Just as we've come to accept that our voice assistants might be listening for commands and pushing ads our way, it's time to extend that scrutiny to every app on our phone. Many apps, even seemingly innocuous ones, can demand excessive access to your device's features and data. The Hidden Dangers of Over-Permissive Apps When you grant an app permission to access your microphone, camera, contacts, or location, you're opening a door. While some permissions are essential for an app's core functionality (e.g., a camera app needs camera access), many others are not. Granting unnecessary permissions can lead to:
Cybersecurity experts frequently find that many apps request far more permissions than they actually need. It's a common practice for developers to cast a wide net, and for users to click "Allow" without fully understanding the implications Check Settings -> Security and Privacy (Android and Apple) -> Permission Manager. You can then tap Camera and see what apps have access and change/update. Also check Location, Microphone, Contacts, Calendar, etc… Ep344 Image created by AI
0 Comments
How does it all work? If your phone and the caller’s phone are connected to the phone network via 4G or 5G, then your phone will receive an “invite” from the caller and it should ring. Why would it not ring?
Ep344 Image created by AI
In a significant move to safeguard consumer privacy, the Information Commissioner's Office (ICO) has released new guidance for manufacturers of smart home appliances, aiming to rein in what some describe as "disproportionate surveillance" by everyday gadgets. The guidance comes after an investigation by consumer champion Which? uncovered alarming data collection practices by certain smart devices, including air fryers, smart TVs, and smartwatches. With an estimated four out of five people in the UK owning at least one smart appliance, the new rules are designed to protect a vast segment of the population from potentially intrusive data collection. The Which? investigation highlighted several concerning instances. Three air fryers, manufactured in China were found to record audio on owners' phones without a specified reason and some were observed sending personal data to Chinese servers, although this was noted in their respective privacy notices. The new guidance mandates that manufacturers and developers adopt a "data protection by design and default" approach. Smartwatches and fitness trackers are also explicitly covered by the new guidance, with the ICO advising extra caution for "special category data" like a user's BMI or fertility information. The Which? study found that the Huawei Ultimate smartwatch requested nine "risky" phone permissions, more than any other device in the investigation. These risky permissions typically include access to precise location, audio recording capabilities, stored files, or the ability to view all other installed apps. Huawei has stated that all requested permissions have a justified need, and there is no suggestion of illegal behavior by any of the companies mentioned in the study. Australian Context: A Similar Path Towards Stronger Protections The UK's proactive stance on smart device privacy resonates strongly in Australia, where similar concerns about data collection and security have been growing. While Australia does not have an identical regulatory body to the ICO, the Office of the Australian Information Commissioner (OAIC) plays a key role in upholding privacy rights under the Privacy Act 1988 (Cth). Significantly, Australia has recently introduced its own legislative measures to address these issues. The Cyber Security Act 2024 (Cth), which received Royal Assent in November 2024, is a landmark piece of legislation that includes provisions for mandatory minimum cyber security standards for smart devices. These "Cyber Security (security standards for smart devices) Rules 2025" are set to come into effect on March 4, 2026. These Australian rules will require manufacturers and suppliers of internet-connectable products intended for consumer use to comply with specified security standards. Key requirements include:
The OAIC has also been actively engaged in promoting "privacy by design" for all digital products, including AI systems, and has issued guidance emphasizing transparency, accuracy, and the need for informed consent, particularly for sensitive personal information collected by IoT devices. Ep344 Image created by AI
Welcome back to our weekly dip into the wonderfully weird world of "The Tech Absurd"! As we Aussies brace ourselves for those crisp (okay, maybe just slightly less scorching) winter evenings, we've stumbled upon a gadget that promises to keep your mitts toasty, even if your fashion choices lean more "singlet and shorts" year-round: the Dnaleao Rechargeable Hand Warmers.
