Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

DuckDuckGo beefs up scam defense to block fake stores, crypto sites

Bleeping Computer - 19 Červen, 2025 - 14:00
The DuckDuckGo web browser has expanded its built-in Scam Blocker tool to protect against a broader range of online scams, including fake e-commerce, cryptocurrency exchanges, and "scareware" sites. [...]
Kategorie: Hacking & Security

Telecom giant Viasat breached by China's Salt Typhoon hackers

Bleeping Computer - 19 Červen, 2025 - 13:54
Satellite communications company Viasat is the latest victim of China's Salt Typhoon cyber-espionage group, which has previously hacked into the networks of multiple other telecom providers in the United States and worldwide. [...]
Kategorie: Hacking & Security

Microsoft to cut thousands more jobs, mainly in sales

Computerworld.com [Hacking News] - 19 Červen, 2025 - 13:50

Microsoft is set to cut thousands of jobs, mainly in sales, amid growing fears that AI advances are accelerating the replacement of human roles across the industry, Bloomberg reports.

The cuts follow a previous round in May, which saw approximately 6,000 roles eliminated.

Microsoft has been ramping up its AI investments to strengthen its position as enterprises across industries rush to integrate the technology into their operations.

Earlier this year, the company announced plans to spend around $80 billion in fiscal 2025, largely on building data centers to support AI training and cloud-based applications.

Adding to industry unease, Amazon CEO Andy Jassy said this week that generative AI and AI agents are expected to shrink the company’s corporate workforce over time.

AI or other factors?

AI is being used as an excuse for layoffs this year, but there may be more to it than what meets the eye.  

“One, we are still rebalancing employee counts from the over-hiring of the past decade,” said Hyoun Park, CEO and chief analyst of Amalgam Insights. “Tech companies were hiring with the assumption that they would grow at ridiculous rates that have not come to pass. Also, some tech companies think they can simply get rid of salespeople, especially in cash-cow industries where renewals seem to come in with little to no effort. Whether that is actually true or not, we are about to find out.”

The job cuts may also signal concerns about the near-term revenue potential of AI, Park said. While Microsoft is under pressure to invest heavily in AI to sustain its stock valuation, it may be turning to short-term operating expense reductions to support its financial performance.

“The planned $80 billion investment in AI infrastructure is especially interesting because those numbers assume a massive number of people will adopt Microsoft-related AI products,” Park said. “Are 50 million+ people willing to pay an additional amount on Microsoft products to support AI? That is a massive bet that has been completely unjustified by the current AI market today.”

Others point out that the company is betting on a long-term inflection in enterprise workload patterns driven by GenAI, but current adoption patterns remain volatile.

“Reports of Microsoft pausing or renegotiating data center leases reflect a prudent but necessary response to these uncertainties,” said Sanchit Vir Gogia, chief analyst and CEO at Greyhound Research. “If workloads fail to scale or regulatory barriers increase, Microsoft, and by extension, other hyperscalers, could face underutilized infrastructure, prompting pricing recalibrations or service tier stratification.”

Changing sales environment

The focus on sales roles in the planned cuts is notable, with analysts saying it reflects a broader shift in how enterprise sales functions are evolving.

“The rise of AI copilots, telemetry-rich self-service portals, and data-driven journey mapping is reducing the need for large in-region sales teams,” Gogia said. “Microsoft’s realignment is part of a broader pattern also visible in Amazon, Google, and Salesforce.” However, while AI can personalize interactions at scale, it lacks the relational depth required in strategic deal-making, compliance negotiation, and multi-stakeholder orchestration, Gogia added.

More Microsoft news and insights:

>

>
Kategorie: Hacking & Security

How to fix a Windows black screen

Computerworld.com [Hacking News] - 19 Červen, 2025 - 12:00

The “black screen” phenomenon in Windows 10 and Windows 11 shows poignantly how nothing sometimes matters quite a lot. Seeing nothing except a black screen where the desktop and its applications normally appear is disconcerting for users, because they literally can’t see what the PC is — or isn’t — doing.

When experienced Windows users encounter a black screen, they know at least two things immediately. First, they know that something is wrong with their PC. And second, because nothing (or nothing much) is visible, they can surmise that the graphics subsystem is likely involved, based on the absence of information on display.

That’s a good start, but what users really want is to get their desktop back. In this story I’ll guide you through the different types of black screen in Windows 10 and 11, and the surest methods I’ve found to fix them.

[ Dealing with a Windows blue screen instead of a black screen? See “What to do when Windows won’t boot.” ]

Two kinds of black screen, one subtle difference

Windows cognoscenti recognize two different types of black screen for both Windows 10 and 11. The first is a black screen, plain and simple. This means the screen is completely dark with nothing at all showing. Zip, zero, nada.

If you see a completely black screen, it’s worth checking to see if the PC is actually powered on. Sometimes when Windows shuts down, it kills the power, too — in which case the fix could be as simple as powering and booting up the device. (Or not.)

The second type is what’s called a “black screen with cursor.” Just as it sounds, this means that the display is completely black, except that the mouse cursor is shown on that black background. Often, the cursor will track mouse movement even though it’s mousing over a completely black screen. The image at the top of the story shows this second kind of black screen.

In my personal experience, the black screen with cursor occurs far more frequently than a black screen by itself (no cursor). I’ve found that two causes are the most likely culprits when a black screen with cursor appears.

First is a failure of the graphics subsystem to interact with the display upon waking from sleep. Second is symptomatic of a problem with the graphics driver, the special software that interacts with the display on behalf of the graphics subsystem inside the OS to render pixels on the screen, itself.

The presence of a cursor that responds to mouse movement — as it often will — is actually a good sign. It indicates that the OS is still working (at least to some extent) behind the scenes. It also shows that the mouse driver can still track cursor position onscreen. This means that there’s a very good chance that the desktop can be restored to normal operation using a few well-known key combinations.

Two keyboard combos can (often) restore normal operations

Even if there’s no cursor present, it’s worth trying these key combinations as a first and second step. Both combos involve pressing multiple keys simultaneously. This usually means using one finger to depress the first key and holding it down, using a second finger to depress the second key and doing likewise, then more of the same for a third key, and so on.

Combo 1: Restart the graphics driver

This four-key combination tells Windows to stop, then restart any and all graphics drivers that happen to be running. Most Windows systems use only a single graphics driver, but those with multiple graphics cards (or perhaps a graphics card plus the CPU’s graphic chipset) and multiple displays may have multiple drivers running.

This keyboard combo reads: Windows key + Ctrl + Shift + B. I usually do the first three keys with my left hand, then press the B key with my right forefinger while the others remain depressed.

