Home Blog

‘Grand Theft Auto’ Video Game Maker Cuts 600 Jobs, Sheds Projects

0

[ad_1]

Take-Two Interactive Software will lay off about 5% of its workforce, or about 600 employees, the publisher said The “Grand Theft Auto” franchise. said Tuesday, as the video game industry grows more than two-year abolition of jobs.

The company will also scrap several projects in development as part of a cost-cutting plan, which is expected to result in total costs of up to $200 million.

He declined to name the projects that were canceled.

Take-Two said the move is expected to generate more than $165 million in annual savings.


Grand Theft Auto video game
The cost-cutting plan is expected to result in total costs of up to $200 million. Reuters

The company’s shares rose by 1% in extended trading. They are down almost 10% so far this year.

The move brings Take-Two in line with Tencent-owned Riot Games, Electronic Arts and Japan’s Sony in cutting workforces this year due to uncertain consumer spending after the pandemic boom.

Gaming revenue growth on PCs and consoles is expected to remain below pre-pandemic levels through 2026 as gamers log fewer hours of gameplay, according to research firm Newzoo.

The canceled projects will amount to as much as $140 million in total costs, while severance and employee costs are expected to be up to $35 million, it said. Take-Two will also downsize some office space as part of the move.


NBA 2K22 and Grand Theft Auto 5
Gaming revenue growth on PCs and consoles is expected to remain below pre-pandemic levels through 2026 as gamers log fewer hours of gameplay, according to research firm Newzoo. Reuters

The company, which had 11,580 full-time employees in March 2023, last month agreed to buy “Borderlands” maker Gearbox for $460 million in a cut-price deal at a time when consolidation is driving up prices for makers of big-name titles.

Take-Two has been focused on developing the next installment in the best-selling “Grand Theft Auto” franchise, but some reports say the title could be pushed back to 2026 from 2025.

[ad_2]

Source link

Students from LA, parents warned about the spread of deepfake threats with nude photos

0

[ad_1]

Multiple Los Angeles school districts have investigated cases of “inappropriate,” images of students generated by artificial intelligence have been making the rounds on the internet and text messages in recent months.

Recently, the Los Angeles Unified School District (LAUSD) announced that it was investigating “allegations of inappropriate photos that were created and distributed within the Fairfax High School community,” the school district told Fox News Digital in a statement.

“These allegations are taken seriously, do not reflect the values ​​of the Los Angeles Unified community, and will result in appropriate disciplinary action if warranted.”

A preliminary investigation revealed that the images were allegedly “created and shared on a third-party messaging application not affiliated with” LAUSD.

The school district said it “remains steadfast in providing training on the ethical use of technology — including AI — and is committed to improving digital citizenship education, privacy and safety for everyone in our school communities.”

AI apps and websites have the ability to put photos of people’s faces on them nude photos generated by artificial intelligence, or in some cases videos.

The Los Angeles Unified School District last week announced the circulation of “inappropriate” AI-generated images at Fairfax High School this week. Getty Images

Titania Jordan, chief parent officer at social media safety firm Bark Technologies, told Fox News Digital in a statement that the recent incident within LAUSD is “an indicator of a larger problem affecting society: the use of artificial intelligence for malicious purposes.”

“Deepfakes – and especially shared, fabricated intimate images and videos without consent – ​​aren’t just like fun TikTok or Snapchat filters. This deceptively realistic media can have devastating real-life consequences for victims who did not consent to their likeness being used,” she said. “Things are complicated by the fact that the technology behind them is getting better every day. It’s already gotten to the point where it can be hard to tell the difference between an authentic video and a deepfake.”

This announcement comes after similar cases within the Beverly Hills Unified School District (BHUSD) and the Laguna Beach Unified School District (LBUSD).

High school students in the LA area are being warned about deepfake photos. Jose Calsina – stock.adobe.com

Earlier this month, Dana Hills High School Principal Jason Allemann sent a letter to parents informing them that artificial intelligence was generating nude images of students circulating online, FOX 11 Los Angeles reported.

The images were circulated on the Internet and via text messages, the newspaper said.

“These actions not only compromise the dignity of the individual, but also undermine the positive and supportive environment we seek to foster at LBHS,” Allemann said in the letter, according to FOX 11.

The LA Unified School District announced that it is investigating “allegations of inappropriate photos that were created and distributed within the Fairfax High School community.” Google Maps

Dana Hills senior Ariana Coulolias told FOX 11 the images looked “really real.”

“It’s just scary to see things like that happen,” Coulolias told the news outlet.