Resembling a rather chunky portable battery pack – because apparently, the pinnacle of hand-warming tech involves looking like you're charging your phone in your palm – these little gadgets pack a surprising punch. With three temperature modes ranging from a mild "slightly less chilly" 95°F to a "feels like you're gently cradling a freshly baked potato" 130°F, you can customize your hand-warming experience. And with a claimed 12-hour battery life from their 4,000mAh cells, you could theoretically keep your hands warm from sunrise to sunset... or at least until you inevitably misplace one in the depths of your backpack. The real absurdity, however, lies in the sheer convenience. Simply grip the warmer to use it. That's it. No frantic rubbing, no awkward glove adjustments, just instant, rechargeable warmth. And when you're done feeling like you've captured a tiny piece of the Outback sun in your hand, just tuck it into your trouser pocket. Because nothing says "stylish adventurer" quite like having two slightly oblong bulges radiating heat from your lower half. So, whether you're battling the frosty air on your morning commute, braving a chilly Bunnings snag sizzle, or just determined to master the art of typing with fingers that haven't turned completely blue, the Dnaleao Rechargeable Hand Warmers offer a techy, if slightly peculiar, way to say "not today, frostbite!" Ep343 Image Source: https://amazon.com
These platform-based password management tools have come a long way from being simple browser autofill features. They've evolved into surprisingly capable, often cross-platform, solutions designed to simplify our digital lives. The Upside: Convenience and Integration For many users, the appeal of these free options is undeniable. They come with several compelling advantages:
The Downside: Limitations and Niche Use Despite their growing capabilities, these built-in managers do come with certain limitations, particularly when compared to dedicated, paid password management services:
So, Should You Use Them? The verdict largely depends on your digital habits. For users who are not particularly tech-savvy, or those with relatively simple online needs and a strong preference for staying within a single ecosystem (e.g., an all-Apple household or someone who lives entirely in Google's cloud), these platform-based password managers are a perfectly viable and secure solution. They offer a significant upgrade over reusing simple passwords or writing them down. However, for individuals who frequently switch between different operating systems or browsers, manage a high volume of complex online accounts, or require advanced features like secure sharing or password auditing, a dedicated, paid password manager might offer a more robust, versatile, and ultimately more secure experience. Ultimately, the best password manager is the one you actually use consistently to generate and store strong, unique passwords. Ep343 Image created by AI
The conventional methods for recycling e-waste, which contains valuable yet hard-to-recover elements like tantalum, gallium, and indium, are often costly, hazardous, and environmentally taxing. These critical minerals, vital for our smartphones, laptops, and advanced electronics, frequently end up in landfills or are processed using methods that pose serious health risks. Enter the humble microwave, repurposed for a much grander task. Researchers, notably a team at West Virginia University with support from DARPA (the U.S. Department of Defense's advanced research agency), are developing a method that uses microwaves to selectively heat specific components within shredded e-waste. By mixing the waste with a carbon-based material, microwaves can precisely activate a chemical reaction that transforms compounds into pure, reusable metals. This process boasts impressive purity levels (over 97% for tantalum) and significantly reduces the need for harsh chemicals, energy consumption, and waste generation. The implications are vast, not just for environmental sustainability but also for national security by ensuring a domestic supply of vital materials. Beyond metals, microwaves are also showing promise in plastic recycling. New techniques are employing microwave irradiation to pretreat tough plastics like PET (polyethylene terephthalate) bottles, making them far more accessible to enzymes. This combination dramatically accelerates the breakdown of plastics into their base components, allowing for more efficient and higher-yield recycling. Furthermore, this innovative microwave technology extends to solar panel recycling. Microwaves can selectively heat silicon components within solar panels, softening the protective plastic coating and allowing for easier de-lamination and recovery of valuable materials without high temperatures or corrosive chemicals. These advancements represent a significant leap forward in our quest for a circular economy. By harnessing the power of microwaves, we're not just finding cleaner ways to recycle; we're unlocking valuable resources from what was once considered waste, paving the way for a more sustainable and resource-independent future. I guess we just need to find a way to sustainably power it! Ep342 Image created by AI
