Four months after the end of a subsidy program for home broadband, individual states are figuring out if and how they can expand access. Meanwhile the debate over the value and impact of the Affordable Connectivity Program (ACP) continues to rage. ... The program launched in 2021 as part of a wider infrastructure package. It was available to households earning up to double the federal poverty level or with somebody in a government assistance program. Under the program, households would get a government-funded discount of up to $30 a month on broadband services and a one-off discount of $100 for a ... (view more)
Featured Articles
The head of controversial messaging app Telegram says it will now comply with some legal requests for information about users. Russian business owner Pavel Durov announced the policy change just weeks after being arrested in France and charged with ... enabling criminal activity. Telegram is a messaging app similar to WhatsApp in that the content of messages is encrypted, to the point that even the operators of the app can't read private messages. It has a couple of significant differences that likely affect the type of people that use it, however. One is that unlike WhatsApp's limit of 1,000 ... (view more)
Dear Infopackets Readers, Last Friday I posted an article detailing ideas for a new Infopackets YouTube pilot program. The videos posted on the new YouTube channel will highlight Microsoft Windows-related remote desktop technical support (provided ... by yours truly) whereby you email me an issue you're having through our website, I call you to discuss the issue, then I connect to your computer to resolve the problem for you. The phone call and video will be recorded, edited, and then uploaded to our future YouTube channel which currently does not exist . Below is an update to that announcement. ... (view more)
"Modified" versions of popular apps have helped distribute a nasty piece of Android malware. The tactic expanded the reach of the Necro Trojan despite Google's security checks. Necro was able to survive for some time before discovery, largely ... because the infection wasn't obvious to users. Its main purpose was to hijack phones and use them to make money for the people behind the malware. This included displaying paid ads in the background so that users didn't see them, but the scammers were able to claim revenue from advertisers. The malware would also install apps on the phone to earn ... (view more)
Chrome is getting more proactive on browser safety. The changes are coming to both desktops and Android devices. It's part of the browser's "Safety Check" feature which already warns users if a password has been compromised or if a website appears ... unsafe. The feature is expanding to cover permissions and notifications. The former involves the way Chrome controls whether or not a specific website has access to computer resources and data such as a microphone, webcam or precise location. Chrome will now start automatically revoking permissions from websites the user rarely visits. Google has ... (view more)
Dear Infopackets Readers, I would like to introduce the launch of an exciting, new video-based tech support Q ... (view more)
Windows users will soon be able to access files on their Android phone or tablet without a USB cable. The feature is already available in test editions of Windows 11. The feature, first reported back in June, has now arrived for members of the ... Windows Insider Program, which gives early access to in-development and test features. They will also need to install the "Cross device experience host" tool from the Microsoft store. Windows does already offer some wireless connectivity with Android phones such as using it as a webcam or getting on-screen notifications from the phone replicated on the ... (view more)
Scammers are using a creative way to trick people into handing over their Google account passwords. The tactic works by annoying the victim until they stop thinking rationally. Most scams to get hold of account passwords, particularly sensitive ones ... like a Google account, work in one of two ways. Some scammers will try to intercept the password, for example by using keylogging software that records everything a user types. Others prefer phishing, where the user is tricked into typing in details into a bogus, lookalike website. The new scam, using malware named StealC, is much simpler. It ... (view more)
Infopackets Reader Steve T. writes: " Dear Dennis, Please help! I am being blackmailed on Instagram and I'm not sure what to do. A few weeks ago I signed up for Plenty of Fish (PoF) dating and matched up with a woman that I believed to be legit. We ... exchanged photos on Instagram and texted back and forth for about a week. Not long after, we exchanged raunchy photos. Fast forward to just a few days ago and she claims to have crashed her car and doesn't have enough to cover the costs. She's asked me to help. I declined. She said if I don't pay, she would share intimate pictures of me with all of ... (view more)
Google is to make it easier to find copies of pages that are no longer available on websites. The change comes several months after Google removed its own cache of web pages. Users will instead be able to follow a link to the archived copy at the ... Internet Archive's "wayback machine." Before this year, many Google search results included a link to Google's own cached copies of web pages. These were the copies that Google made when scanning a web page for content and links to help decide when and where it should appear in search rankings. The cached copy available in the search results would ... (view more)
A man who earned $12 million in royalties after "writing" hundreds of thousands of songs has been charged with fraud. Michael Smith allegedly created the songs with artificial intelligence, then used bots to "listen" to the music on streaming ... services to generated revenue. The case against Smith is not that the music itself was "not real" but rather that he was falsely claiming credit for listeners. Prosecutors say that not only did he steal money from the streaming sites, but that legitimate songwriters missed out. That's because some streaming sites divide a fixed ... (view more)