In February, high school students notified Beverly Hills school administrators that inappropriate images of artificial intelligence were circulating at Beverly Vista High School.

“We want to make it clear unequivocally that this behavior is unacceptable and does not reflect the values ​​of our school community,” the district said in a statement to Fox News Digital at the time. “Although we are aware of similar situations happening across the country, we must act now. This behavior is rising to a level that requires the entire community to work in partnership to ensure it stops immediately.”

The district noted that misusing artificial intelligence in such actions may not technically be a crime, as laws are still catching up with technology.

“We are working closely with the Beverly Hills Police Department throughout this investigation,” the district said. “We assure you that, if any criminal acts are discovered, they will be investigated to the maximum extent.”

Titania Jordan of Bark Technologies noted that even Taylor Swift recently fell victim to “this privacy violation” stemming from a “viral 4chan challenge” using AI deepfake technology.

“Mrs. Swift may have brought a lot of attention to this problem, but it’s been around for a while and happens more often than most people realize. Unfortunately, law enforcement and legal actions have been slow to catch up with this technology because it is new,” said Jordan.

She added that “(s)tudents, families and schools should work together to educate their community about how dangerous and unacceptable it is to create deepfakes without permission.”

“It’s not just about the potential harm of fake nudity — deepfake technology can also be used in fraud, robbery, and even to influence political behavior,” Jordan explained.

Fox News’ Bradford Betz contributed to this report.

[ad_2]

Source link

Google employees storm offices in NYC, California and Seattle to protest ties to Israel

0

[ad_1]

Google employees wearing traditional Arabic headscarves stormed the California office of the company’s top cloud executive, while other workers staged a sit-in at the company’s New York headquarters to are protesting the tech giant’s ties to the Israeli government Tuesday.

Pro-Palestinian employees, part of a group called “No Tech for Apartheid,” used social media accounts on X and Twitch to post images and live video of the takeover of CEO Thomas Kurian’s office in Sunnyvale, California. Google Cloud.

Labor activists read statements condemning the company over its contract with the Israeli government, which the group accuses of carrying out “genocide” in its bombing campaign on the Gaza Strip – following the Hamas massacre of Israelis in October. 7.

Pro-Palestinian Google employees took over the office of Google Cloud CEO Thomas Kurian on Tuesday. Twitch/notech4apartheid

They demanded that Google cancel its participation in “Project Nimbus” – a $1.2 billion deal with Israel that includes Google Cloud as well as Amazon Web Services.

Another group of protesters were seen occupying the 10th floor of Google’s offices in the Chelsea section of Manhattan as part of a protest that spread to the company’s Seattle offices over what it called “No technique for the Day of Action Against Genocide.”

The Post has sought comment from Google.

Orchestrated seating comes after a Google software engineer a public assessment of one of the Israel-based company’s executives during a technology conference in Manhattan last month.

Google fired the worker.

It is not clear what actions the company will take after the mass rebellion within its own walls.

Picture from a Twitch livestream confirmed that they had taken over Kurian’s office.

A custom-made Golden State Warriors basketball jersey with Kurian’s name on it hangs on the wall in the background.

The employees, who are members of an organization called “No Tech For Apartheid,” live-streamed the headquarters on Twitch. Twitch/notech4apartheid
Some of the activists-employees wore traditional Arab scarves and covered their faces. Twitch/notech4apartheid
Kurian’s office is located at Google Cloud headquarters in Sunnyvale, California. Kurian is seen above in May 2023. AP

Activists also appear to have scrawled some pro-Palestinian slogans and statements on Kurian’s notice board – accusing the company of “harassing, bullying and censoring” Arab and Muslim employees.

Project Nimbus was originally announced in April 2021, but the eruption of hostilities between Israel and Gaza brought the issue to the fore.

Tech employees at Amazon and Google have expressed concern that the Israeli military could use the technology against Palestinians.

The list of demands of the protesters was written in Kurian’s office. Twitch/notech4apartheid
Google employees wore t-shirts condemning their company for aiding Israel’s “genocide.” X/@NoTechApartheid
Google employees on Tuesday read statements condemning the company for its ties to the Israeli government. Twitch/notech4apartheid
A large group of Google employees hold signs protesting their company’s participation in “Project Nimbus.” X/@NoTechApartheid

Tech companies with heavily left-leaning workforces, such as Google, Apple, Microsoft and others, are struggling with vacation of employees due to the Israel-Hamas war.

Several companies have broken up chat discussions about the conflict that took place on internal message boards – where exchanges reportedly turned heated and argumentative.

