
Search results for 'Technology' - Page: 12
| ITBrief - 16 Apr (ITBrief) AMD has unveiled its next-gen EPYC CPU, Venice, built on TSMC`s cutting-edge 2nm technology, marking a pivotal advance in high-performance computing. Read...Newslink ©2025 to ITBrief |  |
|  | | ITBrief - 16 Apr (ITBrief) Rackspace Technology has appointed Adhil Badat as Managing Director for APJ and Wade Weirman as Principal Data Lead in Australia, enhancing its data-led strategy. Read...Newslink ©2025 to ITBrief |  |
|  | | ITBrief - 14 Apr (ITBrief) Amber Technology has broadened its distribution partnership with DPA Microphones to include New Zealand, enhancing access to high-quality audio solutions. Read...Newslink ©2025 to ITBrief |  |
|  | | PC World - 13 Apr (PC World)The Trump tariffs have eased on many technology products, even those from China, according to a new amended executive order the Trump administration filed Friday night.
The latest order is a “clarification of exceptions” to Trump’s earlier order on April 2, regarding tariffed goods imported to the United States from China. That order raised tariffs on Chinese goods to 125 percent. Those tariffs of 125 percent remain in place, but exempt a broad swath of the PC industry, plus smartphones.
Essentially, it provides relief for PC and component buyers, which has already been plagued by high prices on computers and components.
Specifically, the order exempts several classifications of products found on the Harmonized Tariff Schedule of the United States (HTSUS), which in turn provides an esoteric textual description pf products imported to the U.S. For example, one of the listed subheadings, 8473.30, includes “parts and accessories” of “automatic data processing machines” like computers. Those “parts and accessories” specifically describe memory modules. (In this case, The Trump order lists the subheading as 847330, excluding the decimal point.)
The list basically includes computers and servers; smartphones; components like motherboards, processors, and memory; monitors; routers and switches; and devices with recorded media upon them, and more. The list also includes category 8542, covering “electronic integrated circuits,” LEDs, and transistors, and machines to produce semiconductors and components.
It appears that Trump has totally withdrawn tariffs on all of these devices, based upon the “exemptions” the order lists. It also appears that these products are exempt from tariffs, no matter their country of origin.
Gaming consoles like the Xbox Series X and PlayStation 5 do not appear to be included in the exemptions.
The entire list of exceptions can be found at the USITC.gov website. The exemptions include the following categories:
8471
847330
8486
85171300
85176200
85235100
8524
85285200
85411000
85412100
85412900
85413000
85414910
85414970
85414980
85414995
85415100
85415900
85419000
8542
Trump’s administration was scheduled to apply a chip tariff of 25 percent to chip imports by April 2, but never did. The president later stated that the chip tariffs would go “substantially higher” over the course of a year. Now, who knows? Read...Newslink ©2025 to PC World |  |
|  | | PC World - 13 Apr (PC World)Microsoft mainly supplies Windows in two different editions: Home and Professional.
Windows 11 Home is pre-installed on many PCs, while the Pro edition is often installed on business devices. This is because Windows 11 Pro can be integrated into a company’s network infrastructure (Active Directory), whereas the Home edition cannot.
However, this feature is not necessary for private users who are unlikely to operate a Windows server in their home network.
Nevertheless, the Windows Pro edition has some features that are of interest to everyone.
Saving tip 1: Buy Windows 11 Pro for just $79 instead of $199
Saving tip 2: Buy a Windows 11 Pro upgrade for just $59 instead of $99
If you want to take advantage of this, you can perform a Pro update for a fee. For details, see the box “Upgrade from Windows 11 Home to Pro.”
Home or Pro? Users of the Home edition receive most of the additional Pro functions free of charge. Additional tools provide what is missing in the cheaper Windows edition.
IDG
But an upgrade from Windows Home can also be completely free: Almost all Pro functions can be replaced by free software.
It is even possible to unlock two Pro functions in the Home Edition, which we describe in more detail in this article.