A key change to Android could reduce the risk of scammers stealing personal data or money. The update will mean sensitive apps won't open unless potentially risky apps are closed first. The idea is to tackle rogue apps which are designed to either ... capture personal data from another app, or to take control of the phone unbeknownst to the owner. Developer Choice Google's new tactic aims to find a balance between restricting the activities of such rogue apps and keeping the freedom of users to choose what apps they install, including those from sources other than the official Play Store. The ... (view more)
A US company that used billions of online photos without permission for facial recognition faces a fine of more than $35 million. Regulators say they may hold directors of Clearview AI personally responsible after the company said the fine was ... unenforceable. Clearview has attracted the attention of regulators in several companies for the way it does business. It produces and licenses facial recognition software to law enforcement agencies, for example, to identify alleged offenders from crowd photos or live video. The software works thanks to a massive database of pictures which Clearview ... (view more)
Google has revealed a series of measures aimed to better inform US voters while reducing the risk of malicious misinformation. It includes restrictions on its AI tools and better protection against cyber attacks for election and campaign officials. ... The measures broadly break down into three categories. The first is better information for users who are trying to find out more about elections. For example, users who search YouTube for the name of an election candidate will get an information panel detailing official website and video channel links for the candidate. (Source: engadget.com ) ... (view more)
Microsoft says its controversial Windows Recall feature will not be removable in Windows 11. The optional feature creates near-continuous screenshots of the computer display for an AI-powered help tool. The feature launches next month for people in ... the Windows Insider program before rolling out to all users. A recent update to test versions of Windows 11 showed Recall as a feature that could not only be turned on or off, but could be completely uninstalled. On/Off Confusion Microsoft has now issued a statement saying that's not the case, telling The Verge that "We are aware of an issue where ... (view more)
YouTube videos that claim to fix a waterlogged phone really can work according to a semi-scientific test. But results are not guaranteed and it's not a reason to take excessive risks. Numerous videos (and some dedicated phone apps) all claim to fix ... a soggy phone in the same way. The theory is that the main risk is liquid getting into the phone through the speaker, which inherently can't be airtight - rather, quite the opposite. The videos "work" simply by playing a specific oscillating tone at a deep frequency that causes the speaker to push air at just the right force to dislodge the water. ... (view more)
The makers of a Barbie-branded fliphone say it could help overcome smartphone addiction in young people. If nothing else, it could be a test case of form vs function. The handset is as overwhelmingly pink as you might expect, but is closer to a late ... 90s handset than a modern smartphone. It's made from HMD, which is the company that makes Nokia branded handsets. The device has virtually no modern features and doesn't allow app installation. It supports voice calls and basic texting but has no web browser or touchscreen. It has a single game, a Barbie-themed version of Snake. A Plethora Of Pink ... (view more)
A notorious ransomware group has engaged in a "triple threat" attack. As well as locking files and threatening to expose data, the Qilin group has been spotted trying to steal saved passwords from Chrome. The Qilin group appears to have been ... operating for at least two years but came to wider attention in 2022 when it attacked British hospitals. The group's origins and membership aren't known for certain, but it has communicated in Russian. As is becoming more common, Qilin doesn't simply restrict itself to encrypting files and systems and then demanding a ransom payment to restore access. It ... (view more)
A useful web feature could be a serious phishing risk according to security researchers. They say scammers are using "progressive web apps" to bypass Android and iOS security features. In simple terms, a progressive web app is a mix of a website and ... a standalone application. It's technically a website and uses web technologies, allowing for instant updates. However, it looks and feels more like a standalone app and can often access more of a device's resources than a web browser. Security firm ESET says scammers are using progressive web apps as a way to overcome a major limitation in scams ... (view more)
Google has warned Android users to disable 2G connectivity. It says scammers are taking advantage of the outdated tech to send phishing messages and other spam that gets past all filters. 2G cellphone service was commonplace in the 1990s before ... being followed by 3G in the 2000s. 2G was the beginning of digital mobile phone connections and allowed for SMS text messaging, though it wasn't fast enough to support reliable mobile Internet services. While most US carriers have disabled their 2G networks, many handsets still support it. It can be useful as a last resort in places with either limited ... (view more)
