mellizo Es posible que los robots Android pronto puedan realizar más tareas, según un informe. El chatbot de inteligencia artificial (IA) agregado a los teléfonos inteligentes Android puede realizar muchas tareas, como responder consultas, buscar consultas en Internet, escribir artículos y mensajes. Sin embargo, el chatbot cambia la funcionalidad al Asistente de Google cuando se trata de tareas integradas como consultar recordatorios, configurar una alarma o enviar un mensaje. Puede que este no sea el caso por mucho tiempo, ya que el informe afirma que Gemini pronto podrá configurar alarmas y temporizadores de forma independiente.
de acuerdo a un informe Según un informe de Android Authority, la aplicación Gemini en Android puede obtener una nueva extensión de herramienta de reloj que le permitirá configurar alarmas y temporizadores cuando el usuario lo solicite. La publicación detectó la nueva característica durante el proceso de desmontaje de la aplicación. La característica se vio en la última versión beta de Google Aplicación (versión 15.27.33).
Accesorio widget de reloj Géminis Crédito de la imagen: Autoridad de Android
En una captura de pantalla compartida por la publicación, la extensión Clock Tool se puede ver en la lista de extensiones de Gemini. Se puede invocar nombrándolo verbalmente o escribiendo “@Clock Tool”, seguido de la solicitud. En la captura de pantalla, esta acción hace que el chatbot de IA muestre un mensaje que dice: “Gemini se hace cargo del Asistente de Google”. para manejar algunas acciones a través de accesorios “. Luego, la herramienta Reloj realiza la tarea.
La nueva extensión se unirá a las extensiones Gemini existentes en Androide Como Google Flights, Google Hotels, Google Maps, Workspace, YouTube y YouTube Music. Además, el informe también encontró una nueva configuración que permitirá a los usuarios acceder al chatbot de IA mientras el dispositivo está bloqueado. Esta característica existía antes. Ha sido reportadopero ahora también ha aparecido una captura de pantalla de la configuración.
Configurar la pantalla de bloqueo de Gemini AI Crédito de la imagen: Autoridad de Android
Con la capacidad de bloquear la pantalla, los usuarios podrán usar Gemini mientras viajan y tener una conversación o hacer una pregunta rápida. También se puede acceder a todas las funciones de la extensión en la pantalla de bloqueo. El informe afirma que es posible que Gemini no pueda realizar tareas que requieran agregar credenciales o acceder a datos privados. No hay información sobre cuándo estará disponible la función para el público.
Los enlaces de afiliados pueden generarse automáticamente; consulte Declaración de ética Para detalles.
Google introduced the Memory Saver feature to its Chrome browser in February 2023 and has been enhancing it ever since. Now a new option will give users even more control over Memory Saver by introducing a way to configure its aggressiveness.
While Memory Saver is an excellent tool — as it addresses Chrome’s RAM issue by identifying tabs that are not being used and removing them from memory — there’s nothing in the way of controlling when a tab is flagged as inactive and therefore put on snooze. But a recently discovered flag in Chrome Canary by Windows Report shows that Google is testing out a feature that will give you three options for Memory Saver: Conservative, Medium, and Aggressive.
Once the toggle setting is enabled, you’ll have access to those three settings:
Moderate Memory Savings: With this setting, your tabs become inactive after a long period of time. It gives a balance between memory usage and keeping recently accessed tabs active.
Balanced Memory Savings: Selecting balanced memory savings means that your tabs become inactive after a moderate period of time.
Maximum Memory Savings: If you choose maximum memory savings, your tabs become inactive after a shorter period of time. This aggressive mode minimizes memory usage but may require more frequent tab reloads.
Google is also adding a new visual cue for inactive tabs, a dotted circle that will appear on inactive tabs to indicate that they’ve been put to sleep and are no longer consuming memory.
According to the report, Google has been extensively testing out the tool for quite some time. The tech giant “tested a multi-state option for memory mode with heuristic mode, fixed timer, and discard, and offered options behind flags to select the time when tabs can be discarded.” And while those tests eventually went nowhere in terms of new features, they influenced improvements made to Memory Saver.
There currently isn’t a timeframe for when this Memory Saver update will be rolled out to all Chrome users, but once it is you should be able to access it through performance settings at chrome://settings/performance.
You might also like
Get the hottest deals available in your inbox plus news, reviews, opinion, analysis and more from the TechRadar team.
A select handful of Pixel and Galaxy smartphones have the exclusive Circle to Search feature. By holding down the home button on one of the models, an overlay will appear “that lets you circle… objects” on screen to identify them through Google Search. We’ve wondered if and when Google plans on widely rolling out Circle to Search to more smartphones. Funnily enough, a similar feature has recently been released, but it’s on iPhone.
