t be your only line of defense, especially for sensitive apps like banking or email. Always set up a PIN, password or pattern as a backup on your iPhone and Android. This way, even if someone manages to copy your fingerprint, they still need another piece of information to get in.5. Be careful about who handles your phone: If someone else uses your phone, especially a stranger or someone you don’t know well, they might be able to copy your fingerprint from the screen. It’s rare, but it happens. To reduce this risk, avoid handing your phone to people unnecessarily and wipe your screen occasionally to remove any clear fingerprints.6. Only use fingerprint login with trusted apps: Not every app that asks for your fingerprint is trustworthy. It’s safest to use fingerprint login only with apps from known and reliable companies, like your bank, phone manufacturer or email provider. If an unfamiliar app asks for fingerprint access, it’s better to skip it and use your password instead.7. Consider using a personal data removal service: Even fingerprint scanners can be bypassed, and large amounts of personal and biometric data have been exposed in breaches. Using a personal data removal service helps reduce your risk by removing your sensitive information from public databases and data broker sites, making it harder for hackers to piece together details that could be used to steal your identity. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web.Kurt’s key takeawayPasswords are generally easier to hack than biometric data like fingerprints or facial recognition. However, the key difference is that passwords can be changed if they’re compromised. Your biometrics cannot. Most modern devices allow both options, and biometrics can offer an extra layer of security by making it harder for someone else to access your phone or apps. They're also fast and convenient, since you don’t need to remember or type anything. That said, in most cases, your device still falls back on a password or PIN when biometric identification doesn’t work, so both systems often go hand in hand.CLICK HERE TO GET THE FOX NEWS APPWith the increasing sophistication of methods to bypass fingerprint security, what should companies be doing to stay ahead of these threats and better protect user data? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #hackers #are #bypassing #fingerprint #scanners
    WWW.FOXNEWS.COM
    Hackers are bypassing fingerprint scanners to steal your identity
    Published May 25, 2025 10:00am EDT close A skydiver lost his iPhone during a 14,000-foot fall, but, miraculously, it survived without a scratch A skydiver lost his iPhone during a 14,000-foot fall, but the phone miraculously survived without a scratch. Fingerprint sensors have been around for quite some time, and they’ve become a standard feature in most smartphones. Apple introduced Touch ID on the iPhone 5s in 2013. Since then, it has appeared on 12 major iPhone models (and some iPads as well). Though Apple removed it from most phones after the iPhone 8, it’s still found in the iPhone SE series. On the flip side, almost every Android phone on the market has a fingerprint scanner. But are fingerprint scanners impossible to bypass? Frank from Deerton, Michigan, asked a similar question that I want to highlight and address because it helps all of us:"Can a website be hacked/compromised with password and fingerprint protection (multiple verification)?"I get what you’re saying, Frank. You’d think that since a fingerprint scanner literally requires your fingerprint, it couldn’t be bypassed. But you’d be wrong. While fingerprint scanners are generally more secure than facial recognition and passwords, they’re not foolproof. In fact, there are several ways bad actors can bypass them to steal your identity. A smartphone on a table   (Kurt "CyberGuy" Knutsson)5 ways bad actors can bypass fingerprint scannersThere are multiple ways hackers use to bypass fingerprint scanners. Below, I will discuss five of the more prominent methods. 1. Masterprints and DeepMasterPrintsHackers exploit the concept of "masterprints," which are fingerprints engineered to match multiple individuals' prints. Researchers at NYU Tandon developed "DeepMasterPrints" using machine learning to generate synthetic fingerprints that can deceive sensors by mimicking common fingerprint features. These artificial prints can match with a significant percentage of stored fingerprints, especially on devices with less stringent security settings. 2. Forged fingerprints using 3D printingAnother trick hackers use is making fake fingerprints. They can lift prints off things you’ve touched and then use stuff like fabric glue or even 3D printers to make molds. For example, researchers at Cisco Talos tried out a bunch of different ways to do this using 3D printing and tested them on phones like the iPhone 8 and Samsung S10; laptops like the Samsung Note 9, Lenovo Yoga and HP Pavilion X360; and even smart gadgets like padlocks.On average, the fake fingerprints worked about 80% of the time. They were able to fool the sensors at least once. Interestingly, they couldn’t crack the biometric systems on Windows 10 devices, but they pointed out that doesn’t necessarily mean those are more secure. It just means this particular method didn’t work on them.19 BILLION PASSWORDS HAVE LEAKED ONLINE: HOW TO PROTECT YOURSELF3. Brute force attacks via BrutePrintAttackers have found a cheap way to break into smartphones by brute force fingerprint authentication. The method, called BrutePrint, lets attackers get around the usual limits that stop too many failed fingerprint attempts. It works by taking advantage of two previously unknown flaws in the fingerprint system. These flaws, named Cancel-After-Match-Fail (CAMF) and Match-After-Lock (MAL), exist because of weak protection for fingerprint data on a part of the hardware called the Serial Peripheral Interface (SPI).Basically, BrutePrint uses a hardware-based man-in-the-middle attack to hijack fingerprint data. It sits between the fingerprint sensor and the phone’s secure area (called the Trusted Execution Environment) and tries as many fingerprint images as needed until it finds a match. The relieving part is that the attacker needs to have physical access to the phone for this method to work.4. Side-channel attacks with PrintListenerPrintListener is a side-channel attack that captures the sound of a finger swiping on a screen to extract fingerprint features. It might sound like something out of a sci-fi movie, but researchers have already built a proof of concept. By analyzing the friction sounds, attackers can reconstruct fingerprint patterns, potentially enhancing the effectiveness of masterprint attacks.5. Exploiting unsecured fingerprint data storageSome devices store fingerprint data without adequate encryption. If attackers gain access to this unprotected data, they can replicate fingerprints to bypass authentication. For example, in 2024, a misconfigured server exposed nearly 500 GB of sensitive biometric data, including fingerprints, facial scans and personal details of law enforcement applicants. Image of a smartphone   (Kurt "CyberGuy" Knutsson)So, can you trust fingerprint scanners?Fingerprint scanners make it easy and fairly secure to unlock your devices. Since everyone has unique fingerprints, you don’t need to remember complicated passwords. Just a quick touch and you are in. Most modern devices store your fingerprint data in secure parts of the system, and they use things like liveness detection to make sure someone is not trying to trick the scanner with a fake finger.Still, no security method is perfect. Skilled attackers have found ways to get past fingerprint scanners using high-resolution photos or 3D-printed fingers or by taking advantage of flaws in how the scanner communicates with the rest of the device. The risk really depends on how well the scanner is designed and how much effort someone puts into breaking it. For most people, fingerprint authentication is quick, easy and secure enough. However, if you are dealing with very sensitive information, relying only on biometrics might not be the best idea. A person using a fingerprint for security verification purposes    (Kurt "CyberGuy" Knutsson)6 ways to protect your fingerprint dataSafeguard your biometric identity with these essential security measures.1. Choose trusted phone brands: If you're buying a phone, stick with well-known brands like Apple, Samsung or Google. These companies take extra steps to protect your fingerprint data by storing it in secure areas of the phone that are harder to access. Cheaper or lesser-known brands may not have these protections, which makes it easier for attackers to steal your data.2. Keep your phone updated: Phone updates are not just about new features. They fix security problems that hackers might use to break into your device. If your phone asks you to install an update, do it. Most phones also let you turn on automatic updates, so you don’t have to worry about remembering. Keeping your software updated is one of the easiest and most important ways to stay protected.3. Use strong antivirus software: Install strong antivirus software to detect malware that could compromise biometric data storage. Strong antivirus software offers real-time threat detection, anti-phishing and privacy features to block unauthorized access to fingerprint data. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?4. Don’t rely only on your fingerprint: Using a fingerprint to unlock your phone is convenient, but it shouldn’t be your only line of defense, especially for sensitive apps like banking or email. Always set up a PIN, password or pattern as a backup on your iPhone and Android. This way, even if someone manages to copy your fingerprint, they still need another piece of information to get in.5. Be careful about who handles your phone: If someone else uses your phone, especially a stranger or someone you don’t know well, they might be able to copy your fingerprint from the screen. It’s rare, but it happens. To reduce this risk, avoid handing your phone to people unnecessarily and wipe your screen occasionally to remove any clear fingerprints.6. Only use fingerprint login with trusted apps: Not every app that asks for your fingerprint is trustworthy. It’s safest to use fingerprint login only with apps from known and reliable companies, like your bank, phone manufacturer or email provider. If an unfamiliar app asks for fingerprint access, it’s better to skip it and use your password instead.7. Consider using a personal data removal service: Even fingerprint scanners can be bypassed, and large amounts of personal and biometric data have been exposed in breaches. Using a personal data removal service helps reduce your risk by removing your sensitive information from public databases and data broker sites, making it harder for hackers to piece together details that could be used to steal your identity. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web.Kurt’s key takeawayPasswords are generally easier to hack than biometric data like fingerprints or facial recognition. However, the key difference is that passwords can be changed if they’re compromised. Your biometrics cannot. Most modern devices allow both options, and biometrics can offer an extra layer of security by making it harder for someone else to access your phone or apps. They're also fast and convenient, since you don’t need to remember or type anything. That said, in most cases, your device still falls back on a password or PIN when biometric identification doesn’t work, so both systems often go hand in hand.CLICK HERE TO GET THE FOX NEWS APPWith the increasing sophistication of methods to bypass fingerprint security, what should companies be doing to stay ahead of these threats and better protect user data? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos
  • TechCrunch Mobility: Uber Freight’s AI bet, Tesla’s robotaxi caveat, and Nikola’s trucks hit the auction block

    Welcome back to TechCrunch Mobility — your central hub for news and insights on the future of transportation. Sign up here for free — just click TechCrunch Mobility!
    For those U.S.-based readers out there, enjoy the long Memorial Day weekend, and if you’re on the road, expect it to be crowded. AAA projects 45.1 million people will travel at least 50 miles from home over the Memorial Day holiday period, from Thursday to Monday. About 39.4 million of those folks will use a car.
    Let’s get to it! This edition has news on loads of companies, including Aurora, Uber, Tesla, and Waymo. Plus, a number of startups you may be interested in.
    A little bird
    Image Credits:Bryce Durbin
    Got a tip for us? Email Kirsten Korosec at kirsten.korosec@techcrunch.com or my Signal at kkorosec.07, Sean O’Kane at sean.okane@techcrunch.com, or Rebecca Bellan at rebecca.bellan@techcrunch.com. Or check out these instructions to learn how to contact us via encrypted messaging apps or SecureDrop.
    Deals!
    Image Credits:Bryce Durbin
    Luminar, the lidar startup turned SPAC, appears to be grasping for capital. Why else would the company make a deal with Yorkville Advisors Global that could bring another million into its coffers through the sale of convertible preferred stock over an 18-month period?
    Under the terms, Luminar will issue million in convertible preferred stock to the investors. Luminar may issue additional tranches in amounts of up to million no more than every 60 days at a purchase price equal to 96% of the stated value of the convertible preferred stock. You might recall Luminar’s board recently replaced founder Austin Russell as its CEO. The company is also going through another restructuring — its third in a year.
    Other deals that got my attention …

    Techcrunch event

    Join us at TechCrunch Sessions: AI
    Secure your spot for our leading AI industry event with speakers from OpenAI, Anthropic, and Cohere. For a limited time, tickets are just for an entire day of expert talks, workshops, and potent networking.

    Exhibit at TechCrunch Sessions: AI
    Secure your spot at TC Sessions: AI and show 1,200+ decision-makers what you’ve built — without the big spend. Available through May 9 or while tables last.

