MITE RADIO 0492 906 469
  • MITE RADIO
  • Volunteer
  • Thank You
  • Blog
  • Programs
    • Making IT Easy with Tony & Kay
    • The Blues Hotel ​with Kelvin Huggins
    • Jazz Fusion with Brett C
    • Pheez Feels
    • Able & Unfiltered
    • Glenn & Tracy's Timeless Tracks
    • Cort In The Morning
    • Hits, Quizzes & Stuff with Harley Buckner
    • Solid Gold Sounds - Chris Pitchford
    • Gordon Cooper (multiple programs)
    • The Vinyl Countdown with Jonathan Charles
    • 50 Years and Rolling with Leo Kirby
    • Soul Vaults with David Southway
    • The Best Disco In Town with Jonathan Charles
    • ABC Oldies - JP McCartney
    • 50 Years of Pop with Peter Kirkpatrick
    • All About The 80s with Rob Charles
    • No More Heroes with Magnus Shaw
    • Classic Chart Rundowns with Dave Marley (multiple programs)
    • US UK Rock Soul Connection
    • Decades Breakfast with Mark Gale
    • Flashback to the 60s with Jim Barrington
    • The Time of Our Musical Life with Geoff Wood
    • Steve Bishops Old Record Club
    • Steve Algar ​(multiple programs)
    • Chris Palin ​(multiple programs)
    • The Peter Nightingale Show
    • Deeper Dimensions with David Dyke
    • Choice Cuts with Kevin Butcher
    • Ken Anton (Multiple Programs)
    • Gary Hopkins (Multiple Programs)
    • Wayback Saturday Night
  • WAYS TO LISTEN
Picture
​

click here to listen
​to Mite radio (then click the red play arrow)
An initiative of ​The Stairway Project Inc
Picture

My TV Wants to Control My Lights

24/9/2025

0 Comments

 
Yep, Google TV now offers a "Home Panel" feature that turns your TV into a central control hub for your smart home devices. This allows you to manage all smart things from the comfort of your lounge chair using your voice or TV remote.
​

Picture

How It Works

  • Integration with Google Home: The feature works by syncing with your Google Home app. Any smart devices you've set up in the app—and added to your "Favorites"—will automatically appear on your Google TV Home Panel.
  • Easy Access: You can access the Home Panel by using the quick settings dashboard on your Google TV or by long-pressing the home button on your remote.
  • Direct Control: Once in the Home Panel, you can quickly turn devices on or off, adjust settings like light brightness, and even view live feeds from compatible security cameras and video doorbells.
  • Voice Commands: You can also use voice commands through the Google Assistant on your remote to control your devices without having to navigate menus. For example, you can say, "Hey Google, dim the living room lights" or "Show me the front door camera."

So basically, you don’t need a Google Nest device if your TV is on 😂


Ep348
0 Comments

Promptware

24/9/2025

0 Comments

 
Of course we need a new type of treat like a hole in the head, but nonetheless…

Here we go: Promptware. It can take control of your AI assistant, like Gemini or Siri, and your smart home.
​


Picture
What Is Promptware?

  • It's a type of malware that hides in messages, emails, or even calendar invites.
  • It works by giving hidden commands to your AI. The AI sees the message and, without you knowing, follows the secret instructions.
  • Sometimes, it's "zero-click," meaning the AI can be tricked just by reading the message title, without you ever opening it.

What Can It Do?

  • It can tell your smart home devices to do things, like unlock doors or turn on lights.
  • It can steal personal data like your location.
  • Standard antivirus software can't detect it, which makes it a new kind of risk.

How to Stay Safe
​
  • Keep everything updated: Always install the latest updates for your phone, computer, and all your apps.
  • Don't open messages from strangers: Avoid opening messages, emails, or attachments from people you don't know.
  • Limit what your AI can access: Don't ask your AI to summarize messages or documents you don't already trust.
  • Check your settings: See if you can turn off AI features that automatically scan your emails and messages.

Ep348
Image created by AI
0 Comments

Google Wallet's Everything Else Option

24/9/2025

0 Comments

 
The "Everything else" feature in Google Wallet is designed to help you digitize physical cards and documents that don't fit into the standard categories like payment cards, loyalty cards, or tickets. This feature essentially lets you take a photo of a pass, and using AI, Google Wallet can convert it into a digital item you can store and access in the app.
​

Picture

What the "Everything else" feature does:
​
  • Digitize any pass: It's a way to add a digital version of almost any physical card. This could include a gym membership, a library card, an insurance card, or any other type of pass that doesn't have an existing digital format supported by Google Wallet.
  • Uses AI to scan: The feature uses your phone's camera and AI to detect and pull information like a barcode or QR code from the photo you take.
  • Stores as a private pass: If the document contains sensitive information (like health or government ID data), it's classified as a private pass and is not synced to other devices for security.

Try it!
Wallet -> tap + -> Select Everything else -> scan your Driver’s License or something.

If you don’t have it yet, it’s coming soon 🙂

Ep348
Image Source: https://wallet.google/
0 Comments

Gemini TV

24/9/2025

0 Comments

 
Well it’s finally happened, Gemini has taken over from Google Assistant in the TV world.
​

What Gemini Brings to Google TV
​

Natural Language Conversations: Gemini is designed to understand more complex, nuanced, and vague requests. Instead of rigid commands, you can have a more natural conversation with your TV. For example, you can say, "Find me a movie for my family. I like dramas, but my partner likes lighthearted comedies."

Picture

Enhanced Content Discovery: Gemini can help you find content in new ways, such as asking for a recap of a show's previous season, or describing a show you can't remember the name of (e.g., "What's that new hospital drama everyone's talking about?").

Beyond Entertainment: The new AI assistant isn't just for TV and movies. It can answer general knowledge questions, help with homework, find recipes, and even show related YouTube videos to help you learn a new skill.

Hands-Free Interaction: Some new TVs with built-in far-field microphones and sensors can allow you to interact with Gemini without a remote, similar to a smart speaker.

So if you have a Google TV Streamer Box or maybe a TCL TV 🙂 you are in the box seat for some AI help in the entertainment space.