It’s called Search Your Screenshot and was created by a group of developers who work on the Google Search app for iOS. Minsang Choi, who is a design manager for Google Lens, states it adds a visual search function to the action button on an iPhone 15 Pro. Pressing the button takes a screenshot of whatever’s on the display and the software proceeds to run a Google Lens scan. After it’s done, search results appear from buttons complete with images, forum posts, and shopping links to the object it detects. Choi says, “It’s basically Circle to Search but faster”.
(Image credit: Google/Minsang Choi)
He has since deleted his post on X (the platform formerly known as Twitter) where he initially shared information about the shortcut. We do have the images he posted. They show a settings menu of presumably Choi configuring Search Your Screenshot on an iPhone. The second picture shows the shortcut appearing on the action button’s unique interface with the third image displaying results for a Teenage Engineering computer case.
If you want to see it in action, 9To5Google, as part of its coverage, made a YouTube video demonstrating Search Your Screenshot. Choi says you can try out the tool by installing the Google Search app on your iPhone or downloading the shortcut from iCloud.
How to enable on older iPhones
Going back to 9To5Google’s report, they made an interesting discovery. Search Your Screenshot is not exclusive to the iPhone 15 Pro because it works on older models that support the Back Tap gesture. This means devices as old as the iPhone 8 can run the feature. However, setting it up on an older model requires more work.
Apple has instructions teaching people how to connect shortcuts to Back Tap. It involves going into the Settings menu, choosing the gesture you want to use (a Double Tap or Triple Tap), and then applying Search Your Screenshot. According to the publication, be sure to select “Always Allow” when you first use the tool to enable Google Lens uploads.
After reading through everything, we couldn’t help but wonder about other Android phones. This function isn’t available on Google Search for Android which is strange. Although it may not be the same as Circle to Search, Search Your Screenshot is still a useful tool. So we contacted the tech giant asking if there are plans for further expansion. We’ll let you know if we hear back.
Get the hottest deals available in your inbox plus news, reviews, opinion, analysis and more from the TechRadar team.
The developers of Tiny11 (a slimmed-down third-party version of Windows 11) have released a new version of their Tiny11 Builder, a tool that enables you to modify and customize your own version of Windows 11 to make it more trimmed-down.
This version will allow you to make Windows 11 ISOs (installation media) with disabled telemetry – basically, Microsoft’s inbuilt automated data collection and communication process for monitoring, analysis, and reporting of your system. Disabling telemetry has multiple implications for increasing user privacy, using fewer system resources to run Windows 11, and getting greater control over your user data.
Tiny11 Builder is essentially an open-source script that you can run on your device to make it possible to slim down your Windows 11 for a smoother user experience. You can get the script for Tiny11 from the developers’ GitHub page by copying and pasting the code into a Windows PowerShell window, or by downloading the script file (which will have a .ps1 extension), right-clicking the file, and selecting ‘Run with PowerShell.’
For the uninitiated, PowerShell is a Microsoft tool that allows you to automate tasks and processes in the Windows operating system. The easiest way to find it is simply by searching for it in Windows Search, but it’ll open automatically if you follow the second method listed above.
How Tiny11 Builder works to unlock Windows 11’s efficiency
Running Tiny11 Builder this way will prompt your system to use Microsoft-made tools to remove items that aren’t essential, but that you wouldn’t be able to remove in its default state.
This process isn’t as straightforward as downloading an official Microsoft ISO from its dedicated website, but according to Neowin, the resulting IOS image comes out clean and fully functional. It also allows you to bypass issues like needing a Microsoft account and certain hardware requirements, as well as permitting you to kill off Microsoft Edge, Get Started, OneDrive, and any other Windows bloatware that you might consider unnecessary.
The updated version of the Tiny11 Builder script allowing for disabled telemetry was put up on GitHub on April 29, 2024, and announced by Tiny11 creators NDTEV on X. If you’re concerned about how much of your user data is collected and shared with Microsoft, this is a popular option with many people who share such concerns. It allows you to curb the sharing of data through Windows functionalities like Application Compatibility Appraiser, Customer Experience Improvement Program, and others.
Get the hottest deals available in your inbox plus news, reviews, opinion, analysis and more from the TechRadar team.
The first update to tiny11 builder is now up! It disables telemetry as well as some of the scheduled tasks associated with it.Go check it out and let me know how it works!https://t.co/qmtOcmkPdO https://t.co/cvkCllUma3April 29, 2024
The ability to remove telemetry looks like the only change to this iteration of Tiny11 Builder, but NDTEV seems to have plans to give Tiny11 additional capabilities as per the developers’ GitHub repository. Future plans include enhanced language detection, more flexibility in managing which Windows 11 features to keep and purge, and maybe even a unique new user interface.