    Berkeley, CA
    |
    June 5

    REGISTER NOW

    SparkCharge, which offers what it calls “charging-as-a-service” for fleets, raised million in a Series A-1 round led by Monte’s Fam, with participation from Cleveland Avenue, Collab Capital, Elemental Impact, MarcyPen, and non sibi ventures. Alongside the equity round, SparkCharge also secured a million venture loan from Horizon Technology Finance Corp.
    Sylndr, a Cairo-based online used car sales startup that is expanding into auto financing, servicing, and tools for dealers, raised million. The round was led by Development Partners International’s Nclude Fund. The startup also raised nearly million in debt financing from local banks in the past year.
    Is an auction a deal? Perhaps for someone. Nikola’s hydrogen trucks, which have a value of about million, are up for auction — one of the company’s last steps in unloading all of its assets after filing for bankruptcy in February.
    Notable reads and other tidbits
    Image Credits:Bryce Durbin
    Autonomous vehicles
    Aurora has put human “observers” in its self-driving trucks at the request of its partner PACCAR, a disclosure that has some scratching their heads about the move. To be clear, these “observers” are not human safety operators, meaning they can’t intervene. An Aurora spokesperson confirmed and noted they have a different role than the human safety operators in the company’s supervised hauls. 
    This news prompted folks to send me a slew of messages with questions like “Why?” and “What’s the point?” 
    Einride founder Robert Falck is stepping down from the role of CEO. Einride’s CFO, Roozbeh Charli, will take over the role of chief executive effective immediately.
    Reliable Robotics, the autonomous aviation company, appointed Marc Stoll as its new CFO. Stoll is the former VP of Finance at Apple and partner at Eclipse Ventures.
    Zoox has completed the “initial mapping phase” and will begin testing its self-driving vehicles in Atlanta later this summer.
    The California Public Utilities Commission approved Waymo’s request to expand its commercial robotaxi service area into more communities south of San Francisco. Meanwhile, Waymo and Uber plan to start offering robotaxi rides in Atlanta to select customers who signed onto a waitlist earlier this year.
    Tesla plans to limit where its robotaxis operate in Austin, Texas, to specific areas the company deems “the safest,” according to Elon Musk. Using a geofence represents a major strategy shift for Musk, who spent years claiming his company would be able to create a general-purpose self-driving solution that could be dropped into any location and work without human supervision. 
    Electric vehicles, charging, & batteries
    Arc unveiled a new electric boat called the Arc Coast, a watercraft with a center console design.
    Senate Republicans have voted to overturn a waiver that allowed California to set stricter air pollution standards for vehicles. The state has received waivers more than 100 times since federal laws granted the right some 50 years ago.
    Gig economy
    Uber plans to launch a B2B logistics service in India through a partnership with a government-backed nonprofit that aims to break the domination of Flipkart, the e-commerce giant backed by Amazon and Walmart.
    AI
    Uber Freight recently launched a suite of AI features to shippers around the world as part of its existing supply chain software. That includes an expansion of Insights AI, which Uber Freight quietly launched in 2023, as well as more than 30 AI agents built to “execute key logistics tasks throughout the freight lifecycle.” Senior reporter Sean O’Kane interviewed CEO Lior Ron about the company’s dive into AI — including the how, why, and what’s next.
    This week’s wheels
    Image Credits:Rebecca Bellan
    Yup, “This week’s wheels” is back with Rebecca Bellan, who writes about her time on the new Heybike Alpha, a sturdy, fat-tire, all-terrain e-bike with a price tag. 
    The entire review can be read here. 
    For those who want the highlights: The Alpha ticked a lot of boxes for Bellan — notably the mid-drive motor with torque sensor and long-lasting battery. There were some frustrations, though, too. Putting the bike together, the app, and outsized horn were disappointments. But generally, Rebecca felt the Alpha was an excellent all-around e-bike, whether you want to take it on off-road adventures or use it in the city to do your weekly Trader Joe’s shopping.
    #techcrunch #mobility #uber #freights #bet
    TechCrunch Mobility: Uber Freight’s AI bet, Tesla’s robotaxi caveat, and Nikola’s trucks hit the auction block
    Welcome back to TechCrunch Mobility — your central hub for news and insights on the future of transportation. Sign up here for free — just click TechCrunch Mobility! For those U.S.-based readers out there, enjoy the long Memorial Day weekend, and if you’re on the road, expect it to be crowded. AAA projects 45.1 million people will travel at least 50 miles from home over the Memorial Day holiday period, from Thursday to Monday. About 39.4 million of those folks will use a car. Let’s get to it! This edition has news on loads of companies, including Aurora, Uber, Tesla, and Waymo. Plus, a number of startups you may be interested in. A little bird Image Credits:Bryce Durbin Got a tip for us? Email Kirsten Korosec at kirsten.korosec@techcrunch.com or my Signal at kkorosec.07, Sean O’Kane at sean.okane@techcrunch.com, or Rebecca Bellan at rebecca.bellan@techcrunch.com. Or check out these instructions to learn how to contact us via encrypted messaging apps or SecureDrop. Deals! Image Credits:Bryce Durbin Luminar, the lidar startup turned SPAC, appears to be grasping for capital. Why else would the company make a deal with Yorkville Advisors Global that could bring another million into its coffers through the sale of convertible preferred stock over an 18-month period? Under the terms, Luminar will issue million in convertible preferred stock to the investors. Luminar may issue additional tranches in amounts of up to million no more than every 60 days at a purchase price equal to 96% of the stated value of the convertible preferred stock. You might recall Luminar’s board recently replaced founder Austin Russell as its CEO. The company is also going through another restructuring — its third in a year. Other deals that got my attention … Techcrunch event Join us at TechCrunch Sessions: AI Secure your spot for our leading AI industry event with speakers from OpenAI, Anthropic, and Cohere. For a limited time, tickets are just for an entire day of expert talks, workshops, and potent networking. Exhibit at TechCrunch Sessions: AI Secure your spot at TC Sessions: AI and show 1,200+ decision-makers what you’ve built — without the big spend. Available through May 9 or while tables last. Berkeley, CA | June 5 REGISTER NOW SparkCharge, which offers what it calls “charging-as-a-service” for fleets, raised million in a Series A-1 round led by Monte’s Fam, with participation from Cleveland Avenue, Collab Capital, Elemental Impact, MarcyPen, and non sibi ventures. Alongside the equity round, SparkCharge also secured a million venture loan from Horizon Technology Finance Corp. Sylndr, a Cairo-based online used car sales startup that is expanding into auto financing, servicing, and tools for dealers, raised million. The round was led by Development Partners International’s Nclude Fund. The startup also raised nearly million in debt financing from local banks in the past year. Is an auction a deal? Perhaps for someone. Nikola’s hydrogen trucks, which have a value of about million, are up for auction — one of the company’s last steps in unloading all of its assets after filing for bankruptcy in February. Notable reads and other tidbits Image Credits:Bryce Durbin Autonomous vehicles Aurora has put human “observers” in its self-driving trucks at the request of its partner PACCAR, a disclosure that has some scratching their heads about the move. To be clear, these “observers” are not human safety operators, meaning they can’t intervene. An Aurora spokesperson confirmed and noted they have a different role than the human safety operators in the company’s supervised hauls.  This news prompted folks to send me a slew of messages with questions like “Why?” and “What’s the point?”  Einride founder Robert Falck is stepping down from the role of CEO. Einride’s CFO, Roozbeh Charli, will take over the role of chief executive effective immediately. Reliable Robotics, the autonomous aviation company, appointed Marc Stoll as its new CFO. Stoll is the former VP of Finance at Apple and partner at Eclipse Ventures. Zoox has completed the “initial mapping phase” and will begin testing its self-driving vehicles in Atlanta later this summer. The California Public Utilities Commission approved Waymo’s request to expand its commercial robotaxi service area into more communities south of San Francisco. Meanwhile, Waymo and Uber plan to start offering robotaxi rides in Atlanta to select customers who signed onto a waitlist earlier this year. Tesla plans to limit where its robotaxis operate in Austin, Texas, to specific areas the company deems “the safest,” according to Elon Musk. Using a geofence represents a major strategy shift for Musk, who spent years claiming his company would be able to create a general-purpose self-driving solution that could be dropped into any location and work without human supervision.  Electric vehicles, charging, & batteries Arc unveiled a new electric boat called the Arc Coast, a watercraft with a center console design. Senate Republicans have voted to overturn a waiver that allowed California to set stricter air pollution standards for vehicles. The state has received waivers more than 100 times since federal laws granted the right some 50 years ago. Gig economy Uber plans to launch a B2B logistics service in India through a partnership with a government-backed nonprofit that aims to break the domination of Flipkart, the e-commerce giant backed by Amazon and Walmart. AI Uber Freight recently launched a suite of AI features to shippers around the world as part of its existing supply chain software. That includes an expansion of Insights AI, which Uber Freight quietly launched in 2023, as well as more than 30 AI agents built to “execute key logistics tasks throughout the freight lifecycle.” Senior reporter Sean O’Kane interviewed CEO Lior Ron about the company’s dive into AI — including the how, why, and what’s next. This week’s wheels Image Credits:Rebecca Bellan Yup, “This week’s wheels” is back with Rebecca Bellan, who writes about her time on the new Heybike Alpha, a sturdy, fat-tire, all-terrain e-bike with a price tag.  The entire review can be read here.  For those who want the highlights: The Alpha ticked a lot of boxes for Bellan — notably the mid-drive motor with torque sensor and long-lasting battery. There were some frustrations, though, too. Putting the bike together, the app, and outsized horn were disappointments. But generally, Rebecca felt the Alpha was an excellent all-around e-bike, whether you want to take it on off-road adventures or use it in the city to do your weekly Trader Joe’s shopping. #techcrunch #mobility #uber #freights #bet
    TECHCRUNCH.COM
    TechCrunch Mobility: Uber Freight’s AI bet, Tesla’s robotaxi caveat, and Nikola’s trucks hit the auction block
    Welcome back to TechCrunch Mobility — your central hub for news and insights on the future of transportation. Sign up here for free — just click TechCrunch Mobility! For those U.S.-based readers out there, enjoy the long Memorial Day weekend, and if you’re on the road, expect it to be crowded. AAA projects 45.1 million people will travel at least 50 miles from home over the Memorial Day holiday period, from Thursday to Monday. About 39.4 million of those folks will use a car. Let’s get to it! This edition has news on loads of companies, including Aurora, Uber, Tesla, and Waymo. Plus, a number of startups you may be interested in. A little bird Image Credits:Bryce Durbin Got a tip for us? Email Kirsten Korosec at kirsten.korosec@techcrunch.com or my Signal at kkorosec.07, Sean O’Kane at sean.okane@techcrunch.com, or Rebecca Bellan at rebecca.bellan@techcrunch.com. Or check out these instructions to learn how to contact us via encrypted messaging apps or SecureDrop. Deals! Image Credits:Bryce Durbin Luminar, the lidar startup turned SPAC, appears to be grasping for capital. Why else would the company make a deal with Yorkville Advisors Global that could bring another $200 million into its coffers through the sale of convertible preferred stock over an 18-month period? Under the terms, Luminar will issue $35 million in convertible preferred stock to the investors. Luminar may issue additional tranches in amounts of up to $35 million no more than every 60 days at a purchase price equal to 96% of the stated value of the convertible preferred stock. You might recall Luminar’s board recently replaced founder Austin Russell as its CEO. The company is also going through another restructuring — its third in a year. Other deals that got my attention … Techcrunch event Join us at TechCrunch Sessions: AI Secure your spot for our leading AI industry event with speakers from OpenAI, Anthropic, and Cohere. For a limited time, tickets are just $292 for an entire day of expert talks, workshops, and potent networking. Exhibit at TechCrunch Sessions: AI Secure your spot at TC Sessions: AI and show 1,200+ decision-makers what you’ve built — without the big spend. Available through May 9 or while tables last. Berkeley, CA | June 5 REGISTER NOW SparkCharge, which offers what it calls “charging-as-a-service” for fleets, raised $15.5 million in a Series A-1 round led by Monte’s Fam, with participation from Cleveland Avenue, Collab Capital, Elemental Impact, MarcyPen, and non sibi ventures. Alongside the equity round, SparkCharge also secured a $15 million venture loan from Horizon Technology Finance Corp. Sylndr, a Cairo-based online used car sales startup that is expanding into auto financing, servicing, and tools for dealers, raised $15.7 million. The round was led by Development Partners International’s Nclude Fund. The startup also raised nearly $10 million in debt financing from local banks in the past year. Is an auction a deal? Perhaps for someone. Nikola’s hydrogen trucks, which have a value of about $114 million, are up for auction — one of the company’s last steps in unloading all of its assets after filing for bankruptcy in February. Notable reads and other tidbits Image Credits:Bryce Durbin Autonomous vehicles Aurora has put human “observers” in its self-driving trucks at the request of its partner PACCAR, a disclosure that has some scratching their heads about the move. To be clear, these “observers” are not human safety operators, meaning they can’t intervene. An Aurora spokesperson confirmed and noted they have a different role than the human safety operators in the company’s supervised hauls.  This news prompted folks to send me a slew of messages with questions like “Why?” and “What’s the point?”  Einride founder Robert Falck is stepping down from the role of CEO. Einride’s CFO, Roozbeh Charli, will take over the role of chief executive effective immediately. Reliable Robotics, the autonomous aviation company, appointed Marc Stoll as its new CFO. Stoll is the former VP of Finance at Apple and partner at Eclipse Ventures. Zoox has completed the “initial mapping phase” and will begin testing its self-driving vehicles in Atlanta later this summer. The California Public Utilities Commission approved Waymo’s request to expand its commercial robotaxi service area into more communities south of San Francisco. Meanwhile, Waymo and Uber plan to start offering robotaxi rides in Atlanta to select customers who signed onto a waitlist earlier this year. Tesla plans to limit where its robotaxis operate in Austin, Texas, to specific areas the company deems “the safest,” according to Elon Musk. Using a geofence represents a major strategy shift for Musk, who spent years claiming his company would be able to create a general-purpose self-driving solution that could be dropped into any location and work without human supervision.  Electric vehicles, charging, & batteries Arc unveiled a new electric boat called the Arc Coast, a $168,000 watercraft with a center console design. Senate Republicans have voted to overturn a waiver that allowed California to set stricter air pollution standards for vehicles. The state has received waivers more than 100 times since federal laws granted the right some 50 years ago. Gig economy Uber plans to launch a B2B logistics service in India through a partnership with a government-backed nonprofit that aims to break the domination of Flipkart, the e-commerce giant backed by Amazon and Walmart. AI Uber Freight recently launched a suite of AI features to shippers around the world as part of its existing supply chain software. That includes an expansion of Insights AI, which Uber Freight quietly launched in 2023, as well as more than 30 AI agents built to “execute key logistics tasks throughout the freight lifecycle.” Senior reporter Sean O’Kane interviewed CEO Lior Ron about the company’s dive into AI — including the how, why, and what’s next. This week’s wheels Image Credits:Rebecca Bellan Yup, “This week’s wheels” is back with Rebecca Bellan, who writes about her time on the new Heybike Alpha, a sturdy, fat-tire, all-terrain e-bike with a $1,699 price tag.  The entire review can be read here.  For those who want the highlights: The Alpha ticked a lot of boxes for Bellan — notably the mid-drive motor with torque sensor and long-lasting battery. There were some frustrations, though, too. Putting the bike together, the app, and outsized horn were disappointments. But generally, Rebecca felt the Alpha was an excellent all-around e-bike, whether you want to take it on off-road adventures or use it in the city to do your weekly Trader Joe’s shopping.
    0 Comentários 0 Compartilhamentos
  • The FDA plans to limit access to covid vaccines. Here’s why that’s not all bad.