If you see immediate disk activity (from a disk activity indicator), that’s a good sign. Sometimes the screen will return to normal operation a few seconds later, showing that the driver has reloaded and is now running successfully. Sometimes, nothing else will happen after the disk activity light ceases flashing. That signals it’s time to try the second combo.

Combo 2: The three-fingered salute

This is a familiar key combo to longtime Windows (and even DOS) users. It reads: Ctrl + Alt + Delete.

It’s notorious to those who’ve been using Microsoft OSes for a long time (since the mid-’90s or earlier), because it used to forcibly reboot the OS when struck. Starting with Windows 95 (and Windows NT version 3.5), this key combination now invokes the secure sign-in screen shown in Figure 1 below.

srcset="https://b2b-contenthub.com/wp-content/uploads/2025/06/windows-black-screen-01-ctrl-alt-del.png?quality=50&strip=all 566w, https://b2b-contenthub.com/wp-content/uploads/2025/06/windows-black-screen-01-ctrl-alt-del.png?resize=300%2C292&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/06/windows-black-screen-01-ctrl-alt-del.png?resize=173%2C168&quality=50&strip=all 173w, https://b2b-contenthub.com/wp-content/uploads/2025/06/windows-black-screen-01-ctrl-alt-del.png?resize=86%2C84&quality=50&strip=all 86w, https://b2b-contenthub.com/wp-content/uploads/2025/06/windows-black-screen-01-ctrl-alt-del.png?resize=494%2C480&quality=50&strip=all 494w, https://b2b-contenthub.com/wp-content/uploads/2025/06/windows-black-screen-01-ctrl-alt-del.png?resize=370%2C360&quality=50&strip=all 370w, https://b2b-contenthub.com/wp-content/uploads/2025/06/windows-black-screen-01-ctrl-alt-del.png?resize=257%2C250&quality=50&strip=all 257w" width="566" height="550" sizes="(max-width: 566px) 100vw, 566px">

Figure 1: Ctrl-Alt-Del invokes the Windows secure sign-in screen on both Windows 10 and 11.

Ed Tittel / Foundry

Even when the preceding combo gets the graphics driver going, it sometimes still won’t light up the screen. And sometimes when that’s the case, this key sequence will repaint the screen to show you the secure log-in options.

What this screen capture doesn’t show is the power buttons at the lower right, with networking, ease of access, and power controls (shut down, restart, and so forth) from left to right. If this screen does appear, click Cancel, and your desktop may reappear in working order.

What if the screen stays black?

If the cursor is absent, these key combos often won’t help — and sometimes they don’t help even when the cursor is present. In such cases, there’s really only one thing to do next: forcibly power off the affected PC. For most devices, this means holding down the power button until the PC shuts down. On desktop PCs with a discrete power supply (aka PSU), you may have to power that PSU off, wait 30 seconds, then power it back on to get the same effect.

A minority of devices may have the power button action redefined so that the PC keeps running despite this action. In that case, it may be necessary to disconnect the PC from its power source. For laptops, this may also mean waiting until the battery runs completely down (or disconnecting the battery, on PCs that permit this).

For most PCs, a subsequent restart will return the device to normal operation — including a working graphics subsystem with no black screen. If the screen remains black despite all these efforts, additional troubleshooting is needed.

I will now briefly describe additional troubleshooting techniques that may or may not lead to a working system. The further you must go down this list of options, the more likely it is that a hardware failure of some kind is involved.

For desktops, this may mean you need to replace an external graphics card (or the CPU or motherboard if a built-in CPU graphics chipset is in use). For laptops, it may mean replacing the motherboard or making a trip to a repair depot, assuming that the problem device is still covered under some kind of service or repair contract.

The troubleshooting sequence for persistent black screens

1. Try a different display. Perhaps the graphics circuitry is indeed working. (This is possible if the disk activity light runs for a while after restart, but the screen remains black.) Plugging in an alternate display may work, in which case troubleshooting has just identified the display rather than the GPU or graphics chipset, and associated drivers, as the culprit.

2. Boot into Safe Mode for various checks. This requires access to bootable Windows 10 or 11 recovery media. (I describe how to build such media near the end of another Computerworld story: “How to repair Windows 10 or 11 in 4 steps.”) If the PC will boot to recovery media and the display works, congratulations! You’ve just established that something is wrong with the normal boot image for Windows on the affected PC.

You can try a boot repair utility (I like the “Fix Windows Boot Problems” tool on Macrium Reflect Free’s Rescue Media) or get some repair ideas from the afore-cited “How to repair…” article. If the PC retains its black screen, it’s pretty conclusive that something is wrong with the GPU or built-in graphics circuitry. Proceed to Step 3.

3. Try different graphics circuitry. Though this troubleshooting technique can also serve as a repair, it depends on a USB 3 external GPU to see if the internal GPU or graphics circuitry isn’t working. If you can plug such a USB device into the affected PC, and then graphics work when a display is hooked up to the device, you’ve just demonstrated where the problem lies. That problem must now be addressed. Proceed to step 4.

(Don’t have a USB 3 external GPU for testing/troubleshooting? See this Newegg search for some good potential USB 3-based candidates, many of which are available in the $60 to $100 range for HDMI, DisplayPort, and DVI displays.)

4. Replace the graphics hardware. It’s up to you (and prevailing service contract arrangements) whether this is a DIY exercise or if it involves turning the PC over to a repair shop or a designated, official repair outlet for an OEM or maker. But some way, somehow the graphics hardware must be replaced. For some laptops, especially older ones, this may mean that outright device replacement, rather than repair, is the best option.

Nobody wants to see a black screen on Windows

If you (or one of your users) does encounter this particular phenomenon, you should now have a pretty good idea of how to address it. In most cases, reloading the graphics driver or restarting the PC will do the trick. In other cases, there’s no choice except to work through the standard troubleshooting sequence as outlined above.

If you’re really, really lucky, a quick dive into the Windows Reliability Monitor can reveal the same kind of error details shown in Figure 2 below, which started appearing in Windows 10 with version 2004. Prior to that release, black-screen errors went mostly unacknowledged in Windows error reporting.

Figure 2: Note the black screen mention in the Bucket ID info at bottom of the error detail.

Ed Tittel / Foundry

This particular image comes from Windows 11 22H2 (as you can see from the beginning of the build number, 10.0.22621). The Bucket ID includes the string “CreateBlackScreenLiveDump” — that’s your indicator that the OS snagged a black screen error on your behalf.

This story was originally published in November 2020 and updated in June 2025.

