• In a world where vintage charm meets pixelated perfection, Leica has decided to bless us with a 64-megapixel upgrade for their digitally-converted cameras. Because who doesn't want their classic film nostalgia captured with the same clarity as a high-definition soap opera? Forget the subtleties of light and shadow; it's all about that mega resolution now! Michael Suguitan must be rolling in his grave—oh wait, he’s probably busy converting more classics to ensure the true essence of “overkill” is preserved.

    Embrace the irony, where the past is resurrected with the most modern of tech, all while collectors nod in approval, blissfully unaware that their beloved relics are now just glorified screensavers.

    #Leica
    In a world where vintage charm meets pixelated perfection, Leica has decided to bless us with a 64-megapixel upgrade for their digitally-converted cameras. Because who doesn't want their classic film nostalgia captured with the same clarity as a high-definition soap opera? Forget the subtleties of light and shadow; it's all about that mega resolution now! Michael Suguitan must be rolling in his grave—oh wait, he’s probably busy converting more classics to ensure the true essence of “overkill” is preserved. Embrace the irony, where the past is resurrected with the most modern of tech, all while collectors nod in approval, blissfully unaware that their beloved relics are now just glorified screensavers. #Leica
    HACKADAY.COM
    Digitally-Converted Leica Gets A 64-Megapixel Upgrade
    Leica’s film cameras were hugely popular in the 20th century, and remain so with collectors to this day. [Michael Suguitan] has previously had great success converting his classic Leica into …read more
    1 Комментарии 0 Поделились
  • In a world where hackers are the modern-day ninjas, lurking in the shadows of our screens, it’s fascinating to watch the dance of their tactics unfold. Enter the realm of ESD diodes—yes, those little components that seem to be the unsung heroes of electronic protection. You’d think any self-respecting hacker would treat them with the reverence they deserve. But alas, as the saying goes, not all heroes wear capes—some just forget to wear their ESD protection.

    Let’s take a moment to appreciate the artistry of neglecting ESD protection. You have your novice hackers, who, in their quest for glory, overlook the importance of these diodes, thinking, “What’s the worst that could happen? A little static never hurt anyone!” Ah, the blissful ignorance! It’s like going into battle without armor, convinced that sheer bravado will carry the day. Spoiler alert: it won’t. Their circuits will fry faster than you can say “short circuit,” leaving them wondering why their master plan turned into a crispy failure.

    Then, we have the seasoned veterans—the ones who should know better but still scoff at the idea of ESD protection. Perhaps they think they’re above such mundane concerns, like some digital demigods who can manipulate the very fabric of electronics without consequence. I mean, who needs ESD diodes when you have years of experience, right? It’s almost adorable, watching them prance into their tech disasters, blissfully unaware that their arrogance is merely a prelude to a spectacular downfall.

    And let’s not forget the “lone wolves,” those hackers who fancy themselves as rebels without a cause. They see ESD protection as a sign of weakness, a crutch for the faint-hearted. In their minds, real hackers thrive on chaos—why bother with protection when you can revel in the thrill of watching your carefully crafted device go up in flames? It’s the equivalent of a toddler throwing a tantrum because they’re told not to touch the hot stove. Spoiler alert number two: the stove doesn’t care about your feelings.

    In this grand tapestry of hacker culture, the neglect of ESD protection is not merely a technical oversight; it’s a statement, a badge of honor for those who believe they can outsmart the very devices they tinker with. But let’s be real: ESD diodes are the unsung protectors of the digital realm, and ignoring them is like inviting disaster to your tech party and hoping it doesn’t show up. Newsflash: it will.

    So, the next time you find yourself in the presence of a hacker who scoffs at ESD protections, take a moment to revel in their bravado. Just remember to pack some marshmallows for when their devices inevitably catch fire. After all, it’s only a matter of time before the sparks start flying.

    #Hackers #ESDDiodes #TechFails #CyberSecurity #DIYDisasters
    In a world where hackers are the modern-day ninjas, lurking in the shadows of our screens, it’s fascinating to watch the dance of their tactics unfold. Enter the realm of ESD diodes—yes, those little components that seem to be the unsung heroes of electronic protection. You’d think any self-respecting hacker would treat them with the reverence they deserve. But alas, as the saying goes, not all heroes wear capes—some just forget to wear their ESD protection. Let’s take a moment to appreciate the artistry of neglecting ESD protection. You have your novice hackers, who, in their quest for glory, overlook the importance of these diodes, thinking, “What’s the worst that could happen? A little static never hurt anyone!” Ah, the blissful ignorance! It’s like going into battle without armor, convinced that sheer bravado will carry the day. Spoiler alert: it won’t. Their circuits will fry faster than you can say “short circuit,” leaving them wondering why their master plan turned into a crispy failure. Then, we have the seasoned veterans—the ones who should know better but still scoff at the idea of ESD protection. Perhaps they think they’re above such mundane concerns, like some digital demigods who can manipulate the very fabric of electronics without consequence. I mean, who needs ESD diodes when you have years of experience, right? It’s almost adorable, watching them prance into their tech disasters, blissfully unaware that their arrogance is merely a prelude to a spectacular downfall. And let’s not forget the “lone wolves,” those hackers who fancy themselves as rebels without a cause. They see ESD protection as a sign of weakness, a crutch for the faint-hearted. In their minds, real hackers thrive on chaos—why bother with protection when you can revel in the thrill of watching your carefully crafted device go up in flames? It’s the equivalent of a toddler throwing a tantrum because they’re told not to touch the hot stove. Spoiler alert number two: the stove doesn’t care about your feelings. In this grand tapestry of hacker culture, the neglect of ESD protection is not merely a technical oversight; it’s a statement, a badge of honor for those who believe they can outsmart the very devices they tinker with. But let’s be real: ESD diodes are the unsung protectors of the digital realm, and ignoring them is like inviting disaster to your tech party and hoping it doesn’t show up. Newsflash: it will. So, the next time you find yourself in the presence of a hacker who scoffs at ESD protections, take a moment to revel in their bravado. Just remember to pack some marshmallows for when their devices inevitably catch fire. After all, it’s only a matter of time before the sparks start flying. #Hackers #ESDDiodes #TechFails #CyberSecurity #DIYDisasters
    Hacker Tactic: ESD Diodes
    A hacker’s view on ESD protection can tell you a lot about them. I’ve seen a good few categories of hackers neglecting ESD protection – there’s the yet-inexperienced ones, ones …read more
    Like
    Love
    Wow
    Sad
    Angry
    206
    1 Комментарии 0 Поделились
  • Ah, the magical world of 3D printing! Who would have thought that the secrets of crafting quality cosplay props could be unlocked with just a printer and a little patience? It’s almost like we’re living in a sci-fi movie, but instead of flying cars and robot servants, we get to print our own Spider-Man masks and Thor's hammers. Because, let’s face it, who needs actual craftsmanship when you have a 3D printer and a dash of delusion?

    Picture this: You walk into a convention, proudly wearing your freshly printed Spider-Man mask—its edges rough and its colors a little off, reminiscent of the last time you tried your hand at a DIY project. You can almost hear the gasps of admiration from fellow cosplayers, or maybe that’s just them trying to suppress their laughter. But hey, you saved a ton of time with that “minimal post-processing”! Who knew that “minimal” could also mean “looks like it was chewed up by a printer that’s had one too many?”

    And let’s not forget about Thor’s hammer, Mjölnir. Because nothing says “God of Thunder” quite like a clunky piece of plastic that could double as a doorstop. The best part? You can claim it’s a unique interpretation of Asgardian craftsmanship. Who needs authenticity when you have the power of 3D printing? Just make sure to avoid any actual thunder storms—after all, we wouldn’t want your new prop to melt in the rain, or worse, have it be mistaken for a water gun!

    Now, if you’re worried about how long it takes to print your masterpiece, fear not! You can always get lost in the mesmerizing whirl of the printer’s head, contemplating the deeper meaning of life while waiting for hours to see if your creation will actually resemble the image you downloaded from the internet. Spoiler alert: it probably won’t, but that’s part of the fun, right?

    Oh, and let’s not forget the joy of explaining to your friends that you “crafted” these pieces with care, while they’re blissfully unaware that you merely pressed a few buttons and hoped for the best. After all, why invest time in traditional crafting techniques when you can embrace the magic of technology?

    So, grab your 3D printer and let your imagination run wild! Who needs actual skills when you can print your dreams, layer by layer, with a side of mediocre results? Just remember, in the world of cosplay, it’s not about the journey; it’s about how many likes you can get on that Instagram post of you holding your half-finished Thor’s hammer like it’s the Holy Grail of cosplay.

    #3DPrinting #CosplayProps #SpiderMan #ThorsHammer #DIYDelusions
    Ah, the magical world of 3D printing! Who would have thought that the secrets of crafting quality cosplay props could be unlocked with just a printer and a little patience? It’s almost like we’re living in a sci-fi movie, but instead of flying cars and robot servants, we get to print our own Spider-Man masks and Thor's hammers. Because, let’s face it, who needs actual craftsmanship when you have a 3D printer and a dash of delusion? Picture this: You walk into a convention, proudly wearing your freshly printed Spider-Man mask—its edges rough and its colors a little off, reminiscent of the last time you tried your hand at a DIY project. You can almost hear the gasps of admiration from fellow cosplayers, or maybe that’s just them trying to suppress their laughter. But hey, you saved a ton of time with that “minimal post-processing”! Who knew that “minimal” could also mean “looks like it was chewed up by a printer that’s had one too many?” And let’s not forget about Thor’s hammer, Mjölnir. Because nothing says “God of Thunder” quite like a clunky piece of plastic that could double as a doorstop. The best part? You can claim it’s a unique interpretation of Asgardian craftsmanship. Who needs authenticity when you have the power of 3D printing? Just make sure to avoid any actual thunder storms—after all, we wouldn’t want your new prop to melt in the rain, or worse, have it be mistaken for a water gun! Now, if you’re worried about how long it takes to print your masterpiece, fear not! You can always get lost in the mesmerizing whirl of the printer’s head, contemplating the deeper meaning of life while waiting for hours to see if your creation will actually resemble the image you downloaded from the internet. Spoiler alert: it probably won’t, but that’s part of the fun, right? Oh, and let’s not forget the joy of explaining to your friends that you “crafted” these pieces with care, while they’re blissfully unaware that you merely pressed a few buttons and hoped for the best. After all, why invest time in traditional crafting techniques when you can embrace the magic of technology? So, grab your 3D printer and let your imagination run wild! Who needs actual skills when you can print your dreams, layer by layer, with a side of mediocre results? Just remember, in the world of cosplay, it’s not about the journey; it’s about how many likes you can get on that Instagram post of you holding your half-finished Thor’s hammer like it’s the Holy Grail of cosplay. #3DPrinting #CosplayProps #SpiderMan #ThorsHammer #DIYDelusions
    How to 3D print cosplay props: From Spider-Man masks to Thor's hammer
    Start crafting quality cosplay props with minimal post-processing.
    Like
    Love
    Wow
    Sad
    Angry
    590
    1 Комментарии 0 Поделились
  • In a world where the line between reality and digital wizardry is blurrier than ever, the recent revelations from the VFX wizards of "Emilia Pérez" are nothing short of a masterclass in illusion. Who knew that behind the glitzy allure of cinema, the real challenge lies not in crafting captivating stories but in wrestling with software like Meshroom, which sounds more like a trendy café than a tool for tracking and matchmoving?

    Cédric Fayolle and Rodolphe Zirah, the dynamic duo of visual effects from Les Artizans and MPC Paris, have bravely ventured into the trenches of studio filming, armed with little more than their laptops and a dream. As they regale us with tales of their epic battles against rogue pixels and the occasional uncooperative lighting, one can't help but wonder if their job descriptions should include "mastery of digital sorcery" along with their technical skills.

    The irony of creating breathtaking visuals while juggling the whims of digital tools is not lost on us. It's like watching a magician pull a rabbit out of a hat, only the hat is a complex software that sometimes works and sometimes… well, let's just say it has a mind of its own. Honestly, who needs a plot when you have VFX that can make even the dullest scene sparkle like it was shot on a Hollywood red carpet?

    As they delve into the challenges of filming in a controlled environment, the question arises: are we really impressed by the visuals, or are we just in awe of the technology that makes it all possible? Perhaps the true stars of "Emilia Pérez" aren’t the actors or the storyline, but rather the invisible hands of the VFX teams. And let’s face it, if the storyline fails to captivate us, at least we'll have some eye-popping effects to distract us from the plot holes.

    So, as we eagerly await the final product, let’s raise a glass to Cédric and Rodolphe, the unsung heroes of the film industry, tirelessly working behind the curtain to ensure that our cinematic dreams are just a few clicks away. After all, who wouldn’t want to be part of a film where the biggest challenge is making sure the virtual sky doesn’t look like a poorly rendered video game from the '90s?

    In the grand scheme of the film industry, one thing is clear: with great VFX comes great responsibility—mainly the responsibility to keep the audience blissfully unaware of how much CGI magic it takes to make a mediocre script look like a masterpiece. Cheers to that!