    This week, two new leaders at the US Food and Drug Administration announced plans to limit access to covid vaccines, arguing that there is not much evidence to support the value of annual shots in healthy people. New vaccines will be made available only to the people who are most vulnerable—namely, those over 65 and others with conditions that make them more susceptible to severe disease.

    Anyone else will have to wait. Covid vaccines will soon be required to go through more rigorous trials to ensure that they really are beneficial for people who aren’t at high risk.

    The plans have been met with fear and anger in some quarters. But they weren’t all that shocking to me. In the UK, where I live, covid boosters have been offered only to vulnerable groups for a while now. And the immunologists I spoke to agree: The plans make sense.

    They are still controversial. Covid hasn’t gone away. And while most people are thought to have some level of immunity to the virus, some of us still stand to get very sick if infected. The threat of long covid lingers, too. Given that people respond differently to both the virus and the vaccine, perhaps individuals should be able to choose whether they get a vaccine or not.

    I should start by saying that covid vaccines have been a remarkable success story. The drugs were developed at record-breaking speed—they were given to people in clinical trials just 69 days after the virus had been identified. They are, on the whole, very safe. And they work remarkably well. They have saved millions of lives. And they rescued many of us from lockdowns.

    But while many of us have benefited hugely from covid vaccinations in the past, there are questions over how useful continuing annual booster doses might be. That’s the argument being made by FDA head Marty Makary and Vinay Prasad, director of the agency’s Center for Biologics Evaluation and Research.

    Both men have been critical of the FDA in the past. Makary has long been accused of downplaying the benefits of covid vaccines. He made incorrect assumptions about the coronavirus responsible for covid-19 and predicted that the disease would be “mostly gone” by April 2021. Most recently, he also testified in Congress that the theory that the virus came from a lab in China was a “no-brainer.”Prasad has said “the FDA is a failure” and has called annual covid boosters “a public health disaster the likes of which we’ve never seen before,” because of a perceived lack of clinical evidence to support their use.

    Makary and Prasad’s plans, which were outlined in the New England Journal of Medicine on Tuesday, don’t include such inflammatory language or unfounded claims, thankfully. In fact, they seem pretty measured: Annual covid booster shots will continue to be approved for vulnerable people but will have to be shown to benefit others before people outside the approved groups can access them.

    There are still concerns being raised, though. Let’s address a few of the biggest ones.

    Shouldn’t I get an annual covid booster alongside my flu vaccine?

    At the moment, a lot of people in the US opt to get a covid vaccination around the time they get their annual flu jab. Each year, a flu vaccine is developed to protect against what scientists predict will be the dominant strain of virus circulating come flu season, which tends to run from October through March.

    But covid doesn’t seem to stick to the same seasonal patterns, says Susanna Dunachie, a clinical doctor and professor of infectious diseases at the University of Oxford in the UK. “We seem to be getting waves of covid year-round,” she says.

    And an annual shot might not offer the best protection against covid anyway, says Fikadu Tafesse, an immunologist and virologist at Oregon Health & Science University in Portland. His own research suggests that leaving more than a year between booster doses could enhance their effectiveness. “One year is really a random time,” he says. It might be better to wait five or 10 years between doses instead, he adds.

    “If you are at riskyou may actually needevery six months,” says Tafesse. “But for healthy individuals, it’s a very different conversation.”

    What about children—shouldn’t we be protecting them?

    There are reports that pediatricians are concerned about the impact on children, some of whom can develop serious cases of covid. “If we have safe and effective vaccines that prevent illness, we think they should be available,” James Campbell, vice chair of the committee on infectious diseases at the American Academy of Pediatrics, told STAT.

    This question has been on my mind for a while. My two young children, who were born in the UK, have never been eligible for a covid vaccine in this country. I found this incredibly distressing when the virus started tearing through child-care centers—especially given that at the time, the US was vaccinating babies from the age of six months.

    My kids were eventually offered a vaccine in the US, when we temporarily moved there a couple of years ago. But by that point, the equation had changed. They’d both had covid by then. I had a better idea of the general risks of the virus to children. I turned it down.

    I was relieved to hear that Tafesse had made the same decision for his own children. “There are always exceptions, but in general,is not severe in kids,” he says. The UK’s Joint Committee on Vaccination and Immunology found that the benefits of vaccination are much smaller for children than they are for adults.

    “Of course there are children with health problems who should definitely have it,” says Dunachie. “But for healthy children in healthy households, the benefits probably are quite marginal.”

    Shouldn’t healthy people get vaccinated to help protect more vulnerable members of society?

    It’s a good argument, says Tafesse. Research suggests that people who are vaccinated against covid-19 are less likely to end up transmitting the infection to the people around them. The degree of protection is not entirely clear, particularly with less-studied—and more contagious—variants of the virus and targeted vaccines. The safest approach is to encourage those at high risk to get the vaccine themselves, says Tafesse.

    If the vaccines are safe, shouldn’t I be able to choose to get one?

    Tafesse doesn’t buy this argument. “I know they are safe, but even if they’re safe, why do I need to get one?” People should know if they are likely to benefit from a drug they are taking, he says.

    Having said that, the cost-benefit calculation will differ between individuals. Even a “mild” covid infection can leave some people bed-bound for a week. For them, it might make total sense to get the vaccine.

    Dunachie thinks people should be able to make their own decisions. “Giving people a top-up whether they need it or not is a safe thing to do,” she says.

    It is still not entirely clear who will be able to access covid vaccinations under the new plans, and how. Makary and Prasad’s piece includes a list of “medical conditions that increase a person’s risk of severe covid-19,” which includes several disorders, pregnancy, and “physical inactivity.” It covers a lot of people; research suggests that around 25% of Americans are physically inactive.

    But I find myself agreeing with Dunachie. Yes, we need up-to-date evidence to support the use of any drugs. But taking vaccines away from people who have experience with them and feel they could benefit from them doesn’t feel like the ideal way to go about it.