[ad_2]

Source link

Beware of New ‘Ghost Hackers’

0

[ad_1]

Imagine if this happened to you. Your husband has passed away and a few weeks after the funeral, you get a text from them saying, “Hi, I hope you’re having a nice day.” Other friends report receiving similar messages from your spouse. Some messages offer great returns in crypto investments.

Join over 500,000 tech people with my free newsletter.

Easy to apply and one click to cancel if you don’t like it.

“Ghost hackers” have taken over your spouse’s account. It is sick new scam. With the account holders dead and families focused on grief, the hack is more likely to go unnoticed. It’s awful, and I want to make sure it doesn’t happen to you or someone you love.

SEE HOW THE HOME YOU GROW UP LOOKS NOW AND OTHER CARD TRICKS

It’s not just trolling and ‘investments’
Ghost hackers monitor obituaries and death notices looking for potential targets. They then use their arsenal (hacking weak passwords, guessing security questions, and accessing previously leaked credentials) to break in. Hackers often break into bank and retirement accounts, making it easy to steal directly from the passerby.

The best offense is a good defense

I know firsthand that there are tons of administrative tasks that need to be done when a close family member dies—everything from canceling cell phone plans to executing a will. This list should now also include marking or deleting them accounts on social networks.

A woman carries an umbrella while at a cemetery on Memorial Day

Fortunately, social media has its own procedures for this. For Facebookask Facebook to bookmark the account. You will need a link to the obituary. You can also request profile to be removed. Instagram have similar steps on Facebook, and the same applies for x.

Take the time to protect yourself now

On Facebook, you can design a legacy contact for manage your account if you die. They won’t be able to log in, read your messages, or delete your friends.

CAN YOU SPOT THE ELECTION DEEPFAKS? HERE’S HOW NOT TO BE DECEIVED

  • On a mobile device, select icon in three lines bottom right. Scroll and tap Settings and privacy > settings. In the “Account Center” section, tap Personal data > Personal data > Account ownership and control > Memorialization.
  • Click your name to select a legacy contact (and inform your contact that they are now in that role). You can also decide if you want your account to be deleted after you deposit it.

Apple’s legacy contact is a safe, secure way to give someone access to the data stored in your Apple Account after your death. You can add more than one legacy contact and they can all access the decision making account. Person must be 13 or older.

Here’s how to set it up on your iPhone:

  • Open settings and touch yours Name.
  • To go Login and security > Inherited contact.
  • Touch Add a legacy contact. You may need to use Face ID, Touch ID, or your password to authenticate.
  • You can select a group member if you are in a family sharing group. Or you can tap Choose someone else to add someone from your contacts.
  • Select a person from your contacts. Touch Continue.
  • You will be asked how you want to share your access key. choose Print access key or Send access key.
  • If you choose to send the key digitally, Apple will create a message letting your contact know that you’ve added them as your legacy contact. Touch Send.
Sad woman sitting on the couch

Finally, adjust your Google Account. You probably have a few things you’d rather keep private in your search, viewing, and location history. By default, Google automatically deletes account records after 18 months. If you want to shorten that window, you can do it in a few steps.

  • Go to your Google Activity controls and sign in with your Google account.
  • Under, under Activity on the web and in the appyou will see Automatic deletion. Make sure this is facing up On.
  • Click the arrow to select the desired time frame: 3 months, 18 months or 36 months.

Really, you need a digital estate plan

It is not a legal document, but an overview of all your accounts, passwords and online resources with instructions on how to find them. My mom made one before she passed away and I can’t tell you how much time and stress it saved me during an incredibly emotional time.

TOP LEGISLATOR SHARES ‘BIGEST FEAR’ ABOUT HER CHILDREN’S DATA ONLINE AS CONGRESS LOOKS AT FEDERAL PRIVACY RULES

Your list can be as formal or informal as you like. It can be an Excel spreadsheet or a Word document that includes web pages, login information, and anything else you want to leave behind. If you go this route, password protect the file and leave the password in your will.

If you’re comfortable with that, I recommend doing it in a password manager. Most have an option to set up a contact who can access your applications when you pass. Use it notebook password if it’s easier for you with pen and paper.

Here’s a checklist to get you started:

  • Email, social media, financial accounts and cloud storage accounts.
  • Credentials for online shopping.
  • Streaming services and other recurring costs.
  • Loyalty programs, including travel rewards.
  • Domain names and website hosting.

I know it’s not fun to think about, but you’ll be helping your loved ones immensely if you do.