Kategorie: Hacking & Security

Krispy Kreme says November data breach impacts over 160,000 people

Bleeping Computer - 19 Červen, 2025 - 11:59
U.S. doughnut chain Krispy Kreme confirmed that attackers stole the personal information of over 160,000 individuals in a November 2024 cyberattack. [...]
Kategorie: Hacking & Security

Ryuk ransomware’s initial access expert extradited to the U.S.

Bleeping Computer - 19 Červen, 2025 - 08:05
A member of the notorious Ryuk ransomware operation who specialized in gaining initial access to corporate networks has been extradited to the United States. [...]
Kategorie: Hacking & Security

Pro-Israel hackers hit Iran's Nobitex exchange, burn $90M in crypto

Bleeping Computer - 18 Červen, 2025 - 23:56
The pro-Israel "Predatory Sparrow" hacking group claims to have stolen over $90 million in cryptocurrency from Nobitex, Iran's largest crypto exchange, and burned the funds in a politically motivated cyberattack. [...]
Kategorie: Hacking & Security

North Korean hackers deepfake execs in Zoom call to spread Mac malware

Bleeping Computer - 18 Červen, 2025 - 22:37
North Korean advanced persistent threat (APT) 'BlueNoroff' (aka 'Sapphire Sleet' or 'TA444') are using deepfake company executives during fake Zoom calls to trick employees into installing custom malware on their computers. [...]
Kategorie: Hacking & Security

Sam Altman: Meta tried to lure OpenAI employees with billion-dollar salaries

Computerworld.com [Hacking News] - 18 Červen, 2025 - 22:27

After reports suggested Meta has tried to poach employees from OpenAI and Google Deepmind by offering huge compensation packages, OpenAI CEO Sam Altman weighed in, saying those reports are true. He confirmed them during a podcast with his brother Jack Altman.

“There have been huge offers to a lot of our team,” said Sam Altman, “like $100 million in sign-on bonuses, more than that in annual compensation.”

According to Altman, the recruitment attempts have largely failed. “I’m really glad that, at least so far, none of our best people have chosen to take it.

Sam Altman says he thinks it’s because employees have decided that OpenAI has a better chance of achieving artificial general intelligence, AGI, than Meta. It could also be because they believe that OpenAI could one day be a higher-valued company than Meta.

More OpenAI news:

>
Kategorie: Hacking & Security

Hackers lean into social engineering to attack Apple security — Jamf

Computerworld.com [Hacking News] - 18 Červen, 2025 - 19:59

Every Mac, iPhone, or iPad user should do everything they can to protect themselves against social engineering-based phishing attacks, a new report from Jamf warns. In a time of deep international tension, the digital threat environment reflects the zeitgeist, with hackers and attackers seeking out security weaknesses on a scale that continues to grow. 

Based on extensive research, the latest edition of Jamf’s annual Security 360 report looks at security trends on Apple’s mobile devices and on Macs. It notes that we’ve seen more than 500 CVE security warnings on macOS 15 since its launch, and more than 10 million phishing attacks in the last year. The report should be on the reading list of anyone concerned with managing Apple’s products at scale (or even at home).

Security begins at home

With phishing and social engineering, protecting personal devices is as important as protecting your business machines. According to Jamf, more than 90% of cyberattacks originate from social engineering attacks, many of which begin by targeting people where they live. Not only that, but up to 2% of all the 10 million phishing attacks the company identified are also classified as zero-day attacks — which means attacks are becoming dangerously sophisticated

This has become such a pervasive problem that Apple in 2024 actually published a support document explaining what you should look for to avoid social engineering attacks. Attackers are increasingly creative, pose as trusted entities, and will use a combination of personal information and AI to create convincing attacks. They recognize, after all, that it is not the attack you spot that gets you, it’s the one you miss.

Within this environment, it is important to note that 25% of organizations have been affected by a social engineering attack — even as 55% of mobile devices used at work run a vulnerable operating system and 32% of organizations still have at least one device with critical vulnerabilities in use across their stack. (The latter is a slight improvement on last year, but not much.)

The nature of what attackers want also seems to be changing. Jamf noticed that attempts to steal information are surging, accounting for 28% of all Mac malware, which suggests some degree of the surveillance taking place. These info-stealing attacks are replacing trojans as the biggest threat to Mac security. The environment is similar on iPhones and iPads, all of which are seeing a similar spike in exploit attempts, zero-day attacks, and convincing social-engineering-driven moves to weaponize digital trust.

The bottom line? While Apple’s platforms are secure by design, the applications you run or the people you interact with remain the biggest security weaknesses the platform has. Security on any platform is only as strong as the weakest link in the chain, even while attack attempts increase and become more convincing and complex. 

Defense is the best form of defense

Arnold Schwarzenegger allegedly believes that one should not complain about a situation unless you are prepared to try to do something to make it better. “If you see a problem and you don’t come to the table with apotential solution, I don’t want to hear your whining about how bad it is,” he says.

With that in mind, what can you as a reader do today to help address the growing scourge of Apple-focused malware? Here are some suggestions from Jamf:

  • Update devices to the latest software.
  • Protect devices with a passcode.
  • Use two-factor authentication and strong passwords to protect Apple accounts.
  • Install apps only from the App Store.
  • Use strong and unique passwords online.
  • Don’t click on links or attachments from unknown senders.

And, of course, don’t use older, unprotected operating systems or devices — certainly not when handling critical or confidential data.

Layer up, winter is coming

Organizations can build on these personal protections, of course. Apple devices need Apple-specific security solutions, including endpoint management solutions; enterprises should adopt device management; and they should prepare for the inevitable attacks by fostering a positive, blame-free culture for incident reporting and by eliminating inter-departmental siloes. Investment in staff training is important, too. 

It is also important to understand that in a hybrid, multi-platform, ultra mobile world there is no such thing as strict perimeter security anymore. That’s why it is essential to secure endpoints and implement zero-trust. It’s also why it is important to adopt a new posture toward security — there is no single form of effective security protection. At best, your business security relies on layers of protection that together form an effective and flexible security defense.

You can follow me on social media! Join me on BlueSky,  LinkedIn, and Mastodon.