    This article first appeared in The Checkup, MIT Technology Review’s weekly biotech newsletter. To receive it in your inbox every Thursday, and read articles like this first, sign up here.
    #fda #plans #limit #access #covid
    The FDA plans to limit access to covid vaccines. Here’s why that’s not all bad.
    This week, two new leaders at the US Food and Drug Administration announced plans to limit access to covid vaccines, arguing that there is not much evidence to support the value of annual shots in healthy people. New vaccines will be made available only to the people who are most vulnerable—namely, those over 65 and others with conditions that make them more susceptible to severe disease. Anyone else will have to wait. Covid vaccines will soon be required to go through more rigorous trials to ensure that they really are beneficial for people who aren’t at high risk. The plans have been met with fear and anger in some quarters. But they weren’t all that shocking to me. In the UK, where I live, covid boosters have been offered only to vulnerable groups for a while now. And the immunologists I spoke to agree: The plans make sense. They are still controversial. Covid hasn’t gone away. And while most people are thought to have some level of immunity to the virus, some of us still stand to get very sick if infected. The threat of long covid lingers, too. Given that people respond differently to both the virus and the vaccine, perhaps individuals should be able to choose whether they get a vaccine or not. I should start by saying that covid vaccines have been a remarkable success story. The drugs were developed at record-breaking speed—they were given to people in clinical trials just 69 days after the virus had been identified. They are, on the whole, very safe. And they work remarkably well. They have saved millions of lives. And they rescued many of us from lockdowns. But while many of us have benefited hugely from covid vaccinations in the past, there are questions over how useful continuing annual booster doses might be. That’s the argument being made by FDA head Marty Makary and Vinay Prasad, director of the agency’s Center for Biologics Evaluation and Research. Both men have been critical of the FDA in the past. Makary has long been accused of downplaying the benefits of covid vaccines. He made incorrect assumptions about the coronavirus responsible for covid-19 and predicted that the disease would be “mostly gone” by April 2021. Most recently, he also testified in Congress that the theory that the virus came from a lab in China was a “no-brainer.”Prasad has said “the FDA is a failure” and has called annual covid boosters “a public health disaster the likes of which we’ve never seen before,” because of a perceived lack of clinical evidence to support their use. Makary and Prasad’s plans, which were outlined in the New England Journal of Medicine on Tuesday, don’t include such inflammatory language or unfounded claims, thankfully. In fact, they seem pretty measured: Annual covid booster shots will continue to be approved for vulnerable people but will have to be shown to benefit others before people outside the approved groups can access them. There are still concerns being raised, though. Let’s address a few of the biggest ones. Shouldn’t I get an annual covid booster alongside my flu vaccine? At the moment, a lot of people in the US opt to get a covid vaccination around the time they get their annual flu jab. Each year, a flu vaccine is developed to protect against what scientists predict will be the dominant strain of virus circulating come flu season, which tends to run from October through March. But covid doesn’t seem to stick to the same seasonal patterns, says Susanna Dunachie, a clinical doctor and professor of infectious diseases at the University of Oxford in the UK. “We seem to be getting waves of covid year-round,” she says. And an annual shot might not offer the best protection against covid anyway, says Fikadu Tafesse, an immunologist and virologist at Oregon Health & Science University in Portland. His own research suggests that leaving more than a year between booster doses could enhance their effectiveness. “One year is really a random time,” he says. It might be better to wait five or 10 years between doses instead, he adds. “If you are at riskyou may actually needevery six months,” says Tafesse. “But for healthy individuals, it’s a very different conversation.” What about children—shouldn’t we be protecting them? There are reports that pediatricians are concerned about the impact on children, some of whom can develop serious cases of covid. “If we have safe and effective vaccines that prevent illness, we think they should be available,” James Campbell, vice chair of the committee on infectious diseases at the American Academy of Pediatrics, told STAT. This question has been on my mind for a while. My two young children, who were born in the UK, have never been eligible for a covid vaccine in this country. I found this incredibly distressing when the virus started tearing through child-care centers—especially given that at the time, the US was vaccinating babies from the age of six months. My kids were eventually offered a vaccine in the US, when we temporarily moved there a couple of years ago. But by that point, the equation had changed. They’d both had covid by then. I had a better idea of the general risks of the virus to children. I turned it down. I was relieved to hear that Tafesse had made the same decision for his own children. “There are always exceptions, but in general,is not severe in kids,” he says. The UK’s Joint Committee on Vaccination and Immunology found that the benefits of vaccination are much smaller for children than they are for adults. “Of course there are children with health problems who should definitely have it,” says Dunachie. “But for healthy children in healthy households, the benefits probably are quite marginal.” Shouldn’t healthy people get vaccinated to help protect more vulnerable members of society? It’s a good argument, says Tafesse. Research suggests that people who are vaccinated against covid-19 are less likely to end up transmitting the infection to the people around them. The degree of protection is not entirely clear, particularly with less-studied—and more contagious—variants of the virus and targeted vaccines. The safest approach is to encourage those at high risk to get the vaccine themselves, says Tafesse. If the vaccines are safe, shouldn’t I be able to choose to get one? Tafesse doesn’t buy this argument. “I know they are safe, but even if they’re safe, why do I need to get one?” People should know if they are likely to benefit from a drug they are taking, he says. Having said that, the cost-benefit calculation will differ between individuals. Even a “mild” covid infection can leave some people bed-bound for a week. For them, it might make total sense to get the vaccine. Dunachie thinks people should be able to make their own decisions. “Giving people a top-up whether they need it or not is a safe thing to do,” she says. It is still not entirely clear who will be able to access covid vaccinations under the new plans, and how. Makary and Prasad’s piece includes a list of “medical conditions that increase a person’s risk of severe covid-19,” which includes several disorders, pregnancy, and “physical inactivity.” It covers a lot of people; research suggests that around 25% of Americans are physically inactive. But I find myself agreeing with Dunachie. Yes, we need up-to-date evidence to support the use of any drugs. But taking vaccines away from people who have experience with them and feel they could benefit from them doesn’t feel like the ideal way to go about it. This article first appeared in The Checkup, MIT Technology Review’s weekly biotech newsletter. To receive it in your inbox every Thursday, and read articles like this first, sign up here. #fda #plans #limit #access #covid
    WWW.TECHNOLOGYREVIEW.COM
    The FDA plans to limit access to covid vaccines. Here’s why that’s not all bad.
    This week, two new leaders at the US Food and Drug Administration announced plans to limit access to covid vaccines, arguing that there is not much evidence to support the value of annual shots in healthy people. New vaccines will be made available only to the people who are most vulnerable—namely, those over 65 and others with conditions that make them more susceptible to severe disease. Anyone else will have to wait. Covid vaccines will soon be required to go through more rigorous trials to ensure that they really are beneficial for people who aren’t at high risk. The plans have been met with fear and anger in some quarters. But they weren’t all that shocking to me. In the UK, where I live, covid boosters have been offered only to vulnerable groups for a while now. And the immunologists I spoke to agree: The plans make sense. They are still controversial. Covid hasn’t gone away. And while most people are thought to have some level of immunity to the virus, some of us still stand to get very sick if infected. The threat of long covid lingers, too. Given that people respond differently to both the virus and the vaccine, perhaps individuals should be able to choose whether they get a vaccine or not. I should start by saying that covid vaccines have been a remarkable success story. The drugs were developed at record-breaking speed—they were given to people in clinical trials just 69 days after the virus had been identified. They are, on the whole, very safe. And they work remarkably well. They have saved millions of lives. And they rescued many of us from lockdowns. But while many of us have benefited hugely from covid vaccinations in the past, there are questions over how useful continuing annual booster doses might be. That’s the argument being made by FDA head Marty Makary and Vinay Prasad, director of the agency’s Center for Biologics Evaluation and Research. Both men have been critical of the FDA in the past. Makary has long been accused of downplaying the benefits of covid vaccines. He made incorrect assumptions about the coronavirus responsible for covid-19 and predicted that the disease would be “mostly gone” by April 2021. Most recently, he also testified in Congress that the theory that the virus came from a lab in China was a “no-brainer.” (The strongest evidence suggests the virus jumped from animals to humans in a market in Wuhan.) Prasad has said “the FDA is a failure” and has called annual covid boosters “a public health disaster the likes of which we’ve never seen before,” because of a perceived lack of clinical evidence to support their use. Makary and Prasad’s plans, which were outlined in the New England Journal of Medicine on Tuesday, don’t include such inflammatory language or unfounded claims, thankfully. In fact, they seem pretty measured: Annual covid booster shots will continue to be approved for vulnerable people but will have to be shown to benefit others before people outside the approved groups can access them. There are still concerns being raised, though. Let’s address a few of the biggest ones. Shouldn’t I get an annual covid booster alongside my flu vaccine? At the moment, a lot of people in the US opt to get a covid vaccination around the time they get their annual flu jab. Each year, a flu vaccine is developed to protect against what scientists predict will be the dominant strain of virus circulating come flu season, which tends to run from October through March. But covid doesn’t seem to stick to the same seasonal patterns, says Susanna Dunachie, a clinical doctor and professor of infectious diseases at the University of Oxford in the UK. “We seem to be getting waves of covid year-round,” she says. And an annual shot might not offer the best protection against covid anyway, says Fikadu Tafesse, an immunologist and virologist at Oregon Health & Science University in Portland. His own research suggests that leaving more than a year between booster doses could enhance their effectiveness. “One year is really a random time,” he says. It might be better to wait five or 10 years between doses instead, he adds. “If you are at risk [of a serious covid infection] you may actually need [a dose] every six months,” says Tafesse. “But for healthy individuals, it’s a very different conversation.” What about children—shouldn’t we be protecting them? There are reports that pediatricians are concerned about the impact on children, some of whom can develop serious cases of covid. “If we have safe and effective vaccines that prevent illness, we think they should be available,” James Campbell, vice chair of the committee on infectious diseases at the American Academy of Pediatrics, told STAT. This question has been on my mind for a while. My two young children, who were born in the UK, have never been eligible for a covid vaccine in this country. I found this incredibly distressing when the virus started tearing through child-care centers—especially given that at the time, the US was vaccinating babies from the age of six months. My kids were eventually offered a vaccine in the US, when we temporarily moved there a couple of years ago. But by that point, the equation had changed. They’d both had covid by then. I had a better idea of the general risks of the virus to children. I turned it down. I was relieved to hear that Tafesse had made the same decision for his own children. “There are always exceptions, but in general, [covid] is not severe in kids,” he says. The UK’s Joint Committee on Vaccination and Immunology found that the benefits of vaccination are much smaller for children than they are for adults. “Of course there are children with health problems who should definitely have it,” says Dunachie. “But for healthy children in healthy households, the benefits probably are quite marginal.” Shouldn’t healthy people get vaccinated to help protect more vulnerable members of society? It’s a good argument, says Tafesse. Research suggests that people who are vaccinated against covid-19 are less likely to end up transmitting the infection to the people around them. The degree of protection is not entirely clear, particularly with less-studied—and more contagious—variants of the virus and targeted vaccines. The safest approach is to encourage those at high risk to get the vaccine themselves, says Tafesse. If the vaccines are safe, shouldn’t I be able to choose to get one? Tafesse doesn’t buy this argument. “I know they are safe, but even if they’re safe, why do I need to get one?” People should know if they are likely to benefit from a drug they are taking, he says. Having said that, the cost-benefit calculation will differ between individuals. Even a “mild” covid infection can leave some people bed-bound for a week. For them, it might make total sense to get the vaccine. Dunachie thinks people should be able to make their own decisions. “Giving people a top-up whether they need it or not is a safe thing to do,” she says. It is still not entirely clear who will be able to access covid vaccinations under the new plans, and how. Makary and Prasad’s piece includes a list of “medical conditions that increase a person’s risk of severe covid-19,” which includes several disorders, pregnancy, and “physical inactivity.” It covers a lot of people; research suggests that around 25% of Americans are physically inactive. But I find myself agreeing with Dunachie. Yes, we need up-to-date evidence to support the use of any drugs. But taking vaccines away from people who have experience with them and feel they could benefit from them doesn’t feel like the ideal way to go about it. This article first appeared in The Checkup, MIT Technology Review’s weekly biotech newsletter. To receive it in your inbox every Thursday, and read articles like this first, sign up here.
    0 Comentários 0 Compartilhamentos
  • Massive data breach exposes swath of unencrypted Apple ID logins

    Macworld

    Cybersecurity researcher Jeremiah Fowler reported on Thursday about finding a “publicly exposed databasewas not password-protected or encrypted” and contained over 184 million unique usernames and passwords for services from Facebook, Instagram, Microsoft, Roblox, Snapchat, and more. A report by Wired on Fowler’s findings states that login information for Apple, as well as Amazon, Nintendo, Snapchat, Spotify, Twitter, WordPress, Yahoo, banks, health services, government portals, and more was also found in the database.

    Folwer was unable to determine the purpose of the database, and he reported it to the hosting provider, which then restricted public access to it. He was also unable to determine how long the database was publicly available or who had used it. Fowler was able to authenticate the information in the database by using some email addresses that he found and identifying himself as a researcher investigating a data breach.

    As Fowler explains, the breach exhibits “multiple signs” that the exposed data was harvested by some type of infostealer malware, which “usually targets credentialsstored in web browsers, email clients, and messaging apps.” As for how the data was collected, Fowler stated that “cybercriminals use a range of methods to deploy infostealers.”