According to cybersecurity firm Bitsight, these cameras are broadcasting video feeds that can be accessed without any form of authentication, encryption, or even the most basic password protection. This means anyone with the right tools or knowledge can potentially view private spaces and activities. The United States appears to be a major hub for this vulnerability, with nearly 14,000 potentially exposed cameras. The states with the highest concentrations of these unsecured devices include California, Texas, Georgia, and New York. Bitsight's Cyber Threat Intelligence team has unearthed evidence suggesting that these unsecured feeds are a hot topic in dark web forums. Cybercriminals are reportedly discussing and sharing methods, tools, and techniques to gain unauthorized access to these video streams. Worse still, access to these unprotected cameras is being bought and sold, highlighting the lucrative nature of exploiting such privacy breaches. Australia is not immune to this widespread issue. Cybersecurity experts and government bodies here frequently warn that many Internet of Things (IoT) devices, including security cameras in Australian homes and businesses, are deployed with inadequate security, often relying on weak or default passwords. This leaves them wide open to exploitation. Actual instances of unsecured camera footage being accessed in Australia have been reported. For example, a rug shop in Cairns was found to be live-streaming its camera footage to a site linked to Russian hackers. Similarly, a mechanic was alerted that his activities were being streamed live online to a compromised website during a home service call. These incidents underscore the tangible risk to privacy and security posed by unsecure camera setups. This incident serves as a stark reminder of the critical importance of cybersecurity best practices, particularly when setting up internet-connected devices. Users of security cameras, whether for personal or business use, must ensure their devices are properly secured with strong, unique passwords, encryption where available, and limited external access to prevent becoming part of this widespread privacy nightmare. Ep342 Image created by AI
While it might not enhance the way you throw, the Tosy RGB flying disc is undeniably a feast for the eyes. At its core, it's a familiar flying disc, perfect for those backyard games and camping adventures with friends and family. However, its secret weapon is a dazzling array of 108 RGB LEDs, capable of emitting a staggering 16.7 million colors. Yes, you read that right – 16.7 million. Because apparently, your backyard frisbee toss just wasn't doing enough to prepare you for a rave. The beauty of the Tosy disc isn't just aesthetic; it brings new possibilities to your outdoor play. Traditional flying disc games, especially those requiring precise throws and catches like Ultimate Frisbee, are often limited to daylight hours because, well, you need to see the disc! But with the Tosy flying disc, the darkness becomes your arena. Its brilliant illumination allows you to keep the game going long after the sun has set, turning your backyard into a dynamic, glowing playground. No more frantic searches for a lost disc in the bushes – unless it's gone really far, in which case, at least it'll look cool while it's missing. So, if you're looking to add a truly unique, visually spectacular element to your outdoor recreation, or just want to make sure your frisbee stands out in a crowd (and in the dark), the Tosy RGB Flying Disc might just be the "absurd" tech gadget you never knew you needed. After all, why just throw a disc when you can throw a disco? Ep342 Image created by AI