Kategorie: Hacking & Security

Microsoft 365 to block file access via legacy auth protocols by default

Bleeping Computer - 18 Červen, 2025 - 17:14
Microsoft has announced that it will soon update security defaults for all Microsoft 365 tenants to block access to SharePoint, OneDrive, and Office files via legacy authentication protocols. [...]
Kategorie: Hacking & Security

'Stargazers' use fake Minecraft mods to steal player passwords

Bleeping Computer - 18 Červen, 2025 - 17:09
A large-scale malware campaign specifically targets Minecraft players with malicious mods and cheats that infect Windows devices with infostealers that steal credentials, authentication tokens, and cryptocurrency wallets. [...]
Kategorie: Hacking & Security

ChainLink Phishing: How Trusted Domains Become Threat Vectors

Bleeping Computer - 18 Červen, 2025 - 16:02
Phishing has evolved—and trust is the new attack vector. ChainLink Phishing uses real platforms like Google Drive & Dropbox to sneak past filters and steal credentials in the browser. Watch Keep Aware's on-demand webinar to see how these attacks work—and how to stop them. [...]
Kategorie: Hacking & Security

CISA warns of attackers exploiting Linux flaw with PoC exploit

Bleeping Computer - 18 Červen, 2025 - 15:54
CISA has warned U.S. federal agencies about attackers targeting a high-severity vulnerability in the Linux kernel's OverlayFS subsystem that allows them to gain root privileges. [...]
Kategorie: Hacking & Security

Healthcare SaaS firm says data breach impacts 5.4 million patients

Bleeping Computer - 18 Červen, 2025 - 15:44
Episource warns of a data breach after hackers stole health information of over 5 million people in the United States in a January cyberattack. [...]
Kategorie: Hacking & Security

How US employers can protect immigrant tech workers

Computerworld.com [Hacking News] - 18 Červen, 2025 - 13:00

The ongoing protests in Los Angeles have pushed a national issue further into the spotlight: recent actions by the US Immigration and Customs Enforcement agency (ICE), including the detention of immigrants and, in some cases, the revocation of visas.

Naturally, immigration is a hot-button topic. But for companies with diverse workforces — particularly those employing foreign-born workers on H-1B visas — the priority is not to take a political stand, but to provide appropriate counsel and protection for affected employees.

Rajeev Madhavan, cofounder and general partner at Clear Ventures in Silicon Valley, notes that while these issues have not yet directly impacted the computer science and AI sectors where he invests, work visa approvals are taking longer than usual.

“The H-1B visa is a very impractical — or at the very least, unpredictable — process. As a result, when you hire someone on an H-1B visa, it may take much longer than you realize to get it,” he says.

This poses a challenge for the US startup and technology ecosystem, Madhavan says, pointing out that many tech founders are immigrants.

“They went to do some good work at places like Google, Meta, or any of these companies, and spend three, four years getting experience — getting their green card in the process — and then they turn to becoming an entrepreneur on some idea that they originate,” Madhavan says.

Of the 42 US-based companies appearing on Forbes’ 2025 list of the top 50 startups developing promising AI applications, for example, 60% were founded by people born outside the United States, according to the Institute for Progress. And new research from Stanford’s Venture Capital Initiative found that 44% of America’s billion-dollar startups were founded by immigrant entrepreneurs.

Because of the uncertainty around immigrants’ place in the US workforce under the Trump administration, Madhavan is seeing more talent either working remotely or launching ventures in other markets, such as Canada, China, and India. He’s concerned about the long-term implications of this shift.

“You will certainly have a lot more stringent rules that will be enforced, which is actually very sad — our leadership and technical background may get eroded in that process,” he says.

What Madhavan sees potentially happening on a national scale can also unfold within individual companies. We spoke with business leaders and legal experts about how to best support foreign-born talent, sustain a strong culture during turbulent times, and reinforce an employer brand that genuinely welcomes diversity.

Three rules: compliance, compliance, and compliance

Jean-Noël BenHamou, a licensed US and Canadian attorney and executive managing partner of BHLG, which specializes in global immigration law, explains that much of the online fear surrounding visa revocation and deportation stems from misinformation.

“The US immigration system is far from being perfect, but it is nevertheless based on the rule of law. And it does not just revoke visas without serious cause,” he says.

Because of this legal foundation, BenHamou believes maintaining immigration status is straightforward — if approached with diligence.

“When it comes to immigration, we have the same three rules: Compliance, compliance, and compliance. This is the name of the game,” he says.

Compliance can be a heavy burden for individual employees. “It’s hard to do your job and know foreign countries’ law at the same time,” says Thomas Sykstus, an attorney from Bond, Botes, Sykstus & Tanner.

To ease that burden, Sykstus recommends that companies offer proactive legal support, beginning with clear organization. For H-1B professionals, that means keeping thorough records — including approval letters, I-94 records, job offer letters, and pay stubs — readily accessible.

H-1B workers should be provided with copies of all such records, and companies should also be able to quickly produce these documents on behalf of their employees.

BenHamou stresses the importance of promptly reporting any changes in work status.

“If your role changes — whether it’s a promotion, whether it is a shift in responsibilities, whether it is a change in location, whether it’s a change from full-time to part-time — these changes must be reported,” he says.

While this might seem like a routine task, he notes, many workers fail to recognize the significance of such changes.

“If it is a material change, it needs to be reported. And if it is not clear whether or not it would be considered a material change, then in an abundance of caution, just disclose it,” he advises.

Another common misstep is violating visa terms through actions that may seem harmless. Moonlighting, for example, is common in the tech industry but is off-limits for H-1B holders.

“It technically is a violation of your visa conditions: You’re hired by the petitioning employer for that specific role, for that specific location. Anything outside of that, they haven’t sponsored you. That’s where the issue is,” says Sykstus.

While H-1B professionals should strive to stay in good standing with the law, BenHamou reassures them that not every minor infraction poses a risk to their visa.

“A regular parking violation is not going to get you in trouble. I think that any crime that would involve moral turpitude would definitely put you in big problems: for instance, DUI or reckless driving, causing death or severe injuries. These are the types of crimes that you want to stay away from, period,” says BenHamou.

ICE at the door

Despite following best practices, H-1B holders may still face visits from immigration authorities. BenHamou warns that site inspections by ICE or US Citizenship and Immigration Services (USCIS) may become more common.

“So employees should always have access to their original visa documents. Bring your passport to work. Bring your approval notice. Be prepared for any type of encounter,” he says.

Under intense pressure from the White House, ICE is significantly ramping up efforts to find and deport undocumented immigrants. That makes it more likely for people who are in the country legally to be mistakenly targeted, according to former ICE director Sarah Saldaña.

“You’re going to have [ICE agents] who are being pushed to the limit, who in a rush may not get things right, including information on a person’s status,” she told the New York Times.

Sykstus notes that while ICE visits are more common in blue-collar industries such as construction, they are still possible in tech settings.

In such encounters, he emphasizes, H-1B professionals should protect their rights. “Don’t speak with them. Don’t sign anything. Call an attorney first. Talk your options out,” he says.