    #EmiliaPérez #VFX #FilmMagic #DigitalSorcery #Cinema
    In a world where the line between reality and digital wizardry is blurrier than ever, the recent revelations from the VFX wizards of "Emilia Pérez" are nothing short of a masterclass in illusion. Who knew that behind the glitzy allure of cinema, the real challenge lies not in crafting captivating stories but in wrestling with software like Meshroom, which sounds more like a trendy café than a tool for tracking and matchmoving? Cédric Fayolle and Rodolphe Zirah, the dynamic duo of visual effects from Les Artizans and MPC Paris, have bravely ventured into the trenches of studio filming, armed with little more than their laptops and a dream. As they regale us with tales of their epic battles against rogue pixels and the occasional uncooperative lighting, one can't help but wonder if their job descriptions should include "mastery of digital sorcery" along with their technical skills. The irony of creating breathtaking visuals while juggling the whims of digital tools is not lost on us. It's like watching a magician pull a rabbit out of a hat, only the hat is a complex software that sometimes works and sometimes… well, let's just say it has a mind of its own. Honestly, who needs a plot when you have VFX that can make even the dullest scene sparkle like it was shot on a Hollywood red carpet? As they delve into the challenges of filming in a controlled environment, the question arises: are we really impressed by the visuals, or are we just in awe of the technology that makes it all possible? Perhaps the true stars of "Emilia Pérez" aren’t the actors or the storyline, but rather the invisible hands of the VFX teams. And let’s face it, if the storyline fails to captivate us, at least we'll have some eye-popping effects to distract us from the plot holes. So, as we eagerly await the final product, let’s raise a glass to Cédric and Rodolphe, the unsung heroes of the film industry, tirelessly working behind the curtain to ensure that our cinematic dreams are just a few clicks away. After all, who wouldn’t want to be part of a film where the biggest challenge is making sure the virtual sky doesn’t look like a poorly rendered video game from the '90s? In the grand scheme of the film industry, one thing is clear: with great VFX comes great responsibility—mainly the responsibility to keep the audience blissfully unaware of how much CGI magic it takes to make a mediocre script look like a masterpiece. Cheers to that! #EmiliaPérez #VFX #FilmMagic #DigitalSorcery #Cinema
    Emilia Pérez : Les Artizans et MPC nous dévoilent les secrets des VFX !
    Nous vous proposons un retour en vidéo sur les effets visuels du film Emilia Pérez de Jacques Audiard, avec Cédric Fayolle (Superviseur VFX Général, Les Artizans) et Rodolphe Zirah (Superviseur VFX, MPC Paris). Le duo revient sur les défis d’un
    Like
    Love
    Wow
    Sad
    Angry
    519
    1 Комментарии 0 Поделились
  • Over 8M patient records leaked in healthcare data breach

    Published
    June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles!
    In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #over #patient #records #leaked #healthcare
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #over #patient #records #leaked #healthcare
    WWW.FOXNEWS.COM
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work   (Kurt "CyberGuy" Knutsson)Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data      (Kurt "CyberGuy" Knutsson)How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop   (Kurt "CyberGuy" Knutsson)5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication (2FA). It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    Like
    Love
    Wow
    Sad
    Angry
    507
    0 Комментарии 0 Поделились
  • Why an Xbox Video Game Franchise Is a Partner in a Major Exhibit at The Louvre Museum

    While it’s now accepted by many that video games are an art form, it still might be hard to believe that one is featured in an exhibit at the same museum that’s home to Leonardo da Vinci’s “Mona Lisa”: The Louvre in Paris.

    But this week, Xbox and World’s Edge Studio announced a partnership with what is arguably the most prestigious museum in the world for its new exhibition, “Mamluks 1250–1517.”

    Related Stories

    For those who are unaware of how the gaming studios connect to this aspect of the Egyptian Syrian empire: The Mamluks cavalry are among the many units featured in Xbox and World’s Edge Studio’s “Age of Empires” video game franchise. The cavalry is a fan favorite choice in the game centered around traversing the ages and competing against rival empires, particularly in “Age of Empires II: Definitive Edition.”

    Popular on Variety

    Presented at the Louvre until July 28, the exhibit “Mamluks 1250–1517″ recounts “the glorious and unique history of this Egyptian Syrian empire, which represents a golden age for the Near East during the Islamic era,” per its official description. “Bringing together 260 pieces from international collections, the exhibition explores the richness of this singular and lesser-known society through a spectacular and immersive scenography.”

    This marks the first time a video game franchise has collaborated with the Louvre Museum, with installations and events that occur both in person at the museum and online through the “Age of Empires” game:

    Official “Louvre Museum” scenario in Age of Empires II: Definitive Edition
    Players can embody General Baybars and Sultan Qutuz at the really heart of the Ain Jalut battle, which opposed the Mamluk Sultanate to the Mongol Empire. This scenario, speciallycreated for the occasion, is already available in Age of Empires II: Definitive Edition.Exclusive Gaming Night on Twitch Live from the Louvre
    On Thursday, June 12, at 8 PM, streamer and journalist Samuel Etiennewill replay live from the exhibition “Mamluks 1250-1517” at the Louvre the official“Louvre Museum” scenario to relive the famous Battle of Ain Jalut on the game Age of EmpiresII: Definitive Edition, in the presence of Le Louvre Teams and one of the studio’s developers.This is an opportunity to learn more about the history of the Mamluks and their representationin the various episodes of the saga.Cross-Interview: The Louvre x Age of Empires
    To discover more, an interview featuring Adam Isgreen, creative director at World’s Edge, thestudio behind the franchise, and Souraya Noujaïm and Carine Juvin, curators of the exhibition,is available on the YouTube channels of the Louvre and Age of Empires.Mediation and Gaming Sessions at the Museum
    Museum visitors at the Louvre are invited to test the scenario of the Battle of Ain Jalut,specially designed for the Mamluk exhibition, in the presence of a Louvre mediator and anXbox representative during an exceptional series of workshops. The sessions will take place onFridays, June 20, 27, and 4 & 11 of July. All information and registrations are available here:www.louvre.fr

    “World’s Edge is honoured to collaborate with Le Louvre,” head of World’s Edge studio Michael Mann said. “The ‘Age of Empires’ franchise has been bringing history to life for more than 65 million players around the world for almost 30 years. We’ve always believed in the great potential for our games to spark an interest in history and culture. We often hear of teachers using ‘Age of Empires’ to teach history to their students and stories from our players about how ‘Age of Empires’ has driven them to learn more, or even to pursue history academically or as a career. This opportunity to bring the amazing stories of the Mamluks to new audiences through the Louvre’s exhibition is one we’re excited to be a part of. We hope that through the excellent work of the Louvre’s team, the legacy of the Mamluks can be shared around the world, and that people enjoy their stories as they come to life through ‘Age of Empires.'”

    “We are delighted to welcome ‘Age of Empires’ as part of the exhibition Mamluks 1250–1517, through a unique partnership that blends the pleasures of gaming with learning and discovery,” Souraya Noujaim, director of the Department of Islamic Arts and chief curator of the exhibition at le Louvre Museum, said. “It is a way for the museum to engage with diverse audiences and offer a new narrative, one that resonates with contemporary sensitivities, allowing for a deeper understanding of artworks and a greater openness to world history. Beyond the game, the museum experience becomes an opportunity to move from the virtual to the real and uncover the true history of the Mamluks and their unique contribution to universal heritage.”

    See video and images below from the “Age of Empires” in-game event and the in-person exhibit at the Louvre.
    #why #xbox #video #game #franchise
    Why an Xbox Video Game Franchise Is a Partner in a Major Exhibit at The Louvre Museum
    While it’s now accepted by many that video games are an art form, it still might be hard to believe that one is featured in an exhibit at the same museum that’s home to Leonardo da Vinci’s “Mona Lisa”: The Louvre in Paris. But this week, Xbox and World’s Edge Studio announced a partnership with what is arguably the most prestigious museum in the world for its new exhibition, “Mamluks 1250–1517.” Related Stories For those who are unaware of how the gaming studios connect to this aspect of the Egyptian Syrian empire: The Mamluks cavalry are among the many units featured in Xbox and World’s Edge Studio’s “Age of Empires” video game franchise. The cavalry is a fan favorite choice in the game centered around traversing the ages and competing against rival empires, particularly in “Age of Empires II: Definitive Edition.” Popular on Variety Presented at the Louvre until July 28, the exhibit “Mamluks 1250–1517″ recounts “the glorious and unique history of this Egyptian Syrian empire, which represents a golden age for the Near East during the Islamic era,” per its official description. “Bringing together 260 pieces from international collections, the exhibition explores the richness of this singular and lesser-known society through a spectacular and immersive scenography.” This marks the first time a video game franchise has collaborated with the Louvre Museum, with installations and events that occur both in person at the museum and online through the “Age of Empires” game: Official “Louvre Museum” scenario in Age of Empires II: Definitive Edition Players can embody General Baybars and Sultan Qutuz at the really heart of the Ain Jalut battle, which opposed the Mamluk Sultanate to the Mongol Empire. This scenario, speciallycreated for the occasion, is already available in Age of Empires II: Definitive Edition.Exclusive Gaming Night on Twitch Live from the Louvre On Thursday, June 12, at 8 PM, streamer and journalist Samuel Etiennewill replay live from the exhibition “Mamluks 1250-1517” at the Louvre the official“Louvre Museum” scenario to relive the famous Battle of Ain Jalut on the game Age of EmpiresII: Definitive Edition, in the presence of Le Louvre Teams and one of the studio’s developers.This is an opportunity to learn more about the history of the Mamluks and their representationin the various episodes of the saga.Cross-Interview: The Louvre x Age of Empires To discover more, an interview featuring Adam Isgreen, creative director at World’s Edge, thestudio behind the franchise, and Souraya Noujaïm and Carine Juvin, curators of the exhibition,is available on the YouTube channels of the Louvre and Age of Empires.Mediation and Gaming Sessions at the Museum Museum visitors at the Louvre are invited to test the scenario of the Battle of Ain Jalut,specially designed for the Mamluk exhibition, in the presence of a Louvre mediator and anXbox representative during an exceptional series of workshops. The sessions will take place onFridays, June 20, 27, and 4 & 11 of July. All information and registrations are available here:www.louvre.fr “World’s Edge is honoured to collaborate with Le Louvre,” head of World’s Edge studio Michael Mann said. “The ‘Age of Empires’ franchise has been bringing history to life for more than 65 million players around the world for almost 30 years. We’ve always believed in the great potential for our games to spark an interest in history and culture. We often hear of teachers using ‘Age of Empires’ to teach history to their students and stories from our players about how ‘Age of Empires’ has driven them to learn more, or even to pursue history academically or as a career. This opportunity to bring the amazing stories of the Mamluks to new audiences through the Louvre’s exhibition is one we’re excited to be a part of. We hope that through the excellent work of the Louvre’s team, the legacy of the Mamluks can be shared around the world, and that people enjoy their stories as they come to life through ‘Age of Empires.'” “We are delighted to welcome ‘Age of Empires’ as part of the exhibition Mamluks 1250–1517, through a unique partnership that blends the pleasures of gaming with learning and discovery,” Souraya Noujaim, director of the Department of Islamic Arts and chief curator of the exhibition at le Louvre Museum, said. “It is a way for the museum to engage with diverse audiences and offer a new narrative, one that resonates with contemporary sensitivities, allowing for a deeper understanding of artworks and a greater openness to world history. Beyond the game, the museum experience becomes an opportunity to move from the virtual to the real and uncover the true history of the Mamluks and their unique contribution to universal heritage.” See video and images below from the “Age of Empires” in-game event and the in-person exhibit at the Louvre. #why #xbox #video #game #franchise
    VARIETY.COM
    Why an Xbox Video Game Franchise Is a Partner in a Major Exhibit at The Louvre Museum
    While it’s now accepted by many that video games are an art form, it still might be hard to believe that one is featured in an exhibit at the same museum that’s home to Leonardo da Vinci’s “Mona Lisa”: The Louvre in Paris. But this week, Xbox and World’s Edge Studio announced a partnership with what is arguably the most prestigious museum in the world for its new exhibition, “Mamluks 1250–1517.” Related Stories For those who are unaware of how the gaming studios connect to this aspect of the Egyptian Syrian empire: The Mamluks cavalry are among the many units featured in Xbox and World’s Edge Studio’s “Age of Empires” video game franchise. The cavalry is a fan favorite choice in the game centered around traversing the ages and competing against rival empires, particularly in “Age of Empires II: Definitive Edition.” Popular on Variety Presented at the Louvre until July 28, the exhibit “Mamluks 1250–1517″ recounts “the glorious and unique history of this Egyptian Syrian empire, which represents a golden age for the Near East during the Islamic era,” per its official description. “Bringing together 260 pieces from international collections, the exhibition explores the richness of this singular and lesser-known society through a spectacular and immersive scenography.” This marks the first time a video game franchise has collaborated with the Louvre Museum, with installations and events that occur both in person at the museum and online through the “Age of Empires” game: Official “Louvre Museum” scenario in Age of Empires II: Definitive Edition Players can embody General Baybars and Sultan Qutuz at the really heart of the Ain Jalut battle(1260), which opposed the Mamluk Sultanate to the Mongol Empire. This scenario, speciallycreated for the occasion, is already available in Age of Empires II: Definitive Edition (see onhttp://www.ageofempire.com/lelouvre for instructions on finding the map in the game) [LiveTuesday 10th at 9am PT/6pm BST].Exclusive Gaming Night on Twitch Live from the Louvre On Thursday, June 12, at 8 PM, streamer and journalist Samuel Etienne (1.1M FrenchStreamer) will replay live from the exhibition “Mamluks 1250-1517” at the Louvre the official“Louvre Museum” scenario to relive the famous Battle of Ain Jalut on the game Age of EmpiresII: Definitive Edition, in the presence of Le Louvre Teams and one of the studio’s developers.This is an opportunity to learn more about the history of the Mamluks and their representationin the various episodes of the saga.Cross-Interview: The Louvre x Age of Empires To discover more, an interview featuring Adam Isgreen, creative director at World’s Edge, thestudio behind the franchise, and Souraya Noujaïm and Carine Juvin, curators of the exhibition,is available on the YouTube channels of the Louvre and Age of Empires.Mediation and Gaming Sessions at the Museum Museum visitors at the Louvre are invited to test the scenario of the Battle of Ain Jalut,specially designed for the Mamluk exhibition, in the presence of a Louvre mediator and anXbox representative during an exceptional series of workshops. The sessions will take place onFridays, June 20, 27, and 4 & 11 of July. All information and registrations are available here:www.louvre.fr “World’s Edge is honoured to collaborate with Le Louvre,” head of World’s Edge studio Michael Mann said. “The ‘Age of Empires’ franchise has been bringing history to life for more than 65 million players around the world for almost 30 years. We’ve always believed in the great potential for our games to spark an interest in history and culture. We often hear of teachers using ‘Age of Empires’ to teach history to their students and stories from our players about how ‘Age of Empires’ has driven them to learn more, or even to pursue history academically or as a career. This opportunity to bring the amazing stories of the Mamluks to new audiences through the Louvre’s exhibition is one we’re excited to be a part of. We hope that through the excellent work of the Louvre’s team, the legacy of the Mamluks can be shared around the world, and that people enjoy their stories as they come to life through ‘Age of Empires.'” “We are delighted to welcome ‘Age of Empires’ as part of the exhibition Mamluks 1250–1517, through a unique partnership that blends the pleasures of gaming with learning and discovery,” Souraya Noujaim, director of the Department of Islamic Arts and chief curator of the exhibition at le Louvre Museum, said. “It is a way for the museum to engage with diverse audiences and offer a new narrative, one that resonates with contemporary sensitivities, allowing for a deeper understanding of artworks and a greater openness to world history. Beyond the game, the museum experience becomes an opportunity to move from the virtual to the real and uncover the true history of the Mamluks and their unique contribution to universal heritage.” See video and images below from the “Age of Empires” in-game event and the in-person exhibit at the Louvre.
    0 Комментарии 0 Поделились
  • Adidas data breach reveals customer info in vendor attack