The coordinated sting resulted in the arrest of 32 individuals globally. Authorities also seized significant data, including over 100 GB of information, and took down more than 20,000 malicious IP addresses and domains linked to infostealer activities. Furthermore, 41 servers supporting these illicit operations were confiscated. "Operation Secure" has been instrumental in protecting countless individuals from financial fraud and identity theft. As a direct result of the operation, 216,000 victims have been notified that their data was compromised, enabling them to take protective measures. Infostealer malware poses a significant threat, covertly infiltrating systems to siphon off sensitive information such as banking credentials, passwords, browser history, and even cryptocurrency wallet information. This global threat has a tangible impact in regions like Australia, where recent reports indicate over 30,000 Australian banking passwords were harvested by infostealers between 2021 and 2025, affecting customers of major banks and even superannuation funds. Cybersecurity experts note that these modern infostealers are increasingly capable of bypassing multi-factor authentication (MFA) by stealing session cookies, presenting a critical challenge for both individuals and organisations. The Australian Signals Directorate (ASD) has repeatedly warned of this "silent heist" accelerating into 2024, emphasizing its role as a precursor to more significant cyber incidents. The success of "Operation Secure" highlights the critical importance of international cooperation in combating cybercrime and safeguarding digital security on a global scale. Perhaps we can breathe a tad easier now… at least for a little while. Ep342 Image created by AI
Bayley, like many of us, recounts the common struggle of cycling through partially used batteries, often storing them for recycling or "just in case." The real headache, he notes, comes when a device unexpectedly dies, forcing a frustrating trial-and-error search for a viable replacement. His solution? A surprisingly effective "bounce test." Here's how to perform this quick test at home:
The Key Observation: The magic lies in how the battery reacts upon impact:
This simple physical reaction provides a quick and clear indicator of a battery's remaining charge, saving precious time and effort. It's a handy piece of everyday science that can help anyone quickly sort through their battery stash, ensuring you grab a good one when you're in a pinch. So next time you're unsure, just drop it and watch. Ep341 Image created by AI
The core appeal of the Wyze Bulb Cam lies in its discreet design and ease of installation. It screws directly into any existing light fixture, instantly providing both illumination and surveillance without the need for additional wiring or complex setups. The camera itself, cleverly positioned below the lightbulb, boasts a 2K resolution and a 160-degree field of view, offering a wide perspective of your chosen space. Even in low-light conditions, the Bulb Cam features color night vision, a significant upgrade from traditional black-and-white infrared, allowing for clearer identification of subjects after dark. As a smart light, the Bulb Cam is no slouch either, capable of reaching up to 800 lumens and offering customizable dimming options through the Wyze mobile app. This dual functionality means you're not just adding a camera; you're also upgrading your lighting. Sounds good, but it is manually adjusted only and will not track movement. There is no AI to distinguish between people, pets and objects, but for $50 it will give you basic camera and local recording so not too bad in my book. Ep341 Image Source: wyze.com.au
The benefits are simple: Phishing Resistant: Passkeys are inherently resistant to phishing. Since you're not typing a password, there's nothing for a fake website to steal. The authentication happens directly between your device and the legitimate service. Simpler Login: No more typing complicated passwords or struggling with autofill. A quick glance or touch is all it takes. More Secure: Cryptographic keys are far more robust than even the strongest human-created passwords. Device-Linked Convenience: Your passkeys are often synced across your devices, making it easy to log in from anywhere you trust. While passkeys are rapidly gaining traction, they're still a relatively new technology, and not every website or service has implemented them yet. This can leave users wondering: "Where can I actually start ditching my passwords?" This is where passkeys.directory steps in. This site helps: Discover compatible services: Easily find out which of your favorite apps and websites now offer passkey login. Learn how to enable passkeys: Many entries on the directory might include quick guides on setting up passkeys for specific services. Stay updated: As more companies roll out passkey support, the directory will provide a live overview of the expanding ecosystem. Ep341 Image created by AI