Companies that employ H-1B workers should also be prepared, with HR and legal teams ready to quickly step in with documentation and legal counsel.

Employer responsibility beyond compliance

While legal compliance is critical, BenHamou emphasizes that immigration support shouldn’t stop at the letter of the law. For companies, the responsibility goes deeper. “It’s cultural, it’s ethical, and it’s strategic,” he says.

After an employee has fulfilled their I-9 requirements and completed onboarding, BenHamou believes their immigration status should be kept strictly confidential — limited to HR, senior leadership, and possibly their direct manager. He sees this discretion as a standard that should be embedded in the company’s culture.

He also stresses the importance of transparency with potential hires around what it takes to achieve permanent residency in the US. “Those individuals are putting their life on hold for 5 to 10 years before seeing the end of the tunnel,” he says, referring to current USCIS processing times for green cards.

Providing this clarity early on helps foster a healthier team dynamic.

“As an employer, by being transparent and open about what it takes to get there from the first minute you join the company, you’re facilitating their integration with their team and vice versa. You’re bringing cohesion within the team,” he says. 

Sykstus agrees that transparency is key. He recommends holding company-wide information sessions to explain how work visas like the H-1B function — not just under current law, but in anticipation of future policy changes.

“If you know something’s coming down the pipe, sitting on the president’s desk, who is likely going to sign it, and it will affect your [employee’s] immigration status, it’s probably important to get ahead of the ball there,” he says.

In light of recent instances in which visa holders who had traveled abroad were denied re-entry to the US, at least two major tech firms in Silicon Valley have advised H-1B holders to limit international travel, Sykstus says.

“Sudden policy changes and heightened border security could bar re-entry. So if you leave, you might have trouble coming back, [even] if you’ve already been here and have had no problems whatsoever,” he says.

This climate of uncertainty can understandably cause anxiety, not just for foreign workers, but also for teammates who rely on them and have formed friendships with them. Sykstus encourages companies to provide access to employee assistance programs or counseling services — whether in-house or through third-party providers — that include support for immigration-related stress.

Angelina Gennis, a principal analyst at Forrester, adds that companies must also be prepared for situations where, despite best efforts, an employee has to leave the US due to circumstances beyond the company’s control.

“However, what we can control is ensuring that our people are okay, even if they need to leave us — so what sort of resources we can offer legally if they do have to leave us to make sure that they get home safely,” she says.

Supporting diversity in turbulent times

Building a culture that supports global talent requires more than behind-the-scenes policy work — it must also be reflected in the company’s outward messaging. And that messaging must align with employees’ lived experiences, says Shahar Silbershatz, CEO of Caliber, a brand reputation analytics company.

“If international hires feel uncertain, unsupported, or in the dark about immigration processes, that story travels quickly and can undermine even the most well-intentioned DEI messaging,” he says.

According to Silbershatz, the solution lies in proactive and empathetic communication with employees. “That means explaining policy shifts in plain language, providing real support to impacted employees, and making your long-term commitment to diverse talent visible,” he says.

Gennis believes businesses should first zoom out and anchor the conversation in their brand values. “That way, the company is being consistent in the messaging,” she says.

Gennis also emphasizes the importance of equipping managers to lead these conversations with care. She advises training managers to engage employees thoughtfully, using intentional language, checking in personally, and ensuring team members understand both the process and where to seek support.

This alignment between managers and the company’s employer brand is especially critical for organizations recruiting globally for highly specialized roles, such as in artificial intelligence. Just like these workers’ skills, the employer messaging must be targeted and intentional.

Employers should be aware that internal communications around immigration policy may be leaked publicly, Silbershatz cautions. Leaders should “approach how they communicate any new policies with clarity and conviction, keeping employee well-being central to any messaging,” he says.

That emphasis on clarity and care feeds into a broader organizational responsibility — one that BenHamou believes must be embedded in the company’s culture and long-term vision.

“The goal is to build a workplace that does not just hire global talent — it’s to build a workplace that protects it, supports it, and thrives because of it,” he says.

Kategorie: Hacking & Security

China’s MiniMax launches M1: A reasoning model to rival GPT-4 at 0.5% the cost

Computerworld.com [Hacking News] - 18 Červen, 2025 - 12:34

Chinese AI startup MiniMax has thrown down the gauntlet to established AI giants, releasing what it boldly claims is the world’s first open-source, large-scale hybrid-attention reasoning model that could fundamentally change the economics of advanced AI development.

MiniMax defines “hybrid-attention” as a combination of its Lightning Attention mechanism and Mixture-of-Experts architecture, which activates only the relevant parts of the model for each task.

The Shanghai-based company said its new MiniMax-M1 model delivers a knockout punch to computational inefficiency, requiring just 30% of the computing power needed by rival DeepSeek’s R1 model when performing deep reasoning tasks — a breakthrough that could democratize access to sophisticated AI capabilities.

“In complex, productivity-oriented scenarios, M1’s capabilities are top-tier among open-source models, surpassing domestic closed-source models and approaching the leading overseas models, all while offering the industry’s best cost-effectiveness,” the company said, announcing the hybrid-attention reasoning model.

A David vs. Goliath moment in AI

What makes MiniMax-M1 particularly intriguing isn’t just its performance — it’s how the company achieved it. While tech titans have been throwing hundreds of millions of dollars at AI development, MiniMax managed to train its model for a mere $534,700.

To put that in perspective, DeepSeek spent $5-$6 million on its R1 model, while OpenAI’s GPT-4 reportedly cost over $100 million to develop.

“The entire reinforcement learning phase used only 512 H800s for three weeks, with a rental cost of just $534,700,” the company explained. “This is an order of magnitude less than initially anticipated.”

However, industry analysts urge caution. “MiniMax’s debut reasoning model, M1, has generated justified excitement with its claim of reducing computational demands by up to 70% compared to peers like DeepSeek-R1,” said Sanchit Vir Gogia, chief analyst and CEO at Greyhound Research. “However, amid growing scrutiny of AI benchmarking practices, enterprises must independently replicate such claims across practical workloads.”

Extended context capabilities

M1’s most impressive feature might be its ability to handle massive amounts of information simultaneously. With a context window supporting one million input tokens and up to 80,000 output tokens, the model can essentially read and understand multiple novel tasks at once while maintaining coherence across the entire conversation.

“A significant advantage of M1 is its support for an industry-leading 1 million token context window, matching the closed-source Google Gemini 2.5 Pro,” MiniMax noted in the post. “This is 8 times that of DeepSeek R1 and includes an industry-leading 80,000 token reasoning output.”