    Published
    June 4, 2025 10:00am EDT close Windows bug leaves computer Wi-Fi vulnerable to hackers Kurt "CyberGuy" Knutsson explains how to keep your Windows computer safe and the security risks of online retail giant Temu. NEWYou can now listen to Fox News articles!
    Hackers are no longer targeting only tech giants or hospitals. Any business that collects valuable personal information, such as names, phone numbers, email addresses or even basic financial details, is now a target.Companies that rely heavily on third-party vendors or outsourced customer support are even more at risk, especially if they are not particularly strong in the technology sector.German retailer Adidas learned this the hard way. The company recently confirmed a data breach involving one of its external partners, and although it has acknowledged the issue, many important details are still missing. A hacker at workAdidas confirms vendor breach: Here’s what we knowAdidas has officially acknowledged that a third-party vendor suffered a breach, resulting in unauthorized access to consumer data. In a public notice titled "Data Security Information," the company revealed that a "third-party customer service provider" had been compromised. While the brand was initially silent on the scope, it had already been reported earlier this month that customers in Turkey and Korea had received breach notifications.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSAdidas posted this information on both its German and English websites. However, no specific region or number of affected individuals has been confirmed. The company’s statement did clarify that no payment information, such as credit card details, nor passwords were included in the breach. Instead, it involved contact details submitted by users to Adidas’ help desk in the past.Data obtained reportedly includes names, phone numbers, email addresses and dates of birth. While this might seem limited compared to financial data, this type of information can be exploited for phishing scams and identity theft.  An Adidas signWhat Adidas told customers after the breachIn the wake of the breach, Adidas began notifying potentially affected customers directly. The company's email to customers below aimed to reassure recipients and clarify what information was involved. Here is the full text of the notification sent to affected individuals.Dear customer,We are writing to inform you of an issue that we recently became aware of which may have impacted some of your data.What happenedadidas recently learned that an unauthorized external party gained access to certain customer data through a third-party customer service provider.What information was involvedThe affected data does not contain passwords, credit card or any other payment-related information. Nor have any Social Security numbers been impacted.It mainly consists of contact information relating to customers who had contacted our customer service help desk in the past. This may have included one or more of the following: name, email address, telephone number, gender and/or birth date.What we are doing Privacy and the security of your data is our priority. Upon becoming aware of this incident, adidas took proactive and immediate steps to investigate and contain the incident. This includes further enhancing security measures and resetting passwords for customer service accounts.What you can doWe are currently unaware of any harmbeing caused to our customers as a result of this incident. There are no immediate steps that you need to take. Although, as always, please remain vigilant and look out for any suspicious messages. As a reminder, adidas will never directly contact you to ask that you provide us with financial information, such as your credit card details, bank account information or passwords.Who you can contactIf you have any questions, then please contact our Customer Service team at  apologise for any inconvenience caused by this incident.adidas TeamWhat Adidas hasn’t said about the vendor hackDespite the official acknowledgment, several questions remain unanswered. Adidas has yet to clarify whether this is a single breach affecting multiple regions or several separate incidents. The lack of transparency around the name of the third-party vendor and the absence of concrete numbers or locations for affected users has created frustration among observers and possibly among customers themselves.The earlier regional reports from Turkey and Korea might suggest that this incident was either global in scale or that similar third-party vendors were independently targeted. In either case, the company's current handling of the situation has left room for speculation. Adidas claims it is in the process of informing potentially affected customers, but it has not detailed the method or timeline for this outreach.We reached out to adidas for a comment, and a representative referred us to this statement on their website. In part, the company said, "We remain fully committed to protecting the privacy and security of our consumers, and sincerely regret any inconvenience or concern caused by this incident."GET FOX BUSINESS ON THE GO BY CLICKING HERE An Adidas shoe6 critical steps to take after the Adidas data breachIf you think you were affected or just want to be cautious, here are some steps you can take right now to stay safe from the Adidas data breach:1. Scrub your data from the internet using a personal data removal service: The more exposed your personal information is online, the easier it is for scammers to use it against you. Following the Adidas breach, consider removing your information from public databases and people-search sites. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Watch out for phishing scams and use strong antivirus software: With access to your email and phone number, Adidas attackers can craft convincing phishing emails pretending to be from healthcare providers or banks. These emails might include malicious links designed to install malware or steal login information. To defend yourself, use a strong antivirus program. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Safeguard against identity theft and use identity theft protection: Hackers now have access to high-value information from the Adidas breach. This makes you a prime target for identity theft. You might want to consider investing in identity theft protection, which can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Signing up for identity theft protection gives you 24/7 monitoring, alerts for unusual activity and support if your identity is stolen. See my tips and best picks on how to protect yourself from identity theft.4. Set up fraud alerts: Requesting fraud alerts notifies creditors that they need extra verification before issuing credit in your name. You can request fraud alerts through any one of the three major credit bureaus; they’ll notify the others. This adds another layer of protection without completely freezing access to credit.5. Change passwords and use a password manager: Update passwords on any accounts tied to compromised data. Use unique passwords that are hard to guess and let a password manager do the heavy lifting by generating secure ones for you. Reused passwords are an easy target after breaches. Consider password managers for convenience and security. Get more details about my best expert-reviewed password managers of 2025 here.6. Be wary of social engineering attacks: Hackers may use stolen details like names or birthdates from breaches in phone scams or fake customer service calls designed to trick you into revealing more sensitive info. Never share personal details over unsolicited calls or emails. Social engineering attacks rely on trust, and vigilance is key.Kurt’s key takeawayThe Adidas breach shows that even companies with decades of brand equity and a massive global footprint are not immune to lapses in data security. It underscores the need for companies to go beyond basic compliance and actively evaluate the cybersecurity standards of every partner in their ecosystem. Consumers are becoming increasingly aware of the trade-offs they make when sharing their personal information, and brands that fail to meet this moment may find their reputations eroding faster than they expect.CLICK HERE TO GET THE FOX NEWS APPShould retailers be penalized for neglecting basic cybersecurity practices? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #adidas #data #breach #reveals #customer
    Adidas data breach reveals customer info in vendor attack
    Published June 4, 2025 10:00am EDT close Windows bug leaves computer Wi-Fi vulnerable to hackers Kurt "CyberGuy" Knutsson explains how to keep your Windows computer safe and the security risks of online retail giant Temu. NEWYou can now listen to Fox News articles! Hackers are no longer targeting only tech giants or hospitals. Any business that collects valuable personal information, such as names, phone numbers, email addresses or even basic financial details, is now a target.Companies that rely heavily on third-party vendors or outsourced customer support are even more at risk, especially if they are not particularly strong in the technology sector.German retailer Adidas learned this the hard way. The company recently confirmed a data breach involving one of its external partners, and although it has acknowledged the issue, many important details are still missing. A hacker at workAdidas confirms vendor breach: Here’s what we knowAdidas has officially acknowledged that a third-party vendor suffered a breach, resulting in unauthorized access to consumer data. In a public notice titled "Data Security Information," the company revealed that a "third-party customer service provider" had been compromised. While the brand was initially silent on the scope, it had already been reported earlier this month that customers in Turkey and Korea had received breach notifications.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSAdidas posted this information on both its German and English websites. However, no specific region or number of affected individuals has been confirmed. The company’s statement did clarify that no payment information, such as credit card details, nor passwords were included in the breach. Instead, it involved contact details submitted by users to Adidas’ help desk in the past.Data obtained reportedly includes names, phone numbers, email addresses and dates of birth. While this might seem limited compared to financial data, this type of information can be exploited for phishing scams and identity theft.  An Adidas signWhat Adidas told customers after the breachIn the wake of the breach, Adidas began notifying potentially affected customers directly. The company's email to customers below aimed to reassure recipients and clarify what information was involved. Here is the full text of the notification sent to affected individuals.Dear customer,We are writing to inform you of an issue that we recently became aware of which may have impacted some of your data.What happenedadidas recently learned that an unauthorized external party gained access to certain customer data through a third-party customer service provider.What information was involvedThe affected data does not contain passwords, credit card or any other payment-related information. Nor have any Social Security numbers been impacted.It mainly consists of contact information relating to customers who had contacted our customer service help desk in the past. This may have included one or more of the following: name, email address, telephone number, gender and/or birth date.What we are doing Privacy and the security of your data is our priority. Upon becoming aware of this incident, adidas took proactive and immediate steps to investigate and contain the incident. This includes further enhancing security measures and resetting passwords for customer service accounts.What you can doWe are currently unaware of any harmbeing caused to our customers as a result of this incident. There are no immediate steps that you need to take. Although, as always, please remain vigilant and look out for any suspicious messages. As a reminder, adidas will never directly contact you to ask that you provide us with financial information, such as your credit card details, bank account information or passwords.Who you can contactIf you have any questions, then please contact our Customer Service team at  apologise for any inconvenience caused by this incident.adidas TeamWhat Adidas hasn’t said about the vendor hackDespite the official acknowledgment, several questions remain unanswered. Adidas has yet to clarify whether this is a single breach affecting multiple regions or several separate incidents. The lack of transparency around the name of the third-party vendor and the absence of concrete numbers or locations for affected users has created frustration among observers and possibly among customers themselves.The earlier regional reports from Turkey and Korea might suggest that this incident was either global in scale or that similar third-party vendors were independently targeted. In either case, the company's current handling of the situation has left room for speculation. Adidas claims it is in the process of informing potentially affected customers, but it has not detailed the method or timeline for this outreach.We reached out to adidas for a comment, and a representative referred us to this statement on their website. In part, the company said, "We remain fully committed to protecting the privacy and security of our consumers, and sincerely regret any inconvenience or concern caused by this incident."GET FOX BUSINESS ON THE GO BY CLICKING HERE An Adidas shoe6 critical steps to take after the Adidas data breachIf you think you were affected or just want to be cautious, here are some steps you can take right now to stay safe from the Adidas data breach:1. Scrub your data from the internet using a personal data removal service: The more exposed your personal information is online, the easier it is for scammers to use it against you. Following the Adidas breach, consider removing your information from public databases and people-search sites. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Watch out for phishing scams and use strong antivirus software: With access to your email and phone number, Adidas attackers can craft convincing phishing emails pretending to be from healthcare providers or banks. These emails might include malicious links designed to install malware or steal login information. To defend yourself, use a strong antivirus program. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Safeguard against identity theft and use identity theft protection: Hackers now have access to high-value information from the Adidas breach. This makes you a prime target for identity theft. You might want to consider investing in identity theft protection, which can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Signing up for identity theft protection gives you 24/7 monitoring, alerts for unusual activity and support if your identity is stolen. See my tips and best picks on how to protect yourself from identity theft.4. Set up fraud alerts: Requesting fraud alerts notifies creditors that they need extra verification before issuing credit in your name. You can request fraud alerts through any one of the three major credit bureaus; they’ll notify the others. This adds another layer of protection without completely freezing access to credit.5. Change passwords and use a password manager: Update passwords on any accounts tied to compromised data. Use unique passwords that are hard to guess and let a password manager do the heavy lifting by generating secure ones for you. Reused passwords are an easy target after breaches. Consider password managers for convenience and security. Get more details about my best expert-reviewed password managers of 2025 here.6. Be wary of social engineering attacks: Hackers may use stolen details like names or birthdates from breaches in phone scams or fake customer service calls designed to trick you into revealing more sensitive info. Never share personal details over unsolicited calls or emails. Social engineering attacks rely on trust, and vigilance is key.Kurt’s key takeawayThe Adidas breach shows that even companies with decades of brand equity and a massive global footprint are not immune to lapses in data security. It underscores the need for companies to go beyond basic compliance and actively evaluate the cybersecurity standards of every partner in their ecosystem. Consumers are becoming increasingly aware of the trade-offs they make when sharing their personal information, and brands that fail to meet this moment may find their reputations eroding faster than they expect.CLICK HERE TO GET THE FOX NEWS APPShould retailers be penalized for neglecting basic cybersecurity practices? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #adidas #data #breach #reveals #customer
    WWW.FOXNEWS.COM
    Adidas data breach reveals customer info in vendor attack
    Published June 4, 2025 10:00am EDT close Windows bug leaves computer Wi-Fi vulnerable to hackers Kurt "CyberGuy" Knutsson explains how to keep your Windows computer safe and the security risks of online retail giant Temu. NEWYou can now listen to Fox News articles! Hackers are no longer targeting only tech giants or hospitals. Any business that collects valuable personal information, such as names, phone numbers, email addresses or even basic financial details, is now a target.Companies that rely heavily on third-party vendors or outsourced customer support are even more at risk, especially if they are not particularly strong in the technology sector.German retailer Adidas learned this the hard way. The company recently confirmed a data breach involving one of its external partners, and although it has acknowledged the issue, many important details are still missing. A hacker at work (Kurt "CyberGuy" Knutsson)Adidas confirms vendor breach: Here’s what we knowAdidas has officially acknowledged that a third-party vendor suffered a breach, resulting in unauthorized access to consumer data. In a public notice titled "Data Security Information," the company revealed that a "third-party customer service provider" had been compromised. While the brand was initially silent on the scope, it had already been reported earlier this month that customers in Turkey and Korea had received breach notifications.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSAdidas posted this information on both its German and English websites. However, no specific region or number of affected individuals has been confirmed. The company’s statement did clarify that no payment information, such as credit card details, nor passwords were included in the breach. Instead, it involved contact details submitted by users to Adidas’ help desk in the past.Data obtained reportedly includes names, phone numbers, email addresses and dates of birth. While this might seem limited compared to financial data, this type of information can be exploited for phishing scams and identity theft.  An Adidas sign (Kurt "CyberGuy" Knutsson)What Adidas told customers after the breachIn the wake of the breach, Adidas began notifying potentially affected customers directly. The company's email to customers below aimed to reassure recipients and clarify what information was involved. Here is the full text of the notification sent to affected individuals.Dear customer,We are writing to inform you of an issue that we recently became aware of which may have impacted some of your data.What happenedadidas recently learned that an unauthorized external party gained access to certain customer data through a third-party customer service provider.What information was involvedThe affected data does not contain passwords, credit card or any other payment-related information. Nor have any Social Security numbers been impacted.It mainly consists of contact information relating to customers who had contacted our customer service help desk in the past. This may have included one or more of the following: name, email address, telephone number, gender and/or birth date.What we are doing Privacy and the security of your data is our priority. Upon becoming aware of this incident, adidas took proactive and immediate steps to investigate and contain the incident. This includes further enhancing security measures and resetting passwords for customer service accounts.What you can doWe are currently unaware of any harm (such as identity theft or fraud) being caused to our customers as a result of this incident. There are no immediate steps that you need to take. Although, as always, please remain vigilant and look out for any suspicious messages. As a reminder, adidas will never directly contact you to ask that you provide us with financial information, such as your credit card details, bank account information or passwords.Who you can contactIf you have any questions, then please contact our Customer Service team at https://www.adidas.com/us/helpWe apologise for any inconvenience caused by this incident.adidas TeamWhat Adidas hasn’t said about the vendor hackDespite the official acknowledgment, several questions remain unanswered. Adidas has yet to clarify whether this is a single breach affecting multiple regions or several separate incidents. The lack of transparency around the name of the third-party vendor and the absence of concrete numbers or locations for affected users has created frustration among observers and possibly among customers themselves.The earlier regional reports from Turkey and Korea might suggest that this incident was either global in scale or that similar third-party vendors were independently targeted. In either case, the company's current handling of the situation has left room for speculation. Adidas claims it is in the process of informing potentially affected customers, but it has not detailed the method or timeline for this outreach.We reached out to adidas for a comment, and a representative referred us to this statement on their website. In part, the company said, "We remain fully committed to protecting the privacy and security of our consumers, and sincerely regret any inconvenience or concern caused by this incident."GET FOX BUSINESS ON THE GO BY CLICKING HERE An Adidas shoe (Kurt "CyberGuy" Knutsson)6 critical steps to take after the Adidas data breachIf you think you were affected or just want to be cautious, here are some steps you can take right now to stay safe from the Adidas data breach:1. Scrub your data from the internet using a personal data removal service: The more exposed your personal information is online, the easier it is for scammers to use it against you. Following the Adidas breach, consider removing your information from public databases and people-search sites. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Watch out for phishing scams and use strong antivirus software: With access to your email and phone number, Adidas attackers can craft convincing phishing emails pretending to be from healthcare providers or banks. These emails might include malicious links designed to install malware or steal login information. To defend yourself, use a strong antivirus program. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Safeguard against identity theft and use identity theft protection: Hackers now have access to high-value information from the Adidas breach. This makes you a prime target for identity theft. You might want to consider investing in identity theft protection, which can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Signing up for identity theft protection gives you 24/7 monitoring, alerts for unusual activity and support if your identity is stolen. See my tips and best picks on how to protect yourself from identity theft.4. Set up fraud alerts: Requesting fraud alerts notifies creditors that they need extra verification before issuing credit in your name. You can request fraud alerts through any one of the three major credit bureaus; they’ll notify the others. This adds another layer of protection without completely freezing access to credit.5. Change passwords and use a password manager: Update passwords on any accounts tied to compromised data. Use unique passwords that are hard to guess and let a password manager do the heavy lifting by generating secure ones for you. Reused passwords are an easy target after breaches. Consider password managers for convenience and security. Get more details about my best expert-reviewed password managers of 2025 here.6. Be wary of social engineering attacks: Hackers may use stolen details like names or birthdates from breaches in phone scams or fake customer service calls designed to trick you into revealing more sensitive info. Never share personal details over unsolicited calls or emails. Social engineering attacks rely on trust, and vigilance is key.Kurt’s key takeawayThe Adidas breach shows that even companies with decades of brand equity and a massive global footprint are not immune to lapses in data security. It underscores the need for companies to go beyond basic compliance and actively evaluate the cybersecurity standards of every partner in their ecosystem. Consumers are becoming increasingly aware of the trade-offs they make when sharing their personal information, and brands that fail to meet this moment may find their reputations eroding faster than they expect.CLICK HERE TO GET THE FOX NEWS APPShould retailers be penalized for neglecting basic cybersecurity practices? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    Like
    Love
    Wow
    Angry
    Sad
    216
    0 Комментарии 0 Поделились
  • Breaking down why Apple TVs are privacy advocates’ go-to streaming device