Ep348
Image created by AI
0 Comments

Quishing

24/9/2025

0 Comments

 
QR codes were once a quirky novelty, a quick way to get more information about a museum exhibit or a product. During the pandemic, they became an essential part of daily life, from restaurant menus to boarding passes. But as QR codes have become ubiquitous, a new threat has emerged: “quishing,” a form of phishing that uses these seemingly harmless symbols to dupe millions of people worldwide.
​


Picture
The Rise of a Global Threat

Cybercriminals have turned the QR code into a new weapon. They can easily print fake QR code stickers and place them over legitimate ones on public surfaces like parking meters, train stations, or even utility bills. They rely on the victim being in a hurry, with the urgency of a payment or transaction overriding their caution. When the unsuspecting user scans the fraudulent code, they are redirected to a malicious website designed to steal personal information, download malware, or trick them into making an unauthorized payment.
​

This low-effort, high-return tactic is gaining traction as traditional email phishing campaigns become less effective. A study by the cybersecurity platform KeepNet Labs found that 26% of all malicious links are now sent via QR code. The appeal for criminals is the ease with which the scam operates and the user's inability to verify the destination URL just by looking at the code.


Why We Fall for It

​
A significant factor contributing to the success of quishing is user trust. A global study by Malwarebytes found that 70% of iPhone users have scanned a QR code to begin or complete a purchase, compared to 63% of Android users. The researchers suggest that the high trust in their devices may cause some users to let down their guard. The same study found that 55% of iPhone users and 50% of Android users believe their devices can keep them safe from cyber threats, highlighting a pervasive and dangerous overconfidence.

Experts warn that even stylized QR codes with company logos can be easily copied by cybercriminals, creating a false sense of security. Attackers can even use these codes to infiltrate critical networks or distribute remote access Trojans (RATs), a type of malware that allows hackers full access to a device. As a result, quishing isn't just a risk for consumers; it's a threat to corporate and government security.


The Cat-and-Mouse Game of Security

The battle against quishing is an ongoing one. Some institutions, like the Children's Museum of Indianapolis, are fighting back by using stylized QR codes and regularly inspecting them for tampering. At the same time, researchers like Professor Gaurav Sharma at the University of Rochester are working on developing "smart" QR codes with built-in security features.

However, as a cybersecurity professional noted, "QR codes weren’t built with security in mind; they were built to make life easier." This makes them a perfect tool for scammers. As long as attackers can easily compromise legitimate documents and public surfaces by simply pasting a fake QR code over a genuine one, the onus remains on the user. The best defense is to exercise caution: avoid scanning unwanted or unexpected QR codes, and if you must, always check to see if your phone's camera app displays the full URL before you click on it.


Ep347
Image Source: Licensed by Google
0 Comments

AI Followup Prompts

24/9/2025

0 Comments

 
If you use AI much, followup suggestions can be both a blessing and a curse, depending on your state of mind 🙂 Good news is there is usually a way to turn it off.
​
​
Gemini

Picture

ChatGPT
Picture


Ep347
Image Source: Screenshot taken by MITE Radio
0 Comments

USB Bug Bite Healer

24/9/2025

0 Comments

 
In the hallowed halls of gadgetry, where innovation often waltzes with the mundane, a new champion has emerged. Forget flying cars and robot butlers; the true future is here, and it’s a USB-powered bug bite healer. A device so profoundly simple, so undeniably niche, it could only have been birthed from the minds of geniuses—or someone who’s had a really, really bad day with mosquitoes in Texas.

​
Picture
Enter the “Heat It”—a tiny, absurdly clever dongle that plugs into your smartphone’s USB-C or Lightning port. It’s a heat-based itch obliterator, and it operates on a principle that feels both ancient and futuristic: apply some warmth to a bug bite, and watch the misery melt away. The device heats up to a precise 52 degrees, a temperature that's just hot enough to make your brain go, "Whoa, what's that?" before it decides to forget all about the itching. The feeling is a fleeting sting, a moment of "Ouch, but in a good way," followed by a zen-like calm as the swelling subsides and the itch vanishes into thin air.
​

This is not just a gadget; it's a statement. It’s a tiny, unassuming hero for the modern age. It scoffs at bulky creams and sprays, laughs in the face of calamine lotion, and fits on your keychain like a silent, powerful guardian against the tiny terrors of summer. You can throw it in your backpack, attach it to your keys, or even wear it on a necklace if you want to make a truly bold fashion statement. The “Heat It” is a testament to human ingenuity and our endless quest to solve life's most ridiculous problems with the most ridiculous solutions. AU$30
​
Ep347
This image is used under the Fair Use provision for the purpose of review and commentary.
​Source:  https://www.justheatit.com.au/
0 Comments

NBN Update

24/9/2025

0 Comments

 
Starting in September 2025, NBN Co is rolling out significant speed upgrades to its high-speed residential plans. This initiative is designed to meet the growing demand for faster, more reliable internet in Australian households, driven by an increase in connected devices and data-intensive activities like streaming, gaming, and working from home.
​

Picture

​Here's a breakdown of the key changes:

New and Upgraded Speed Tiers

NBN is accelerating the speeds of its three highest residential wholesale speed tiers and introducing a new, even faster option. The specific changes for eligible plans are:

  • NBN 100 (Home Fast): The maximum download speed will be upgraded from 100 Mbps to 500 Mbps.
  • NBN 250 (Home Superfast): The maximum download speed will increase from 250 Mbps to 750 Mbps.
  • NBN 1000 (Home Ultrafast): The maximum upload speed will double from 50 Mbps to 100 Mbps.
  • NBN 2000 (Home Hyperfast): A brand new speed tier will be introduced, offering download speeds of up to 2000 Mbps (2 Gbps). Upload speeds for this tier will be 200 Mbps for Fibre to the Premises (FTTP) connections and 100 Mbps for Hybrid Fibre Coaxial (HFC) connections.

Eligibility and Connection Types

The speed upgrades are not available for all NBN connections. To be eligible, you must have one of the following connection types:

  • Fibre to the Premises (FTTP): A fiber optic cable runs directly to your home.
  • Hybrid Fibre Coaxial (HFC): This connection uses a combination of fiber and the existing cable TV network.