For context, OpenAI’s GPT-4o can handle only 128,000 tokens — enough for about one novel task. M1’s expanded capacity opens doors for applications that were previously impractical, from analyzing entire legal documents to debugging massive code repositories.

Real-world performance that matters

Beyond impressive technical specifications, M1 demonstrates strong real-world capabilities across multiple benchmarks. The model comes in two variants — M1-40k and M1-80k, referring to their “thinking budgets” — with the larger version consistently outperforming its smaller sibling across most tests.

In software engineering tasks, both versions scored 55.6% and 56.0%, respectively, on the challenging SWE-bench validation benchmark. While slightly trailing DeepSeek-R1-0528’s 57.6%, they significantly outpaced other open-weight models in this critical area of productivity.

“MiniMax-M1-80k consistently outperforms MiniMax-M1-40k across most benchmarks, which fully validates the effectiveness of extended computational resources during testing,” the company added.

Breaking down barriers to AI access

Perhaps most significantly, MiniMax is releasing M1 under a true Apache 2.0 open-source license — unlike Meta’s Llama models, which use restrictive community licenses, or DeepSeek’s partially open approach. This decision could accelerate innovation by giving researchers and developers unprecedented access to cutting-edge reasoning capabilities.

Gogia sees this as particularly significant for mid-market companies. “MiniMax’s M1 represents more than just architectural efficiency — it symbolizes the new accessibility of advanced reasoning AI for mid-market enterprises,” he noted. “With open-source licensing, reduced inference costs, and support for 1 M-token context windows, M1 aligns squarely with the evolving needs of midsize firms that seek capability parity with larger players but lack hyperscaler budgets.”

The company is backing up its open-source commitment with competitive pricing for those who prefer API access. Input processing costs just $0.4 per million tokens for contexts up to 200,000 tokens, rising to $1.3 per million tokens for the full 1-million-token capability.

“Due to its relatively efficient use of training and inference computing power, we are offering unlimited free use on the MiniMax APP and Web, and providing APIs on our official website at the industry’s lowest prices,” the company announced.

What this means for the industry

M1’s release comes at a pivotal moment in AI development, as the industry grapples with the massive computational costs of training and running advanced models.

The timing is particularly noteworthy, coming just weeks after fellow Chinese company DeepSeek shook the industry with its own cost-effective approach to AI development. This pattern suggests Chinese companies are finding innovative ways to compete with better-funded Western rivals through superior engineering rather than just throwing money at problems.

Yet challenges remain for Chinese AI models in Western markets. Despite technical achievements, Gogia notes that “Chinese LLMs remain under-adopted in North America and Western Europe” due to concerns around governance and regulatory compliance in industries with strict procurement frameworks.

A company on the rise

MiniMax isn’t exactly a household name yet, but it’s rapidly becoming one of China’s most-watched AI companies. Founded in 2021 by former SenseTime executives, the startup has raised $850 million from heavyweight investors including Alibaba, Tencent, and IDG Capital, achieving a $2.5 billion valuation.

This M1 announcement kicks off what MiniMax is calling “MiniMaxWeek,” with additional product releases planned for the coming days. For enterprise users and developers, M1 represents something potentially transformative: enterprise-grade AI reasoning capabilities without enterprise-grade infrastructure requirements. However, as Gogia cautioned, “The real test will lie in how quickly CIOs can extract operational savings at scale, without compromising accuracy or governance.”

Kategorie: Hacking & Security

BeyondTrust warns of pre-auth RCE in Remote Support software

Bleeping Computer - 18 Červen, 2025 - 12:10
BeyondTrust has released security updates to fix a high-severity flaw in its Remote Support (RS) and Privileged Remote Access (PRA) solutions that can let unauthenticated attackers gain remote code execution on vulnerable servers. [...]
Kategorie: Hacking & Security

Copilot finally has a feature that beats ChatGPT on Windows PCs

Computerworld.com [Hacking News] - 18 Červen, 2025 - 12:00

There’s no denying it: When it comes to Windows and AI chatbots, ChatGPT leads the pack.

Microsoft invested more than $13 billion in OpenAI, after all. And while the company has pinned Copilot to the taskbar on Windows PCs and placed a Copilot key on new laptops, its Copilot system is still built atop the same large language model (LLM) technology at ChatGPT’s core. That means the system will always be similar to ChatGPT until Microsoft releases its own AI models.

But there’s finally a reason to use Copilot instead of ChatGPT on your PC. It’s a feature Microsoft announced a while ago and is finally making available natively within Windows: You can now share any app on your PC with the Copilot AI chatbot and then have a conversation about it. And Copilot can draw highlights on your screen while you chat.

It’s called Copilot Vision, it’s really interesting — but it has more limits than you might think.

Want more tips for your Windows PC? Sign up for my free Windows Intelligence newsletter. I’ll send you free in-depth Windows Field Guides as a special welcome bonus!

The ChatGPT-Copilot Windows matchup

Traditionally, Copilot has lagged behind ChatGPT in many ways. While OpenAI has confidently stuck with the same ChatGPT interface for a long time, Microsoft has repeatedly hemmed and hawed and changed its mind on what Copilot even should be.

For example, after turning Copilot into something more like the personal companion from Her, Microsoft recently got rid of that more companion-focused app and pivoted Copilot back to more of a standard chatbot interface — for now.

My biggest problem with Copilot, though, is the lack of a crisp model selection tool. ChatGPT lets you get into the weeds and select exactly which AI model you’re using. Microsoft’s Copilot has a simple dropdown box where you select “Quick Response,” “Think Deeper,” or “Deep Research.” If you select Quick Response, you’re not sure what model you’re using: Are you using GPT-4o, or did Copilot just route your query to a less expensive model to save money? There’s no predictability.

Copilot has other limits that aren’t surprising, considering Microsoft has spent the last few years repeatedly reinventing the wheel by constantly creating new Copilot apps. For example, the ChatGPT app lets you search your entire history to find conversations if you want to pull something up. It lets you organize conversations into folders. It gives you the ability to customize your experience. It feels more like a mature app — again, no surprise considering Microsoft has been repeatedly starting from scratch rather than improving a single app over time.

Microsoft’s secret weapon

Despite all those weak points, Copilot has one compelling advantage over ChatGPT — its integration with other Microsoft platforms and services. For example, if you use Microsoft 365 apps like Word and Excel (once called Office apps), you’ll need a $20 per month Copilot Pro subscription rather than a $20 per month ChatGPT Plus subscription. And organizations will need to get AI features for Microsoft 365 through Copilot.