    Smart TVs, take note

    Breaking down why Apple TVs are privacy advocates’ go-to streaming device

    Using the Apple TV app or an Apple account means giving Apple more data, though.

    Scharon Harding



    Jun 1, 2025 7:35 am

    |

    22

    Credit:

    Aurich Lawson | Getty Images

    Credit:

    Aurich Lawson | Getty Images

    Story text

    Size

    Small
    Standard
    Large

    Width
    *

    Standard
    Wide

    Links

    Standard
    Orange

    * Subscribers only
      Learn more

    Every time I write an article about the escalating advertising and tracking on today's TVs, someone brings up Apple TV boxes. Among smart TVs, streaming sticks, and other streaming devices, Apple TVs are largely viewed as a safe haven.
    "Just disconnect your TV from the Internet and use an Apple TV box."
    That's the common guidance you'll hear from Ars readers for those seeking the joys of streaming without giving up too much privacy. Based on our research and the experts we've consulted, that advice is pretty solid, as Apple TVs offer significantly more privacy than other streaming hardware providers.
    But how private are Apple TV boxes, really? Apple TVs don't use automatic content recognition, but could that change? And what about the software that Apple TV users do use—could those apps provide information about you to advertisers or Apple?
    In this article, we'll delve into what makes the Apple TV's privacy stand out and examine whether users should expect the limited ads and enhanced privacy to last forever.
    Apple TV boxes limit tracking out of the box
    One of the simplest ways Apple TVs ensure better privacy is through their setup process, during which you can disable Siri, location tracking, and sending analytics data to Apple. During setup, users also receive several opportunities to review Apple's data and privacy policies. Also off by default is the boxes' ability to send voice input data to Apple.
    Most other streaming devices require users to navigate through pages of settings to disable similar tracking capabilities, which most people are unlikely to do. Apple’s approach creates a line of defense against snooping, even for those unaware of how invasive smart devices can be.

    Apple TVs running tvOS 14.5 and later also make third-party app tracking more difficult by requiring such apps to request permission before they can track users.
    "If you choose Ask App Not to Track, the app developer can’t access the system advertising identifier, which is often used to track," Apple says. "The app is also not permitted to track your activity using other information that identifies you or your device, like your email address."
    Users can access the Apple TV settings and disable the ability of third-party apps to ask permission for tracking. However, Apple could further enhance privacy by enabling this setting by default.
    The Apple TV also lets users control which apps can access the set-top box's Bluetooth functionality, photos, music, and HomeKit data, and the remote's microphone.
    "Apple’s primary business model isn’t dependent on selling targeted ads, so it has somewhat less incentive to harvest and monetize incredible amounts of your data," said RJ Cross, director of the consumer privacy program at the Public Interest Research Group. "I personally trust them more with my data than other tech companies."
    What if you share analytics data?
    If you allow your Apple TV to share analytics data with Apple or app developers, that data won't be personally identifiable, Apple says. Any collected personal data is "not logged at all, removed from reports before they’re sent to Apple, or protected by techniques, such as differential privacy," Apple says.
    Differential privacy, which injects noise into collected data, is one of the most common methods used for anonymizing data. In support documentation, Apple details its use of differential privacy:
    The first step we take is to privatize the information using local differential privacy on the user’s device. The purpose of privatization is to assure that Apple’s servers don't receive clear data. Device identifiers are removed from the data, and it is transmitted to Apple over an encrypted channel. The Apple analysis system ingests the differentially private contributions, dropping IP addresses and other metadata. The final stage is aggregation, where the privatized records are processed to compute the relevant statistics, and the aggregate statistics are then shared with relevant Apple teams. Both the ingestion and aggregation stages are performed in a restricted access environment so even the privatized data isn’t broadly accessible to Apple employees.
    What if you use an Apple account with your Apple TV?
    Another factor to consider is Apple's privacy policy regarding Apple accounts, formerly Apple IDs.

    Apple support documentation says you "need" an Apple account to use an Apple TV, but you can use the hardware without one. Still, it's common for people to log into Apple accounts on their Apple TV boxes because it makes it easier to link with other Apple products. Another reason someone might link an Apple TV box with an Apple account is to use the Apple TV app, a common way to stream on Apple TV boxes.

    So what type of data does Apple harvest from Apple accounts? According to its privacy policy, the company gathers usage data, such as "data about your activity on and use of" Apple offerings, including "app launches within our services...; browsing history; search history;product interaction."
    Other types of data Apple may collect from Apple accounts include transaction information, account information, device information, contact information, and payment information. None of that is surprising considering the type of data needed to make an Apple account work.
    Many Apple TV users can expect Apple to gather more data from their Apple account usage on other devices, such as iPhones or Macs. However, if you use the same Apple account across multiple devices, Apple recognizes that all the data it has collected from, for example, your iPhone activity, also applies to you as an Apple TV user.
    A potential workaround could be maintaining multiple Apple accounts. With an Apple account solely dedicated to your Apple TV box and Apple TV hardware and software tracking disabled as much as possible, Apple would have minimal data to ascribe to you as an Apple TV owner. You can also use your Apple TV box without an Apple account, but then you won't be able to use the Apple TV app, one of the device's key features.

    Data collection via the Apple TV app
    You can download third-party apps like Netflix and Hulu onto an Apple TV box, but most TV and movie watching on Apple TV boxes likely occurs via the Apple TV app. The app is necessary for watching content on the Apple TV+ streaming service, but it also drives usage by providing access to the libraries of manypopular streaming apps in one location. So understanding the Apple TV app’s privacy policy is critical to evaluating how private Apple TV activity truly is.
    As expected, some of the data the app gathers is necessary for the software to work. That includes, according to the app's privacy policy, "information about your purchases, downloads, activity in the Apple TV app, the content you watch, and where you watch it in the Apple TV app and in connected apps on any of your supported devices." That all makes sense for ensuring that the app remembers things like which episode of Severance you're on across devices.
    Apple collects other data, though, that isn't necessary for functionality. It says it gathers data on things like the "features you use," content pages you view, how you interact with notifications, and approximate location informationto help improve the app.
    Additionally, Apple tracks the terms you search for within the app, per its policy:
    We use Apple TV search data to improve models that power Apple TV. For example, aggregate Apple TV search queries are used to fine-tune the Apple TV search model.
    This data usage is less intrusive than that of other streaming devices, which might track your activity and then sell that data to third-party advertisers. But some people may be hesitant about having any of their activities tracked to benefit a multi-trillion-dollar conglomerate.

    Data collected from the Apple TV app used for ads
    By default, the Apple TV app also tracks "what you watch, your purchases, subscriptions, downloads, browsing, and other activities in the Apple TV app" to make personalized content recommendations. Content recommendations aren't ads in the traditional sense but instead provide a way for Apple to push you toward products by analyzing data it has on you.
    You can disable the Apple TV app's personalized recommendations, but it's a little harder than you might expect since you can't do it through the app. Instead, you need to go to the Apple TV settings and then select Apps > TV > Use Play History > Off.
    The most privacy-conscious users may wish that personalized recommendations were off by default. Darío Maestro, senior legal fellow at the nonprofit Surveillance Technology Oversight Project, noted to Ars that even though Apple TV users can opt out of personalized content recommendations, "many will not realize they can."

    Apple can also use data it gathers on you from the Apple TV app to serve traditional ads. If you allow your Apple TV box to track your location, the Apple TV app can also track your location. That data can "be used to serve geographically relevant ads," according to the Apple TV app privacy policy. Location tracking, however, is off by default on Apple TV boxes.
    Apple's tvOS doesn't have integrated ads. For comparison, some TV OSes, like Roku OS and LG's webOS, show ads on the OS's home screen and/or when showing screensavers.
    But data gathered from the Apple TV app can still help Apple's advertising efforts. This can happen if you allow personalized ads in other Apple apps serving targeted apps, such as Apple News, the App Store, or Stocks. In such cases, Apple may apply data gathered from the Apple TV app, "including information about the movies and TV shows you purchase from Apple, to serve ads in those apps that are more relevant to you," the Apple TV app privacy policy says.