Two people are sitting in a cemetery

Be more tech-savvy in your schedule

Award-winning presenter Kim Komando is your secret technology management weapon.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Copyright 2024, WestStar Multimedia Entertainment. All rights reserved.



[ad_2]

Source link

The restaurant gives a free bottle of wine if you give up your phone

0

[ad_1]

Wine not?

Saying goodbye to your cell phone is actually worth it in this restaurant in Italy.

Al Condominio, which opened in the northern city of Verona in March, offers a free bottle of wine to customers who hand over their phones before eating.

“We wanted to open a restaurant that was different from the rest,” said owner Angelo Lella Guard on Monday. “That’s why we chose this format – users can choose to forgo technology while enjoying a shared moment of companionship.”

He added: “Technology is becoming a problem — there’s no need to look at your phone every five seconds, but for many people it is like a drug…This way they have the opportunity to put it aside and drink good wine.”

“We wanted to open a restaurant that was different from the rest,” Al Condominia owner Angelo Lella told The Guardian. UNITED STUDIO

Upon arrival, guests can put their phone in the box, under the key, at the entrance.

To claim a free bottle of wine, all they have to do is show the key to the waiter.

That’s not the only benefit customers can get for locking their mobile devices.

They can also choose to review their meal, leaving a letter in the same box as their phone.

The person who writes the best review, with all the praise, will be offered a free meal on their next visit.

Al Condominio, which opened in the northern city of Verona in March, offers a free bottle of wine to customers who hand over their phones before eating. TikTok/@leca.ursachi
To claim a free bottle of wine, all customers have to do is show the waiter their phone key. TikTok/@leca.ursachi

“The reaction was very positive. 90% of customers decided to leave their phones aside in exchange for wine,” said Lella.

“It’s a really nice thing to see people embrace it,” he continued. They talk to each other instead of looking at photos or answering messages on their phones.”

The Guardian reports that another restaurant in Italy, Separè 1968, offers vouchers for guests who drop their phones.

[ad_2]

Source link

NYC Seen ‘Tech Talent Boom’ as Top Destination for Workers to Relocate in 2023: Study

0

[ad_1]

New York is “in the midst of a tech talent boom” — and was the top destination for tech workers to relocate to in 2023, according to an industry study.

The Big Apple saw a 3.6% net gain in tech talent, meaning more workers moved to the city than left in search of opportunities, according to an analysis released by venture capital firm SignalFire.

The gain was the largest of any city in the country, with New York “claiming 15% of all people who moved” for tech jobs, according to SignalFire researchers Asher Bantock and Heather Doshay wrote in the report released on Monday.

This is despite the fact that New York City has one of the highest costs of living in the country.


Technical workers
New York is in the midst of a tech talent boom, according to SignalFire. Stock of Friends – stock.adobe.com

“Anecdotally, we hear movers mention the ‘energy’ of the city – both professionally and socially,” Doshay told The Post.

“You would think that people moving out of high-cost-of-living cities like San Francisco, Seattle and Boston would disperse to lower-cost-of-living metro areas — and in many cases, they’re moving to places like Austin,” he added. Doshay.

“But for many tech professionals, they don’t want to sacrifice perceived career and social opportunities at any cost.”

The study was based on a LinkedIn dataset that tracked approximately 57,000 employees who moved to select top technology companies and some private companies.

The Wall Street Journal first reported the data.

New York beat out other top contenders such as Austin, Texas, which posted a net gain of 1.4%, and Los Angeles, which posted a net gain of 0.6%.

Other cities that experienced net-positive tech relocations include Denver, San Diego and Miami.

Meanwhile, traditional big tech hubs have seen an exodus of tech workers.

These include San Francisco, which experienced a net loss of 3.7% among tech industry workers who moved, and Seattle, which suffered a 2.3% loss.

Tech workers who have left the San Francisco Bay Area are most likely to move to New York, the analysis found.


New York City
New York received the largest share of relocated tech workers. ImageFlow – stock.adobe.com

Despite the net outflow of tech workers, a SignalFire representative noted that San Francisco remains a national leader in tech industry talent — especially as the artificial intelligence boom is underway.

San Francisco also had the highest share of employees working on artificial intelligence or machine learning among the top 10 metro areas measured in the SignalFire report, followed by Seattle and New York City.

Despite the exodus, the overall number of tech workers in San Francisco continues to grow as workers outside the industry switch careers, according to SignalFire.

“San Francisco continues to lead in terms of concentration of tech talent, but New York is clearly winning,” Doshay added.