Launched in 2022, ANZ Plus has already onboarded over one million customers, steadily building out new features and products. A key upcoming innovation for the platform is the rollout of fully password-less web banking, promising a more secure and streamlined online experience. The ambitious long-term goal is to run the entire retail bank on Plus by 2029, a move that will encompass not only the six million existing ANZ customers but also the 1.2 million customers recently acquired from Suncorp Bank. For existing ANZ customers, the migration to the Plus platform will be a gradual process over the coming years, though a precise timeline for individual customers has not yet been provided. However, ANZ has reassured customers that vital details such as existing BSB and account numbers, credit card numbers, and direct debits will be retained, aiming for an experience akin to a seamless app upgrade. ANZ Plus offers a suite of modern banking tools designed to help customers manage their finances more effectively. These include smart saving features like "roundups" (where spare change from transactions is saved) and predictions for upcoming bills, moving towards a more proactive and digitally-driven banking experience. So if you’re an ANZ customer, be ready for the change. Ep341 Image created by AI
Yes, they exist. No, they're not just for stunt performers anymore. Companies are now marketing these sartorial safety bubbles to the general public, promising to cushion your every fall, trip, and potentially, your dignity. Imagine strolling down the street, enjoying a leisurely afternoon, when suddenly, you stumble on a rogue pebble. WHUMPFF! Your stylish new vest (or belt, or even, dare we say, a full-body suit?) instantly inflates, transforming you into a human marshmallow, mid-air. The official spiel touts "advanced sensors" and "milliseconds-fast deployment," detecting everything from a gentle wobble to a full-blown face-plant. They're primarily aimed at the elderly for fall prevention, or extreme sports enthusiasts who apparently view broken bones as an inconvenient interruption to their adrenaline fixes. But the logical conclusion, as always at The Tech Absurd, is a world where everyone, from toddlers to octogenarians, is perpetually encased in a pre-inflated cocoon of caution. Picture this: your morning commute. The bus comes to a sudden stop. Instantly, the entire carriage becomes a sea of rapidly expanding nylon, passengers gently bouncing off each other like human bumper cars. Or a bustling supermarket, where a misplaced banana peel triggers a chain reaction of spontaneous inflation, turning aisle five into an impromptu bouncy castle. The sheer logistics of everyday life become a comedy of errors. And what about the re-inflation process? Do we carry spare CO2 cartridges in our pockets, ready to re-arm ourselves after every minor mishap? Is there a roadside assistance service for prematurely deployed airbags? The thought of awkwardly waddling to the nearest "re-inflation station" after a minor trip over your own feet is enough to induce a collective sigh of existential defeat. While the intent is undeniably noble – reducing injuries is a worthy goal – the practical absurdity of ubiquitous wearable airbags is undeniable. We're hurtling towards a future where the fear of a scraped knee or a bruised hip might just outweigh the desire for spontaneous movement. Soon, perhaps, walking will require a pre-flight checklist, and every public space will resemble a giant, human-sized ball pit. So, the next time you see someone waddling around in what appears to be a personal cloud of inflated fabric, remember: it’s not just about safety. It’s about the hilariously over-protective, utterly absurd direction our technology is taking us. Just try not to laugh too hard; you wouldn't want to trigger their shoulder pads. Ep340 Image created by AI
This update significantly enhances Google Photos' already powerful search capabilities. While the platform has long used AI to recognize objects and faces, this new functionality allows for much more precise textual searches embedded within the images themselves. Here's how it works: If you're looking for a photo that contains a particular word, you can now simply type that word enclosed in quotation marks into the Google Photos search bar. For instance, a search for "passport" will now specifically show you only those photos in your library that visibly contain the word "passport" in them. This cuts down dramatically on irrelevant results, helping you pinpoint exactly what you're looking for with unprecedented speed. Imagine trying to find a snapshot of a business card, a Wi-Fi password written on a coffee shop wall, or a handwritten note with a specific term. This new exact text search feature turns your photo library into a searchable document, making it far more practical and efficient. It's important to note that while incredibly powerful, the feature performs best with clear, legible text. It might encounter challenges with highly stylized fonts, words that are partially obscured, or text in certain less common languages. However, for everyday use with clear text, it stands to change how we interact with our vast digital archives. NOTE: This precise text search feature is rolling out gradually to Google Photos users, so keep checking. Ep340 Image created by AI