If you are on an eligible plan and have an FTTP or HFC connection, the speed upgrade will likely happen automatically and at no extra cost. Retail service providers (RSPs) will be rolling out the changes from mid-September 2025.


What if I'm not eligible?

If you are on a different connection type, such as Fibre to the Node (FTTN) or Fibre to the Curb (FTTC), your speeds will not be automatically upgraded. However, NBN is running a free "Fibre Connect" program that allows many FTTN and FTTC customers to upgrade to an FTTP connection at no standard installation cost. To get the upgrade, you will need to order a plan with a speed tier of 100 Mbps or higher from a participating provider.

Other Important Considerations

  • Modem/Router Compatibility: To take full advantage of the faster speeds, you'll need to ensure your modem or router is capable of supporting speeds above 100 Mbps. Older modems may not be able to handle the new, higher speeds.
  • Retail Provider Rollout: While NBN Co will make the new wholesale speed tiers available from September 14, the exact timing of the rollout to customers will depend on your specific retail service provider (e.g., iiNet, Belong, Telstra, etc.). Some providers may have the plans ready on day one, while others might have a short delay.
  • No Price Increase (for now): For eligible customers on existing high-speed plans, the speed increase will happen without an associated increase in the wholesale price from NBN Co. However, your individual retail provider may have its own pricing and plan structures.
​
Ep347
Image created by AI
0 Comments

iPad Battery

29/8/2025

0 Comments

 
Do you have an older iPad and are struggling with battery life?

iPads have a fairly big battery and in their prime you could get a full day of screen time without needing a recharge.

All batteries age and lose capacity, so before you are forced to replace the battery or ultimately your entire device, consider some power saving tips.

​
Picture

Here are 6 quickies:
​

1 Screen brightness. They are big screens and chew through batteries
2. Location services
3. Wireless when using local apps or not connected
4. Notifications - vet them
5. Background app refresh rather than always on
6. Screen lock time or press sleep when you’re not actually using it.

Also check Battery Usage in Settings to see the heavy hitting apps.

Ep346
Image created by AI
0 Comments

Cool-men

29/8/2025

0 Comments

 
​In a move that has the tech world both scratching its head and quietly placing pre-orders, Polish startup Be CoolMen has unveiled its latest product: a wearable device designed to boost male fertility. The “COOLMEN” device, a sleek, temperature-regulating undergarment, promises to "help men become fathers" by keeping things, well, cooler.
Picture

While many in the tech sphere were anticipating another smart fork or a drone that folds laundry, Be CoolMen has opted to address a problem a little closer to home—specifically, the one 37 degrees Celsius problem. The device, which looks like a jockstrap that’s been upgraded by a team of futuristic engineers and a fashion designer with a penchant for medical equipment, uses thermoelectric cooling to stabilize temperatures.

“We’ve optimized for a sedentary lifestyle,” said a Be CoolMen spokesperson, speaking from a standing desk. “Our data shows that men, especially those who work in tech, spend a lot of time on their butts. And that’s a tragedy for sperm. So we thought, why not turn your crotch into a mini-fridge? It’s a game-changer.”

The company’s press release boasts that the device is made from "certified antibacterial materials" and can "track usage data" for physicians, turning a once-private health matter into a potential conversation starter at your next family reunion.

Early reviews are in, and they are, as expected, a mixed bag. One test subject, a tech blogger named Chad, said, "It feels like a tiny air conditioner for my junk. It's oddly refreshing. My test results haven’t changed, but my confidence in a crowded elevator has.” Another reviewer simply wrote, “My wife says I’m spending too much time with my ‘smart undies.’”

The COOLMEN device is part of a larger trend in tech to solve a vast array of human problems, real or imagined. From smart socks that monitor your running form to app-controlled water bottles that tell you when you’re thirsty, the tech industry has made it clear that no human function is too mundane to be "optimized."

Be CoolMen is currently in talks to integrate the device with popular fitness trackers and social media, so users can soon post their sperm motility score to their Instagram story, or challenge their friends to a "sperm count-off" on a leaderboard.

“It's not just a medical device,” said the spokesperson, adjusting his own undergarment. “It's a lifestyle.”

Ep346
Image Source: https://becoolmen.com/
0 Comments

AI Toys

29/8/2025

0 Comments

 
Across the globe, the next big thing in AI is soft, cuddly, and coming to a toy box near you. AI-powered plushies and stuffed animals are hitting the market, promising a new era of interactive companionship and personalized learning for children.

​​These aren't your average teddy bears. Equipped with advanced AI, they can engage in natural language conversations, remember personal details, and even offer comfort. Parents are drawn to the idea of a fluffy friend that can help with homework or listen empathetically after a tough day.
Picture

"It's like having a little tutor and best friend all rolled into one," says one parent, showcasing her daughter's new "Proxima Bear." "The interactions are surprisingly genuine, and my daughter absolutely adores it."

However, the warm feelings quickly turn to questions about data privacy. Every conversation and every shared secret generates a trove of data, raising serious concerns about what happens to that information. Privacy advocates worry that if not handled carefully, this data could pose significant risks.

Developers are racing to address these fears, implementing safety features like:

  • Parental Controls: Giving parents dashboards to monitor conversation logs and manage data sharing.
  • Local Processing: Keeping highly sensitive data on the device itself, so it never reaches the cloud.
  • Age-Appropriate Filters: Ensuring the AI's responses are suitable for children and that no inappropriate language is used.
  • Data Anonymization: Companies commit to aggregating data for system improvement without tying it back to individual children for advertising.

Despite these efforts, consumer watchdogs remain concerned. "We've seen how quickly privacy policies can change and how vulnerable cloud data can be to breaches," warns one expert. "The emotional bond children form with these toys could make them particularly susceptible to exploitation if safeguards aren't rock-solid."

As these AI companions become a household staple, the debate intensifies. The challenge is to design a future where the innovation of AI doesn't come at the cost of safety, privacy, and the very innocence it seeks to enhance. The line between a comforting friend and a data-collecting device is a delicate one, and society is just beginning to figure out where to draw it.