New York has attracted more talent even as a tech industry experienced a wave of job cuts last yearwith industry giants such as Amazon, Google and Meta among the companies laying off workers.

[ad_2]

Source link

Google workers organize protests to protest the company’s work with Israel

0

[ad_1]

SAN FRANCISCO – A group of Google employees staged protests at two of the company’s offices on Tuesday to protest the tech giant’s cooperation with the Israeli government, an escalating conflict within tech companies over the war in Gaza and whether American companies should sell their technology to Israel.

Protesters at Google’s offices in Sunnyvale, California, entered Google Cloud CEO Thomas Kurian’s office Tuesday morning and vowed to remain there until they demand that Google withdraw from a $1.2 billion contract it shares with Amazon to provide cloud and data center services to the Israeli government. Another group of protesters are sitting in a common area at one of the company’s New York offices, according to Zelda Montes, one of the workers who took part in the protest. Police were already en route to the Sunnyvale office around 10:45 a.m. in California, a spokesman for the protesters said.

Some workers and foreign activists have opposed the deal, known as Nimbus, since it was signed in 2021. But protests have intensified over the past seven months as Israel continues to bomb the Gaza Strip, following Hamas’ October 7 attack on the country. The workers sent out an internal e-mail, protested in front of the company office and staged a “die” outside one of Google’s buildings in San Francisco in December, blocking traffic on a busy downtown street.

The protests come a day after pro-Palestinian activists blocked highways, bridges and enters airports across the United States in a coordinated series of demonstrations against Israel’s invasion of Gaza and US military support for the country.

In early March, Google fired a worker who stood up and protested during a speech given by Google’s top executive in Israel at a conference in New York. Montes, who works as a software engineer at Google-owned YouTube, acknowledged that they too could be fired.

“We often have the privilege of looking the other way and not thinking about the impact of our work on the world,” Montes said. “I’ve been waiting for months for people to be in the same position as me and be willing to put their jobs on the line.”

The contract the workers are protesting was signed with the Israeli government as a whole, but when the contract was initially signed, Israeli officials he told reporters that contract terms prohibit Google and Amazon from denying services to certain parts of the government, raising concerns among some tech employees that their work could be used for military purposes.

Last week, Time Magazine reported that Google has been talking with the Israeli Ministry of Defense in recent weeks.

“It’s appalling that Google is selling this technology to the Israeli government and military and lying to its employees about it,” Montes said, referring to the Time Magazine report.

A Google spokesperson did not immediately respond to a request for comment.

Amazon employees involved in organizing against Nimbus also attended Tuesday’s rallies, organizers said. Employees opposed to the Israel deal have clashed with their Tel Aviv co-workers since the conflict began in October, The Post previously reported.

At an Amazon shareholder meeting in May, Amazon employees against Nimbus said they would support a resolution seeking a third-party report to investigate whether “customers’ use of their products and services with surveillance, computer vision or cloud storage capabilities infringes or violates international humanitarian law.”

An Amazon spokesman did not immediately respond to a request for comment.

[ad_2]

Source link

The Meta Board explores Facebook, Instagram’s answer to deepfake pornography

0

[ad_1]

Meta’s oversight board is investigating Facebook and Instagram’s handling of two cases in which pornographic images generated by artificial intelligence, including one of “American public figures,” were circulated on their popular social networks.

Meta’s board only provided descriptions of the deepfake images in question, but did not name the famous women depicted in them to “prevent further damage,” a board spokesman said.

Celebrity deepfakes have recently become widespread, with Taylor Swift and US representative Alexandria Ocasio-Cortez is among the victims of deepfake pornography generated by artificial intelligence in recent months.

Meta’s oversight board — which is funded by the social media giant but reportedly operates independently — said it would use two examples of so-called “deepfakes” to assess the overall effectiveness of its and enforcement practices. Reuters

According to Meta’s watchdog case descriptions, one involves an AI-generated image of a naked woman resembling a public figure from India, which was posted by an Instagram account that only shares AI-generated images of Indian women.

Another image, the board said, appeared in a Facebook group sharing AI creations and featured an AI-generated depiction of a naked woman resembling an “American public figure” with a man groping her breasts.

Meta removed the image depicting an American woman for violating its abuse and harassment policy, which prohibits “derogatory sexualized photoshops or drawings,” but initially left the one depicting an Indian woman and reversed course only after the board selected it for review.

The committee, which is funded by the Meta but operates independently of the social media giant, will use two examples of deepfakes to assess the overall effectiveness of the Meta’s policies and enforcement practices around AI-generated porn counterfeits, the blog post said.