    Apple also provides third-party advertisers and strategic partners with "non-personal data" gathered from the Apple TV app:
    We provide some non-personal data to our advertisers and strategic partners that work with Apple to provide our products and services, help Apple market to customers, and sell ads on Apple’s behalf to display on the App Store and Apple News and Stocks.
    Apple also shares non-personal data from the Apple TV with third parties, such as content owners, so they can pay royalties, gauge how much people are watching their shows or movies, "and improve their associated products and services," Apple says.
    Apple's policy notes:
    For example, we may share non-personal data about your transactions, viewing activity, and region, as well as aggregated user demographicssuch as age group and gender, to Apple TV strategic partners, such as content owners, so that they can measure the performance of their creative workmeet royalty and accounting requirements.
    When reached for comment, an Apple spokesperson told Ars that Apple TV users can clear their play history from the app.
    All that said, the Apple TV app still shares far less data with third parties than other streaming apps. Netflix, for example, says it discloses some personal information to advertising companies "in order to select Advertisements shown on Netflix, to facilitate interaction with Advertisements, and to measure and improve effectiveness of Advertisements."
    Warner Bros. Discovery says it discloses information about Max viewers "with advertisers, ad agencies, ad networks and platforms, and other companies to provide advertising to you based on your interests." And Disney+ users have Nielsen tracking on by default.
    What if you use Siri?
    You can easily deactivate Siri when setting up an Apple TV. But those who opt to keep the voice assistant and the ability to control Apple TV with their voice take somewhat of a privacy hit.

    According to the privacy policy accessible in Apple TV boxes' settings, Apple boxes automatically send all Siri requests to Apple's servers. If you opt into using Siri data to "Improve Siri and Dictation," Apple will store your audio data. If you opt out, audio data won't be stored, but per the policy:
    In all cases, transcripts of your interactions will be sent to Apple to process your requests and may be stored by Apple.
    Apple TV boxes also send audio and transcriptions of dictation input to Apple servers for processing. Apple says it doesn't store the audio but may store transcriptions of the audio.
    If you opt to "Improve Siri and Dictation," Apple says your history of voice requests isn't tied to your Apple account or email. But Apple is vague about how long it may store data related to voice input performed with the Apple TV if you choose this option.
    The policy states:
    Your request history, which includes transcripts and any related request data, is associated with a random identifier for up to six months and is not tied to your Apple Account or email address. After six months, you request history is disassociated from the random identifier and may be retained for up to two years. Apple may use this data to develop and improve Siri, Dictation, Search, and limited other language processing functionality in Apple products ...
    Apple may also review a subset of the transcripts of your interactions and this ... may be kept beyond two years for the ongoing improvements of products and services.
    Apple promises not to use Siri and voice data to build marketing profiles or sell them to third parties, but it hasn't always adhered to that commitment. In January, Apple agreed to pay million to settle a class-action lawsuit accusing Siri of recording private conversations and sharing them with third parties for targeted ads. In 2019, contractors reported hearing private conversations and recorded sex via Siri-gathered audio.

    Outside of Apple, we've seen voice request data used questionably, including in criminal trials and by corporate employees. Siri and dictation data also represent additional ways a person's Apple TV usage might be unexpectedly analyzed to fuel Apple's business.

    Automatic content recognition
    Apple TVs aren't preloaded with automatic content recognition, an Apple spokesperson confirmed to Ars, another plus for privacy advocates. But ACR is software, so Apple could technically add it to Apple TV boxes via a software update at some point.
    Sherman Li, the founder of Enswers, the company that first put ACR in Samsung TVs, confirmed to Ars that it's technically possible for Apple to add ACR to already-purchased Apple boxes. Years ago, Enswers retroactively added ACR to other types of streaming hardware, including Samsung and LG smart TVs.In general, though, there are challenges to adding ACR to hardware that people already own, Li explained:
    Everyone believes, in theory, you can add ACR anywhere you want at any time because it's software, but because of the wayarchitected... the interplay between the chipsets, like the SoCs, and the firmware is different in a lot of situations.
    Li pointed to numerous variables that could prevent ACR from being retroactively added to any type of streaming hardware, "including access to video frame buffers, audio streams, networking connectivity, security protocols, OSes, and app interface communication layers, especially at different levels of the stack in these devices, depending on the implementation."
    Due to the complexity of Apple TV boxes, Li suspects it would be difficult to add ACR to already-purchased Apple TVs. It would likely be simpler for Apple to release a new box with ACR if it ever decided to go down that route.

    If Apple were to add ACR to old or new Apple TV boxes, the devices would be far less private, and the move would be highly unpopular and eliminate one of the Apple TV's biggest draws.
    However, Apple reportedly has a growing interest in advertising to streaming subscribers. The Apple TV+ streaming service doesn't currently show commercials, but the company is rumored to be exploring a potential ad tier. The suspicions stem from a reported meeting between Apple and the United Kingdom's ratings body, Barb, to discuss how it might track ads on Apple TV+, according to a July report from The Telegraph.
    Since 2023, Apple has also hired several prominent names in advertising, including a former head of advertising at NBCUniversal and a new head of video ad sales. Further, Apple TV+ is one of the few streaming services to remain ad-free, and it's reported to be losing Apple billion per year since its launch.
    One day soon, Apple may have much more reason to care about advertising in streaming and being able to track the activities of people who use its streaming offerings. That has implications for Apple TV box users.
    "The more Apple creeps into the targeted ads space, the less I’ll trust them to uphold their privacy promises. You can imagine Apple TV being a natural progression for selling ads," PIRG's Cross said.
    Somewhat ironically, Apple has marketed its approach to privacy as a positive for advertisers.
    "Apple’s commitment to privacy and personal relevancy builds trust amongst readers, driving a willingness to engage with content and ads alike," Apple's advertising guide for buying ads on Apple News and Stocks reads.
    The most private streaming gadget
    It remains technologically possible for Apple to introduce intrusive tracking or ads to Apple TV boxes, but for now, the streaming devices are more private than the vast majority of alternatives, save for dumb TVs. And if Apple follows its own policies, much of the data it gathers should be kept in-house.

    However, those with strong privacy concerns should be aware that Apple does track certain tvOS activities, especially those that happen through Apple accounts, voice interaction, or the Apple TV app. And while most of Apple's streaming hardware and software settings prioritize privacy by default, some advocates believe there's room for improvement.
    For example, STOP's Maestro said:
    Unlike in the, where the upcoming Data Act will set clearer rules on transfers of data generated by smart devices, the US has no real legislation governing what happens with your data once it reaches Apple's servers. Users are left with little way to verify those privacy promises.
    Maestro suggested that Apple could address these concerns by making it easier for people to conduct security research on smart device software. "Allowing the development of alternative or modified software that can evaluate privacy settings could also increase user trust and better uphold Apple's public commitment to privacy," Maestro said.
    There are ways to limit the amount of data that advertisers can get from your Apple TV. But if you use the Apple TV app, Apple can use your activity to help make business decisions—and therefore money.
    As you might expect from a device that connects to the Internet and lets you stream shows and movies, Apple TV boxes aren't totally incapable of tracking you. But they're still the best recommendation for streaming users seeking hardware with more privacy and fewer ads.

    Scharon Harding
    Senior Technology Reporter

    Scharon Harding
    Senior Technology Reporter

    Scharon is a Senior Technology Reporter at Ars Technica writing news, reviews, and analysis on consumer gadgets and services. She's been reporting on technology for over 10 years, with bylines at Tom’s Hardware, Channelnomics, and CRN UK.