But, while Microsoft quickly added deep Copilot integration to M365, the company lagged when it comes to adding integration to Windows. That’s now changed with Copilot Vision, which arrived first for browsing web pages in Microsoft Edge and officially became available on both Windows 11 and Windows 10 in the US this month. (It will likely launch in additional countries in the future.)

For the moment, the feature works only in real-time voice mode. If you want to have a conversation in text mode, you’ll need to provide screenshots of your screen to Copilot along with text prompts — just as you would with ChatGPT.

How to use Copilot Vision on Windows

To get started with Copilot Vision in its new Windows-native form, just launch the Copilot app from your taskbar or Start menu. (If you have a laptop with a Copilot key, you can just press that, too.)

At the bottom right corner of the Copilot app — at the right side of the text input box — you’ll see a glasses-shaped icon for “Share screen with Copilot.” Click that to get started.

You’ll then be prompted to choose the window you want to share. Copilot doesn’t get access to your PC’s entire display — just the specific app you choose. And it can’t actually control anything in that app: Copilot will be able to see what’s on your screen in that app, and it will be able to draw highlights to call your attention to things. But that’s it.

Copilot will show you a list of all your open windows, and you can share any one you want with the AI model — but just one window at once.

Chris Hoffman, Foundry

Once you’ve shared whatever app you want, you can have a conversation and ask questions about it. You might ask “How exactly do I accomplish this task in Photoshop?” or “What do you think of this hotel I’m about to reserve online? Are there better options?” and keep the conversation going for as long as you like.

While you’re sharing an app and having a voice conversation, you’ll see a floating box at the bottom of your screen. Click “Stop” to stop sharing.

A floating box will appear just above your taskbar icons while you’re sharing a window and having a voice conversation.

Chris Hoffman, Foundry

You can ask it to point out things on the screen, and it can highlight different areas to draw your attention to them. This is a simplistic feature at launch, as it can point out only one thing. Let’s say you need to find an option five menus deep: The system would highlight the individual icon or menu option visible on your screen, and that’s it. The highlights aren’t great for quickly guiding you through complex interfaces on the fly.

Copilot Vision can highlight things on your screen to draw your attention to them.

Chris Hoffman, Foundry

The Copilot Vision cons

Beyond that, Microsoft’s Copilot Vision AI experience has some of the same limits as any AI chatbot at the moment. It wants to validate you, the user. It may nod along, even if you get something wrong. For example, here’s a quick interaction I had:

“How do I draw something in Word?”

“To draw in Word, you’d go to the ‘Draw’ tab on the Ribbon…”

“Okay, so it’s under the Layout tab, right?”

“That’s correct!”

“Nope, it was under the Draw tab.”

“Mm-hm.”

This isn’t an attack on AI chatbots in general, the underlying GPT model from OpenAI, or Copilot itself. It’s just a limitation of the technology — at least at the moment. When interacting with Copilot, ChatGPT, or any other LLM, you need to stay on your toes and question what you’re hearing.

The real limitations with AI voice modes

While voice modes might feel more “futuristic” than text-based LLM interactions, text-based interactions are simply better and richer at the moment. First of all, this voice-based experience is just relying on text. Under the hood, the things you’re saying are getting converted to text, and the LLM is outputting text that is being spoken aloud by a different process. This is crucial to understand: The LLM cannot hear any emotional tone you have in your voice. Additionally, while the Copilot voice you hear may appear to have an emotional tone, that is being inserted by the text-to-speech process after the LLM outputs its text.

This results in a rather uncanny valley experience. The LLM can’t receive any of your vocal cues or tone. It will respond in a voice that appears to have an emotional tone, but the emotional tone isn’t provided by the LLM at all. And, again, it isn’t responsive to your emotional tone.

Beyond that, voice-based interactions are naturally quicker and more surface-level than text-based interactions, where deeper and more analytical responses are possible. So, for lots of tasks, a deeper text-based interaction might be much better than a quick voice-based interaction. If you think it’s not being “smart” enough, try dropping back to text mode and following the tips in my guide to the secret to using generative AI.

There’s no real-time sharing of your screen in text mode, though: You’ll need to take screenshots and provide them along with your text prompts. In Copilot, you can click the “+” button at the right side of the message box and select “Take Screenshot” to quickly add a screenshot. That’s one way to get something like “Vision” along with a text conversation.

Then again, you could always provide screenshots to ChatGPT, too. Now, though, at least, Microsoft has some reason to hope you might be inspired to stick with Copilot instead and think of it as your go-to Windows companion.

Looking for more thoughtful Windows analysis and useful PC tips? Sign up for my free Windows Intelligence newsletter today. I’ll send you three new things to try each Friday.

Kategorie: Hacking & Security

21 ways Gemini can actually be useful on Android

Computerworld.com [Hacking News] - 18 Červen, 2025 - 11:45

Right now, Gemini’s getting a bit of a bad rap — at least, among certain circles of savvy users who are closely tuned into the technology.

It’s easy to see why: Google rushed Gemini out of the gates way before it was ready. It increasingly crippled the perfectly fine Google Assistant experience in the meantime, and still today, Gemini can’t do everything Assistant did in terms of day-to-day device basics (while Assistant no longer handles those same tasks consistently anymore, either).

Gemini’s also overly complicated and confusing, with its many models and cryptically coded options. It’s being shoved in our faces at every possible opportunity in a move reminiscent of a certain other much-maligned Google service. And, most troubling of all, it’s being positioned as an all-purpose answer machine when it gets answers wildly wrong anywhere from 5 to 20% of the time.

Just like all the other generative AI chatbots of the moment, in other words, it’s a steaming hot mess — even if most of the the mainstream tech-tappin’ masses may not fully realize it yet.

But the problem with Gemini (and other similar systems) is less the technology itself and more the way the tech industry for some reason insists on framing it. These large-language model mechanisms just aren’t good at understanding context or offering factual answers. They shouldn’t be set up to serve as replacements for search. They get stuff wrong shockingly often, for cryin’ out loud, and they always will. It’s par for the course, and it’s just plain silly. (Seriously: The hits keep comin’ — and comin’, and comin’, and…well, you get the idea.)

They are, however, useful in other ways — namely when it comes to lower-level, more mundane sorts of tasks where context, judgment, and a lack of flat-out fabricating aren’t required.

Here, specifically, are 21 simple ways Gemini can actually be useful and worth using on Android — with minimal “AI” (in the current sense of the term), no “brainstorming” ballyhoo, and absolutely no error-filled info-seeking involved.