Meta representatives did not immediately respond to The Post’s request for comment.

Just last week, Ocasio-Cortez, 34, opened up about her own horrifying experience of finding a fake image of herself performing a sex act — while scrolling through X while discussing the law with her coworkers in a car in February.

“There’s a shock to seeing pictures of yourself that someone might think are real,” the Queens Democrat said he told Rolling Stone. “As a survivor of physical sexual assault, it adds a level of dysregulation. He’s bringing out the trauma again, while I’m trying to… in the middle of an af—royal meeting.”

The mental image of a deepfake version of herself putting her mouth over other people’s genitals stayed with Ocasio-Cortez for the rest of the day, she said.

Tail. Alexandria Ocasio-Cortez said she was scrolling through X when she came across an AI-generated image (above) of her performing a sexual act in February.

Earlier this year Swift was also the subject of a series of X-rated photos showing the pop sensation in various sexualized positions at a Kansas City Chiefs game — a nod to her highly touted romance with the team’s tight end Travis Kelce — that were created using AI.

As soon as the pictures started trending on X in January, Swifties came together and tried to bury the pictures by sharing a series of positive posts about the 34-year-old singer.

It only took hours for users follow the rough pictures back to the account under the tag @FloridaPigMan, which no longer produces any results on X.

The account reportedly collected images from Celeb Jihad, which boasts a collection of deepfakes using celebrity likenesses.

After Taylor Swift also fell victim to AI pornography, loyal Swifties wondered how the images were considered sexual assault – and called for more regulation around the sharing of fake nudity images. dpa/picture alliance via Getty Images

The incident has sparked renewed pressure on lawmakers to implement stricter policies related to the use of artificial intelligence and the prevalence of deepfake pornography.

Deepfake pornography without consent has already been banned in Texas, Minnesota, New York, Hawaii and Georgia, although it has been unsuccessful in stopping the circulation of AI-generated nude images in high schools in New Jersey and Florida. where there are explicit deepfake pictures of female students were distributed by male classmates.

In January, Rep. Joseph Morelle (D-NY) and Tom Kean (R-NJ) reintroduced a bill that would allow sharing without consent digitally altered pornographic images a federal crime, with severe penalties such as jail time, fines, or both.

Repeats Joseph Morelle and Tom Kean are pushing for the “Intimate Image Counterfeiting Act,” which would make sharing digitally altered pornographic images without consent a federal crime.
AFP via Getty Images

The “Intimate Image Counterfeiting Act” has been referred to the House Judiciary Committee, but the committee has yet to make a decision on whether or not to pass the bill.

In addition to making sharing digitally altered intimate images a crime, the bill proposed by Morelle and Kean would also allow victims to sue offenders in civil court.

The law has yet to be adopted by the House of Representatives. It would still have to be approved by US senators as well as the president if it were to pass.

With Post wires

[ad_2]

Source link

Why do so many app icons have a black and white color scheme?

0

[ad_1]

When I intend to work out with the Peloton app, I sometimes accidentally tap Wahoo, another workout app on my phone.

Or sometimes my finger accidentally wanders to more a fitness-related app from 4iiii.

I’m changing these apps because all their logos have white text on a black background. My brain can’t tell the difference between apps at a glance.

Once I noticed how many app logos had black-and-white color schemes — including Threads, the BBC, Uber, Apple TV, and, yes, The Washington Post — I had to know what the hell was going on.

What’s wrong with, you know, colors?

Other apps — including the New York Times, shopping app RealReal and dating app Hinge — take the opposite approach with black text on a white background.

(In fact, the Times says its logo’s colors have a slightly reduced contrast like newsprint and are “93 percent black and 95 percent white.”)

There is a serious side to my exploration of the black and white mystery. Smartphones and apps are important cultural markers, and their evolving designs reflect our shared moment and mood.

Judging by all the black and heavy logos, we live in the land of imaginary goth apps. Put on the eyeliner and Doc Martens — and get dressed.

The Art and Science of Logo Color

There is a perhaps apocryphal theory that the color red makes people hungry and that this is why some food companies such as McDonald’s have red in their logos.

Snapchat created your application logo with a “joyous and happy” yellow because no popular apps used that color, says the powerful.

Reddit he says the “use of bold color,” including the red-orange logo, is “an integral part” of the online bulletin board’s branding.

As for why black and white seems to be the color scheme of the moment, I’m dizzy with all the theories.

To some companies and design experts, black and white it conveys luxury, sophistication, calm simplicity — or the complex spectrum of our lives, as the CEO of the white-on-black social app BeReal told me.

