A Scottish grandmother received an obscene and insulting message thanks to a complete fail by Apple's voice transcription. It completely misunderstood a voicemail left by a local car dealership. The call was made to Louise Littlejohn by a worker at ... the garage who intended to invite her to a promotional event for a new car. The call went to voicemail so he left a message. Apple then "transcribed" the call with an AI-powered system and delivered a text message, something that's meant to save users time rather than have to listen to the message. According to the BBC, which listened to the audio ... (view more)
Featured Articles
Infopackets Reader Sarah B. writes: " Dear Dennis, Please help - I'm being harassed on Instagram . A few months ago, I met a guy on Instagram claiming to be stationed overseas in the US Military. He moves from base to base, which makes it difficult ... for him to stay in touch with people. Initially, he was sweet, charming, and always had a good excuse for why we couldn't video chat - so we exchange some photos instead. At first, he just wanted someone to talk to, but not long after, he hinted that he was struggling financially. He needed money for things like Internet access, food, and other ' ... (view more)
Infopackets Reader Mark R. writes: " Dear Dennis, I just came across your article on How to Stop Cyber Harassment and I'm reaching out because my teenage son is brutally being harassed online . He recently met a girl in a chat group on Reddit; she ... seemed nice at first, and claims to live nearby. They chatted for a few days, then things got more 'personal': she convinced him to move to Snapchat, where they exchanged some private messages and pictures. After that, the tone shifted instantly and now she's demanding money. She's taken screenshots of all of his Instagram followers and says ... (view more)
Intentional Internet shutdowns by governments reached new heights in 2024, according to a digital rights campaign group. Access Now recorded 296 shutdowns across 54 countries. The figures don't include shutdowns caused by natural disasters, ... technical errors, or other unintentional reasons. Instead, they specifically account for cases where a government or related authority deliberately blocked access. The statistics are likely most reliable as a measure of year-on-year change, showing a rise from 283 shutdowns in the previous year. More notably, the number of countries experiencing shutdowns ... (view more)
Smartwatch sales have reportedly declined for the first time, signaling potential challenges ahead for the wearable tech industry. Experts attribute this downturn primarily to slowing innovation and recent legal setbacks faced by Apple, a major ... market leader. According to Counterpoint Research, smartwatch shipments dropped 7 percent in 2024 compared to the previous year, with Apple's shipments notably falling by 19 percent. Given Apple's commanding market share - approximately one-quarter of all global smartwatch sales - this decline significantly impacts the market. (Source: ... (view more)
Google Pixel phones can now detect potential scams in text messages and voice calls in real time. The company says the technology runs locally on phones, meaning it shouldn't compromise privacy. After a beta testing program, Google is rolling out ... Scam Detection for messages to any handset running Google Messages . This app is available for download on the Google Play Store and can replace the default messaging app on most Android phones. Users who install it gain access to Google’s latest messaging features, including spam protection, end-to-end encryption, and AI-powered scam detection. ... href="/news/11523/google-ai-can-now-detect-phone-scams-real-time" class="more-link">view more)
Infopackets Reader Sam J. writes: "Dear Dennis, My teenage son got caught up in an online sextortion scam. He thought he was talking to a girl his age on Instagram, but it turned out to be a scammer who tricked him into sharing private photos. He ... already sent the blackmailers $500 in Steam cards. Now, they're threatening to send those images to his friends and family unless we pay more. He's terrified, ashamed, and deeply depressed. As a father, I feel completely helpless. How can I stop cyber harassment and online blackmail in order to protect my son? Please help!" My response: If you or ... (view more)
All 50 states have now introduced a "right to repair" bill aimed at making it easier for users to fix their own electronic devices. But only six have passed laws, with lawmakers in many states having abandoned their efforts. The specific wording of ... a right to repair bill varies significantly from case to case. Some of the most common principles include users having the legal right to source components or hire a third-party specialist to perform a repair. In other cases, users may have the right to access repair manuals. A common point of debate is what happens with warranties. In some cases, ... (view more)
Apple is reportedly working on a foldable iPhone with no visible crease in the screen. While several manufacturers have already introduced folding phones, Apple has seemingly held off, possibly due to concerns about design aesthetics. The ... introduction of an Apple foldable device could set a new benchmark in the industry, but it is expected to come with a hefty price tag. Folding Phones: Gimmick or Innovation? Folding phones have evolved from a niche concept to a somewhat legitimate category within the smartphone industry. The idea behind them is simple: they offer the compact portability of a ... (view more)
Apple has fixed a supposed bug that caused iPhones to mix up the words "Trump" and "racist". But a speech recognition expert says Apple's explanation was implausible. The issue was with the Dictation tool in iPhones that lets users speak and have ... their words transcribed ready to use as text, for example to send as a message. Numerous videos posted online by users showed them saying the word "racist" but their phone showing the word "Trump" before correcting the error shortly afterwards. Although Apple quickly fixed the issue after the videos went viral, it does appear the videos are genuine. ... (view more)