Ep346
Image created by AI
0 Comments

Old Apps Holding Your Google Data

29/8/2025

0 Comments

 

Remember that game you downloaded for five minutes in 2017? Or that third-party photo editor you used once for a single profile picture? While you may have long since deleted them from your phone, there's a good chance they still have access to your Google account data. This silent app invasion is a pervasive digital threat, and it's a security risk many people aren't even aware of.

When you sign in to a third-party app or service using your Google account, you're granting it a specific set of permissions. These permissions can range from viewing your basic profile information to accessing your Gmail, Google Drive, or Calendar data. The problem is, even after you delete the app, that access often remains active in your Google account settings, leaving a digital back door open for potential security breaches.

This isn't about malicious hacking, but rather a simple oversight in our digital lives. As we download and discard apps, we create a growing list of services with active access to our most private information. This list is a goldmine for data brokers and a significant point of vulnerability if one of these services were ever compromised.

How to Reclaim Your Digital Privacy

The good news is that taking back control of your data is a straightforward process, you just need to know where to look.

  1. Access Your Security Settings: Log in to your Google account and go to the "Security" section.
  2. Find Third-Party Access: Scroll down to the "Third-party apps with account access" section. This is your master list of all the services you've ever granted permission to.
  3. Review and Remove: Review the list carefully. If you see an app you no longer use or don't recognize, simply click on it and select "Remove Access."

This quick audit is a vital step in maintaining your online security. Regularly reviewing and revoking permissions for old and unused apps can significantly reduce your digital footprint and protect your personal information from falling into the wrong hands. It's a small task that offers a huge return on your digital peace of mind.

Picture
Ep346
Image Source: Screenshot taken by MITE Radio
0 Comments

White Traffic Light

29/8/2025

0 Comments

 
If you’re anything like me, maybe you share my frustration at traffic lights when drivers are sluggish to go on the green and slow to approach a green but then zoom through when it turns orange. We are imperfect beings, but perhaps more perfect are our smart vehicles. There’s a relatively new idea involving the introduction of a "fourth color" traffic light, specifically a white light, that has been proposed by researchers at North Carolina State University. This concept is designed to enhance traffic flow and efficiency, particularly in the context of increasing numbers of autonomous vehicles (AVs) on our roads.
​

Picture

​What, why, how, I hear you ask?

The "White Phase": The key idea is a "white phase" where autonomous vehicles effectively take temporary control of traffic management at an intersection. This system relies on AVs' ability to communicate wirelessly with each other and with the traffic signal system.

Signaling to Human Drivers: When enough AVs are detected approaching an intersection, the white light would illuminate. For human drivers, the instruction during this "white phase" is simple: "Follow the car in front of you." This means if the car ahead (which would ideally be an AV coordinating with the system) proceeds, you proceed; if it stops, you stop. The specific color "white" isn't strictly necessary, as long as the signal is clearly distinguishable and doesn't create confusion with existing red, yellow, or green meanings.

AV Coordination: During the white phase, the AVs themselves would coordinate their movements to optimize traffic flow through the intersection. They would essentially become "mobile traffic controllers," using their collective computing power and real-time data to make rapid, efficient decisions on who goes when. This distributed control aims to reduce delays, fuel consumption, and improve overall travel times for all vehicles, not just AVs.

Benefits for Mixed Traffic: The simulations conducted by the researchers show significant benefits even with a relatively low percentage of AVs on the road. For instance, delays dropped by 70% when 30% of vehicles were AVs, and even a 10% AV presence led to noticeable reductions in delays. This system is designed to work in "mixed traffic streams," where both human-driven and autonomous vehicles share the road.

Impact on Traditional Lights: When there aren't enough AVs to activate the white phase, or if the AV system is not active, the traditional red, yellow, and green traffic lights would function exactly as they do now. Red still means stop, green still means go.

What could possibly go wrong 🙂
​

Ep345
Image created by AI
0 Comments

Malware Bytes App

29/8/2025

0 Comments

 
Malwarebytes Mobile Security for Android offers several features to help protect against phishing messages and other scams. The key features for this type of threat are its Anti-Phishing Alerts and a newer, AI-powered tool called Scam Guard.
​

Key Features for Phishing Detection
​
  • Anti-Phishing Alerts: This feature provides real-time warnings when you are about to click on a suspicious link. It's designed to protect you from fraudulent websites that try to steal your personal information. Malwarebytes can detect malicious URLs in browsers like Chrome and in messages.
  • Scam Guard: This is a more interactive, AI-powered tool that allows you to directly check for scams. You can upload a suspicious text message, a screenshot, a link, or a phone number to the Scam Guard chatbot. The AI will quickly analyze it and give you advice on whether it's a scam and what to do next. This is a mobile-exclusive feature that is designed to help with a wide range of scams, including those delivered via text messages, emails, or even phone calls.
Picture

How it Works

The app works by continuously monitoring your device and its activity. For phishing links, it checks the URLs you're about to visit against a database of known malicious sites. If a link in a message is identified as suspicious, Malwarebytes will warn you before you can proceed to the site.

The Scam Guard feature goes a step further by providing a way for you to actively check things you are unsure about. This is particularly useful for scams that don't involve a malicious link but instead try to manipulate you into giving up information or money.

Free vs. Premium

While some basic features like a manual virus scan may be available for free, a premium subscription is required for real-time protection, which is what is needed for the anti-phishing alerts and web protection. The Scam Guard feature is also available as part of the Malwarebytes Mobile Security app.

In addition to phishing and scams, the Malwarebytes Android app also provides:
​
  • Real-time malware and spyware protection.
  • A virus cleaner to remove existing infections.
  • A VPN for secure browsing.
  • Privacy features that audit your apps to show what permissions they have
​
Ep345
Image Source: Malwarebytes
0 Comments

Basic Battery Checker

29/8/2025

0 Comments

 
Few things are more frustrating than a device going dead when you least expect it, especially when you're rummaging through a bag of old batteries, unsure which ones still hold a charge. But what if there was a simple, instant way to tell a live battery from a dead one without needing a tester? According to PCWorld's Australian Editor Dominic Bayley, there is – and it's a neat trick involving a quick drop.
​

Picture

Bayley, like many of us, recounts the common struggle of cycling through partially used batteries, often storing them for recycling or "just in case." The real headache, he notes, comes when a device unexpectedly dies, forcing a frustrating trial-and-error search for a viable replacement. His solution? A surprisingly effective "bounce test."