To Michael Ernstbrand and product designer who was the founder of Yelp, the black-dominated apps reflect the brotherhood.

“A lot of brand identities that incorporate black color schemes feel more masculine,” Ernst said.

Black and white logos can also be practical.

Black goes well with other colors, Ernst said. And the Times said its black logo on the app’s white background looks good even if your phone is in “dark” mode, which changes the screen background to permanent black.

Daniel Hallac, director of product for Hearst Newspapers, said that, like fashion, app design trends can swing from one extreme to the other.

For a while, he said, bright colors were the epitome of cool apps, like the yellow Snapchat and bright blue Facebook logo. Perhaps it was inevitable that the pendulum would turn towards the colorless.

“Any time you go through a very brave period, the reaction is counter-programming,” Hallac said. “Bright maybe feels 2018.”

There may not be a single explanation for why so many app logos are black and white.

This could be an application version of convergent evolution, which led to humans and koalas having different thumbs. (Check it out!) A bunch of applications regardless came in black and white.

It tries to stand out, but it looks the same

At least quantitatively, black and white applications are not dominant.

Of the 100 most downloaded iPhone apps in the United States last week, according to Sensor towernine have black and white logos, including e-commerce company Shein, Meta’s Threads and ChatGPT.

The most prevalent color combination among the most popular apps seems to be blue and white – including Max, Facebook, Venmo, Zoom, LinkedIn and Indeed.

But these apps are different shades of blue which makes them look quite different even at first glance. With black and white apps, there aren’t many shades to differentiate the apps.

So maybe there aren’t any more black and white applications than those in other colors, but it could feel that way because they look similar.

Evite’s recently revised logo and app have ditched the vibrant green that the digital stationery company has displayed for decades with—you guessed it— black and white.

Evite’s creative director, Eddie Rhyu, told me that black is “in.” The black and white logo also allows the colorful digital invitations and greeting cards to stand out.

Rhyu said that unlike the more black-heavy exercise apps on my phone, there aren’t many apps with similar color schemes in Evite’s category. “If I were in the fitness industry, I’d think twice” about black and white, Rhyu said.

There’s an irony if companies that want to stand out with black-and-white logos instead confuse people about which app is which, he said. Marcie Coopermanexpert in color theory at the New School’s Parsons School of Design.

“When so many brands do it, it becomes a trend,” she said. “But of course that defeats the purpose.”

Read more: Tatum Hunter spent weeks trying to help technology find her “season” of colors. It was a journey.

[ad_2]

Source link

A cell phone nightmare leads to porting, identity theft and a struggle to recover

0

[ad_1]

Imagine this scenario: you’re going about your day and suddenly you can’t make calls or text. You didn’t know it, but you’ve become the latest victim of a ported phone number scam, a sneaky tactic where hackers hijack your phone number to assume your identity.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERT, QUICK VIDEO TIPS, TECHNICAL REVIEWS AND SIMPLE HOW-TO’S TO MAKE YOU SMARTER

A mobile phone nightmare leads to porting, identity theft and a struggle to recover

A woman is talking on a cell phone (Kurt “CyberGuy” Knutsson)

What is a ported phone number scam?

A CyberGuy Report subscriber contacted us to say he was the victim of a ported phone number scam. Also known as Replacing the SIM card or port-out fraud, is when a hacker steals a victim’s phone number to take control of it. Once they gain control, they use that number to commit identity theft by gaining access to their other accounts.

A mobile phone nightmare leads to porting, identity theft and a struggle to recover

A man is typing on a mobile phone (Kurt “CyberGuy” Knutsson)

MORE: TV PRESENT ANDY COHEN DUPLICATED IN EXPENSIVE BANK FRAUD: HOW TO AVOID BECOMING A VICTIM YOURSELF

How Hackers Hijack Your Identity Through the Ported Phone Number Scam

While there are several ways they can port a victim’s phone number, one of the most common ways is for them to use your stolen personal information to call their carrier, pass their security checks, and once they pass, demand that they port the number to a new carrier or transfer to a new the SIM card they sent them.

After the scammer successfully transfers the phone number, he receives all calls and messages intended for the victim. This approach allows them to bypass security measures such as two-factor authentication (2FA) which sends a code via text message to the phone number associated with the account.

With this power, a fraudster can use this method to crack passwords and gain unauthorized access to your personal accounts, whether it’s a social media account, an online bank account, or any other account. Once they continue to gain access to your other various accounts, there’s no telling what else they can do.