See also: Windows survival skills: 8 things every PC user should know how to do
The differences between Windows Home and Pro
There are actually only a few points where the two editions differ. Here are the most important and relevant for private users:
Bitlocker encryption, which can be used to secure the entire drive or USB sticks, is reserved for the Pro edition. Bitlocker is particularly useful for laptops so that nobody can access your data if the device is lost. However, Microsoft has added a similar function to the Home edition of Windows 11 24H2 with device encryption (point 3). This requires you to log in with a Microsoft account. Users who do not want a Microsoft account or use Windows 10 can use alternative methods (points 4 and 5).
Hyper-V is software that can be used to virtualize operating systems. For example, you can install Linux or Windows in Hyper-V while Windows is running and use it as a virtual second system. We describe how Hyper-V can be activated in the Home edition and what the alternative Virtualbox offers in points 6 and 7.
The remote desktop enables remote access to the desktop of another Windows computer via the network. The Home edition only offers remote support, where a user must first invite a helper before they can access the other PC. Both methods are only suitable to a limited extent for spontaneous help via the internet. Remote access only works if the necessary ports are open in the router firewall. This is not necessary for other remote assistance programs (see point 8).
Group policies offer centralized management of user rights. They are mainly used in larger company networks in which functions can be restricted or specified on all PCs via the central server. Local group policies are a variant for computers that do not belong to a Windows domain. The editor for this can be activated in the Home edition, or an alternative tool can be used (see box “Configuring Windows with group policies”).
Encryption with Windows on-board resources
With the Home edition of Windows 10 and 11, you cannot encrypt drives with Bitlocker. However, it is possible to integrate encrypted external hard drives or USB sticks into the file system. Encryption must be carried out on another PC on which the Pro or Enterprise edition is installed.
If no other computer is available, use a virtual PC (point 6 or 7).
Security for external drives: Encrypt the drive with Bitlocker under Windows Pro. Although the Home Edition cannot create it, it can still integrate it into the file system.Microsoft
Go to “Settings” (Win-I), search for Bitlocker and click on “Manage Bitlocker.” Click on the desired drive and then on “Activate Bitlocker.”
Tick the box “Use password to unlock the drive” and enter a sufficiently secure password. After clicking on “Next,” save the recovery key in a file, for example. Follow the further instructions of the wizard.
A drive encrypted in this way can also be used with the Home edition. If you open it in the file manager by double-clicking on it, Windows will ask you for the password.
Device encryption of Windows 11 24H2
Microsoft has equipped Windows 11 24H2 Home with a new function that can be used to encrypt the system drive. Bitlocker provides the basis, albeit with fewer options than the Pro edition. Windows login with a Microsoft account is also required.
In Windows 11 24H2 Home: Activate “Device encryption” in the “Settings” if you want Windows to encrypt the system partition. A Microsoft account is required for this.Chris Hoffman / IDG
If you are using version 24H2, you should check the option in the “Settings” under “Privacy and security > Device encryption.”
If “Device encryption” is not displayed, the system requirements for Windows 11 are probably not met. Then check in the firmware settings of the PC whether TPM and Secure Boot are activated.
If you activate device encryption, you should save the associated recovery key. You can determine the key via account.microsoft.com/devices/recoverykey after logging in with your Microsoft account.
The recovery key is required so that you can access your data via a rescue or secondary system in the event of Windows or hardware problems.
See also: How to make Microsoft Windows services work for you
Encrypt drives with Veracrypt
If you don’t want to or can’t use Bitlocker or device encryption, Veracrypt is an almost equivalent alternative. The tool also has the advantage that it is available for Linux and Mac OS. You can also use it to integrate encrypted Windows drives under these systems.
In terms of security, it is difficult to compare Bitlocker and Veracrypt. With the open source tool Veracrypt, you can examine the source code and check the code quality and implementation of the algorithms. This is not possible with Bitlocker.