Gmail is to stop using SMS text messages as a way to authenticate accounts. It's concluded the security measure is no longer secure or efficient. The SMS message test is a common example of two-factor authentication, the idea that accounts should ... always be protected by two different factors, often including something the customer knows (such as a password), something they have (such as a smartphone), and where they are (using an IP address). This means most of the time the customer can simply log in with a password from their normal location or IP address. With two-factor authentication ... (view more)
So-called video display "dark modes" on mobile devices may use more energy than ordinary display modes according to new research. The effect of the modes on human behavior may be counterproductive. The claim comes from BBC Research ... (view more)
Microsoft claims it has made key parts of the Edge browser dramatically faster. The update affects specific features of the browser rather than simply the page loading time. According to Microsoft, 14 different features have been sped up, with an ... average boost of 40 percent. However, it's only specifically listed a few of the affected features: Browser Essentials: a status windows that lists some of the key performance features such as which tabs have been put into sleeping mode to minimize memory user. Downloads: the display of which files the user has downloaded (or is midway through ... (view more)
Google is to allow advertisers to use a controversial tactic for tracking Chrome users online. It had previously described the 'fingerprinting' technique as "wrong". The idea of fingerprinting is to identify an individual user even if they don't ... have the ability or permission to install a cookie on a user's computer. It's a way to more accurately identify somebody without relying solely on an IP address, which may be shared between multiple users or even change between different online sessions. Fingerprinting adds in specific pieces of data which individually don't reveal much about the user ... (view more)
Politically and financially motivated hacking groups are increasingly working together, according to new research. This collaboration has led to a dangerous pooling of resources, making cybercriminals more effective than ever. The research, ... conducted by Mandiant (a security firm owned by Google's parent company), suggests that hackers are becoming more specialized in their skill sets and working in partnership to maximize their impact. Just as in the corporate world, these cybercriminals are forming networks where each group focuses on a particular aspect of hacking - whether it's gaining ... (view more)
Chrome may soon make it even easier to change a password after a data breach. An in-test feature would actively change the password on the user's behalf. The change would affect what happens when Google auto-fills a password field using a stored ... password. The browser already checks such stored passwords against a database of passwords that have been breached and released publicly. At the moment Chrome will simply warn users about such a breach and prompt them to change it. However, the user will need to manually go to the password settings section or account settings on the website in ... (view more)
Infopackets Reader Dennis J. writes: " Dear Dennis, What happens when Windows 10 reaches end of life after October 14, 2025? My computer isn't compatible with upgrading to Windows 11. Will I still be able to operate using Windows 10 safely? I have ... MalwareBytes but I don't understand these things. I'm retired, and just shy of 80, and can't afford a new computer this year. I'd appreciate your advice thank you. " My response: Thanks for your question. As you mentioned, after October 14, 2025 your Windows 10 PC will no longer receive security updates. One option is to pay Microsoft for Extended ... (view more)
Microsoft is to more clearly label search results in the Windows 11 Start Menu. It will better highlight which results come from the computer itself and which are from the Internet. The change will initially apply only to users in the European ... Economic Area and appears to be a way of complying with new rules on the continent. It's not clear yet if Microsoft intends to roll the changes out to all users. It's all to do with the search feature that appears in the Start Menu itself. The current setup means typing a word or phrase will bring up results that include documents and applications on ... (view more)
A new app offers to bring together multiple social media, messaging and content tools into a single "timeline". Tapestry is made by the people behind a previous app that aimed to improve the experience of what was then called Twitter. That app, ... Twitterific, stopped working in 2023 when Twitter blocked third-party access to its service. That ongoing block means the new app doesn't support the rebranded X service. Instead, Tapestry brings together multiple apps into a single chronological timeline showing all posts that meet the user's criteria. The developers believe many users prefer that to ... (view more)
Comcast is experimenting with a new technology for reducing latency and lag online. It could be particularly useful for video calls and online gaming. While most analysis of Internet speed is about uploading or downloading data, latency - also ... called lag - is all about response time. In effect, it's how quickly the connection starts transferring data after you (and your device) start the process. Although variations in latency are usually measured in fractions of a second, they can cause serious problems for some Internet use. For video calls they can cause a notable gap between somebody on ... (view more)