A mobile phone nightmare leads to porting, identity theft and a struggle to recover

Image of bank cards (Kurt “CyberGuy” Knutsson)

MORE: WHAT TO DO WHEN YOUR OWN NUMBER RINGES ON YOUR HOME PHONE

How to protect yourself from ported number scams in the future

If you manage to get out of identity theft once, chances are you’ll do whatever it takes to avoid being in that position again. With all of this said, it’s important not to blame yourself. Scammers are very sophisticated and are always looking for ways to stay one step ahead of their victims. So do what you can to stay one step ahead of them:

1) Secure your phone number: If you can take any extra measures to protect your phone number, don’t think twice. For example, add a secondary security code or PIN to yours Android or iPhone.

2) Enable two-factor authentication (2FA): This adds an extra layer of security to all your accounts.

3) Secure your email account: Just like you would for your phone, add additional check methods when possible and notify you if someone logs into your account from another device.

4) Secure your other accounts: Take the same measures for your other accounts, such as your bank or accounts on social networks. For example, request to be notified every time there is activity on your account, so you can track it and quickly determine whether the activity was done by you or someone else.

5) Limit who you give your number to: Be careful who you share your phone number with.

6) Consider using a secondary or number of burners for online use: This can help protect your primary phone number.

7) Change the password: Use a strong password that has more than 12 characters (if applicable) and a combination of numbers and upper and lower case letters. Consider using a password manager for generating and storing complex passwords.

8) Be careful with email: Do not open attachments or click on links in emails unless you are sure they are safe. The best way to protect yourself from clicking on malicious links that install malware that could gain access to your personal information is to have antivirus protection installed on all your devices. This can also alert you to any phishing emails or ransomware scams. Choose the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

How do you know if your identity has been stolen?

You can find out about ported phone number scams when your mobile service is unexpectedly interrupted because your number has been ported to another carrier’s SIM card. Such incidents can escalate into full-blown identity theft.

A fraudster could use one-time passwords (OTPs) – unique codes sent to your phone for security verification – to fraudulently access all the data on your device, including credit card information. This violation could result in your own accounts being banned.

When a fraudster successfully port your phone number to another carrier’s SIM card, they can receive these OTPs meant for you. This allows them to bypass security measures and gain unauthorized access to your accounts, such as email, banking and social media, potentially leading to identity theft.

Retaking control of your phone number and securing any accounts that were compromised is often a difficult and time-consuming process. This highlights the need to be proactive, protect your personal information and be alert for unusual activity on your accounts.

A mobile phone nightmare leads to porting, identity theft and a struggle to recover

A woman is holding a bank card (Kurt “CyberGuy” Knutsson)

MORE: WHY YOU NEED AN IDENTITY PROTECTION PIN THIS TAX SEASON

What to do if a fraudster takes over your identity

If you discover that your identity has been stolen—whether through this phone line scam or another type of identity theft—there are a few steps you should take.

Report the theft to the local police station: Some companies may require a police report to remove fraudulent debts from your account.

To visit Identity theft.gov: This website helps you recover from identity theft. You can answer questions about what happened to you, get your identity theft report, and create a recovery plan just for you.

Contact your credit card companies: Notify them of the situation and follow their procedures for securing your accounts. You may need to close your current accounts and open new ones.

Check your credit reports: Look for any bills or expenses you haven’t incurred and report them.

Place a fraud alert on your credit reports: This makes it difficult for someone else to open new accounts in your name.

Use the identity theft protection service: Phishing companies can monitor personal information like your Social Security number, phone number, and email address and alert you if it’s being sold on the dark web or used to open an account. They can also help you freeze bank and credit card accounts to prevent further unauthorized use by criminals. One of the best parts about using some services is that they may include identity theft insurance up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a A US-based case manager helps you recover any losses. Check out my tips and top picks on how to protect yourself from identity theft.

A mobile phone nightmare leads to porting, identity theft and a struggle to recover

Smartphone with sim card (Kurt “CyberGuy” Knutsson)

MORE: HOW TO STOP SCORING PHONE NUMBERS AND PROTECT YOURSELF FROM SCAMMERS

Kurt’s outdoor essentials

Unfortunately, once a fraudster steals your identity, it can be very difficult to get it back. That being said, there are steps you can take to reclaim your identity while ensuring your number is not ported in the future.

What measures do you think mobile operators should implement to prevent ported phone number fraud? Let us know by writing to us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report newsletter by going to Cyberguy.com/Newsletter.

Ask Kurt a question or tell us what stories you want us to cover.

Answers to the most frequently asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

[ad_2]

Source link