Neither method can promise 100 percent security — ultimately, the use of any software is a question of trust.
A study conducted by the Fraunhofer Institute for Secure Information Technology (SIT) in 2020 is entitled “VeraCrypt with minor flaws.” No serious vulnerabilities were found.
Veracrypt is not as well integrated into the system as Bitlocker. It is somewhat cumbersome to use and you have to enter the password for decryption every time you restart Windows. For security reasons, the password should be more than 20 characters long and sufficiently complex.
If this is too much effort for you, you should consider whether you really need to encrypt the entire hard drive. Perhaps the solution presented in point 5 will suffice. Please also note that Veracrypt only requests the password on a restart. When reactivating after “Sleep,” only the Windows password is requested by default.
If you want to encrypt the system partition, proceed as follows:
Step 1: The use of Veracrypt is considered secure. Nevertheless, it is advisable to create a complete backup of the Windows partition or at least the personal files.
If, for example, the power fails during encryption, the files on the hard drive will no longer be readable. Also have a USB stick ready that is formatted with the FAT32 file system.
About 5MB of free space is sufficient and you can also use the stick for other purposes.
In Veracrypt you will have to create a sufficiently long password for an encrypted drive to be used every time you restart your computer.
Veracrypt
Step 2: In Veracrypt, go to “System > Encrypt system partition/system drive.” Follow the easy-to-understand instructions of the wizard. You can accept the defaults almost everywhere.
When entering the password, please note that the Veracrypt bootloader works with the U.S. keyboard layout. The program takes this into account and switches the keyboard layout when entering the password. Tick the “Show password” box to see the actual password.
Step 3: The wizard prompts you to create a rescue data carrier. By default, Veracrypt saves the required file under the name “VeraCrypt Rescue Disk.zip” in your “Documents” folder.
Unzip the file and copy the “EFI” folder it contains to your FAT32-formatted USB stick. After clicking on “Next,” the wizard will check whether the folder is present.
Step 4: In the “System encryption pre-test” step, click on “Test.” Read the description, which is best printed out. Click on “Yes” when you are prompted to restart the PC. Type in the password and confirm with the Enter key.
If Veracrypt does not accept the password, for example if it is entered incorrectly, press the Esc key. Windows will then start as usual from the previously unencrypted hard drive and you will have to configure the encryption again.
Otherwise, Windows will start after you enter the password. After Windows logon, the “Pre-test completed” window appears automatically, in which you click on “Encrypt.” Veracrypt then starts the encryption process, which may take some time. A window will inform you of the progress.
Step 5: Try booting from the rescue drive. You may need to change the boot sequence in the firmware setup. The rescue system offers a simple menu that can be used to repair the Veracrypt boot loader, load an alternative boot loader, or decrypt the system partition.
Upgrade from Windows 11 Home to Pro
The Home edition can be converted to a Pro edition without reinstallation. All you need is a new product key.
Microsoft currently charges $99 for the upgrade in the official store. In the PCWorld shop, however, you can get the official upgrade for just $59.
If you have purchased a Pro key, go to “System” in the “Settings” under Windows 11, click on “Activation” and then on “Update Windows Edition.” Click on “Change” after “Change product key” and enter the new product key.
Foundry
Encrypted container with Veracrypt
If you encrypt your Windows partition, you no longer have to worry about the security of individual files. On the other hand, it is not particularly convenient to have to enter a long and complicated password when restarting the system.
For more security, only encrypt the files that are really worth protecting. To do this, use Veracrypt to create an encrypted container file that holds the sensitive files.
Secure container: Create an encrypted container file with Veracrypt. Store sensitive and important documents in it. The file can be stored on any drive.Veracrypt
Step 1: In Veracrypt, go to “Volume > Create new volume.” Leave the first option “Create encrypted container file” and click on “Next” and again on “Next.”
Step 2: Specify the storage location and file name after clicking on “File.” Follow the further instructions of the wizard.