Whether it's a PIN, password, pattern, fingerprint, or facial recognition, enabling a screen lock on your phone, tablet, or laptop is your first and most essential line of defense against unauthorized access. It’s the digital equivalent of locking your front door; without it, anyone can simply walk in. The Risks of an Unlocked Device:
Choosing the Right Screen Lock: Modern devices offer various options, each with its own balance of convenience and security:
So, make it a habit: Enabling a screen lock takes mere seconds to set up in your device's security settings. Most devices allow you to choose how quickly the screen locks after inactivity (e.g., immediately, after 30 seconds, 1 minute). For optimal security, set it to lock almost instantly. In an age where our devices are extensions of ourselves, protecting them is paramount. A simple screen lock isn't just a recommendation; it's a fundamental pillar of personal cybersecurity. Don't leave your digital life exposed – lock it down. Ep340 Image created by AI
The most noticeable change for many will be the personalised homepage, tailoring content to individual user preferences and habits. Complementing this, the Store's search function has become far more intelligent and intent-aware, leveraging signals like app updates and ratings to deliver more relevant results and better address language-specific nuances. For users in the United States, (and soon to be released everywhere) a standout addition is the integration of Copilot, now accessible directly from product pages to answer questions as you browse. Discovery is also getting a major uplift. A new “Discover More” section on product pages will surface related content, helping users find complementary apps and games. Furthermore, new product page badges will clearly indicate apps boasting AI features and those specifically optimized for the new generation of Copilot+ PCs, making it easier to identify cutting-edge software. Beyond new features, Microsoft has made substantial strides in performance and reliability. The Store now launches an impressive two times faster than it did just six months ago, and installation reliability and speed have seen significant improvements. Gamers will particularly appreciate the new ability to install individual components for games, offering greater control over downloads. Everyday conveniences include faster in-app rating dialogs and a new field on product pages indicating when an app or game was last updated, providing crucial transparency for users. Perhaps one of the most streamlined features is the ability to install apps directly from Windows Search. Users can now search for an app or game from the Windows search bar, and if available in the Store, quickly initiate the installation without needing to fully open the Store application. These comprehensive updates underscore Microsoft's ongoing commitment to refining the Windows experience, making the Microsoft Store a faster, more intuitive, and more secure hub for digital content. Ep340 Image created by AI
Many users unknowingly install extensions that can track their data, display unwanted ads, or even contain malicious code. The problem? App stores often provide only a superficial review of these add-ons, leaving a dangerous gap in your online protection. But now, a new tool is here to help you navigate this digital minefield. Cybersecurity company LayerX has launched ExtensionPedia, a platform being dubbed the "Wikipedia for extensions." Its mission is simple: to make your web browser far more secure by exposing dangerous browser extensions and providing transparent, in-depth risk assessments. What is ExtensionPedia and How Does it Help You? ExtensionPedia offers a comprehensive database of over 200,000 browser extensions across popular platforms like Chrome, Firefox, and Edge. Unlike basic app store descriptions, this free-to-use tool gives you crucial insights into the security posture of any extension you're considering or already have installed. Here’s what ExtensionPedia provides:
ExtensionPedia achieves this by pulling anonymous data from millions of browser sessions, aggregating it into a searchable, public-facing tool. This means you can quickly look up an extension and get a clear picture of its security profile. Your Simple Tip for a More Secure Browser: Before you install any new extension, or to audit your existing ones, make it a habit to check it on ExtensionPedia. Simply visit the platform, search for the extension by name, and review its risk assessment. If an extension demands excessive permissions or has a low reputation score, it's a strong indicator that it might be a privacy risk or worse. By leveraging tools like ExtensionPedia, you can take a proactive step in safeguarding your online activity and ensuring your browser remains a secure environment for all your digital tasks. Don't let a convenient extension become a backdoor for cyber threats. https://layerxsecurity.com/extensions/ Ep339 Image created by AI