    How to protect yourself

    Never open links in emails or texts you receive from unknown and unexpected sources. If you get a message that looks like it is from an entity that you do business with, check the sender’s email address and inspect the URL carefully. If you see a link or button, you can Control-click it, select Copy Link, and then paste it into a text editor to see the actual URL and check it.

    Phishing attacks often involve a user inadvertently visiting a website with a mistyped URL. So verify the URL you have typed into your browser. Bookmark the sites you visit frequently so you don’t have to type in the URL every time. In some instances, you can use a search engine, type the name of the place you want to visit, and then click on the link after looking at the URL it goes to. For example, type “Macworld” into the search engine you use, and then click on the link that’s designated at www.macworld.com. This way isn’t as efficient, but if you make a typo, you’ll see it in the search and Google will steer you in the right direction.

    To protect yourself from malware, avoid downloading software from repositories such as GitHub and other download sites. Apple has vetted software in the Mac App Store and is the safest way to get apps. If you prefer not to patronize the Mac App Store, then buy software directly from the developer and their website. If you insist on using cracked software, you will always risk malware exposure.

    Apple releases security patches through OS updates, so installing them as soon as possible is important. It’s also important to update the apps on your Mac, which you can do through the App Store or through the app’s settings. Macworld has several guides to help, including a guide on whether or not you need antivirus software, a list of Mac viruses, malware, and trojans, and a comparison of Mac security software.
    #massive #data #breach #exposes #swath
    Massive data breach exposes swath of unencrypted Apple ID logins
    Macworld Cybersecurity researcher Jeremiah Fowler reported on Thursday about finding a “publicly exposed databasewas not password-protected or encrypted” and contained over 184 million unique usernames and passwords for services from Facebook, Instagram, Microsoft, Roblox, Snapchat, and more. A report by Wired on Fowler’s findings states that login information for Apple, as well as Amazon, Nintendo, Snapchat, Spotify, Twitter, WordPress, Yahoo, banks, health services, government portals, and more was also found in the database. Folwer was unable to determine the purpose of the database, and he reported it to the hosting provider, which then restricted public access to it. He was also unable to determine how long the database was publicly available or who had used it. Fowler was able to authenticate the information in the database by using some email addresses that he found and identifying himself as a researcher investigating a data breach. As Fowler explains, the breach exhibits “multiple signs” that the exposed data was harvested by some type of infostealer malware, which “usually targets credentialsstored in web browsers, email clients, and messaging apps.” As for how the data was collected, Fowler stated that “cybercriminals use a range of methods to deploy infostealers.” How to protect yourself Never open links in emails or texts you receive from unknown and unexpected sources. If you get a message that looks like it is from an entity that you do business with, check the sender’s email address and inspect the URL carefully. If you see a link or button, you can Control-click it, select Copy Link, and then paste it into a text editor to see the actual URL and check it. Phishing attacks often involve a user inadvertently visiting a website with a mistyped URL. So verify the URL you have typed into your browser. Bookmark the sites you visit frequently so you don’t have to type in the URL every time. In some instances, you can use a search engine, type the name of the place you want to visit, and then click on the link after looking at the URL it goes to. For example, type “Macworld” into the search engine you use, and then click on the link that’s designated at www.macworld.com. This way isn’t as efficient, but if you make a typo, you’ll see it in the search and Google will steer you in the right direction. To protect yourself from malware, avoid downloading software from repositories such as GitHub and other download sites. Apple has vetted software in the Mac App Store and is the safest way to get apps. If you prefer not to patronize the Mac App Store, then buy software directly from the developer and their website. If you insist on using cracked software, you will always risk malware exposure. Apple releases security patches through OS updates, so installing them as soon as possible is important. It’s also important to update the apps on your Mac, which you can do through the App Store or through the app’s settings. Macworld has several guides to help, including a guide on whether or not you need antivirus software, a list of Mac viruses, malware, and trojans, and a comparison of Mac security software. #massive #data #breach #exposes #swath
    WWW.MACWORLD.COM
    Massive data breach exposes swath of unencrypted Apple ID logins
    Macworld Cybersecurity researcher Jeremiah Fowler reported on Thursday about finding a “publicly exposed database [that] was not password-protected or encrypted” and contained over 184 million unique usernames and passwords for services from Facebook, Instagram, Microsoft, Roblox, Snapchat, and more. A report by Wired on Fowler’s findings states that login information for Apple, as well as Amazon, Nintendo, Snapchat, Spotify, Twitter, WordPress, Yahoo, banks, health services, government portals, and more was also found in the database. Folwer was unable to determine the purpose of the database, and he reported it to the hosting provider, which then restricted public access to it. He was also unable to determine how long the database was publicly available or who had used it. Fowler was able to authenticate the information in the database by using some email addresses that he found and identifying himself as a researcher investigating a data breach. As Fowler explains, the breach exhibits “multiple signs” that the exposed data was harvested by some type of infostealer malware, which “usually targets credentials (like usernames and passwords) stored in web browsers, email clients, and messaging apps.” As for how the data was collected, Fowler stated that “cybercriminals use a range of methods to deploy infostealers.” How to protect yourself Never open links in emails or texts you receive from unknown and unexpected sources. If you get a message that looks like it is from an entity that you do business with, check the sender’s email address and inspect the URL carefully. If you see a link or button, you can Control-click it, select Copy Link, and then paste it into a text editor to see the actual URL and check it. Phishing attacks often involve a user inadvertently visiting a website with a mistyped URL. So verify the URL you have typed into your browser. Bookmark the sites you visit frequently so you don’t have to type in the URL every time. In some instances, you can use a search engine, type the name of the place you want to visit, and then click on the link after looking at the URL it goes to. For example, type “Macworld” into the search engine you use, and then click on the link that’s designated at www.macworld.com. This way isn’t as efficient, but if you make a typo, you’ll see it in the search and Google will steer you in the right direction. To protect yourself from malware, avoid downloading software from repositories such as GitHub and other download sites. Apple has vetted software in the Mac App Store and is the safest way to get apps. If you prefer not to patronize the Mac App Store, then buy software directly from the developer and their website. If you insist on using cracked software, you will always risk malware exposure. Apple releases security patches through OS updates, so installing them as soon as possible is important. It’s also important to update the apps on your Mac, which you can do through the App Store or through the app’s settings. Macworld has several guides to help, including a guide on whether or not you need antivirus software, a list of Mac viruses, malware, and trojans, and a comparison of Mac security software.
    0 Comentários 0 Compartilhamentos
  • How To Beat Monster Hunter Wilds’ Craziest Hunt

    Jump ToThe general gameplay loop of Monster Hunter Wilds is using cool weapons to fight strong monsters—and then using their parts to make even cooler weapons to fight even stronger monsters. That cycle likely doesn’t have many hitches until you have to wrestle with Zoh Shia. While their debut hunt can be a strong wall, the High-Rank version is an absolute gauntlet. Whether it’s your first time or your tenth time, here’s how to farm and beat Zoh Shia.Suggested ReadingThe 3 Best And 3 Worst Korok Challenges In Tears Of The Kingdom

    Share SubtitlesOffEnglishview videoSuggested ReadingThe 3 Best And 3 Worst Korok Challenges In Tears Of The Kingdom