Step 3: In the “Volume password” window, enter a sufficiently complex password with 20 characters or more. If you tick the “Show password” box, you can check the entry.
Step 4 (optional): You can also use a short password or a PIN if you also create a key file. To do this, tick the box next to “Use key file” and then click on “Key files.”
Click on “Create key file(s)” and generate the entropy by moving the mouse. Enter a name for the key file, click on the “Create and save key file(s)” button and select the storage location.
Save the file to a USB stick. The container cannot be unlocked without the stick or the key file in combination with the password.
Close the window, click on “Add files,” select the key file you have just created, and click on “OK.” Continue with the wizard.
Step 5: In the Veracrypt main window, click on a free drive letter, go to “Volume > Select file” and specify the file created in Step 2. Then click on “Volume > Mount volume” and enter the password.
If you created a key file in step 4, tick “Use key file,” click on “Key files,” and specify the file via “Add files.”
Step 6: For faster access to the encrypted container, right-click on the (virtual) drive in the Veracrypt main window and select “Add to favorites” in the context menu.
Tick the box “Mount selected volume at login” and confirm with “OK.” Veracrypt then automatically opens a window for entering the password after the Windows logon.
If you are using a key file, you should specify this via “Settings > Default key files.” Otherwise, you will have to select the file each time in the password entry window. You can specify the same key file when creating further data containers.
Virtual second PC with Virtualbox
Virtualbox is open source software and therefore available free of charge for all Windows editions. The range of functions corresponds roughly to Microsoft’s Hyper-V. Install Virtualbox and the Virtualbox extension package, which is required for some functions, such as remote access and encryption of virtual hard disks.
Click on the “New” button to start a wizard for setting up a virtual machine in Virtualbox. You enter the ISO image with the installation system and specify the operating system and the size of the RAM and virtual hard drive.
After completing the wizard, click on “Start” and install the operating system as usual.
Configure VMs with Virtualbox: A wizard supports you with the installation of the system. You will need the ISO file of the Linux or Windows installation system, for example.
Oracle
In the virtual machine window, go to “Devices > Insert guest extensions” and install the guest extensions from the virtual DVD drive. The optimized drivers ensure better graphics performance, for example.
Remote access or remote maintenance via the network
Remotely control another PC: The free Rustdesk enables access to a remote desktop. This works in the local network and also over the Internet without further configuration.
Rustdesk
You do not have to rely on the remote desktop connection of the Pro edition for remote access. There is plenty of software for this task. For example, the open source solution Rustdesk is free of charge.
The program does not require a firewall configuration. The connection is established in encrypted form via the provider’s switching server.
The program works without installation — the people involved only need to start it. The person seeking help tells you the ID and password displayed. You then establish the connection, which the person on the other PC must confirm.
Actions that require increased rights must also be confirmed. For convenient use, however, you should install Rustdesk using the button at the bottom left of the window. This also enables unattended access to a computer. You must set a password for this in the settings under “Security.”
Further reading: Every Windows operating system, ranked Read...Newslink ©2025 to PC World |  |
|  | | PC World - 12 Apr (PC World)What was the first smart home product? One could argue it was the electric garage door opener. The first such openers with a radio-based remote controls came to market way back in 1931, predating the first TV remote by 20 years. Comfort and convenience were the motivation behind all three technological advances. In the case of the garage door, people were looking for a way to get out of their cars and into their homes while avoiding the weather. Given that history, it’s a wonder that it took so long to bring IoT technology to the biggest door in the house.
Well, the good news is that it’s here now. And the better news is that most existing garage door openers can be integrated with the rest of your smart home, greatly reducing the cost of that convenience. What’s more, these products are rapidly improving in both simplicity and capability. Buy one and you’ll not only be able to open and shut the door from anywhere—letting in guests, relatives, or delivery people—you’ll also know whether the door is open or closed in real time.