Cybersecurity experts are increasingly sounding the alarm, highlighting the inherent cyber risks that come with such highly sensitive data, particularly the danger of this collected information falling into the wrong hands through data breaches or misuse. This raises a crucial question: are we trading too much privacy for the convenience of knowing exactly where everyone is? For many families, apps like Life360 embody the promise of constant connection and safety – real-time location tracking, crash detection, and emergency alerts. The idea of always knowing where your loved ones are can be incredibly reassuring. However, cybersecurity experts are increasingly highlighting the inherent cyber risks that come with such highly sensitive data, citing past incidents and persistent privacy concerns surrounding these omnipresent tools. These "family safety" applications typically operate by continuously monitoring GPS signals, often enhancing accuracy with Wi-Fi and Bluetooth data. Users form "Circles" to share their whereabouts with chosen contacts, receiving automatic notifications for arrivals and departures from designated locations. While some premium features even extend to identity theft protection and dark web monitoring, the core function—constant location data collection—creates significant vulnerabilities. Reports and analyses have consistently pointed to several critical areas of concern:
While location-sharing apps undoubtedly offer a sense of security, users must critically evaluate the privacy trade-offs and cybersecurity risks involved. It is paramount to meticulously review an app's privacy policy, configure permissions to the absolute minimum required, employ robust and unique passwords, enable multi-factor authentication whenever possible, and remain perpetually vigilant for any suspicious activity linked to your accounts. For families weighing the benefits against the potential perils, exploring alternatives with stronger privacy guarantees or engaging in transparent conversations about data sharing boundaries is crucial. Ep339 Image created by AI
Behold, the Blaster. It’s not merely a child’s toy; it’s a tactical, battery-powered liquid assault system that feels less like fun and more like a preparatory drill for a highly specialized fire department. The product page, a veritable shrine to over-engineering, boasts of its “powerful motor” and a design that makes it "the most technologically advanced water gun on the market." Because, apparently, our backyard water fights were suffering from a severe lack of cutting-edge innovation. Gone are the days of manual pumping, the satisfying thwack-thwack that built anticipation. Now, the future of hydration-based combat is automated. Press a button, and a relentless stream of H2O erupts, likely leaving your opponent drenched before they can even comprehend the sheer absurdity of your firepower. This thing boasts a level of precision and power usually reserved for pressure washers, making you wonder if it's meant for soaking siblings or power-washing stubborn patio stains. While the "Ultimate Water Battle Blaster" proudly proclaims its battery-powered might, one can't help but envision the frantic scramble for AAAs mid-battle, or the existential dread of a low-battery indicator during a critical ambush. What happens when your ultra-advanced blaster dies, and your foe is armed with a simple, reliable bucket? The shame. The absolute, unadulterated shame. In an age where technology aims to solve increasingly complex problems – climate change, disease, sending tourists into space – Linnaco has bravely tackled the most pressing issue of our time: the inefficient drenching of loved ones. It’s a testament to humanity’s boundless creativity, or perhaps, its boundless capacity for inventing things nobody truly asked for. So, if your summer water fights feel too primitive, too manual, or simply lack the cold, unfeeling efficiency of a precision-engineered liquid delivery system, then the Ultimate Water Battle Blaster is your absurd solution. Just don't accidentally power-wash your pet or trigger an international incident with its unforeseen aquatic might. The future, it seems, is surprisingly wet and wonderfully ridiculous. Ep339 This image is used under the Fair Use provision for the purpose of review and commentary.