Google is to take stronger actions against apps that turn out to be potentially harmful. It may revoke permissions where the app is already on a user's device. One of the most notable aspects of Google's management of Android apps is its particular ... balance of security and privacy. Although it will remove apps suspected or confirmed to be malicious from the Play Store, it doesn't usually do much if anything about devices which already have the app installed. The optional Google Play Protect can technically deactivate suspicious apps, but usually it's left to users to hear about the issue (for ... (view more)
Microsoft's Edge browser now has a "scareware blocker" available for optional use. It attempts to recognize bogus claims that a computer has been compromised by malware. Scareware can come from a deliberate scam website, a compromised site, or a ... pop-up window running on a legitimate site that hijacks or takes advantage of advertising space. Whatever the source, the effect is normally the same: highly visible warnings of a supposed malware infestation, often in a full-screen window that's difficult to escape. Some versions even include an audio warning. The idea is to panic the user into ... (view more)
Hype about a Chinese owned AI tool has sent major tech stocks into a slump. The DeepSeek tool is much cheaper to run, which could hurt profitability among tech providers. DeepSeek is a Large Language Model (LLM), a form of AI of which ChatGPT is ... arguably the best known. While specific models vary, it largely works by writing word-by-word, predicting each time which would be the most likely to follow. It's been described as "autocomplete on steroids." More advanced models will break down a request before writing, planning the overall message and organization in advance. Drastically Cheaper ... (view more)
Would you entrust your data to an AI system that may be subject to one of the world's most sophisticated surveillance regimes ? Recently, DeepSeek has gained national headlines as a disruptive AI pricing model. On one hand, the promise of cheaper AI ... services is tempting, especially for businesses and individuals who rely on AI for content generation, data analysis, and automation. On the other hand, DeepSeek is owned and operated by a Chinese entity, raising serious concerns about privacy, security, and potential government overreach. DeepSeek: High-Performance AI at a Low Cost DeepSeek has ... (view more)
Google's global search market share has dropped below 90 percent according to one estimate. It's the first time it's consistently been below that threshold in a decade. Some analysts have suggested the drop may be down to users preferring AI large ... language model chatbots such as ChatGPT to search for information. However, that's not factored directly into these figures. They come from Statcounter, a respected online activity tracking company. While it only gathers data from a sample of users, the sample is generally accepted as representative of the Internet as a whole and its archive of data ... (view more)
A gadget that gets phones up to full battery strength in two seconds was among the eye-catching displays at a recent trade show. "Swippitt" does actually live up to the maker's claims, but isn't quite what it seems. Visitors to the CES show each ... January are used to seeing spectacular gadgets, many of which are demonstrations of works in process using technology that won't necessarily work in everyday life. However, Swippitt was a functional demonstration. It's a rectangular box with a slot in the top that makes it look a little like a toaster. Users can put a depleted phone in and within a ... (view more)
If you've used an Apple device which had the Siri assistant, you could be in for a cash bonus. Apple has agreed to pay $95 million compensation for recording users' conversations without their intentional consent. The case relates to the "Hey Siri" ... voice command to activate the assistant. In theory the device would be constantly "listening" but would only process a few seconds of data at a time, check whether it heard "Hey Siri" and then delete the data if not. The problem came with cases when the device misheard a user and began recording and analyzing the subsequent speech under the ... (view more)
Infopackets Reader Jarold K. writes: " Dear Dennis, I own a small business and have eight PCs running Windows 10, including an already unsupported Windows Server 2012 machine. I had a tech that managed this for us but he's moved on, so I am looking ... for someone else to manage this for us and came across one of your older articles. At any rate, we keep receiving messages that Windows 10 will reach 'end of life' in October 2025 and will no longer receive security updates . I ran the 'PC Health Check' app, and none of the devices are able to upgrade to Windows 11. I understand upgrading is ... (view more)
A court has blocked the FCC's attempts to reinstate net neutrality rules . It's a decision about procedure rather than policy but likely means national rules are off the table for years to come. Net neutrality is the principle that Internet service ... providers (ISPs) should treat all lawful Internet traffic equally. At its most basic principle, that could mean an ISP doesn't block its customers from visiting a particular website. The idea has evolved as technology has developed. For example, Internet carriers slowing down connections when people are using torrent sites, or excluding particular ... (view more)
Infopackets Reader Mike D. writes: " Dear Dennis, I just purchased an AMD Ryzen 9700x (8 core, 16 threat, 65 watt TDP, 4nm) and MSI MAG B650M Mortar WiFi motherboard. The processor is a beast and can handle just about everything I throw at it - plus ... it stays nice and cool. Unfortunately, I have an audio lag issue when playing videos . When I click to start a video, it plays the video straight away, but the audio won't start playing until a few seconds later. To be clear, this is not an 'audio out of sync' issue - the audio is muted for a few seconds whenever I start playing a video. The same ... (view more)
Need Help? Ask!

My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).

My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited

We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.