Why you should trust us
TechHive’s writers and editors have been reviewing smart home products for decades, and they draw on their deep and wide experience to evaluate every new product that comes to market. We install the products we review in our own homes to gain real-world experience as we evaluate how well they can be integrated into existing systems as well as how they perform on their own.
The best smart garage door opener controllers
Best smart garage door controller — Chamberlain myQ Smart Garage Hub (model MYQ-G0401)
Pros
Price remains unbeatable
Attractive styling fits in with the typical garage décor
Plenty of third-party compatibility
Cons
Occasional trouble with disconnects
Still no support for a third garage door (you must buy a second controller)
Best Prices Today:
Retailer
Price
$24.90
View Deal
Price comparison from over 24,000 stores worldwide
Product
Price
Price comparison from Backmarket
It’s still a no-brainer: Everything we said about the Chamberlain model MYQ-G0301 myQ Smart Garage Door Hub is now true of the Chamberlain model MYQ-G0401: It’s the easiest smart garage door controller to set up, the most functional controller on the market, and, it’s the least expensive on the market—by a wide margin. That said, there’s little reason to upgrade from the previous model. The myQ app is simple to configure and use, and the system supports a small but growing number of smart home ecosystems, including HomeKit. While it isn’t compatible with every opener—check online before you buy—it’s definitively the one to get.
Read our full
Chamberlain myQ Smart Garage Hub (model MYQ-G0401) review
Best smart garage door controller, runner-up — Meross Smart Wi-Fi Garage Door Opener (model MSG100)
Pros
Very inexpensive
Solid performance during our testing
Lots of extra features to ensure you don’t leave the door open
Cons
Wired door sensor adds complexity
Virtually no handholding during installation
Best Prices Today:
Retailer
Price
$35.99
View Deal
Price comparison from over 24,000 stores worldwide
Product
Price
Price comparison from Backmarket
Meross smart home products have left us with mixed emotions. They’re all inexpensive, but value is defined by more than a price tag. The Meross Smart Wi-Fi Garage Door Opener is on the better end of that scale. If Chamberlain’s product doesn’t fit your needs, this one is worth your consideration. (Note: This device is not HomeKit compatible, but Meross offers a separate model that is. It wasn’t available at press time, however, for us to evaluate.)
Read our full
Meross Smart Wi-Fi Garage Door Opener (model MSG100) review
Best security camera for garages — LiftMaster myQ Smart Garage Camera
Pros
Easy to set up and simple to use
Magnetic base makes it tailor-made for garage mounting
Good overall video quality
Integrates well with other myQ gear
Cons
No recording features unless you pay for a subscription
Electrical outlet management can be tricky in a garage setting
Best Prices Today:
Retailer
Price
$106.90
View Deal
LiftMaster
$149.99
View Deal
Price comparison from over 24,000 stores worldwide
Product
Price
Price comparison from Backmarket
We criticized the high price of this effective special-purpose camera when we first reviewed it several years ago, but times have changed and its MSRP–and especially its street price–have dropped substantially. You don’t need to have a myQ smart garage door controller installed (and the myQ camera doesn’t interact with the myQ controller at all); but if you do, your camera feed will appear directly above your garage door controls within the app. It’s a handy way to get one-stop access to everything that’s going on in the least inviting room of your house. Its magnetic base makes it easy to mount on the bottom of any garage door opener with a metal enclosure. The camera also works with the Key by Amazon system and app, which in this case would empower Amazon delivery drivers to open your garage and place your Amazon packages securely inside.
Read our full
LiftMaster myQ Smart Garage Camera review
How to pick the right smart garage door controller
While garage door openers come in a vast range of brands, styles, and capabilities, the good news is that you’ll likely be able to find a smart controller that works with your system without much trouble.