Source: https://linnaco.com/products/ultimate-water-battle-blaster
While schools commonly deploy robust firewalls and content filters to block social media, chat apps, and unauthorized websites, the integrated collaboration tools within popular productivity suites like Microsoft 365 often slip through the cracks. These features, designed for legitimate co-editing and project work, allow users to chat in real-time within a shared document or spreadsheet. "We first noticed it when a teacher caught two students giggling while 'working' on a shared history project," explained one school IT administrator, who requested anonymity due to the sensitive nature of the discovery. "On closer inspection, their 'edits' were minimal, but the chat pane was filled with rapid-fire messages discussing everything from weekend plans to exam answers. Our usual filters don't flag internal chat within a Word document as 'social media' traffic." The technique is simple yet ingenious. Students create a new, often meaningless, Word document or Excel spreadsheet, then share it with their intended recipient(s) within the school's network. Once the document is open, they use the built-in chat function (often found in the top right corner, usually with a speech bubble icon) to exchange messages. Because the communication is embedded within a Microsoft application and routed through the school's legitimate network traffic for Microsoft 365 services, it largely goes undetected by standard web filters looking for external chat applications. The messages are typically ephemeral, as the chat history might only persist as long as the document is open or within a recent activity log. However, for quick, real-time exchanges during class, it proves to be a surprisingly effective loophole. Ep339 Image created by AI
Do you shop at Bunnings? There is an app specific for Bunnings that has some pretty cool options including whether they have stock, finding items located in specific isles and at specific stores. Ep338 This image is used under the Fair Use provision for the purpose of review and commentary. Source: Bunnings website
The Cyrillic alphabet has significant relevance for hackers, primarily because of a tactic known as homoglyph attacks (also sometimes called homograph attacks or script spoofing). Here's why it's a valuable tool for cybercriminals:
So basically, in the past the links were obvious to detect as they go to unexpected addresses. Now they actually look correct but the changes font for particular letters can completely change the destination. How to Protect Yourself
Ep338 This image is used under the Fair Use provision for the purpose of review and commentary. Source: Facebook
If you’re a Mac user and you want to upgrade to a new iMac or MacBook, you can use several methods to get your data across and basically pick up where you left off and keep working. The easiest method is to use Migration Assistant.
Migration Assistant can also transfer from a Time Machine backup or transfer from a Windows PC.
This may take some time depending on how much data you need to transfer. Ep338 Image Source: Screenshot taken by MITE Radio
This service leverages the advanced "direct to cell" capabilities of new SpaceX Starlink satellites. While only 25-30 percent of Australia currently boasts traditional mobile coverage, Telstra's new offering aims to bridge this vast communication gap. How do you turn it on?..."As long as your phone has a direct line of sight to the sky, your phone will show 'Telstra SpaceX' as the mobile network, with a Satellite icon in the signal strength area" This seamless connection allows Telstra customers on an upfront plan to send text messages to any Australian mobile number, regardless of their location, from the remotest outback to the most isolated coastal stretches. The service's initial rollout is exclusively for the latest Samsung Galaxy S25 with the newest software update. However, hints from testing in the USA suggest broader device compatibility is on the horizon, with older Samsung phones, recent iPhones (from the last 3-4 years), Google devices, and Motorola's foldable Razr potentially gaining access via future software updates and Telstra network validation. Telstra's move places it ahead in the satellite-to-phone race in Australia. While Optus had an earlier deal with SpaceX, certification delays allowed Telstra to swiftly capitalize on the technology. Vodafone is also reportedly testing similar capabilities with an alternative satellite provider (I think Lynk Global and AST SpaceMobile) While the service is currently limited to SMS, making it unsuitable for Triple Zero emergency calls, its implications for safety and connectivity are immense. Users can now communicate with friends and family from previously unreachable areas, offering peace of mind for adventurers, remote workers, and residents alike. Looking ahead, Telstra plans to introduce voice calling capabilities in 2026, with slow data access for messaging applications also on the roadmap. For a nation defined by its vast and often uninhabited landscapes, Telstra Satellite Messaging represents a revolutionary leap forward, fundamentally altering how Australians connect in the bush, on remote roads, and in any location far from traditional mobile towers. Ep338 Image created by AI
|
AuthorDelve into the world of MITE Radio through our captivating blogs. From music and tech to community news, our articles offer fresh perspectives and behind-the-scenes glimpses. Stay informed, connect with our community, and explore MITE Radio in a new way today! Archives
June 2025
Categories
All
|