Here's how to perform this quick test at home:

  1. Find Your Surface: Locate a flat, firm surface. A sturdy table or even a thick book will work as your test platform.
  2. The Drop: Hold the battery (typically an AA or AAA, though the principle applies to others) vertically above the surface.
  3. Release and Observe: Drop the battery straight down onto the surface from a height of approximately 8 inches (about 20cm).

The Key Observation:

The magic lies in how the battery reacts upon impact:
  • A fully charged battery will tend to fall with a duller thud, tipping over and staying put on the surface, or bouncing minimally before settling.
  • A flat or dead battery, however, will often bounce back up a few centimeters or more, indicating it's no longer worth using.

​This simple physical reaction provides a quick and clear indicator of a battery's remaining charge, saving precious time and effort. It's a handy piece of everyday science that can help anyone quickly sort through their battery stash, ensuring you grab a good one when you're in a pinch. So next time you're unsure, just drop it and watch.


Ep345
Image created by AI
0 Comments

Windows 10 EOL Update

29/8/2025

0 Comments

 
After October 2025, Windows 10 will no longer receive free security updates. However, Microsoft offers three options, two of which are free, to extend this support for another year.

Microsoft is rolling out a new "Enroll now (ESU)" wizard in the Windows Update settings to allow users to select one of these options. While this menu has been available since the end of July 2025, it's being released gradually, and many users still don't have it.​

Picture

You can't manually force the update, so you'll need to wait until the ESU wizard appears on your PC. The deadline to sign up for this extended support is October 13, 2025, so there's still plenty of time.

While Microsoft is slowly rolling out the option to extend support, it has been more aggressive with full-screen reminders urging users to upgrade to Windows 11.

End of Free Windows 10 Support: After October 2025, Windows 10 will no longer receive free security updates.

Options for Extended Support: Microsoft offers three options, two of which are free, to extend security updates for another year.

The ESU Wizard: Users must wait for the "Enroll now (ESU)" wizard to appear in their Windows Update settings to choose one of these options.

Slow Rollout: The ESU wizard has been available since late July 2025 but is being rolled out gradually, and many users still don't have it.

Lack of User Control: Users cannot manually force the update and must wait for Microsoft to release the wizard to their PC.

Ample Time to Enroll: The registration deadline for extended support is October 13, 2025, providing plenty of time.

Aggressive Upgrade Reminders: Microsoft is actively showing full-screen notifications to Windows 10 users, urging them to upgrade to Windows 11.
​

Deceptive Messaging: These full-screen reminders often make the "Upgrade to Windows 11" button prominent while making the "Keep Windows 10" option small and difficult to find.

Ep345
Image created by AI
0 Comments

App Privacy Settings

20/6/2025

0 Comments

 
Our smartphones are extensions of ourselves, holding a vast amount of personal data. From our photos and contacts to our location history and even our health metrics, these devices are treasure troves of information. But with every new app we download, we're asked to grant various permissions – often with a quick tap of "Allow" without a second thought. The critical question is: are these apps truly respecting our privacy, or are they quietly collecting more data than they need, potentially exposing us to unseen risks?
Picture

Just as we've come to accept that our voice assistants might be listening for commands and pushing ads our way, it's time to extend that scrutiny to every app on our phone. Many apps, even seemingly innocuous ones, can demand excessive access to your device's features and data.


The Hidden Dangers of Over-Permissive Apps

When you grant an app permission to access your microphone, camera, contacts, or location, you're opening a door. While some permissions are essential for an app's core functionality (e.g., a camera app needs camera access), many others are not. Granting unnecessary permissions can lead to:

  • Data Leakage: Sensitive information, from your messages to your financial details, could be accessed, stored, or even transmitted without your knowledge or consent.
  • Unwanted Surveillance and Tracking: Apps with access to your location, microphone, or camera can potentially monitor your movements, conversations, or surroundings. This data can then be used for targeted advertising, behavioural tracking, or worse.
  • Identity Theft and Fraud: Apps with access to contacts, photos, or emails can make you vulnerable if their security is breached, potentially leading to identity theft or unauthorized transactions.
  • Battery Drain and Performance Issues: Apps constantly running in the background, collecting data, can significantly impact your phone's battery life and overall performance.

Cybersecurity experts frequently find that many apps request far more permissions than they actually need. It's a common practice for developers to cast a wide net, and for users to click "Allow" without fully understanding the implications


Check Settings
-> Security and Privacy (Android and Apple) -> Permission Manager.


You can then tap
Camera and see what apps have access and change/update.


Also check Location, Microphone, Contacts, Calendar, etc…


Ep344
Image created by AI
0 Comments

My Phone Didn’t Ring

20/6/2025

0 Comments

 
A bit of an air crash investigation:

We've all been there: staring at our phone, willing it to ring for that crucial call – from a job offer to urgent family news – only to be met with a frustrating "missed call" notification, despite no audible ring. That sinking feeling is all too familiar. But why does this happen? Is your phone secretly betraying you? We delve into the complex world of mobile calls to uncover the culprits and offer some potential solutions.
Picture

How does it all work?

​If your phone and the caller’s phone are connected to the phone network via 4G or 5G, then your phone will receive an “invite” from the caller and it should ring.

Why would it not ring?