As I mentioned above, the Chamberlain myQ is my top pick for a variety of reasons, but because it exclusively relies on wireless technology, it isn’t compatible with every system on the market. To start, visit myQ’s compatibility tool and check whether your existing opener is supported. If it is, and you don’t care that it’s not compatible with Alexa or Samsung SmartThings, your work is done: Get the myQ. If it isn’t, you can either get an all-new opener as Chamberlain suggests (although that won’t resolve the Alexa and SmartThings issues), or delve into the world of wired smart garage door controllers.
The Nexx NXG-200 must be attached to your garage door opener via wires, and space can be tight depending on your ceiling height.
Actually, upgrading your old, incompatible door opener is not a terrible idea, and new models are more secure and less expensive than you might think. Considering that a wired garage door controller can run you about $100, it’s worth thinking hard about whether you want to pour more money into an outdated system that might be close to failure, or just upgrade it from the start. (Many new openers have smart technology built in, obviating the need for an add-on controller.)
But if you do have an opener that’s incompatible with our top pick, and you want to keep it around, you’ll need a wired controller like the Nexx Garage NXG-200 (be sure to read our April 5 story about a security vulnerability associated with Nexx garage door controllers) or the Garadget Wired controllers. These must be connected to the opener via a pair of wires, so you’ll need to be comfortable with some minor electrical work in order to install them. Like myQ, Nexx offers an online compatibility tool, but here you’re likely to find that Nexx is either compatible straight out of the box, or compatible only with an additional adapter. In other words, wired controllers are generally compatible with everything, or, at least, I haven’t found any openers yet that aren’t compatible with them.
The Garadget fires a laser once a second at the door to determine whether it is open or closed.As with the product from NEXX, the Garadget must be hardwired to your opener.
The catch involves the adapter. Generally speaking, if you have an older garage door opener, Nexx and Garadget will work with it straight out of the box. If you have a newer opener, you’ll need their adapter as well. This is because newer openers often have a more complex encryption system built in, and a standard push-button remote—which is what wired smart controllers emulate—won’t work with them. The solution is to place a button that is compatible with this encryption in between the controller and the opener: The controller tells the button to activate, which in turn tells the opener to open or close. It’s a little wonky, but in my testing, these setups work just as well as the wireless alternative.
The problem is that it’s just a lot more expensive to do it this way. Purchasing a Nexx and an adapter will run you $105 at press time, and a Garadget plus adapter costs $98. Compare that to the less than $40 you’ll spend on the myQ and there’s really no choice.
Again, if myQ isn’t compatible, either Nexx or Garadget will make for an acceptable alternative, provided you’re willing to spend a little extra to get the job done. We’ll review new products in this space as they come to market and will update our top pick as warranted. Read...Newslink ©2025 to PC World |  |
|  | | PC World - 12 Apr (PC World)I bet you there’s something you need on your desk that you probably didn’t realize you needed. I’m talking about this 6-in-1 Baseus Blade charging station that’s compact, practical, and only $69.99 on Amazon with this Prime deal. (Be sure to grab a free 30-day Prime trial if you aren’t a member!)
The Baseus Blade charging station features two AC outlets, three USB-C ports, and a USB-A port. The whole thing is about the size and shape of a typical smartphone, so it can easily slip inside any bag, making it great for travel. (The detachable 5-feet cord is a lovely bonus.) But it’s also perfect as a home office desk accessory for keeping all your things charged.
Since it uses modern GaN technology, the Baseus Blade is not only smaller in size but also more power efficient, allowing it to charge faster and give off less heat. And with its 7-point safety system, your devices are protected against over-voltage, over-current, and short circuits.
This charging station delivers a maximum of 140W through the right-most USB-C port, with power throughput being split when multiple ports are in use. You can see exactly how much power each port is delivering by checking out the on-device LCD display.
Don’t miss this awesome price! Get this Baseus Blade 6-in-1 charging station for $59.49 on Amazon while you can. Make sure to sign up for a 30-day free trial of Prime for this deal and extra perks if you aren’t Prime yet.