    22 Comments
    #breaking #down #why #apple #tvs
    Breaking down why Apple TVs are privacy advocates’ go-to streaming device
    Smart TVs, take note Breaking down why Apple TVs are privacy advocates’ go-to streaming device Using the Apple TV app or an Apple account means giving Apple more data, though. Scharon Harding – Jun 1, 2025 7:35 am | 22 Credit: Aurich Lawson | Getty Images Credit: Aurich Lawson | Getty Images Story text Size Small Standard Large Width * Standard Wide Links Standard Orange * Subscribers only   Learn more Every time I write an article about the escalating advertising and tracking on today's TVs, someone brings up Apple TV boxes. Among smart TVs, streaming sticks, and other streaming devices, Apple TVs are largely viewed as a safe haven. "Just disconnect your TV from the Internet and use an Apple TV box." That's the common guidance you'll hear from Ars readers for those seeking the joys of streaming without giving up too much privacy. Based on our research and the experts we've consulted, that advice is pretty solid, as Apple TVs offer significantly more privacy than other streaming hardware providers. But how private are Apple TV boxes, really? Apple TVs don't use automatic content recognition, but could that change? And what about the software that Apple TV users do use—could those apps provide information about you to advertisers or Apple? In this article, we'll delve into what makes the Apple TV's privacy stand out and examine whether users should expect the limited ads and enhanced privacy to last forever. Apple TV boxes limit tracking out of the box One of the simplest ways Apple TVs ensure better privacy is through their setup process, during which you can disable Siri, location tracking, and sending analytics data to Apple. During setup, users also receive several opportunities to review Apple's data and privacy policies. Also off by default is the boxes' ability to send voice input data to Apple. Most other streaming devices require users to navigate through pages of settings to disable similar tracking capabilities, which most people are unlikely to do. Apple’s approach creates a line of defense against snooping, even for those unaware of how invasive smart devices can be. Apple TVs running tvOS 14.5 and later also make third-party app tracking more difficult by requiring such apps to request permission before they can track users. "If you choose Ask App Not to Track, the app developer can’t access the system advertising identifier, which is often used to track," Apple says. "The app is also not permitted to track your activity using other information that identifies you or your device, like your email address." Users can access the Apple TV settings and disable the ability of third-party apps to ask permission for tracking. However, Apple could further enhance privacy by enabling this setting by default. The Apple TV also lets users control which apps can access the set-top box's Bluetooth functionality, photos, music, and HomeKit data, and the remote's microphone. "Apple’s primary business model isn’t dependent on selling targeted ads, so it has somewhat less incentive to harvest and monetize incredible amounts of your data," said RJ Cross, director of the consumer privacy program at the Public Interest Research Group. "I personally trust them more with my data than other tech companies." What if you share analytics data? If you allow your Apple TV to share analytics data with Apple or app developers, that data won't be personally identifiable, Apple says. Any collected personal data is "not logged at all, removed from reports before they’re sent to Apple, or protected by techniques, such as differential privacy," Apple says. Differential privacy, which injects noise into collected data, is one of the most common methods used for anonymizing data. In support documentation, Apple details its use of differential privacy: The first step we take is to privatize the information using local differential privacy on the user’s device. The purpose of privatization is to assure that Apple’s servers don't receive clear data. Device identifiers are removed from the data, and it is transmitted to Apple over an encrypted channel. The Apple analysis system ingests the differentially private contributions, dropping IP addresses and other metadata. The final stage is aggregation, where the privatized records are processed to compute the relevant statistics, and the aggregate statistics are then shared with relevant Apple teams. Both the ingestion and aggregation stages are performed in a restricted access environment so even the privatized data isn’t broadly accessible to Apple employees. What if you use an Apple account with your Apple TV? Another factor to consider is Apple's privacy policy regarding Apple accounts, formerly Apple IDs. Apple support documentation says you "need" an Apple account to use an Apple TV, but you can use the hardware without one. Still, it's common for people to log into Apple accounts on their Apple TV boxes because it makes it easier to link with other Apple products. Another reason someone might link an Apple TV box with an Apple account is to use the Apple TV app, a common way to stream on Apple TV boxes. So what type of data does Apple harvest from Apple accounts? According to its privacy policy, the company gathers usage data, such as "data about your activity on and use of" Apple offerings, including "app launches within our services...; browsing history; search history;product interaction." Other types of data Apple may collect from Apple accounts include transaction information, account information, device information, contact information, and payment information. None of that is surprising considering the type of data needed to make an Apple account work. Many Apple TV users can expect Apple to gather more data from their Apple account usage on other devices, such as iPhones or Macs. However, if you use the same Apple account across multiple devices, Apple recognizes that all the data it has collected from, for example, your iPhone activity, also applies to you as an Apple TV user. A potential workaround could be maintaining multiple Apple accounts. With an Apple account solely dedicated to your Apple TV box and Apple TV hardware and software tracking disabled as much as possible, Apple would have minimal data to ascribe to you as an Apple TV owner. You can also use your Apple TV box without an Apple account, but then you won't be able to use the Apple TV app, one of the device's key features. Data collection via the Apple TV app You can download third-party apps like Netflix and Hulu onto an Apple TV box, but most TV and movie watching on Apple TV boxes likely occurs via the Apple TV app. The app is necessary for watching content on the Apple TV+ streaming service, but it also drives usage by providing access to the libraries of manypopular streaming apps in one location. So understanding the Apple TV app’s privacy policy is critical to evaluating how private Apple TV activity truly is. As expected, some of the data the app gathers is necessary for the software to work. That includes, according to the app's privacy policy, "information about your purchases, downloads, activity in the Apple TV app, the content you watch, and where you watch it in the Apple TV app and in connected apps on any of your supported devices." That all makes sense for ensuring that the app remembers things like which episode of Severance you're on across devices. Apple collects other data, though, that isn't necessary for functionality. It says it gathers data on things like the "features you use," content pages you view, how you interact with notifications, and approximate location informationto help improve the app. Additionally, Apple tracks the terms you search for within the app, per its policy: We use Apple TV search data to improve models that power Apple TV. For example, aggregate Apple TV search queries are used to fine-tune the Apple TV search model. This data usage is less intrusive than that of other streaming devices, which might track your activity and then sell that data to third-party advertisers. But some people may be hesitant about having any of their activities tracked to benefit a multi-trillion-dollar conglomerate. Data collected from the Apple TV app used for ads By default, the Apple TV app also tracks "what you watch, your purchases, subscriptions, downloads, browsing, and other activities in the Apple TV app" to make personalized content recommendations. Content recommendations aren't ads in the traditional sense but instead provide a way for Apple to push you toward products by analyzing data it has on you. You can disable the Apple TV app's personalized recommendations, but it's a little harder than you might expect since you can't do it through the app. Instead, you need to go to the Apple TV settings and then select Apps > TV > Use Play History > Off. The most privacy-conscious users may wish that personalized recommendations were off by default. Darío Maestro, senior legal fellow at the nonprofit Surveillance Technology Oversight Project, noted to Ars that even though Apple TV users can opt out of personalized content recommendations, "many will not realize they can." Apple can also use data it gathers on you from the Apple TV app to serve traditional ads. If you allow your Apple TV box to track your location, the Apple TV app can also track your location. That data can "be used to serve geographically relevant ads," according to the Apple TV app privacy policy. Location tracking, however, is off by default on Apple TV boxes. Apple's tvOS doesn't have integrated ads. For comparison, some TV OSes, like Roku OS and LG's webOS, show ads on the OS's home screen and/or when showing screensavers. But data gathered from the Apple TV app can still help Apple's advertising efforts. This can happen if you allow personalized ads in other Apple apps serving targeted apps, such as Apple News, the App Store, or Stocks. In such cases, Apple may apply data gathered from the Apple TV app, "including information about the movies and TV shows you purchase from Apple, to serve ads in those apps that are more relevant to you," the Apple TV app privacy policy says. Apple also provides third-party advertisers and strategic partners with "non-personal data" gathered from the Apple TV app: We provide some non-personal data to our advertisers and strategic partners that work with Apple to provide our products and services, help Apple market to customers, and sell ads on Apple’s behalf to display on the App Store and Apple News and Stocks. Apple also shares non-personal data from the Apple TV with third parties, such as content owners, so they can pay royalties, gauge how much people are watching their shows or movies, "and improve their associated products and services," Apple says. Apple's policy notes: For example, we may share non-personal data about your transactions, viewing activity, and region, as well as aggregated user demographicssuch as age group and gender, to Apple TV strategic partners, such as content owners, so that they can measure the performance of their creative workmeet royalty and accounting requirements. When reached for comment, an Apple spokesperson told Ars that Apple TV users can clear their play history from the app. All that said, the Apple TV app still shares far less data with third parties than other streaming apps. Netflix, for example, says it discloses some personal information to advertising companies "in order to select Advertisements shown on Netflix, to facilitate interaction with Advertisements, and to measure and improve effectiveness of Advertisements." Warner Bros. Discovery says it discloses information about Max viewers "with advertisers, ad agencies, ad networks and platforms, and other companies to provide advertising to you based on your interests." And Disney+ users have Nielsen tracking on by default. What if you use Siri? You can easily deactivate Siri when setting up an Apple TV. But those who opt to keep the voice assistant and the ability to control Apple TV with their voice take somewhat of a privacy hit. According to the privacy policy accessible in Apple TV boxes' settings, Apple boxes automatically send all Siri requests to Apple's servers. If you opt into using Siri data to "Improve Siri and Dictation," Apple will store your audio data. If you opt out, audio data won't be stored, but per the policy: In all cases, transcripts of your interactions will be sent to Apple to process your requests and may be stored by Apple. Apple TV boxes also send audio and transcriptions of dictation input to Apple servers for processing. Apple says it doesn't store the audio but may store transcriptions of the audio. If you opt to "Improve Siri and Dictation," Apple says your history of voice requests isn't tied to your Apple account or email. But Apple is vague about how long it may store data related to voice input performed with the Apple TV if you choose this option. The policy states: Your request history, which includes transcripts and any related request data, is associated with a random identifier for up to six months and is not tied to your Apple Account or email address. After six months, you request history is disassociated from the random identifier and may be retained for up to two years. Apple may use this data to develop and improve Siri, Dictation, Search, and limited other language processing functionality in Apple products ... Apple may also review a subset of the transcripts of your interactions and this ... may be kept beyond two years for the ongoing improvements of products and services. Apple promises not to use Siri and voice data to build marketing profiles or sell them to third parties, but it hasn't always adhered to that commitment. In January, Apple agreed to pay million to settle a class-action lawsuit accusing Siri of recording private conversations and sharing them with third parties for targeted ads. In 2019, contractors reported hearing private conversations and recorded sex via Siri-gathered audio. Outside of Apple, we've seen voice request data used questionably, including in criminal trials and by corporate employees. Siri and dictation data also represent additional ways a person's Apple TV usage might be unexpectedly analyzed to fuel Apple's business. Automatic content recognition Apple TVs aren't preloaded with automatic content recognition, an Apple spokesperson confirmed to Ars, another plus for privacy advocates. But ACR is software, so Apple could technically add it to Apple TV boxes via a software update at some point. Sherman Li, the founder of Enswers, the company that first put ACR in Samsung TVs, confirmed to Ars that it's technically possible for Apple to add ACR to already-purchased Apple boxes. Years ago, Enswers retroactively added ACR to other types of streaming hardware, including Samsung and LG smart TVs.In general, though, there are challenges to adding ACR to hardware that people already own, Li explained: Everyone believes, in theory, you can add ACR anywhere you want at any time because it's software, but because of the wayarchitected... the interplay between the chipsets, like the SoCs, and the firmware is different in a lot of situations. Li pointed to numerous variables that could prevent ACR from being retroactively added to any type of streaming hardware, "including access to video frame buffers, audio streams, networking connectivity, security protocols, OSes, and app interface communication layers, especially at different levels of the stack in these devices, depending on the implementation." Due to the complexity of Apple TV boxes, Li suspects it would be difficult to add ACR to already-purchased Apple TVs. It would likely be simpler for Apple to release a new box with ACR if it ever decided to go down that route. If Apple were to add ACR to old or new Apple TV boxes, the devices would be far less private, and the move would be highly unpopular and eliminate one of the Apple TV's biggest draws. However, Apple reportedly has a growing interest in advertising to streaming subscribers. The Apple TV+ streaming service doesn't currently show commercials, but the company is rumored to be exploring a potential ad tier. The suspicions stem from a reported meeting between Apple and the United Kingdom's ratings body, Barb, to discuss how it might track ads on Apple TV+, according to a July report from The Telegraph. Since 2023, Apple has also hired several prominent names in advertising, including a former head of advertising at NBCUniversal and a new head of video ad sales. Further, Apple TV+ is one of the few streaming services to remain ad-free, and it's reported to be losing Apple billion per year since its launch. One day soon, Apple may have much more reason to care about advertising in streaming and being able to track the activities of people who use its streaming offerings. That has implications for Apple TV box users. "The more Apple creeps into the targeted ads space, the less I’ll trust them to uphold their privacy promises. You can imagine Apple TV being a natural progression for selling ads," PIRG's Cross said. Somewhat ironically, Apple has marketed its approach to privacy as a positive for advertisers. "Apple’s commitment to privacy and personal relevancy builds trust amongst readers, driving a willingness to engage with content and ads alike," Apple's advertising guide for buying ads on Apple News and Stocks reads. The most private streaming gadget It remains technologically possible for Apple to introduce intrusive tracking or ads to Apple TV boxes, but for now, the streaming devices are more private than the vast majority of alternatives, save for dumb TVs. And if Apple follows its own policies, much of the data it gathers should be kept in-house. However, those with strong privacy concerns should be aware that Apple does track certain tvOS activities, especially those that happen through Apple accounts, voice interaction, or the Apple TV app. And while most of Apple's streaming hardware and software settings prioritize privacy by default, some advocates believe there's room for improvement. For example, STOP's Maestro said: Unlike in the, where the upcoming Data Act will set clearer rules on transfers of data generated by smart devices, the US has no real legislation governing what happens with your data once it reaches Apple's servers. Users are left with little way to verify those privacy promises. Maestro suggested that Apple could address these concerns by making it easier for people to conduct security research on smart device software. "Allowing the development of alternative or modified software that can evaluate privacy settings could also increase user trust and better uphold Apple's public commitment to privacy," Maestro said. There are ways to limit the amount of data that advertisers can get from your Apple TV. But if you use the Apple TV app, Apple can use your activity to help make business decisions—and therefore money. As you might expect from a device that connects to the Internet and lets you stream shows and movies, Apple TV boxes aren't totally incapable of tracking you. But they're still the best recommendation for streaming users seeking hardware with more privacy and fewer ads. Scharon Harding Senior Technology Reporter Scharon Harding Senior Technology Reporter Scharon is a Senior Technology Reporter at Ars Technica writing news, reviews, and analysis on consumer gadgets and services. She's been reporting on technology for over 10 years, with bylines at Tom’s Hardware, Channelnomics, and CRN UK. 22 Comments #breaking #down #why #apple #tvs
    ARSTECHNICA.COM
    Breaking down why Apple TVs are privacy advocates’ go-to streaming device
    Smart TVs, take note Breaking down why Apple TVs are privacy advocates’ go-to streaming device Using the Apple TV app or an Apple account means giving Apple more data, though. Scharon Harding – Jun 1, 2025 7:35 am | 22 Credit: Aurich Lawson | Getty Images Credit: Aurich Lawson | Getty Images Story text Size Small Standard Large Width * Standard Wide Links Standard Orange * Subscribers only   Learn more Every time I write an article about the escalating advertising and tracking on today's TVs, someone brings up Apple TV boxes. Among smart TVs, streaming sticks, and other streaming devices, Apple TVs are largely viewed as a safe haven. "Just disconnect your TV from the Internet and use an Apple TV box." That's the common guidance you'll hear from Ars readers for those seeking the joys of streaming without giving up too much privacy. Based on our research and the experts we've consulted, that advice is pretty solid, as Apple TVs offer significantly more privacy than other streaming hardware providers. But how private are Apple TV boxes, really? Apple TVs don't use automatic content recognition (ACR, a user-tracking technology leveraged by nearly all smart TVs and streaming devices), but could that change? And what about the software that Apple TV users do use—could those apps provide information about you to advertisers or Apple? In this article, we'll delve into what makes the Apple TV's privacy stand out and examine whether users should expect the limited ads and enhanced privacy to last forever. Apple TV boxes limit tracking out of the box One of the simplest ways Apple TVs ensure better privacy is through their setup process, during which you can disable Siri, location tracking, and sending analytics data to Apple. During setup, users also receive several opportunities to review Apple's data and privacy policies. Also off by default is the boxes' ability to send voice input data to Apple. Most other streaming devices require users to navigate through pages of settings to disable similar tracking capabilities, which most people are unlikely to do. Apple’s approach creates a line of defense against snooping, even for those unaware of how invasive smart devices can be. Apple TVs running tvOS 14.5 and later also make third-party app tracking more difficult by requiring such apps to request permission before they can track users. "If you choose Ask App Not to Track, the app developer can’t access the system advertising identifier (IDFA), which is often used to track," Apple says. "The app is also not permitted to track your activity using other information that identifies you or your device, like your email address." Users can access the Apple TV settings and disable the ability of third-party apps to ask permission for tracking. However, Apple could further enhance privacy by enabling this setting by default. The Apple TV also lets users control which apps can access the set-top box's Bluetooth functionality, photos, music, and HomeKit data (if applicable), and the remote's microphone. "Apple’s primary business model isn’t dependent on selling targeted ads, so it has somewhat less incentive to harvest and monetize incredible amounts of your data," said RJ Cross, director of the consumer privacy program at the Public Interest Research Group (PIRG). "I personally trust them more with my data than other tech companies." What if you share analytics data? If you allow your Apple TV to share analytics data with Apple or app developers, that data won't be personally identifiable, Apple says. Any collected personal data is "not logged at all, removed from reports before they’re sent to Apple, or protected by techniques, such as differential privacy," Apple says. Differential privacy, which injects noise into collected data, is one of the most common methods used for anonymizing data. In support documentation (PDF), Apple details its use of differential privacy: The first step we take is to privatize the information using local differential privacy on the user’s device. The purpose of privatization is to assure that Apple’s servers don't receive clear data. Device identifiers are removed from the data, and it is transmitted to Apple over an encrypted channel. The Apple analysis system ingests the differentially private contributions, dropping IP addresses and other metadata. The final stage is aggregation, where the privatized records are processed to compute the relevant statistics, and the aggregate statistics are then shared with relevant Apple teams. Both the ingestion and aggregation stages are performed in a restricted access environment so even the privatized data isn’t broadly accessible to Apple employees. What if you use an Apple account with your Apple TV? Another factor to consider is Apple's privacy policy regarding Apple accounts, formerly Apple IDs. Apple support documentation says you "need" an Apple account to use an Apple TV, but you can use the hardware without one. Still, it's common for people to log into Apple accounts on their Apple TV boxes because it makes it easier to link with other Apple products. Another reason someone might link an Apple TV box with an Apple account is to use the Apple TV app, a common way to stream on Apple TV boxes. So what type of data does Apple harvest from Apple accounts? According to its privacy policy, the company gathers usage data, such as "data about your activity on and use of" Apple offerings, including "app launches within our services...; browsing history; search history; [and] product interaction." Other types of data Apple may collect from Apple accounts include transaction information (Apple says this is "data about purchases of Apple products and services or transactions facilitated by Apple, including purchases on Apple platforms"), account information ("including email address, devices registered, account status, and age"), device information (including serial number and browser type), contact information (including physical address and phone number), and payment information (including bank details). None of that is surprising considering the type of data needed to make an Apple account work. Many Apple TV users can expect Apple to gather more data from their Apple account usage on other devices, such as iPhones or Macs. However, if you use the same Apple account across multiple devices, Apple recognizes that all the data it has collected from, for example, your iPhone activity, also applies to you as an Apple TV user. A potential workaround could be maintaining multiple Apple accounts. With an Apple account solely dedicated to your Apple TV box and Apple TV hardware and software tracking disabled as much as possible, Apple would have minimal data to ascribe to you as an Apple TV owner. You can also use your Apple TV box without an Apple account, but then you won't be able to use the Apple TV app, one of the device's key features. Data collection via the Apple TV app You can download third-party apps like Netflix and Hulu onto an Apple TV box, but most TV and movie watching on Apple TV boxes likely occurs via the Apple TV app. The app is necessary for watching content on the Apple TV+ streaming service, but it also drives usage by providing access to the libraries of many (but not all) popular streaming apps in one location. So understanding the Apple TV app’s privacy policy is critical to evaluating how private Apple TV activity truly is. As expected, some of the data the app gathers is necessary for the software to work. That includes, according to the app's privacy policy, "information about your purchases, downloads, activity in the Apple TV app, the content you watch, and where you watch it in the Apple TV app and in connected apps on any of your supported devices." That all makes sense for ensuring that the app remembers things like which episode of Severance you're on across devices. Apple collects other data, though, that isn't necessary for functionality. It says it gathers data on things like the "features you use (for example, Continue Watching or Library)," content pages you view, how you interact with notifications, and approximate location information (that Apple says doesn't identify users) to help improve the app. Additionally, Apple tracks the terms you search for within the app, per its policy: We use Apple TV search data to improve models that power Apple TV. For example, aggregate Apple TV search queries are used to fine-tune the Apple TV search model. This data usage is less intrusive than that of other streaming devices, which might track your activity and then sell that data to third-party advertisers. But some people may be hesitant about having any of their activities tracked to benefit a multi-trillion-dollar conglomerate. Data collected from the Apple TV app used for ads By default, the Apple TV app also tracks "what you watch, your purchases, subscriptions, downloads, browsing, and other activities in the Apple TV app" to make personalized content recommendations. Content recommendations aren't ads in the traditional sense but instead provide a way for Apple to push you toward products by analyzing data it has on you. You can disable the Apple TV app's personalized recommendations, but it's a little harder than you might expect since you can't do it through the app. Instead, you need to go to the Apple TV settings and then select Apps > TV > Use Play History > Off. The most privacy-conscious users may wish that personalized recommendations were off by default. Darío Maestro, senior legal fellow at the nonprofit Surveillance Technology Oversight Project (STOP), noted to Ars that even though Apple TV users can opt out of personalized content recommendations, "many will not realize they can." Apple can also use data it gathers on you from the Apple TV app to serve traditional ads. If you allow your Apple TV box to track your location, the Apple TV app can also track your location. That data can "be used to serve geographically relevant ads," according to the Apple TV app privacy policy. Location tracking, however, is off by default on Apple TV boxes. Apple's tvOS doesn't have integrated ads. For comparison, some TV OSes, like Roku OS and LG's webOS, show ads on the OS's home screen and/or when showing screensavers. But data gathered from the Apple TV app can still help Apple's advertising efforts. This can happen if you allow personalized ads in other Apple apps serving targeted apps, such as Apple News, the App Store, or Stocks. In such cases, Apple may apply data gathered from the Apple TV app, "including information about the movies and TV shows you purchase from Apple, to serve ads in those apps that are more relevant to you," the Apple TV app privacy policy says. Apple also provides third-party advertisers and strategic partners with "non-personal data" gathered from the Apple TV app: We provide some non-personal data to our advertisers and strategic partners that work with Apple to provide our products and services, help Apple market to customers, and sell ads on Apple’s behalf to display on the App Store and Apple News and Stocks. Apple also shares non-personal data from the Apple TV with third parties, such as content owners, so they can pay royalties, gauge how much people are watching their shows or movies, "and improve their associated products and services," Apple says. Apple's policy notes: For example, we may share non-personal data about your transactions, viewing activity, and region, as well as aggregated user demographics[,] such as age group and gender (which may be inferred from information such as your name and salutation in your Apple Account), to Apple TV strategic partners, such as content owners, so that they can measure the performance of their creative work [and] meet royalty and accounting requirements. When reached for comment, an Apple spokesperson told Ars that Apple TV users can clear their play history from the app. All that said, the Apple TV app still shares far less data with third parties than other streaming apps. Netflix, for example, says it discloses some personal information to advertising companies "in order to select Advertisements shown on Netflix, to facilitate interaction with Advertisements, and to measure and improve effectiveness of Advertisements." Warner Bros. Discovery says it discloses information about Max viewers "with advertisers, ad agencies, ad networks and platforms, and other companies to provide advertising to you based on your interests." And Disney+ users have Nielsen tracking on by default. What if you use Siri? You can easily deactivate Siri when setting up an Apple TV. But those who opt to keep the voice assistant and the ability to control Apple TV with their voice take somewhat of a privacy hit. According to the privacy policy accessible in Apple TV boxes' settings, Apple boxes automatically send all Siri requests to Apple's servers. If you opt into using Siri data to "Improve Siri and Dictation," Apple will store your audio data. If you opt out, audio data won't be stored, but per the policy: In all cases, transcripts of your interactions will be sent to Apple to process your requests and may be stored by Apple. Apple TV boxes also send audio and transcriptions of dictation input to Apple servers for processing. Apple says it doesn't store the audio but may store transcriptions of the audio. If you opt to "Improve Siri and Dictation," Apple says your history of voice requests isn't tied to your Apple account or email. But Apple is vague about how long it may store data related to voice input performed with the Apple TV if you choose this option. The policy states: Your request history, which includes transcripts and any related request data, is associated with a random identifier for up to six months and is not tied to your Apple Account or email address. After six months, you request history is disassociated from the random identifier and may be retained for up to two years. Apple may use this data to develop and improve Siri, Dictation, Search, and limited other language processing functionality in Apple products ... Apple may also review a subset of the transcripts of your interactions and this ... may be kept beyond two years for the ongoing improvements of products and services. Apple promises not to use Siri and voice data to build marketing profiles or sell them to third parties, but it hasn't always adhered to that commitment. In January, Apple agreed to pay $95 million to settle a class-action lawsuit accusing Siri of recording private conversations and sharing them with third parties for targeted ads. In 2019, contractors reported hearing private conversations and recorded sex via Siri-gathered audio. Outside of Apple, we've seen voice request data used questionably, including in criminal trials and by corporate employees. Siri and dictation data also represent additional ways a person's Apple TV usage might be unexpectedly analyzed to fuel Apple's business. Automatic content recognition Apple TVs aren't preloaded with automatic content recognition (ACR), an Apple spokesperson confirmed to Ars, another plus for privacy advocates. But ACR is software, so Apple could technically add it to Apple TV boxes via a software update at some point. Sherman Li, the founder of Enswers, the company that first put ACR in Samsung TVs, confirmed to Ars that it's technically possible for Apple to add ACR to already-purchased Apple boxes. Years ago, Enswers retroactively added ACR to other types of streaming hardware, including Samsung and LG smart TVs. (Enswers was acquired by Gracenote, which Nielsen now owns.) In general, though, there are challenges to adding ACR to hardware that people already own, Li explained: Everyone believes, in theory, you can add ACR anywhere you want at any time because it's software, but because of the way [hardware is] architected... the interplay between the chipsets, like the SoCs, and the firmware is different in a lot of situations. Li pointed to numerous variables that could prevent ACR from being retroactively added to any type of streaming hardware, "including access to video frame buffers, audio streams, networking connectivity, security protocols, OSes, and app interface communication layers, especially at different levels of the stack in these devices, depending on the implementation." Due to the complexity of Apple TV boxes, Li suspects it would be difficult to add ACR to already-purchased Apple TVs. It would likely be simpler for Apple to release a new box with ACR if it ever decided to go down that route. If Apple were to add ACR to old or new Apple TV boxes, the devices would be far less private, and the move would be highly unpopular and eliminate one of the Apple TV's biggest draws. However, Apple reportedly has a growing interest in advertising to streaming subscribers. The Apple TV+ streaming service doesn't currently show commercials, but the company is rumored to be exploring a potential ad tier. The suspicions stem from a reported meeting between Apple and the United Kingdom's ratings body, Barb, to discuss how it might track ads on Apple TV+, according to a July report from The Telegraph. Since 2023, Apple has also hired several prominent names in advertising, including a former head of advertising at NBCUniversal and a new head of video ad sales. Further, Apple TV+ is one of the few streaming services to remain ad-free, and it's reported to be losing Apple $1 billion per year since its launch. One day soon, Apple may have much more reason to care about advertising in streaming and being able to track the activities of people who use its streaming offerings. That has implications for Apple TV box users. "The more Apple creeps into the targeted ads space, the less I’ll trust them to uphold their privacy promises. You can imagine Apple TV being a natural progression for selling ads," PIRG's Cross said. Somewhat ironically, Apple has marketed its approach to privacy as a positive for advertisers. "Apple’s commitment to privacy and personal relevancy builds trust amongst readers, driving a willingness to engage with content and ads alike," Apple's advertising guide for buying ads on Apple News and Stocks reads. The most private streaming gadget It remains technologically possible for Apple to introduce intrusive tracking or ads to Apple TV boxes, but for now, the streaming devices are more private than the vast majority of alternatives, save for dumb TVs (which are incredibly hard to find these days). And if Apple follows its own policies, much of the data it gathers should be kept in-house. However, those with strong privacy concerns should be aware that Apple does track certain tvOS activities, especially those that happen through Apple accounts, voice interaction, or the Apple TV app. And while most of Apple's streaming hardware and software settings prioritize privacy by default, some advocates believe there's room for improvement. For example, STOP's Maestro said: Unlike in the [European Union], where the upcoming Data Act will set clearer rules on transfers of data generated by smart devices, the US has no real legislation governing what happens with your data once it reaches Apple's servers. Users are left with little way to verify those privacy promises. Maestro suggested that Apple could address these concerns by making it easier for people to conduct security research on smart device software. "Allowing the development of alternative or modified software that can evaluate privacy settings could also increase user trust and better uphold Apple's public commitment to privacy," Maestro said. There are ways to limit the amount of data that advertisers can get from your Apple TV. But if you use the Apple TV app, Apple can use your activity to help make business decisions—and therefore money. As you might expect from a device that connects to the Internet and lets you stream shows and movies, Apple TV boxes aren't totally incapable of tracking you. But they're still the best recommendation for streaming users seeking hardware with more privacy and fewer ads. Scharon Harding Senior Technology Reporter Scharon Harding Senior Technology Reporter Scharon is a Senior Technology Reporter at Ars Technica writing news, reviews, and analysis on consumer gadgets and services. She's been reporting on technology for over 10 years, with bylines at Tom’s Hardware, Channelnomics, and CRN UK. 22 Comments
    0 Комментарии 0 Поделились
  • OpenAI Academy – A New Beginning in AI Learning