  • 4G and 5G networks are slightly different. The system tries to use the fastest system then falls back to slower systems if there’s a connection problem, so 5G to 4G to 3G (now gone) to voicemail… 
  • Sometimes your phone might not be registered on the network correctly so might not receive the call invite. Maybe a SIM error or software glitch,
  • Network Handover problems can happen when moving between towers.
  • Battery saver settings might cause a problem.
  • You might be in a dead zone or have poor reception.
​
Ep344
Image created by AI
0 Comments

Smart Device Listening

20/6/2025

0 Comments

 
We've all had that unsettling experience: a casual conversation about a new appliance, a holiday destination, or a fleeting interest, only for eerily specific ads to start popping up on our phones minutes later. It’s a common, if unnerving, understanding that our digital companions – whether it's Google's ever-present assistant or Apple's Siri – are, in some capacity, always listening, seemingly translating our spoken words into targeted advertising. But what about the other "smart" devices infiltrating our homes, from air fryers to smartwatches? Are they also silently gathering data, pushing the boundaries of what's acceptable when it comes to our most private spaces?
Picture

In a significant move to safeguard consumer privacy, the Information Commissioner's Office (ICO) has released new guidance for manufacturers of smart home appliances, aiming to rein in what some describe as "disproportionate surveillance" by everyday gadgets. The guidance comes after an investigation by consumer champion Which? uncovered alarming data collection practices by certain smart devices, including air fryers, smart TVs, and smartwatches.

With an estimated four out of five people in the UK owning at least one smart appliance, the new rules are designed to protect a vast segment of the population from potentially intrusive data collection.


The Which? investigation highlighted several concerning instances. Three air fryers, manufactured in China were found to record audio on owners' phones without a specified reason and some were observed sending personal data to Chinese servers, although this was noted in their respective privacy notices.


The new guidance mandates that manufacturers and developers adopt a "data protection by design and default" approach. 

Smartwatches and fitness trackers are also explicitly covered by the new guidance, with the ICO advising extra caution for "special category data" like a user's BMI or fertility information. The Which? study found that the Huawei Ultimate smartwatch requested nine "risky" phone permissions, more than any other device in the investigation. These risky permissions typically include access to precise location, audio recording capabilities, stored files, or the ability to view all other installed apps. Huawei has stated that all requested permissions have a justified need, and there is no suggestion of illegal behavior by any of the companies mentioned in the study.

Australian Context: A Similar Path Towards Stronger Protections

The UK's proactive stance on smart device privacy resonates strongly in Australia, where similar concerns about data collection and security have been growing. While Australia does not have an identical regulatory body to the ICO, the Office of the Australian Information Commissioner (OAIC) plays a key role in upholding privacy rights under the Privacy Act 1988 (Cth).

Significantly, Australia has recently introduced its own legislative measures to address these issues. The
Cyber Security Act 2024 (Cth), which received Royal Assent in November 2024, is a landmark piece of legislation that includes provisions for mandatory minimum cyber security standards for smart devices. These "Cyber Security (security standards for smart devices) Rules 2025" are set to come into effect on March 4, 2026.


These Australian rules will require manufacturers and suppliers of internet-connectable products intended for consumer use to comply with specified security standards. Key requirements include:
​
  • No universal default passwords: Each device must have a unique password or allow the user to define their own.
  • Vulnerability reporting mechanisms: Manufacturers must have a public policy for reporting security issues and provide contact information for doing so.
  • Minimum security update periods: Manufacturers must disclose the duration of security support for their products' software or hardware.
  • Statement of compliance: Both manufacturers and suppliers will be required to provide a statement confirming their device meets these standards.

The OAIC has also been actively engaged in promoting "privacy by design" for all digital products, including AI systems, and has issued guidance emphasizing transparency, accuracy, and the need for informed consent, particularly for sensitive personal information collected by IoT devices.


Ep344
Image created by AI
0 Comments

Hand Warmers

19/6/2025

0 Comments

 
Welcome back to our weekly dip into the wonderfully weird world of "The Tech Absurd"! As we Aussies brace ourselves for those crisp (okay, maybe just slightly less scorching) winter evenings, we've stumbled upon a gadget that promises to keep your mitts toasty, even if your fashion choices lean more "singlet and shorts" year-round: the Dnaleao Rechargeable Hand Warmers.
​

Now, we get it. Winter camping in your backyard can have a certain rugged appeal... right after you've wrestled with the mozzie net and remembered where you stashed the extra blankets. But for those who truly embrace the chill, or perhaps just suffer from perpetually icy fingers (maybe you work in a particularly enthusiastic air-conditioned office?), Dnaleao offers a solution that's less "crackling campfire" and more "pocket-sized personal sun."
Picture

Resembling a rather chunky portable battery pack – because apparently, the pinnacle of hand-warming tech involves looking like you're charging your phone in your palm – these little gadgets pack a surprising punch. With three temperature modes ranging from a mild "slightly less chilly" 95°F to a "feels like you're gently cradling a freshly baked potato" 130°F, you can customize your hand-warming experience. And with a claimed 12-hour battery life from their 4,000mAh cells, you could theoretically keep your hands warm from sunrise to sunset... or at least until you inevitably misplace one in the depths of your backpack.

​The real absurdity, however, lies in the sheer convenience. Simply grip the warmer to use it. That's it. No frantic rubbing, no awkward glove adjustments, just instant, rechargeable warmth. And when you're done feeling like you've captured a tiny piece of the Outback sun in your hand, just tuck it into your trouser pocket. Because nothing says "stylish adventurer" quite like having two slightly oblong bulges radiating heat from your lower half.

So, whether you're battling the frosty air on your morning commute, braving a chilly Bunnings snag sizzle, or just determined to master the art of typing with fingers that haven't turned completely blue, the Dnaleao Rechargeable Hand Warmers offer a techy, if slightly peculiar, way to say "not today, frostbite!"

Ep343
Image Source: https://amazon.com
0 Comments

Free Password Managers

19/6/2025

0 Comments

 
In our tech-world, every online service demands a unique login, managing passwords has become a cybersecurity tightrope walk. Thankfully, major tech giants like Apple, Google, and Microsoft have stepped up, offering free, built-in password managers as part of their ecosystems. But as with all things free, the question for us here and across Australia, is: are they good enough, or are you compromising security for convenience?
Picture

These platform-based password management tools have come a long way from being simple browser autofill features. They've evolved into surprisingly capable, often cross-platform, solutions designed to simplify our digital lives.