    Share SubtitlesOffEnglishScreenshot: Capcom / Samuel Moreno / KotakuYour first fight against this constructed creature takes place at the end of chapter three, effectively acting as your last Low Rank hunt. The opportunity to fight Zoh Shia a second time comes once you’ve reached Hunter Rank 50. Talking to Werner will start a new story quest called “An Unexpected Summons” that revolves around it returning. However, unlike other monsters, there isn’t any related optional quest added afterward for you to easily replay.That doesn’t mean you can’t farm the monster and gather more of its parts to make cool-looking armor and weapons. Here are your options for how to hunt Zoh Shia again:Wait until it randomly appears in Wyveria during an Inclemency season. You can keep resting to increase the chances of it appearingSave it as an investigation to fight it up to three times. This will require it to show up in Wyveria firstFilter for it through SOS Quests and help other hunters take one downI do want to point out that Zoh Shia won’t physically appear in Wyveria like other monsters. Just like Jin Dahaad, you’ll have to wait until a notification pops up in the Environment Overview to challenge them. The ensuing hunt takes place on a separate map, which is the Dragontorch Shrine in this case.Screenshot: Zoh Shia’s suggested strategy screen, showing which body parts are breakable.You’re always in for a challenging endeavor with Zoh Shia. It uses multiple elements and has some of the biggest attacks in the game. Thankfully, you can give yourself an edge by exploiting the following weaknesses:Elemental Weaknesses – DragonWeapon Type Weaknesses – Cut, BluntBreakable Parts – Head, Foreleg x2, Tail, Wings x2Susceptible Status Ailments – Blastblight, Paralysis, Poison, Sleep, StunScreenshot: Capcom / Samuel Moreno / KotakuThis hunt has a distinct mechanic that you might recognize from a few spots on the Wyveria map. Some of Zoh Shia’s attacks will create crystals, which it can then charge with Fire or Thunder attacks. They explode soon after, dealing the associated elemental damage to any nearby hunters and possibly causing a chain reaction with nearby crystals.The good news is that you can make them work in your favor. Using your slinger to shoot the crystals with Dragon and Thunder pods will cause them to explode and inflict the corresponding elemental damage to Zoh Shia. Considering how often its attacks generate crystals, you can quickly create your own elemental chain reaction and dish out some big hits to the monster. Fortunately, both of these slinger ammo types are easily crafted with the Wyrmsbane and Thundercryst that spawn in the arena.Screenshot: Capcom / Samuel Moreno / KotakuBring gear with high resistance to Fire and Thunder. Blight Resistance is an especially helpful skill if you have pieces of the Guardian Arkveld armor set or the Blight Charm talisman. Staying underneath this behemoth and near its back legs is one of the safest spots for the entire hunt, although your damage output will be limited. Their evolving set of attacks will eventually start flushing you out from that position as well, so don’t rely on it too often.Zoh Shia cycles through multiple phases as it takes more damage. The monster is completely covered in white crystal armor during its first phase. Your attacks will be more effective if you manage to break the armor, but it will eventually regenerate. Time your dodges well and try mounting if you can. I’ve always been able to open four wounds along its back with plenty of time to spare.The second phase begins with the armor on its head breaking off to reveal a black head that can now use fire attacks. You’ll need to watch out for deceptively quick fireballs and an attack that sets everything underneath it ablaze. From this point on, it can trigger crystals to create some large explosions. Trigger them first to destroy the armor quicker!You’ll know the third phase starts when Zoh Shia flies to the front of the arena and lands with a huge tremor. Gigantic crystals will rise out of the ground as it sheds its wing armor. Your experiences against Jin Dahaad might convince you to hide behind one of them, but these won’t offer you protection. The heated creature will set them all on fire, which then spreads out to nearly the whole arena. You can easily avoid this attack by making them prematurely explode with your slinger. Each destroyed crystal leaves behind an area safe from the fire.Not only are there more burning attacks in the third phase, but fiery pieces of debris will also begin falling. Don’t be surprised if you’re dodging more exploding crystals than triggering them. You might have to contend with a slightly smaller version of the attack that started this phase as well. The best ways to avoid that are to move as far away as possible, or to get right behind the monster.All of this leads to the final phase, with Zoh Shia’s entire black body being revealed. On top of the relentless fire attacks and fiery debris, you’ll also have to deal with a sideways lightning blast and random lightning bolts. Any one of these can set off crystals and potentially ruin the hunt. Do your best to trigger them first and avoid every intended or random attack that comes your way. This is a particularly great time to bring down the two hanging shrine fragment pieces on the sides of the arena. Since this is the last and most dangerous phase, you want to end it as quickly as possible.Tackling this with a coordinated link party of friends will make the hunt far less difficult. I’ve been able to win plenty of times with random hunters, although I’ve typically felt like the only person aware of the crystal mechanic.Screenshot: Capcom / Samuel Moreno / KotakuBeating this tough monster is plenty worth it for the awesome armor and weapons you can make from its parts. I highly recommend leafing through Zoh Shia’s monster information tabs to determine how to best earn any needed parts. If you want a simplified list of each Zoh Shia drop, I’ve included one below that’s sorted by most to least frequent.Zoh Shia StakeclawBlackember MassZoh Shia CrystalhornZoh Shia CrystaltailGuardian Blood +Zoh Shia CrystalscaleZoh Shia LayershellZoh Shia Certificate SFaux Whitegleam OrbDefeating Zoh Shia is a huge accomplishment that you should be proud of. The Tempered Mizutsune fight can admittedly be just as intense, but nothing so far feels as epic as a Zoh Shia hunt. .
    #how #beat #monster #hunter #wilds
    How To Beat Monster Hunter Wilds’ Craziest Hunt
    Jump ToThe general gameplay loop of Monster Hunter Wilds is using cool weapons to fight strong monsters—and then using their parts to make even cooler weapons to fight even stronger monsters. That cycle likely doesn’t have many hitches until you have to wrestle with Zoh Shia. While their debut hunt can be a strong wall, the High-Rank version is an absolute gauntlet. Whether it’s your first time or your tenth time, here’s how to farm and beat Zoh Shia.Suggested ReadingThe 3 Best And 3 Worst Korok Challenges In Tears Of The Kingdom Share SubtitlesOffEnglishview videoSuggested ReadingThe 3 Best And 3 Worst Korok Challenges In Tears Of The Kingdom Share SubtitlesOffEnglishScreenshot: Capcom / Samuel Moreno / KotakuYour first fight against this constructed creature takes place at the end of chapter three, effectively acting as your last Low Rank hunt. The opportunity to fight Zoh Shia a second time comes once you’ve reached Hunter Rank 50. Talking to Werner will start a new story quest called “An Unexpected Summons” that revolves around it returning. However, unlike other monsters, there isn’t any related optional quest added afterward for you to easily replay.That doesn’t mean you can’t farm the monster and gather more of its parts to make cool-looking armor and weapons. Here are your options for how to hunt Zoh Shia again:Wait until it randomly appears in Wyveria during an Inclemency season. You can keep resting to increase the chances of it appearingSave it as an investigation to fight it up to three times. This will require it to show up in Wyveria firstFilter for it through SOS Quests and help other hunters take one downI do want to point out that Zoh Shia won’t physically appear in Wyveria like other monsters. Just like Jin Dahaad, you’ll have to wait until a notification pops up in the Environment Overview to challenge them. The ensuing hunt takes place on a separate map, which is the Dragontorch Shrine in this case.Screenshot: Zoh Shia’s suggested strategy screen, showing which body parts are breakable.You’re always in for a challenging endeavor with Zoh Shia. It uses multiple elements and has some of the biggest attacks in the game. Thankfully, you can give yourself an edge by exploiting the following weaknesses:Elemental Weaknesses – DragonWeapon Type Weaknesses – Cut, BluntBreakable Parts – Head, Foreleg x2, Tail, Wings x2Susceptible Status Ailments – Blastblight, Paralysis, Poison, Sleep, StunScreenshot: Capcom / Samuel Moreno / KotakuThis hunt has a distinct mechanic that you might recognize from a few spots on the Wyveria map. Some of Zoh Shia’s attacks will create crystals, which it can then charge with Fire or Thunder attacks. They explode soon after, dealing the associated elemental damage to any nearby hunters and possibly causing a chain reaction with nearby crystals.The good news is that you can make them work in your favor. Using your slinger to shoot the crystals with Dragon and Thunder pods will cause them to explode and inflict the corresponding elemental damage to Zoh Shia. Considering how often its attacks generate crystals, you can quickly create your own elemental chain reaction and dish out some big hits to the monster. Fortunately, both of these slinger ammo types are easily crafted with the Wyrmsbane and Thundercryst that spawn in the arena.Screenshot: Capcom / Samuel Moreno / KotakuBring gear with high resistance to Fire and Thunder. Blight Resistance is an especially helpful skill if you have pieces of the Guardian Arkveld armor set or the Blight Charm talisman. Staying underneath this behemoth and near its back legs is one of the safest spots for the entire hunt, although your damage output will be limited. Their evolving set of attacks will eventually start flushing you out from that position as well, so don’t rely on it too often.Zoh Shia cycles through multiple phases as it takes more damage. The monster is completely covered in white crystal armor during its first phase. Your attacks will be more effective if you manage to break the armor, but it will eventually regenerate. Time your dodges well and try mounting if you can. I’ve always been able to open four wounds along its back with plenty of time to spare.The second phase begins with the armor on its head breaking off to reveal a black head that can now use fire attacks. You’ll need to watch out for deceptively quick fireballs and an attack that sets everything underneath it ablaze. From this point on, it can trigger crystals to create some large explosions. Trigger them first to destroy the armor quicker!You’ll know the third phase starts when Zoh Shia flies to the front of the arena and lands with a huge tremor. Gigantic crystals will rise out of the ground as it sheds its wing armor. Your experiences against Jin Dahaad might convince you to hide behind one of them, but these won’t offer you protection. The heated creature will set them all on fire, which then spreads out to nearly the whole arena. You can easily avoid this attack by making them prematurely explode with your slinger. Each destroyed crystal leaves behind an area safe from the fire.Not only are there more burning attacks in the third phase, but fiery pieces of debris will also begin falling. Don’t be surprised if you’re dodging more exploding crystals than triggering them. You might have to contend with a slightly smaller version of the attack that started this phase as well. The best ways to avoid that are to move as far away as possible, or to get right behind the monster.All of this leads to the final phase, with Zoh Shia’s entire black body being revealed. On top of the relentless fire attacks and fiery debris, you’ll also have to deal with a sideways lightning blast and random lightning bolts. Any one of these can set off crystals and potentially ruin the hunt. Do your best to trigger them first and avoid every intended or random attack that comes your way. This is a particularly great time to bring down the two hanging shrine fragment pieces on the sides of the arena. Since this is the last and most dangerous phase, you want to end it as quickly as possible.Tackling this with a coordinated link party of friends will make the hunt far less difficult. I’ve been able to win plenty of times with random hunters, although I’ve typically felt like the only person aware of the crystal mechanic.Screenshot: Capcom / Samuel Moreno / KotakuBeating this tough monster is plenty worth it for the awesome armor and weapons you can make from its parts. I highly recommend leafing through Zoh Shia’s monster information tabs to determine how to best earn any needed parts. If you want a simplified list of each Zoh Shia drop, I’ve included one below that’s sorted by most to least frequent.Zoh Shia StakeclawBlackember MassZoh Shia CrystalhornZoh Shia CrystaltailGuardian Blood +Zoh Shia CrystalscaleZoh Shia LayershellZoh Shia Certificate SFaux Whitegleam OrbDefeating Zoh Shia is a huge accomplishment that you should be proud of. The Tempered Mizutsune fight can admittedly be just as intense, but nothing so far feels as epic as a Zoh Shia hunt. . #how #beat #monster #hunter #wilds
    KOTAKU.COM
    How To Beat Monster Hunter Wilds’ Craziest Hunt
    Jump ToThe general gameplay loop of Monster Hunter Wilds is using cool weapons to fight strong monsters—and then using their parts to make even cooler weapons to fight even stronger monsters. That cycle likely doesn’t have many hitches until you have to wrestle with Zoh Shia. While their debut hunt can be a strong wall, the High-Rank version is an absolute gauntlet. Whether it’s your first time or your tenth time, here’s how to farm and beat Zoh Shia.Suggested ReadingThe 3 Best And 3 Worst Korok Challenges In Tears Of The Kingdom Share SubtitlesOffEnglishview videoSuggested ReadingThe 3 Best And 3 Worst Korok Challenges In Tears Of The Kingdom Share SubtitlesOffEnglishScreenshot: Capcom / Samuel Moreno / KotakuYour first fight against this constructed creature takes place at the end of chapter three, effectively acting as your last Low Rank hunt. The opportunity to fight Zoh Shia a second time comes once you’ve reached Hunter Rank 50. Talking to Werner will start a new story quest called “An Unexpected Summons” that revolves around it returning. However, unlike other monsters, there isn’t any related optional quest added afterward for you to easily replay.That doesn’t mean you can’t farm the monster and gather more of its parts to make cool-looking armor and weapons. Here are your options for how to hunt Zoh Shia again:Wait until it randomly appears in Wyveria during an Inclemency season. You can keep resting to increase the chances of it appearingSave it as an investigation to fight it up to three times. This will require it to show up in Wyveria firstFilter for it through SOS Quests and help other hunters take one downI do want to point out that Zoh Shia won’t physically appear in Wyveria like other monsters. Just like Jin Dahaad, you’ll have to wait until a notification pops up in the Environment Overview to challenge them. The ensuing hunt takes place on a separate map, which is the Dragontorch Shrine in this case.Screenshot: Zoh Shia’s suggested strategy screen, showing which body parts are breakable.You’re always in for a challenging endeavor with Zoh Shia. It uses multiple elements and has some of the biggest attacks in the game. Thankfully, you can give yourself an edge by exploiting the following weaknesses:Elemental Weaknesses – DragonWeapon Type Weaknesses – Cut, BluntBreakable Parts – Head, Foreleg x2, Tail (can also be severed), Wings x2Susceptible Status Ailments – Blastblight, Paralysis, Poison, Sleep, Stun (less effective rate)Screenshot: Capcom / Samuel Moreno / KotakuThis hunt has a distinct mechanic that you might recognize from a few spots on the Wyveria map. Some of Zoh Shia’s attacks will create crystals, which it can then charge with Fire or Thunder attacks. They explode soon after, dealing the associated elemental damage to any nearby hunters and possibly causing a chain reaction with nearby crystals.The good news is that you can make them work in your favor. Using your slinger to shoot the crystals with Dragon and Thunder pods will cause them to explode and inflict the corresponding elemental damage to Zoh Shia. Considering how often its attacks generate crystals, you can quickly create your own elemental chain reaction and dish out some big hits to the monster. Fortunately, both of these slinger ammo types are easily crafted with the Wyrmsbane and Thundercryst that spawn in the arena.Screenshot: Capcom / Samuel Moreno / KotakuBring gear with high resistance to Fire and Thunder. Blight Resistance is an especially helpful skill if you have pieces of the Guardian Arkveld armor set or the Blight Charm talisman. Staying underneath this behemoth and near its back legs is one of the safest spots for the entire hunt, although your damage output will be limited. Their evolving set of attacks will eventually start flushing you out from that position as well, so don’t rely on it too often.Zoh Shia cycles through multiple phases as it takes more damage. The monster is completely covered in white crystal armor during its first phase. Your attacks will be more effective if you manage to break the armor, but it will eventually regenerate. Time your dodges well and try mounting if you can. I’ve always been able to open four wounds along its back with plenty of time to spare.The second phase begins with the armor on its head breaking off to reveal a black head that can now use fire attacks. You’ll need to watch out for deceptively quick fireballs and an attack that sets everything underneath it ablaze. From this point on, it can trigger crystals to create some large explosions. Trigger them first to destroy the armor quicker!You’ll know the third phase starts when Zoh Shia flies to the front of the arena and lands with a huge tremor. Gigantic crystals will rise out of the ground as it sheds its wing armor. Your experiences against Jin Dahaad might convince you to hide behind one of them, but these won’t offer you protection. The heated creature will set them all on fire, which then spreads out to nearly the whole arena. You can easily avoid this attack by making them prematurely explode with your slinger. Each destroyed crystal leaves behind an area safe from the fire.Not only are there more burning attacks in the third phase, but fiery pieces of debris will also begin falling. Don’t be surprised if you’re dodging more exploding crystals than triggering them. You might have to contend with a slightly smaller version of the attack that started this phase as well. The best ways to avoid that are to move as far away as possible, or to get right behind the monster.All of this leads to the final phase, with Zoh Shia’s entire black body being revealed. On top of the relentless fire attacks and fiery debris, you’ll also have to deal with a sideways lightning blast and random lightning bolts. Any one of these can set off crystals and potentially ruin the hunt. Do your best to trigger them first and avoid every intended or random attack that comes your way. This is a particularly great time to bring down the two hanging shrine fragment pieces on the sides of the arena. Since this is the last and most dangerous phase, you want to end it as quickly as possible.Tackling this with a coordinated link party of friends will make the hunt far less difficult. I’ve been able to win plenty of times with random hunters, although I’ve typically felt like the only person aware of the crystal mechanic.Screenshot: Capcom / Samuel Moreno / KotakuBeating this tough monster is plenty worth it for the awesome armor and weapons you can make from its parts. I highly recommend leafing through Zoh Shia’s monster information tabs to determine how to best earn any needed parts. If you want a simplified list of each Zoh Shia drop, I’ve included one below that’s sorted by most to least frequent.Zoh Shia Stakeclaw (100% chance for breaking either Foreleg)Blackember Mass (100% chance for breaking either Wingarm)Zoh Shia Crystalhorn (100% chance for breaking the Head)Zoh Shia CrystaltailGuardian Blood +Zoh Shia CrystalscaleZoh Shia LayershellZoh Shia Certificate SFaux Whitegleam OrbDefeating Zoh Shia is a huge accomplishment that you should be proud of. The Tempered Mizutsune fight can admittedly be just as intense, but nothing so far feels as epic as a Zoh Shia hunt. .
    0 Comentários 0 Compartilhamentos
  • Free streaming’s hidden dangers–and how to protect your Mac