    Home OpenAI Academy – A New Beginning in AI Learning

    News

    OpenAI Academy – A New Beginning in AI Learning

    5 min read

    Published: May 29, 2025

    Key Takeaways

    The OpenAI Academy is a collection of tutorials and live webinars that educate users about OpenAI products and LLMs.
    The main aim of the Academy is to enable users to understand the full capabilities of these AI tools in various sectors, such as education, business, and everyday work.
    With AI advancing rapidly, we might soon see artificial intelligence being offered as professional courses from recognized universities.

    OpenAI has launched the OpenAI Academy – a one-stop destination for you to learn everything about OpenAI LLM products, such as ChatGPT, Sora, Deep Research, and more. The portal provides extensive video demonstrations on using various features of these AI models and optimizing inputs to get the best results.
    Here’s a quick look at what you can learn at the OpenAI Academy:

    ChatGPT on Campus: Meant for students, specifically those in higher education courses. This includes tutorials on researching and writing, managing time effectively, designing resumes, and preparing for interviews.
    AI for K-12 Educators: Designed for educators, this module focuses on how teachers and support staff can leverage AI tools to streamline school operations and enhance communications. With detailed videos on lesson planning and student support, educators can improve education from the bottom up. It also includes detailed tutorials on using ChatGPT Edu – OpenAI’s specialized chatbot version for educators.
    ChatGPT at Work: This module will help you with prompt engineering, coding, introduction to ChatGPT projects, ChatGPT Search, data analytics, and Deep Research.
    Sora Tutorials: Sora is OpenAI’s very own video generator. It can render videos from text, images, and video prompts. Sora tutorials on OpenAI Academy teach you how to build a storyboard, recut, blend, and remix videos with the AI tool.
    OpenAI for Business: This module is all about personalizing ChatGPT to make it more relevant to your day-to-day work. You can learn more about ChatGPT’s Deep Research integration with GitHub, connecting ChatGPT to Google Drive to tap into internal knowledge, run multi-step workflows, and do extensive market research.

    In addition to these pre-recorded tutorials, videos, and ‘how-to’ articles, the OpenAI Academy hosts many live events and webinars. These sessions are quite exhaustive, from the introduction to ChatGPT to practical use cases for career development and education.
    There’s no debating that ChatGPT has endless real-world applications, whether in business or education. However, a vast majority of people are simply unaware. The OpenAI Academy looks to eliminate the lack of awareness around its products and show the world their capabilities.
    The Art of Prompts
    In a nutshell, the art of using AI is essentially your ability to feed these LLM models proper and effective prompts. For example, if there’s an image to be generated, an average person’s prompt might be as simple as ‘generate an image of a kid playing football.’
    However, those who know what the AI is truly capable of will feed more specific prompts, such as ‘Generate a portrait image in HD showing a kid aged roughly six years old, wearing a Chelsea jersey and shorts with Nike boots playing football on a grassy ground. Keep the lighting in the image close to what we see during sunset in August.’
    Here’s how the two results would vary:

    Interestingly, both these images have been generated using the same model, i.e., ChatGPT, with the only difference being the prompt. This goes to show that people who have fully wrapped their heads around what AI can do will be able to use it to its full potential.
    It’s worth noting that you can extrapolate this example to endless scenarios. For example, if you’re too lazy to read a book, you can simply ask ChatGPT to generate a mind map of the entire book. This will help you understand the text better and remember the book’s content for a long time. However, you must have professional AI training to do so.
    Alternatively, ChatGPT can serve up some work emails or sort numerical data. However, experienced users can also use it for tasks like strategic planning, breaking down trends and competitions, finding new strategic leads and opportunities, and generating an actionable market strategy using accurate prompts.
    AI Isn’t Just a Feature Anymore
    Gone are the days when AI was just a new, cool feature for us to try. Using ChatGPT or Gemini to write a work email, complete an assignment, or generate an AI image are just the tip of the iceberg. Using AI tools now requires real skills and comes with a learning curve and even a curriculum.
    If you give an average person a blank canvas and a paintbrush, he may draw a couple of houses, a river, the sun, and other basic elements. However, put the same canvas and paintbrush in the hands of a trained artist, and he’ll make you a masterpiece.
    Today’s AI tools are essentially the canvas and the paintbrush. In the hands of the average user, it’s hardly anything more than a text or image generator. However, those aware of their potential can design entire business plans, write and run complex codes, and learn new things almost every day.
    In its initial days, coding, too, was just a soft skill or an extracurricular activity. However, with time, coding has developed into a full-fledged education stream with postgraduate and PhD certifications.
    Something similar might happen with AI as well. As these tools become more sophisticated, the need for a structured AI education will also rise. The day isn’t far when we might see recognized universities offering professional degrees in artificial intelligence, focusing not only on designing the systems but also harnessing the most out of AI.