The Upside: Convenience and Integration

For many users, the appeal of these free options is undeniable. They come with several compelling advantages:

  • No Extra Downloads: They're already integrated into your operating system or browser, meaning no additional software to download or install. This "set and forget" simplicity is a major draw.
  • Automatic Syncing: Passwords automatically sync across all your devices linked to your Apple ID, Google Account, or Microsoft Account. Log in once on your phone, and it's there on your laptop.
  • Integrated Security: Their security features are deeply embedded within the respective platforms, leveraging existing account security measures like two-factor authentication.
  • Cost-Free: The price is right – free!

The Downside: Limitations and Niche Use

Despite their growing capabilities, these built-in managers do come with certain limitations, particularly when compared to dedicated, paid password management services:

  • Platform Lock-in: While they are becoming more cross-platform, their seamlessness often shines brightest within their native ecosystem. If you frequently switch between, say, an iPhone, an Android tablet, and a Windows PC, you might encounter usability quirks or reduced functionality.
  • Basic Feature Set: They typically offer a more fundamental set of features. Dedicated password managers often include advanced capabilities like secure sharing, dark web monitoring, emergency access, and more robust auditing tools that these free options lack.
  • Usability Across Divides: While Google's password manager, for example, is becoming quite versatile across platforms, users deeply entrenched in one ecosystem might find others less intuitive when using a rival's password manager.

So, Should You Use Them?

The verdict largely depends on your digital habits. For users who are not particularly tech-savvy, or those with relatively simple online needs and a strong preference for staying within a single ecosystem (e.g., an all-Apple household or someone who lives entirely in Google's cloud), these platform-based password managers are a perfectly viable and secure solution. They offer a significant upgrade over reusing simple passwords or writing them down.

However, for individuals who frequently switch between different operating systems or browsers, manage a high volume of complex online accounts, or require advanced features like secure sharing or password auditing, a dedicated, paid password manager might offer a more robust, versatile, and ultimately more secure experience. Ultimately, the best password manager is the one you actually use consistently to generate and store strong, unique passwords.

Ep343
Image created by AI
0 Comments

Microwaving E-Waste

19/6/2025

0 Comments

 
When you think of a microwave, heating last night's leftovers probably comes to mind. But what if this ubiquitous kitchen appliance held the key to turbo charging global recycling, turning vast mountains of trash into valuable treasure? Research is proving just that, as microwaves emerge as a surprisingly efficient and clean solution for recovering critical materials from electronic waste (e-waste) and even breaking down plastics.
Picture

The conventional methods for recycling e-waste, which contains valuable yet hard-to-recover elements like tantalum, gallium, and indium, are often costly, hazardous, and environmentally taxing. These critical minerals, vital for our smartphones, laptops, and advanced electronics, frequently end up in landfills or are processed using methods that pose serious health risks.

​Enter the humble microwave, repurposed for a much grander task. Researchers, notably a team at West Virginia University with support from DARPA (the U.S. Department of Defense's advanced research agency), are developing a method that uses microwaves to selectively heat specific components within shredded e-waste. By mixing the waste with a carbon-based material, microwaves can precisely activate a chemical reaction that transforms compounds into pure, reusable metals. This process boasts impressive purity levels (over 97% for tantalum) and significantly reduces the need for harsh chemicals, energy consumption, and waste generation. The implications are vast, not just for environmental sustainability but also for national security by ensuring a domestic supply of vital materials.


Beyond metals, microwaves are also showing promise in plastic recycling. New techniques are employing microwave irradiation to pretreat tough plastics like PET (polyethylene terephthalate) bottles, making them far more accessible to enzymes. This combination dramatically accelerates the breakdown of plastics into their base components, allowing for more efficient and higher-yield recycling.


Furthermore, this innovative microwave technology extends to solar panel recycling. Microwaves can selectively heat silicon components within solar panels, softening the protective plastic coating and allowing for easier de-lamination and recovery of valuable materials without high temperatures or corrosive chemicals.


These advancements represent a significant leap forward in our quest for a circular economy. By harnessing the power of microwaves, we're not just finding cleaner ways to recycle; we're unlocking valuable resources from what was once considered waste, paving the way for a more sustainable and resource-independent future. 


I guess we just need to find a way to sustainably power it!


Ep342
Image created by AI
0 Comments

Camera Privacy

19/6/2025

0 Comments

 
A significant and disturbing cybersecurity vulnerability has come to light, revealing that over 40,000 security cameras across the globe are live-streaming footage completely unsecured and exposed to the internet. This alarming revelation poses a massive privacy concern for individuals and organizations alike.
Picture

According to cybersecurity firm Bitsight, these cameras are broadcasting video feeds that can be accessed without any form of authentication, encryption, or even the most basic password protection. This means anyone with the right tools or knowledge can potentially view private spaces and activities.
The United States appears to be a major hub for this vulnerability, with nearly 14,000 potentially exposed cameras. The states with the highest concentrations of these unsecured devices include California, Texas, Georgia, and New York.

​Bitsight's Cyber Threat Intelligence team has unearthed evidence suggesting that these unsecured feeds are a hot topic in dark web forums. Cybercriminals are reportedly discussing and sharing methods, tools, and techniques to gain unauthorized access to these video streams. Worse still, access to these unprotected cameras is being bought and sold, highlighting the lucrative nature of exploiting such privacy breaches.


Australia is not immune to this widespread issue. Cybersecurity experts and government bodies here frequently warn that many Internet of Things (IoT) devices, including security cameras in Australian homes and businesses, are deployed with inadequate security, often relying on weak or default passwords. This leaves them wide open to exploitation.


Actual instances of unsecured camera footage being accessed in Australia have been reported. For example, a rug shop in Cairns was found to be live-streaming its camera footage to a site linked to Russian hackers. Similarly, a mechanic was alerted that his activities were being streamed live online to a compromised website during a home service call. These incidents underscore the tangible risk to privacy and security posed by unsecure camera setups.


This incident serves as a stark reminder of the critical importance of cybersecurity best practices, particularly when setting up internet-connected devices. Users of security cameras, whether for personal or business use, must ensure their devices are properly secured with strong, unique passwords, encryption where available, and limited external access to prevent becoming part of this widespread privacy nightmare.