Save 30% on this multi-device AC and USB charging stationBuy now at Amazon Read...Newslink ©2025 to PC World |  |
|  | | PC World - 11 Apr (PC World)If you’re a smartphone owner—and chances are that’s everyone reading this—you’ve probably encountered an eerie, but all too common scenario: One day you’re talking about a random topic while your phone is next to you and the following day you notice ads start popping up related to that same topic. It’s unsettling. How do these ads know what you were talking about?
Your smartphone may be the culprit. Every smartphone has its built-in microphone constantly turned on in order for the virtual assistant to hear your voice commands. So, could it be that these devices are also secretly eavesdropping on your conversations in order to serve you ads? Here’s everything you need to know, plus a simple test to find out.
How to find out if your phone is listening to you
To test if your phone is listening to your conversations, start by openly discussing a unique topic that you’ve never searched for or discussed previously while your phone is turned on next to you. It’s crucial that this be something that isn’t related to your usual interests or search queries.
Spend a day or two discussing this topic out loud with your phone next to you the whole time. Make sure that you don’t search about this topic on any of your devices—not just your phone.
You can also try talking about specific things related to this topic. For example, if you’re discussing traveling to Spain, you can discuss learning Spanish or what the best restaurant is for paella in Madrid.
During this time, pay close attention to the ads you’re served while online—ads on social media feeds, websites you visit, apps you use, and those on your smart TV if you have one. Then, if you begin seeing ads about the topic you chose to discuss, chances are you’ve confirmed the eavesdropping and caught your phone red-handed.
What to do if you think your phone is eavesdropping
Before you go taping over the microphone and camera on your phone or throwing it in a lake, there are a few less drastic things you can do to curb the potential eavesdropping.
The first is to carefully review the app permissions on your device. It’s likely that you downloaded an app and allowed it to access your microphone without ever realizing it. Comb through the permissions for each app on your phone and limit apps that don’t need access to your microphone, camera, or location settings.
Under the respective settings menus, you can turn off Google Assistant on Android phones or Siri on iOS devices to make sure they aren’t eavesdropping.
Sam Singleton
Next, clear the voice history and disable your phone’s digital assistant. Google, Siri, and Alexa are all very convenient, but might be actively (and passively) recording everything you say without you knowing.
Just last year, 404 Media reported that a third-party company named Cox Media Group (CMG), which offers “Active Listening” technology, was working with companies such as Amazon, Google, and Microsoft.
While these companies have since denied using this technology to spy on phone users, the fact is that the capabilities exist and it’d be foolish to assume that companies wouldn’t take advantage of ways to more effectively advertise to consumers—after all, ads drive most of their revenue.
Finally, while companies are the most likely source of eavesdropping, there is always the potential for hackers to exploit vulnerabilities on your device and take control of the microphone or camera as well. The best way to combat this is to make sure you always have the latest updates for both your phone’s OS and all of the installed apps.
All of these steps will help cut off unwanted access to your phone’s microphone, but if you’re still unsure, there’s a simple solution. Just turn off your phone or leave it behind when you want to discuss private matters. It’s the best way to ensure your phone can’t hear you.
If your phone isn’t listening, then how’s it getting your data?
While the prospect of your phone constantly eavesdropping on your every conversation may be disconcerting, there are myriad ways that you could be divulging this same info without ever saying it out loud.
Each smartphone is a veritable treasure trove of personal data for any and all apps to pull from. They are essentially mini-computers packed with sensors: gyroscopes, accelerometers, magnetometers, and just about any other -meter you can think of. The data collected from these sensors can provide a shocking amount of info about our routines, habits, and personalities.
Everywhere you visit, other people you talk to or spend time with, lifestyle choices, and personal health data are just some of the metadata and telemetry—phone sensor data—collected by your phone. Not to mention all of the vast amounts of data you’ve already provided over the years to your apps and via Google searches.
Your phone and the installed apps hoover up all of this data and send it off to third parties such as data brokers to be analyzed, sold, and regurgitated back to you in the form of personalized ads.