Note that Gemini is not available in all countries, due to differing regulations in different parts of the world. If you’re in a place where the service is supported and you don’t yet have it on your device, you can download the official Google Gemini app and open it up to get started — then either long-press your device’s power button or say Hey Google to summon it from there, depending on the specifics of your setup.

Part I: Notes and memory with Gemini on Android 

1. In a reminder that the simplest features are often the most practical of all, Gemini can remind you of anything, anytime — just like Google Assistant could before it. Simply fire it up and say Remind me [whatever] at [whenever — day and/or time], and the deed will be done.

Gemini can set a reminder for you without even interrupting what you’re doing.

JR Raphael, Foundry

It may not be flashy, but I’d be willing to wager you’ll rely on that much more often than the on-demand image generation or “creative thought partner” poppycock Google and every other AI-obsessed company is pushing with these things these days.

2. Basic reminders aside, Gemini is great at remembering specific info and then recalling it for you later. Try telling the service something like Remember that the door code is 90210, Remember that my rental car license plate is WIGGLES77, or Remember that Jed’s wife is named Tallulah — then, whenever you need to recall the related nugget, just ask: What’s the door code, What’s my rental car license plate, or What’s Jed’s wife’s name (or whatever question is appropriate for what it remembered).

3. The next time you need to make a more extensive note to yourself, pull out the classic old Assistant trick of telling Gemini to Create a note that says whatever you’ve got on your mind. It’ll save it into the Google Keep Android app for easy future finding.

[Psst: Love shortcuts? My free Android Shortcut Supercourse will teach you tons of time-saving tricks. Start now for free!]

Part II: Places and events with Gemini on Android 

4. If you’re ever feeling lost — or maybe you’re out on a Very Important Business Call and at a location you want to track down again in the future — fire up Gemini on your phone and ask the soul-searching question Where am I? Gemini will give you the nearest address in return. And then…

5. After you’ve asked Gemini for your current location, try saying Remember that location as…, followed by some sort of description you might use in the future — the best place to park, the home of the seven-foot egg roll, the place where I lost my mind (after eating a seven-foot egg roll), or whatever the case may be. You can then later ask Gemini where that place is, and it should serve back up the very same spot for your rediscovering pleasure.

6. Gemini can help you get from point A to point B, too. In addition to asking it to Start a navigation to some particular place, you can ask it questions like How long would it take me to get In ‘N’ Out Burger right now and other equally important inquiries.

7. Just like Assistant before it, Gemini is great at helping you check in on your calendar. Ask it What’s on my agenda for today, When’s my first meeting tomorrow, or When’s my next haircut — or any other variations on those same concepts you can come up with — for a quick ‘n’ easy way to see what you’ve got ahead.

8. You don’t have to stop with calendar check-ins: Gemini can also make new appointments for you in some especially useful ways. In addition to simply asking it to Create a new calendar appointment for [whatever] on [whatever day and time], you can summon Gemini anytime you’ve got info about an event on your screen — in an email, on a website, within a text or Slack thread, or whatever — then tap the button that says “Ask about screen” and say Create a calendar appointment for this. Gemini will interpret the visible info and format it into a full event on your calendar in a single swift step.

Creating calendar events is especially easy with Gemini’s assistance.

JR Raphael, Foundry

Part III: Intelligent interactions with Gemini on Android 

9. When you’re looking at a web page, a document, or any other type of text on your Android device and you aren’t in a position to read it with your own two eyes — if, for instance, you’re walking, driving, or climbing high atop a towering tree in Narnia — get Gemini, tap that same “Ask about screen” button we went over a second ago, and say Read this out loud. Just please, for the sake of our collective sanity, put in your frickin’ earbuds first.

10. If, on the other hand, you want a summarized version of something on your screen, follow those same steps from the previous tip but this time say Summarize this. Gemini will start to speak a simple summary of the info aloud to you (provided you spoke aloud to it), or you can press the pause button and read its streamlined overview yourself if you’d rather.

11. Speaking of summarizing, Gemini’s (non-milk-related) condensing powers also extend to the domain of YouTube — where a quick ‘n’ simple summarization can sometimes really be useful. Use that same “Ask about screen” button again while you’ve got a video in front of ye and say Summarize this video

Get a simple text summary of any long video in seconds with Gemini by your side.

JR Raphael, Foundry

In advance: You’re welcome.

12. One more slice of summarizing sorcery worth noting: No matter what you’re doing on your device, you can call up Gemini and ask it to Summarize my most recent incoming emails. As long as you’ve got the Gemini Gmail/Google Workspace integration active, El Gembo will give you a bird’s eye view of what’s awaiting in your inbox at that very moment.

13. Trying to identify something you see on your screen — a landmark, a plant or flower, or even a person named Joe Pesci? Caress that Gemini “Ask about screen” button while it’s visible and ask exactly what you want to know: What building is this? What type of flower is this? Who is this? Gemini will tap into the same smarts seen in the superb Google Lens Android setup and give you an answer in the blink of an eye.

Part IV: Basic device functions with Gemini on Android 

14. Check up on your phone’s power in a jiff by asking Gemini What’s my battery level? (You can also try asking it What’s the frequency, Kenneth? but I wouldn’t necessarily expect any real results in return.)

15. Save yourself the sometimes-awkward finger-stretching and snap a screenshot of anything on your screen simply by asking Gemini to Take a screenshot. Easy!

16. On a related note, you can review your captured screenshots without lifting a finger by giving Gemini the very logical command of Show my screenshots.

17. It may seem obvious, but Gemini can send text messages on your behalf. Just say — brace yourself… — Send a text message to followed by the name of the person you’ve got in mind (and, optionally, the entire message, too, if you want to save yourself a second step).

18. Similarly, your Android Gemini assistant can place a call via the command Call followed by the name of the contact or number you’re needing.

19. Set your sound volume in a split second by asking Gemini to Set the media volume — or call volume, ring volume, notification volume, or alarm volume — either on a one to 10 scale or to a specific percent value.

Adjusting any system volume level is never more than a spoken command away.

JR Raphael, Foundry

20. You can also rely on Gemini to adjust all sorts of system settings — for instance, asking it to Turn Do Not Disturb on (or off), Turn the flashlight on (or off), Turn Bluetooth on (or off), and Turn airplane mode on (or off).

21. And last but not least, Gemini can get you where you need to be within your Android system settings without any of the usual hunting. Tell it to Open up the Accessibility settings — or any other area or specific option — and watch it fly you over precisely where you need to be.

Keep the advanced Android knowledge coming with my free Android Shortcut Supercourse. Tons of time-saving tricks await!

Kategorie: Hacking & Security
Syndikovat obsah