Ep342
Image created by AI
0 Comments

Tosy Flying Disc

19/6/2025

0 Comments

 
Ahh "The Tech Absurd," celebrating gadgets that might not change the world, but might just add a splash of unexpected fun! Remember the Frisbee? Well, move over my plastic, because today, we're casting our spotlight on a device that takes a classic outdoor pastime and injects it with a vibrant, dazzling twist: enter the Tosy RGB Flying Disc.
Picture
While it might not enhance the way you throw, the Tosy RGB flying disc is undeniably a feast for the eyes. At its core, it's a familiar flying disc, perfect for those backyard games and camping adventures with friends and family. However, its secret weapon is a dazzling array of 108 RGB LEDs, capable of emitting a staggering 16.7 million colors. Yes, you read that right – 16.7 million. Because apparently, your backyard frisbee toss just wasn't doing enough to prepare you for a rave.

The beauty of the Tosy disc isn't just aesthetic; it brings new possibilities to your outdoor play. Traditional flying disc games, especially those requiring precise throws and catches like Ultimate Frisbee, are often limited to daylight hours because, well, you need to see the disc! But with the Tosy flying disc, the darkness becomes your arena. Its brilliant illumination allows you to keep the game going long after the sun has set, turning your backyard into a dynamic, glowing playground. No more frantic searches for a lost disc in the bushes – unless it's gone
really far, in which case, at least it'll look cool while it's missing.


So, if you're looking to add a truly unique, visually spectacular element to your outdoor recreation, or just want to make sure your frisbee stands out in a crowd (and in the dark), the Tosy RGB Flying Disc might just be the "absurd" tech gadget you never knew you needed. After all, why just throw a disc when you can throw a disco?
​

Ep342
Image created by AI
0 Comments

Infostealer Sting

19/6/2025

0 Comments

 
An extensive international law enforcement effort, dubbed "Operation Secure," has successfully disrupted major infostealer malware infrastructure across 26 countries between January and April 2025. The operation, spearheaded by Interpol, aimed to dismantle sophisticated criminal groups responsible for stealing vast amounts of financial and personal data from victims worldwide.
Picture

The coordinated sting resulted in the arrest of 32 individuals globally. Authorities also seized significant data, including over 100 GB of information, and took down more than 20,000 malicious IP addresses and domains linked to infostealer activities. Furthermore, 41 servers supporting these illicit operations were confiscated.

"Operation Secure" has been instrumental in protecting countless individuals from financial fraud and identity theft. As a direct result of the operation, 216,000 victims have been notified that their data was compromised, enabling them to take protective measures.

Infostealer malware poses a significant threat, covertly infiltrating systems to siphon off sensitive information such as banking credentials, passwords, browser history, and even cryptocurrency wallet information. This global threat has a tangible impact in regions like Australia, where recent reports indicate over 30,000 Australian banking passwords were harvested by infostealers between 2021 and 2025, affecting customers of major banks and even superannuation funds. Cybersecurity experts note that these modern infostealers are increasingly capable of bypassing multi-factor authentication (MFA) by stealing session cookies, presenting a critical challenge for both individuals and organisations. The Australian Signals Directorate (ASD) has repeatedly warned of this "silent heist" accelerating into 2024, emphasizing its role as a precursor to more significant cyber incidents.

The success of "Operation Secure" highlights the critical importance of international cooperation in combating cybercrime and safeguarding digital security on a global scale.

Perhaps we can breathe a tad easier now… at least for a little while. 

Ep342
Image created by AI
0 Comments
<<Previous

    Author

    Delve into the world of MITE Radio through our captivating blogs. From music and tech to community news, our articles offer fresh perspectives and behind-the-scenes glimpses. Stay informed, connect with our community, and explore MITE Radio in a new way today!

    Archives

    June 2025
    May 2025
    April 2025
    March 2025
    February 2025
    January 2025
    December 2024
    November 2024
    October 2024
    September 2024
    August 2024
    July 2024
    June 2024
    May 2024
    April 2024
    March 2024
    February 2024
    January 2024
    December 2023
    November 2023
    June 2023
    May 2023
    April 2023

    Categories

    All
    AI
    App Of The Day
    Bytes & Beats
    Cyber Security
    Discussion
    Gadgets & Gizmos
    Game
    Innovation Hub
    Listener Question
    News
    Other
    Somethin' For Nothin'
    The Tech Absurd
    Tips & Tricks

    RSS Feed



  • MITE RADIO
  • Volunteer
  • Thank You
  • Blog
  • Programs
    • Making IT Easy with Tony & Kay
    • The Blues Hotel ​with Kelvin Huggins
    • Jazz Fusion with Brett C
    • Pheez Feels
    • Able & Unfiltered
    • Glenn & Tracy's Timeless Tracks
    • Cort In The Morning
    • Hits, Quizzes & Stuff with Harley Buckner
    • Solid Gold Sounds - Chris Pitchford
    • Gordon Cooper (multiple programs)
    • The Vinyl Countdown with Jonathan Charles
    • 50 Years and Rolling with Leo Kirby
    • Soul Vaults with David Southway
    • The Best Disco In Town with Jonathan Charles
    • ABC Oldies - JP McCartney
    • 50 Years of Pop with Peter Kirkpatrick
    • All About The 80s with Rob Charles
    • No More Heroes with Magnus Shaw
    • Classic Chart Rundowns with Dave Marley (multiple programs)
    • US UK Rock Soul Connection
    • Decades Breakfast with Mark Gale
    • Flashback to the 60s with Jim Barrington
    • The Time of Our Musical Life with Geoff Wood
    • Steve Bishops Old Record Club
    • Steve Algar ​(multiple programs)
    • Chris Palin ​(multiple programs)
    • The Peter Nightingale Show
    • Deeper Dimensions with David Dyke
    • Choice Cuts with Kevin Butcher
    • Ken Anton (Multiple Programs)
    • Gary Hopkins (Multiple Programs)
    • Wayback Saturday Night
  • WAYS TO LISTEN