So, even though you may not have talked about or searched that trip to Spain, your phone may have intuited what you were thinking and come to the conclusion on its own based on the data it collected. Maybe your friends were searching for Spanish AirBnBs while next to you, or maybe you downloaded Duolingo and started learning Spanish recently, or maybe your shopping trends show a recent uptick in the amount of saffron and jamón you’ve been buying.
Any and all of this metadata could be the reasoning for the eerily relevant ads you’re seeing. And while your phone could truly be listening in, it might just be the unspoken data you’re sharing in other ways that gives you away.
Further reading: How often should you turn off your phone? Here’s what the NSA says Read...Newslink ©2025 to PC World |  |
|  | | PC World - 11 Apr (PC World)The new Matter standard is getting better at helping Alexa, Apple HomeKit, Google Home, and Samsung SmartThings play nice with each other, but it often does so at the expense of finer-grained features.
Some Matter-enabled smart lights, for example, can be turned on or off via Matter or change their color, but Matter controllers might not be able to access their lighting scenes or advanced animation modes.
Likewise, smart home manufacturer Aqara found some of its hardware functionality hamstrung by Matter’s limitations, such as the lack of Matter support for facial recognition (which might arrive once Matter finally works with security cameras), or for the fall-detection capabilities of its motion sensors.
One option would be to wait for the Matter specification to catch up and add that functionality—which could take a while, given the slow pace of Matter specification updates.
Instead, Aqara built its own workaround, which involves taking various Aqara scenes and “signals” and turning them into virtual sensors that Matter understands.
Aqara calls its Matter-translating technology “Advanced Matter Bridging,” introducing the tech earlier this year in an update for its Hub M3 smart home hub. Now, Aqara says it’s bringing Advanced Matter Bridging to all its hubs, including the newer Camera Hub G5 Pro and older Zigbee-based models, including the Hub M2, Hub M1S/M1S Gen 2, Hub E1, and Camera Hub G3.
Besides expanding support for its Advanced Matter Bridging functionality, Aqara is adding more than a dozen new Matter categories to its Aqara Home platform, including robot vacuums, dimmable plugs, smoke and CO alarms, smart curtains and shades, air conditioners and heat pumps, laundry washers and dryers, and leak, freeze, and rain sensors.
With those additions, Aqara now supports more than 50 Matter device types, the manufacturer said.
Advanced Matter Bridging will take some work on the part of users to expose Aqara’s more esoteric functionality to Matter.
Using the Aqara Home app, you’ll need to create a “signal” using one or more Aqara conditions–such as a camera recognizing a person’s face, or a door lock being opened by a specific fingerprint–and set those signals as triggers for virtual Matter devices.
For example, if an Aqara cam recognizes a person’s face, it could send an “Occupancy Detected” signal to a virtual Matter occupancy sensor, which could then activate a Philips Hue light automation.
This news story is part of TechHive’s in-depth coverage of the best smart home systems.
It’s a clever, if somewhat hack-y way to deal with one of Matter’s many rough edges, and it opens up numerous possibilities for integrating Aqara gear more deeply into Matter-enabled smart routines.
Advanced Matter Bridging will work on Aqara Matter controller bridges running firmware version 4.3.4, and you’ll need Aqara Home version 5.1.4 or better to access the feature. Read...Newslink ©2025 to PC World |  |
|  | | ITBrief - 10 Apr (ITBrief) The Agent2Agent protocol has been launched to enhance AI interoperability across enterprise platforms, supported by over 50 technology partners including Atlassian and Salesforce. Read...Newslink ©2025 to ITBrief |  |
|  |  |
|
 |
 | Top Stories |

RUGBY
While Sititi is staying, Blues hooker Ricky Riccitelli's is departing after this season More...
|

BUSINESS
Fuel giant Gull - needs to look to its laurels for cheap fuel - with a Z-Energy competitor nipping at its heels More...
|

|

 | Today's News |

 | News Search |
|
 |