    Krishi is a seasoned tech journalist with over four years of experience writing about PC hardware, consumer technology, and artificial intelligence.  Clarity and accessibility are at the core of Krishi’s writing style.
    He believes technology writing should empower readers—not confuse them—and he’s committed to ensuring his content is always easy to understand without sacrificing accuracy or depth.
    Over the years, Krishi has contributed to some of the most reputable names in the industry, including Techopedia, TechRadar, and Tom’s Guide. A man of many talents, Krishi has also proven his mettle as a crypto writer, tackling complex topics with both ease and zeal. His work spans various formats—from in-depth explainers and news coverage to feature pieces and buying guides. 
    Behind the scenes, Krishi operates from a dual-monitor setupthat’s always buzzing with news feeds, technical documentation, and research notes, as well as the occasional gaming sessions that keep him fresh. 
    Krishi thrives on staying current, always ready to dive into the latest announcements, industry shifts, and their far-reaching impacts.  When he's not deep into research on the latest PC hardware news, Krishi would love to chat with you about day trading and the financial markets—oh! And cricket, as well.

    View all articles by Krishi Chowdhary

    Our editorial process

    The Tech Report editorial policy is centered on providing helpful, accurate content that offers real value to our readers. We only work with experienced writers who have specific knowledge in the topics they cover, including latest developments in technology, online privacy, cryptocurrencies, software, and more. Our editorial policy ensures that each topic is researched and curated by our in-house editors. We maintain rigorous journalistic standards, and every article is 100% written by real authors.

    More from News

    View all

    View all
    #openai #academy #new #beginning #learning
    OpenAI Academy – A New Beginning in AI Learning
    Home OpenAI Academy – A New Beginning in AI Learning News OpenAI Academy – A New Beginning in AI Learning 5 min read Published: May 29, 2025 Key Takeaways The OpenAI Academy is a collection of tutorials and live webinars that educate users about OpenAI products and LLMs. The main aim of the Academy is to enable users to understand the full capabilities of these AI tools in various sectors, such as education, business, and everyday work. With AI advancing rapidly, we might soon see artificial intelligence being offered as professional courses from recognized universities. OpenAI has launched the OpenAI Academy – a one-stop destination for you to learn everything about OpenAI LLM products, such as ChatGPT, Sora, Deep Research, and more. The portal provides extensive video demonstrations on using various features of these AI models and optimizing inputs to get the best results. Here’s a quick look at what you can learn at the OpenAI Academy: ChatGPT on Campus: Meant for students, specifically those in higher education courses. This includes tutorials on researching and writing, managing time effectively, designing resumes, and preparing for interviews. AI for K-12 Educators: Designed for educators, this module focuses on how teachers and support staff can leverage AI tools to streamline school operations and enhance communications. With detailed videos on lesson planning and student support, educators can improve education from the bottom up. It also includes detailed tutorials on using ChatGPT Edu – OpenAI’s specialized chatbot version for educators. ChatGPT at Work: This module will help you with prompt engineering, coding, introduction to ChatGPT projects, ChatGPT Search, data analytics, and Deep Research. Sora Tutorials: Sora is OpenAI’s very own video generator. It can render videos from text, images, and video prompts. Sora tutorials on OpenAI Academy teach you how to build a storyboard, recut, blend, and remix videos with the AI tool. OpenAI for Business: This module is all about personalizing ChatGPT to make it more relevant to your day-to-day work. You can learn more about ChatGPT’s Deep Research integration with GitHub, connecting ChatGPT to Google Drive to tap into internal knowledge, run multi-step workflows, and do extensive market research. In addition to these pre-recorded tutorials, videos, and ‘how-to’ articles, the OpenAI Academy hosts many live events and webinars. These sessions are quite exhaustive, from the introduction to ChatGPT to practical use cases for career development and education. There’s no debating that ChatGPT has endless real-world applications, whether in business or education. However, a vast majority of people are simply unaware. The OpenAI Academy looks to eliminate the lack of awareness around its products and show the world their capabilities. The Art of Prompts In a nutshell, the art of using AI is essentially your ability to feed these LLM models proper and effective prompts. For example, if there’s an image to be generated, an average person’s prompt might be as simple as ‘generate an image of a kid playing football.’ However, those who know what the AI is truly capable of will feed more specific prompts, such as ‘Generate a portrait image in HD showing a kid aged roughly six years old, wearing a Chelsea jersey and shorts with Nike boots playing football on a grassy ground. Keep the lighting in the image close to what we see during sunset in August.’ Here’s how the two results would vary: Interestingly, both these images have been generated using the same model, i.e., ChatGPT, with the only difference being the prompt. This goes to show that people who have fully wrapped their heads around what AI can do will be able to use it to its full potential. It’s worth noting that you can extrapolate this example to endless scenarios. For example, if you’re too lazy to read a book, you can simply ask ChatGPT to generate a mind map of the entire book. This will help you understand the text better and remember the book’s content for a long time. However, you must have professional AI training to do so. Alternatively, ChatGPT can serve up some work emails or sort numerical data. However, experienced users can also use it for tasks like strategic planning, breaking down trends and competitions, finding new strategic leads and opportunities, and generating an actionable market strategy using accurate prompts. AI Isn’t Just a Feature Anymore Gone are the days when AI was just a new, cool feature for us to try. Using ChatGPT or Gemini to write a work email, complete an assignment, or generate an AI image are just the tip of the iceberg. Using AI tools now requires real skills and comes with a learning curve and even a curriculum. If you give an average person a blank canvas and a paintbrush, he may draw a couple of houses, a river, the sun, and other basic elements. However, put the same canvas and paintbrush in the hands of a trained artist, and he’ll make you a masterpiece. Today’s AI tools are essentially the canvas and the paintbrush. In the hands of the average user, it’s hardly anything more than a text or image generator. However, those aware of their potential can design entire business plans, write and run complex codes, and learn new things almost every day. In its initial days, coding, too, was just a soft skill or an extracurricular activity. However, with time, coding has developed into a full-fledged education stream with postgraduate and PhD certifications. Something similar might happen with AI as well. As these tools become more sophisticated, the need for a structured AI education will also rise. The day isn’t far when we might see recognized universities offering professional degrees in artificial intelligence, focusing not only on designing the systems but also harnessing the most out of AI. Krishi is a seasoned tech journalist with over four years of experience writing about PC hardware, consumer technology, and artificial intelligence.  Clarity and accessibility are at the core of Krishi’s writing style. He believes technology writing should empower readers—not confuse them—and he’s committed to ensuring his content is always easy to understand without sacrificing accuracy or depth. Over the years, Krishi has contributed to some of the most reputable names in the industry, including Techopedia, TechRadar, and Tom’s Guide. A man of many talents, Krishi has also proven his mettle as a crypto writer, tackling complex topics with both ease and zeal. His work spans various formats—from in-depth explainers and news coverage to feature pieces and buying guides.  Behind the scenes, Krishi operates from a dual-monitor setupthat’s always buzzing with news feeds, technical documentation, and research notes, as well as the occasional gaming sessions that keep him fresh.  Krishi thrives on staying current, always ready to dive into the latest announcements, industry shifts, and their far-reaching impacts.  When he's not deep into research on the latest PC hardware news, Krishi would love to chat with you about day trading and the financial markets—oh! And cricket, as well. View all articles by Krishi Chowdhary Our editorial process The Tech Report editorial policy is centered on providing helpful, accurate content that offers real value to our readers. We only work with experienced writers who have specific knowledge in the topics they cover, including latest developments in technology, online privacy, cryptocurrencies, software, and more. Our editorial policy ensures that each topic is researched and curated by our in-house editors. We maintain rigorous journalistic standards, and every article is 100% written by real authors. More from News View all View all #openai #academy #new #beginning #learning
    TECHREPORT.COM
    OpenAI Academy – A New Beginning in AI Learning
    Home OpenAI Academy – A New Beginning in AI Learning News OpenAI Academy – A New Beginning in AI Learning 5 min read Published: May 29, 2025 Key Takeaways The OpenAI Academy is a collection of tutorials and live webinars that educate users about OpenAI products and LLMs. The main aim of the Academy is to enable users to understand the full capabilities of these AI tools in various sectors, such as education, business, and everyday work. With AI advancing rapidly, we might soon see artificial intelligence being offered as professional courses from recognized universities. OpenAI has launched the OpenAI Academy – a one-stop destination for you to learn everything about OpenAI LLM products, such as ChatGPT, Sora, Deep Research, and more. The portal provides extensive video demonstrations on using various features of these AI models and optimizing inputs to get the best results. Here’s a quick look at what you can learn at the OpenAI Academy: ChatGPT on Campus: Meant for students, specifically those in higher education courses. This includes tutorials on researching and writing, managing time effectively, designing resumes, and preparing for interviews. AI for K-12 Educators: Designed for educators, this module focuses on how teachers and support staff can leverage AI tools to streamline school operations and enhance communications. With detailed videos on lesson planning and student support, educators can improve education from the bottom up. It also includes detailed tutorials on using ChatGPT Edu – OpenAI’s specialized chatbot version for educators. ChatGPT at Work: This module will help you with prompt engineering, coding, introduction to ChatGPT projects, ChatGPT Search, data analytics, and Deep Research. Sora Tutorials: Sora is OpenAI’s very own video generator. It can render videos from text, images, and video prompts. Sora tutorials on OpenAI Academy teach you how to build a storyboard, recut, blend, and remix videos with the AI tool. OpenAI for Business: This module is all about personalizing ChatGPT to make it more relevant to your day-to-day work. You can learn more about ChatGPT’s Deep Research integration with GitHub, connecting ChatGPT to Google Drive to tap into internal knowledge, run multi-step workflows, and do extensive market research. In addition to these pre-recorded tutorials, videos, and ‘how-to’ articles, the OpenAI Academy hosts many live events and webinars. These sessions are quite exhaustive, from the introduction to ChatGPT to practical use cases for career development and education. There’s no debating that ChatGPT has endless real-world applications, whether in business or education. However, a vast majority of people are simply unaware. The OpenAI Academy looks to eliminate the lack of awareness around its products and show the world their capabilities. The Art of Prompts In a nutshell, the art of using AI is essentially your ability to feed these LLM models proper and effective prompts. For example, if there’s an image to be generated, an average person’s prompt might be as simple as ‘generate an image of a kid playing football.’ However, those who know what the AI is truly capable of will feed more specific prompts, such as ‘Generate a portrait image in HD showing a kid aged roughly six years old, wearing a Chelsea jersey and shorts with Nike boots playing football on a grassy ground. Keep the lighting in the image close to what we see during sunset in August.’ Here’s how the two results would vary: Interestingly, both these images have been generated using the same model, i.e., ChatGPT, with the only difference being the prompt. This goes to show that people who have fully wrapped their heads around what AI can do will be able to use it to its full potential. It’s worth noting that you can extrapolate this example to endless scenarios. For example, if you’re too lazy to read a book, you can simply ask ChatGPT to generate a mind map of the entire book. This will help you understand the text better and remember the book’s content for a long time. However, you must have professional AI training to do so. Alternatively, ChatGPT can serve up some work emails or sort numerical data. However, experienced users can also use it for tasks like strategic planning, breaking down trends and competitions, finding new strategic leads and opportunities, and generating an actionable market strategy using accurate prompts. AI Isn’t Just a Feature Anymore Gone are the days when AI was just a new, cool feature for us to try. Using ChatGPT or Gemini to write a work email, complete an assignment, or generate an AI image are just the tip of the iceberg. Using AI tools now requires real skills and comes with a learning curve and even a curriculum. If you give an average person a blank canvas and a paintbrush, he may draw a couple of houses, a river, the sun, and other basic elements. However, put the same canvas and paintbrush in the hands of a trained artist, and he’ll make you a masterpiece. Today’s AI tools are essentially the canvas and the paintbrush. In the hands of the average user, it’s hardly anything more than a text or image generator. However, those aware of their potential can design entire business plans, write and run complex codes, and learn new things almost every day. In its initial days, coding, too, was just a soft skill or an extracurricular activity. However, with time, coding has developed into a full-fledged education stream with postgraduate and PhD certifications. Something similar might happen with AI as well. As these tools become more sophisticated, the need for a structured AI education will also rise. The day isn’t far when we might see recognized universities offering professional degrees in artificial intelligence, focusing not only on designing the systems but also harnessing the most out of AI. Krishi is a seasoned tech journalist with over four years of experience writing about PC hardware, consumer technology, and artificial intelligence.  Clarity and accessibility are at the core of Krishi’s writing style. He believes technology writing should empower readers—not confuse them—and he’s committed to ensuring his content is always easy to understand without sacrificing accuracy or depth. Over the years, Krishi has contributed to some of the most reputable names in the industry, including Techopedia, TechRadar, and Tom’s Guide. A man of many talents, Krishi has also proven his mettle as a crypto writer, tackling complex topics with both ease and zeal. His work spans various formats—from in-depth explainers and news coverage to feature pieces and buying guides.  Behind the scenes, Krishi operates from a dual-monitor setup (including a 29-inch LG UltraWide) that’s always buzzing with news feeds, technical documentation, and research notes, as well as the occasional gaming sessions that keep him fresh.  Krishi thrives on staying current, always ready to dive into the latest announcements, industry shifts, and their far-reaching impacts.  When he's not deep into research on the latest PC hardware news, Krishi would love to chat with you about day trading and the financial markets—oh! And cricket, as well. View all articles by Krishi Chowdhary Our editorial process The Tech Report editorial policy is centered on providing helpful, accurate content that offers real value to our readers. We only work with experienced writers who have specific knowledge in the topics they cover, including latest developments in technology, online privacy, cryptocurrencies, software, and more. Our editorial policy ensures that each topic is researched and curated by our in-house editors. We maintain rigorous journalistic standards, and every article is 100% written by real authors. More from News View all View all
    0 Комментарии 0 Поделились