Chrome on Android may soon automatically blur out sensitive data when screen sharing or recording. It's a potentially useful feature that brings some big questions. The feature was spotted as an optional "flag" in Chrome Canary, which means it's at ... the very earliest stage of public testing. Canary is a version of Chrome for people happy to be the first to try new features or update, the name referring to the literal "canary in the mine" whose death would warn miners of a problem such as a gas leak. Making a flag means it's not enabled by default even in Canary. That means it's very possible ... (view more)
The Federal Trade Commission (FTC) has made it illegal to buy or sell fake reviews in return for payment. The new rule also outlaws lying about who wrote a review and includes several other measures designed to make reviews more trustworthy. The ... "Trade Regulation Rule on the Use of Consumer Reviews and Testimonials" was approved unanimously by the FTC and, once formally published, will take effect after 60 days. It follows a consultation and review spanning nearly two years. Threats Outlawed The rule is wide-ranging, banning the following actions based on creating, buying or selling a fake ... (view more)
Google staff have been accused of exploiting a loophole to target ads at children. The workaround reportedly broke company policy but not any existing laws. According to the Financial Times, the workaround was done in partnership with Meta, which ... wanted a way to advertise Instagram on YouTube and target 13 to 17 year olds. (Source: ft.com ) Normally that would be impossible under Google's rules for targeting, which don't let advertisers specify ages under 18 when selecting who does and doesn't see an ad. Known Unknowns However, the Financial Times claims Google staff not only knew Meta wanted ... (view more)
iPhones and iPads could soon let users permanently hide parts of web pages including pop-up windows. The move has proven controversial with suggestions it could also be used as an ad-blocker. The new feature is called Distraction Control and is in ... the development beta stages (i.e. test version) of the Safari web browser in the upcoming iOS 18 update. It also appears to be on the way in Safari for Mac computers. The feature lets users tap a page menu button marked "Hide Distracting Items". That will bring up a list of elements on a web page such as pop-up windows, autoplay videos and banners ... (view more)
Google has acted unlawfully to maintain its monopoly in the search market, according to a US court ruling. Whether it will face any practical consequences remains to be seen. The ruling was in a case brought by the Department of Justice alleging ... violations of the Sherman Act. That makes it a felony to intentionally act or conspire to have or maintain a monopoly in a particular market. Previous cases have established that this isn't simply about market share but rather the ability to exploit monopoly power. The judge in the case did not mince his words, stating that "Google is a monopolist, ... (view more)
Two studies both say Google's search rankings help only the company itself. One says the ranking algorithm worsens the experience for users, while the other says paid placements in the rankings doesn't even benefit businesses. The first study is ... from WalletHub, which looked specifically at searches for 48 terms related to credit cards and banking. It claims that in more than a third of searches it carried out, the entire top 10 results were from pages that didn't have any editorial content and were simply promoting financial services for paid advertisers. (Source: wallethub.com ) (While some ... (view more)
Five rogue Android apps remained in the Google Play store for more than two years. They hosted notorious malware called Mandrake that was hidden through some creative means. According to SecureList, the apps were titled AirFS, Amber, Astro Explorer, ... Brain Matrix and CryptoPulsing. The good news is that the apps had hardly any downloads, one of the reasons they attracted little attention. The real concern is whether malware distributors are using the same tactics with other apps. (Source: securelist.com ) Mandrake has been known about since 2020, though appears to have been in circulation ... (view more)
Two proposed laws to boost online privacy and security for children have received widespread backing in the Senate. Whether the measures will make it into law remains unclear. The laws are the Kids Online Safety Act (KOSA) and the Children and ... Teen's Online Privacy Protection Act (COPPA 2.0). They've now been combined into a single package for administrative and voting purposes. 86 Senators agreed the laws should be considered by the Senate while just one voted against. That means they will go to a final approval vote after further discussion. (Source: ctmirror.org ) Greater Parental Controls ... (view more)
What's one of the best one-stop video/image quality enhancement and editing software available for Windows? Answer: Digiarty's VideoProc Converter AI! From the makers of WinX DVD Ripper and WinX Video Converter comes VideoProc Converter: a ... multi-award winning software program that is a one-stop video/image processing program that allows you to restore and enhance video image quality in 1 click, convert video/audio, rip DVDs, edit video, download videos, video to GIF maker ... plus much more! The latest version of VideoProc Converter AI includes the ability to upscale old pictures and video ... (view more)
Almost one in six Chrome extensions could stop working this summer thanks to a major Google update. They include one of the most prominent ad-blocking tools. An extension is a third party tool that integrates with Chrome to improve the user's ... experience when accessing websites. They can include tools as diverse as password managers, page translators and video downloaders, though ad blockers are perhaps the best known. Extensions are able to integrate with Chrome and access its data thanks for a platform called Manifest. Google has developed a Version 3 of Manifest and is phasing out support ... (view more)
Need Help? Ask!
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.