    Macworld

    Streaming services have become the most popular way to watch movies and TV on a Mac. But rising prices and the number of services now available can make it hard to afford all the subscriptions required to deliver the content you want to watch.

    That means it’s tempting when you come across websites like MyFlixer, which offers loads of AAA titles at no cost. Of course, there’s no such thing as a free lunch, and you should always be deeply suspicious of sites that contain free versions of premium content.

    MyFlixer has already been banned or blocked in several countries, but mirror sites reappear quickly, making it hard to stop people accessing the portal. It’s not just the fact that the content is provides is very likely pirated, but more importantly you could soon find yourself with intrusive ads or even malware on your system that puts your personal information at risk.

    If you are going to continue to use MyFlixer or the like, here’s how to protect yourself and your Mac from the dangers that lurk on free streaming sites.

    PROMOTIONCleanMyMac: Total Cleanup and Protection
    CleanMyMac’s advanced malware protection safeguards your Mac from viruses, miners, keyloggers, Trojans, and other threats. MacPaw, the developer behind CleanMyMac, regularly updates its custom-built malware database to ensure your Mac machine is always protected against the latest and emerging threats.
    Get CleanMyMac

    What is the MyFlixer virus?

    Just visiting the MyFlixer site shouldn’t immediately infect your Mac with malware. But you’ll very quickly be prompted to accept new content alerts, push notifications or browser extensions. If you do this, you’ll then be pestered by adware to download things like companion apps, which will most likely turn out to be malware.

    The approaches differ for each mirror-site, but the method of getting an infection onto your system is usually similar. If you’ve already fallen for the tricks the sites employ, then you’ll need to clean up your browser prompts, remove any extensions or apps, and use anti-virus software to restore your machine back to full health. We’ll cover all these steps below so that you fix the problems that can be caused by using MyFlixer.

    How to remove the MyFlixer browser extension

    It’s quite easy to remove the MyFlixer extension from your browser. Here’s the methods needed for some of the most popular browers on macOS.

    How to remove the MyFlixer Safari browser extension

    Removing the MyFlixer Safari extension is easy and is the same way you’d remove any extension from the browser. Here’s the steps:

    Open Safari

    Go to Safari > Settings then select the Extensions tab.

    In the left column, click on the Extension you want to remove

    Click Uninstall

    Screenshot
    Martyn Casserly

    How to remove the MyFlixer Chrome browser extension

    To remove the extension on your Chrome browser, here’s what you’ll need to do:

    Open Chrome

    Click on the Extensions icon in the toolbarFind the extension you want to remove, then click the three dots to the right of its name

    Click Remove from Chrome

    You’ll be asked to confirm your decision, so click Remove to finish.

    Screenshot
    Martyn Casserly

    How to remove the MyFlixer Firefox browser extension

    If you prefer to use Firefox, here’s what’s required to remove the extension:

    Open Firefox

    Click on the Extensions icon in the tool barClick the Settings iconto the right of the extension you want to remove

    Select Remove Extension

    Confirm your choice by clicking Remove

    Screenshot
    Martyn Casserly

    How to stop push notifications from MyFlixer

    With the extension removed, you’ll still need to deal with the push notifications that will flood you with adware and potential malware. Here’s the steps to take on the most popular browsers.

    How to remove MyFlixer push notifications on Safari

    To stop notifications from MyFlixer, here’s what you’ll need to do:

    Open Safari

    Select the Websites tab

    In the left column select Notifications

    In the main pane, select the MyFlixter option and set the drop-down menu to Deny

    Next, select the Pop-up Windows option from the left column

    Again, find the MyFlixer site and this time set the drop-down menu to Block

    Screenshot
    Martyn Casserly

    How to remove MyFlixer push notifications on Chrome

    The instructions are a little different on Chrome:

    Open Chrome

    Click the three dots icon in the top right corner

    Select Settings > Privacy and security

    Scroll down and select Site settings

    Find the MyFlixer site and click on it

    Adjust all the settings to Block

    Go back to the Site settings page and select Pop-up and Redirects

    In the ‘Not allowed to send pop-ups or use redirects’ section, click Add

    Enter the web address that’s sending you notifications and click Add

    Screenshot
    Martyn Casserly

    How to remove MyFlixer push notifications on Firefox

    Open Firefox

    Click on the three lines in the top right corner

    Select Settings

    From the left column choose Privacy & Security

    Scroll down to Permissions and click on the Settings button for Notifications

    Select the Block option for the MyFlixer website

    Click Changes

    Screenshot
    Martyn Casserly

    How to find and remove MyFlixer malware

    Clearing a virus or malware off your system isn’t something you can really do yourself, so if you think your system may be compromised then you’ll need to use an antivirus program. You’ll see plenty of free ones around, but most of these only scan for infection and won’t remove anything until you move to the paid version – which makes sense as it is providing a professional service.

    We recommend taking a look at our Best Mac Antivirus Software chart to see the products that we’ve tested and found to be the most reliable. A prime example is Intego Mac Security X9, which tops the chart at the time of writing. You can find out more in our Intego Mac Security X9 review. Using this software should locate and remove any malware from your Mac that MyFlixerhas managed to install on your system. You can read a more detailed explanation of the process in our How to remove a virus from your Mac tutorial.

    Petter Ahrnstedt

    While the immediate threat is dealt with by antivirus, there can still be files and other junk left behind, so we’d also recommend you use a Mac Cleaner app to completely return your Mac to a pristine state. CleanMyMac is an excellent option, with a friendly and easy to understand interface that allows you to know what needs fixing without bombarding you with confusing information. You can find out more in our CleanMyMac review.

    Once you have these apps on your Mac, it’s a good idea to run them periodically to ensure your data is safe and that your system is running to its full potential.

    How to avoid the MyFlixer virus

    While free streaming sites might seem incredibly tempting, there’s often a hidden cost involved…and it can be nasty. Basically, if you’re being offered something that you know you’d normally have to pay for, then the chances are it’s some kind of scam or delivery method for malware. So, to stay safe, don’t visit those sites and certainly don’t download anything from them. That’s just asking for trouble.

    If you really want to enjoy movies and TV shows on your Mac, then the safest way is through a paid service. It means you’re not ripping off the people that work hard to create the content and aren’t playing into the hands of cybercriminals that want to steal your data.

    You don’t have to sign up to all of them at the same time though. Most services offer free trials, so you could always work your way through those first. When you’ve exhausted those, simply sign up to one and binge what you want, then cancel your subscription and repeat the process on the next one. This way you minimise what you have to pay, while ensuring you don’t get any dangerous malware on your computer.

    FAQ
    1.
    What is MyFlixer?

    A site that offers free TV and movie streaming, often of pirated content from other studios.

    2.
    Is MyFlixer safe?

    No, MyFlixer is not safe. There are usually prompts for notifications, extensions and downloads that can contain adware and malware. If you decide to use MyFlixer then you should take steps to ensure your computer and your data is protected.

    3.
    Is MyFlixer legal?

    Distrubuting content for which the site doesn’t have copyright is illegal. This is why the site has been banned or blocked in various countries.

    4.
    How to block MyFlixer ads?

    Change the settings in your browser to block pop-up ads and notifications.

    5.
    How to protect your Mac from MyFlixer virus?

    Install and use a quality antivirus app and run a Mac Cleaner app afterwards to remove any remaining artifacts from your system.
    #free #streamings #hidden #dangersand #how
    Free streaming’s hidden dangers–and how to protect your Mac
    Macworld Streaming services have become the most popular way to watch movies and TV on a Mac. But rising prices and the number of services now available can make it hard to afford all the subscriptions required to deliver the content you want to watch. That means it’s tempting when you come across websites like MyFlixer, which offers loads of AAA titles at no cost. Of course, there’s no such thing as a free lunch, and you should always be deeply suspicious of sites that contain free versions of premium content. MyFlixer has already been banned or blocked in several countries, but mirror sites reappear quickly, making it hard to stop people accessing the portal. It’s not just the fact that the content is provides is very likely pirated, but more importantly you could soon find yourself with intrusive ads or even malware on your system that puts your personal information at risk. If you are going to continue to use MyFlixer or the like, here’s how to protect yourself and your Mac from the dangers that lurk on free streaming sites. PROMOTIONCleanMyMac: Total Cleanup and Protection CleanMyMac’s advanced malware protection safeguards your Mac from viruses, miners, keyloggers, Trojans, and other threats. MacPaw, the developer behind CleanMyMac, regularly updates its custom-built malware database to ensure your Mac machine is always protected against the latest and emerging threats. Get CleanMyMac What is the MyFlixer virus? Just visiting the MyFlixer site shouldn’t immediately infect your Mac with malware. But you’ll very quickly be prompted to accept new content alerts, push notifications or browser extensions. If you do this, you’ll then be pestered by adware to download things like companion apps, which will most likely turn out to be malware. The approaches differ for each mirror-site, but the method of getting an infection onto your system is usually similar. If you’ve already fallen for the tricks the sites employ, then you’ll need to clean up your browser prompts, remove any extensions or apps, and use anti-virus software to restore your machine back to full health. We’ll cover all these steps below so that you fix the problems that can be caused by using MyFlixer. How to remove the MyFlixer browser extension It’s quite easy to remove the MyFlixer extension from your browser. Here’s the methods needed for some of the most popular browers on macOS. How to remove the MyFlixer Safari browser extension Removing the MyFlixer Safari extension is easy and is the same way you’d remove any extension from the browser. Here’s the steps: Open Safari Go to Safari > Settings then select the Extensions tab. In the left column, click on the Extension you want to remove Click Uninstall Screenshot Martyn Casserly How to remove the MyFlixer Chrome browser extension To remove the extension on your Chrome browser, here’s what you’ll need to do: Open Chrome Click on the Extensions icon in the toolbarFind the extension you want to remove, then click the three dots to the right of its name Click Remove from Chrome You’ll be asked to confirm your decision, so click Remove to finish. Screenshot Martyn Casserly How to remove the MyFlixer Firefox browser extension If you prefer to use Firefox, here’s what’s required to remove the extension: Open Firefox Click on the Extensions icon in the tool barClick the Settings iconto the right of the extension you want to remove Select Remove Extension Confirm your choice by clicking Remove Screenshot Martyn Casserly How to stop push notifications from MyFlixer With the extension removed, you’ll still need to deal with the push notifications that will flood you with adware and potential malware. Here’s the steps to take on the most popular browsers. How to remove MyFlixer push notifications on Safari To stop notifications from MyFlixer, here’s what you’ll need to do: Open Safari Select the Websites tab In the left column select Notifications In the main pane, select the MyFlixter option and set the drop-down menu to Deny Next, select the Pop-up Windows option from the left column Again, find the MyFlixer site and this time set the drop-down menu to Block Screenshot Martyn Casserly How to remove MyFlixer push notifications on Chrome The instructions are a little different on Chrome: Open Chrome Click the three dots icon in the top right corner Select Settings > Privacy and security Scroll down and select Site settings Find the MyFlixer site and click on it Adjust all the settings to Block Go back to the Site settings page and select Pop-up and Redirects In the ‘Not allowed to send pop-ups or use redirects’ section, click Add Enter the web address that’s sending you notifications and click Add Screenshot Martyn Casserly How to remove MyFlixer push notifications on Firefox Open Firefox Click on the three lines in the top right corner Select Settings From the left column choose Privacy & Security Scroll down to Permissions and click on the Settings button for Notifications Select the Block option for the MyFlixer website Click Changes Screenshot Martyn Casserly How to find and remove MyFlixer malware Clearing a virus or malware off your system isn’t something you can really do yourself, so if you think your system may be compromised then you’ll need to use an antivirus program. You’ll see plenty of free ones around, but most of these only scan for infection and won’t remove anything until you move to the paid version – which makes sense as it is providing a professional service. We recommend taking a look at our Best Mac Antivirus Software chart to see the products that we’ve tested and found to be the most reliable. A prime example is Intego Mac Security X9, which tops the chart at the time of writing. You can find out more in our Intego Mac Security X9 review. Using this software should locate and remove any malware from your Mac that MyFlixerhas managed to install on your system. You can read a more detailed explanation of the process in our How to remove a virus from your Mac tutorial. Petter Ahrnstedt While the immediate threat is dealt with by antivirus, there can still be files and other junk left behind, so we’d also recommend you use a Mac Cleaner app to completely return your Mac to a pristine state. CleanMyMac is an excellent option, with a friendly and easy to understand interface that allows you to know what needs fixing without bombarding you with confusing information. You can find out more in our CleanMyMac review. Once you have these apps on your Mac, it’s a good idea to run them periodically to ensure your data is safe and that your system is running to its full potential. How to avoid the MyFlixer virus While free streaming sites might seem incredibly tempting, there’s often a hidden cost involved…and it can be nasty. Basically, if you’re being offered something that you know you’d normally have to pay for, then the chances are it’s some kind of scam or delivery method for malware. So, to stay safe, don’t visit those sites and certainly don’t download anything from them. That’s just asking for trouble. If you really want to enjoy movies and TV shows on your Mac, then the safest way is through a paid service. It means you’re not ripping off the people that work hard to create the content and aren’t playing into the hands of cybercriminals that want to steal your data. You don’t have to sign up to all of them at the same time though. Most services offer free trials, so you could always work your way through those first. When you’ve exhausted those, simply sign up to one and binge what you want, then cancel your subscription and repeat the process on the next one. This way you minimise what you have to pay, while ensuring you don’t get any dangerous malware on your computer. FAQ 1. What is MyFlixer? A site that offers free TV and movie streaming, often of pirated content from other studios. 2. Is MyFlixer safe? No, MyFlixer is not safe. There are usually prompts for notifications, extensions and downloads that can contain adware and malware. If you decide to use MyFlixer then you should take steps to ensure your computer and your data is protected. 3. Is MyFlixer legal? Distrubuting content for which the site doesn’t have copyright is illegal. This is why the site has been banned or blocked in various countries. 4. How to block MyFlixer ads? Change the settings in your browser to block pop-up ads and notifications. 5. How to protect your Mac from MyFlixer virus? Install and use a quality antivirus app and run a Mac Cleaner app afterwards to remove any remaining artifacts from your system. #free #streamings #hidden #dangersand #how
    WWW.MACWORLD.COM
    Free streaming’s hidden dangers–and how to protect your Mac
    Macworld Streaming services have become the most popular way to watch movies and TV on a Mac. But rising prices and the number of services now available can make it hard to afford all the subscriptions required to deliver the content you want to watch. That means it’s tempting when you come across websites like MyFlixer, which offers loads of AAA titles at no cost. Of course, there’s no such thing as a free lunch, and you should always be deeply suspicious of sites that contain free versions of premium content. MyFlixer has already been banned or blocked in several countries, but mirror sites reappear quickly, making it hard to stop people accessing the portal. It’s not just the fact that the content is provides is very likely pirated, but more importantly you could soon find yourself with intrusive ads or even malware on your system that puts your personal information at risk. If you are going to continue to use MyFlixer or the like, here’s how to protect yourself and your Mac from the dangers that lurk on free streaming sites. PROMOTIONCleanMyMac: Total Cleanup and Protection CleanMyMac’s advanced malware protection safeguards your Mac from viruses, miners, keyloggers, Trojans, and other threats. MacPaw, the developer behind CleanMyMac, regularly updates its custom-built malware database to ensure your Mac machine is always protected against the latest and emerging threats. Get CleanMyMac What is the MyFlixer virus? Just visiting the MyFlixer site shouldn’t immediately infect your Mac with malware. But you’ll very quickly be prompted to accept new content alerts, push notifications or browser extensions. If you do this, you’ll then be pestered by adware to download things like companion apps, which will most likely turn out to be malware. The approaches differ for each mirror-site, but the method of getting an infection onto your system is usually similar. If you’ve already fallen for the tricks the sites employ, then you’ll need to clean up your browser prompts, remove any extensions or apps, and use anti-virus software to restore your machine back to full health. We’ll cover all these steps below so that you fix the problems that can be caused by using MyFlixer. How to remove the MyFlixer browser extension It’s quite easy to remove the MyFlixer extension from your browser. Here’s the methods needed for some of the most popular browers on macOS. How to remove the MyFlixer Safari browser extension Removing the MyFlixer Safari extension is easy and is the same way you’d remove any extension from the browser. Here’s the steps: Open Safari Go to Safari > Settings then select the Extensions tab. In the left column, click on the Extension you want to remove Click Uninstall Screenshot Martyn Casserly How to remove the MyFlixer Chrome browser extension To remove the extension on your Chrome browser, here’s what you’ll need to do: Open Chrome Click on the Extensions icon in the toolbar (looks like a puzzle piece) Find the extension you want to remove, then click the three dots to the right of its name Click Remove from Chrome You’ll be asked to confirm your decision, so click Remove to finish. Screenshot Martyn Casserly How to remove the MyFlixer Firefox browser extension If you prefer to use Firefox, here’s what’s required to remove the extension: Open Firefox Click on the Extensions icon in the tool bar (looks like a puzzle piece) Click the Settings icon (Cog) to the right of the extension you want to remove Select Remove Extension Confirm your choice by clicking Remove Screenshot Martyn Casserly How to stop push notifications from MyFlixer With the extension removed, you’ll still need to deal with the push notifications that will flood you with adware and potential malware. Here’s the steps to take on the most popular browsers. How to remove MyFlixer push notifications on Safari To stop notifications from MyFlixer, here’s what you’ll need to do: Open Safari Select the Websites tab In the left column select Notifications In the main pane, select the MyFlixter option and set the drop-down menu to Deny Next, select the Pop-up Windows option from the left column Again, find the MyFlixer site and this time set the drop-down menu to Block Screenshot Martyn Casserly How to remove MyFlixer push notifications on Chrome The instructions are a little different on Chrome: Open Chrome Click the three dots icon in the top right corner Select Settings > Privacy and security Scroll down and select Site settings Find the MyFlixer site and click on it Adjust all the settings to Block Go back to the Site settings page and select Pop-up and Redirects In the ‘Not allowed to send pop-ups or use redirects’ section, click Add Enter the web address that’s sending you notifications and click Add Screenshot Martyn Casserly How to remove MyFlixer push notifications on Firefox Open Firefox Click on the three lines in the top right corner Select Settings From the left column choose Privacy & Security Scroll down to Permissions and click on the Settings button for Notifications Select the Block option for the MyFlixer website Click Save Changes Screenshot Martyn Casserly How to find and remove MyFlixer malware Clearing a virus or malware off your system isn’t something you can really do yourself, so if you think your system may be compromised then you’ll need to use an antivirus program. You’ll see plenty of free ones around, but most of these only scan for infection and won’t remove anything until you move to the paid version – which makes sense as it is providing a professional service. We recommend taking a look at our Best Mac Antivirus Software chart to see the products that we’ve tested and found to be the most reliable. A prime example is Intego Mac Security X9, which tops the chart at the time of writing. You can find out more in our Intego Mac Security X9 review. Using this software should locate and remove any malware from your Mac that MyFlixer (or any other site) has managed to install on your system. You can read a more detailed explanation of the process in our How to remove a virus from your Mac tutorial. Petter Ahrnstedt While the immediate threat is dealt with by antivirus, there can still be files and other junk left behind, so we’d also recommend you use a Mac Cleaner app to completely return your Mac to a pristine state. CleanMyMac is an excellent option, with a friendly and easy to understand interface that allows you to know what needs fixing without bombarding you with confusing information. You can find out more in our CleanMyMac review. Once you have these apps on your Mac, it’s a good idea to run them periodically to ensure your data is safe and that your system is running to its full potential. How to avoid the MyFlixer virus While free streaming sites might seem incredibly tempting, there’s often a hidden cost involved…and it can be nasty. Basically, if you’re being offered something that you know you’d normally have to pay for, then the chances are it’s some kind of scam or delivery method for malware. So, to stay safe, don’t visit those sites and certainly don’t download anything from them. That’s just asking for trouble. If you really want to enjoy movies and TV shows on your Mac, then the safest way is through a paid service. It means you’re not ripping off the people that work hard to create the content and aren’t playing into the hands of cybercriminals that want to steal your data. You don’t have to sign up to all of them at the same time though. Most services offer free trials, so you could always work your way through those first. When you’ve exhausted those, simply sign up to one and binge what you want, then cancel your subscription and repeat the process on the next one. This way you minimise what you have to pay, while ensuring you don’t get any dangerous malware on your computer. FAQ 1. What is MyFlixer? A site that offers free TV and movie streaming, often of pirated content from other studios. 2. Is MyFlixer safe? No, MyFlixer is not safe. There are usually prompts for notifications, extensions and downloads that can contain adware and malware. If you decide to use MyFlixer then you should take steps to ensure your computer and your data is protected. 3. Is MyFlixer legal? Distrubuting content for which the site doesn’t have copyright is illegal. This is why the site has been banned or blocked in various countries. 4. How to block MyFlixer ads? Change the settings in your browser to block pop-up ads and notifications. 5. How to protect your Mac from MyFlixer virus? Install and use a quality antivirus app and run a Mac Cleaner app afterwards to remove any remaining artifacts from your system.
    0 Comentários 0 Compartilhamentos