This is maybe one notch above ‘beginner’ when it comes to implementing software on your PC, but if you’re interested in it, I’d encourage you to try it. With Microsoft’s recent onslaught of ads, I can see tools and solutions like this becoming more popular, and for all of our sakes, I hope Tiny11 Builder stays open-source.
Hybrid access as a service (HAaaS) provider Cloudbrink has created a new tool that can measure packet loss impact, revealing the deep-seated causes of network and application performance problems affecting the hybrid workforce.
Cloudbrink’s own research reveals as little as 0.0047% packet loss in conjunction with 30ms latency can cause a dramatic decline in speed, reducing effective throughput by up to 95%. This underlines how any latency increase from VPN or ZTNA services can lead to massive degradation in performance.
Cloudbrink points out that packet loss typically occurs in the “last mile” – the distance from the user to the broadband network or the nearest cell tower – or between the user’s device and Wi-Fi router.
Mimics home networking conditions
Focused on remote workforce optimization, the free Packet Loss Tool allows IT departments to see how the use of VPN or ZTNA solutions impact their essential business applications and the overall user experience.
Prakash Mana, CEO of Cloudbrink said, “The shift to hybrid work models brings new hurdles. Remote users often experience lag and connection inconsistencies (latency and jitter) that disrupt their workflow and create frustration with technology. This new tool empowers IT teams to identify these bottlenecks and implement solutions that optimize application performance and end worker frustration.”
Cloudbrink’s tool mimics the network conditions home-based workers and those on the move are projected to face on typical broadband connections, or via cellular networks and public Wi-Fi access points. It also tests the influence of varying network conditions on private and SaaS applications.
Steve Broadhead, Director of Broadband Testing said, “Seeing is believing. This tool provides a great way of enabling the CTO to witness at first hand the effects of network degradation and how it can impact application performance.”
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Packet Loss Tool is available as a free download on the Cloudbrink website. You will need to complete a short survey before gaining access to it.
RedacTek’s tool alerts users to PubPeer discussions, and indicates when a study, or the papers that it cites, has been retracted.Credit: deepblue4you/Getty
A free online tool released earlier this month alerts researchers when a paper cites studies that are mentioned on the website PubPeer, a forum scientists often use to raise integrity concerns surrounding published papers.
Studies are usually flagged on PubPeer when readers have suspicions, for example about image manipulation, plagiarism, data fabrication or artificial intelligence (AI)-generated text. PubPeer already offers its own browser plug-in that alerts users when a study that they are reading has been posted on the site. The new tool, a plug-in released on 13 April by RedacTek, based in Oakland, California, goes further — it searches through reference lists for papers that have been flagged. The software pulls information from many sources, including PubPeer’s database; data from the digital-infrastructure organization Crossref, which assigns digital object identifiers to articles; and OpenAlex, a free index of hundreds of millions of scientific documents.
It’s important to track mentions of referenced articles on PubPeer, says Jodi Schneider, an information scientist at the University of Illinois Urbana-Champaign, who has tried out the RedacTek plug-in. “Not every single reference that’s in the bibliography matters, but some of them do,” she adds. “When you see a large number of problems in somebody’s bibliography, that just calls everything into question.”
The aim of the tool is to flag potential problems with studies to researchers early on, to reduce the circulation of poor-quality science, says RedacTek founder Rick Meyler, based in Emeryville, California. Future versions might also use AI to automatically clarify whether the PubPeer comments on a paper are positive or negative, he adds.
Third-generation retractions
As well as flagging PubPeer discussions, the plug-in indicates when a study, or the papers that it cites, has been retracted. There are existing tools that alert academics about retracted citations; some can do this during the writing process, so that researchers are aware of the publication status of studies when constructing bibliographies. But with the new tool, users can opt in to receive notifications about further ‘generations’ of retractions — alerts cover not only the study that they are reading, but also the papers it cites, articles cited by those references and even papers cited by the secondary references.
The software also calculates a ‘retraction association value’ for studies, a metric that measures the extent to which the paper is associated with science that has been withdrawn from the literature. As well as informing individual researchers, the plug-in could help scholarly publishers to keep tabs on their own journals, Meyler says, because it allows users to filter by publication.
In its ‘paper scorecard’, the tool also flags any papers in the three generations of referenced studies in which more than 25% of papers in the bibliography are self-citations — references by authors to their previous works.
Future versions could highlight whether papers cited retracted studies before or after the retraction was issued, notes Meyler, or whether mentions of such studies acknowledge the retraction. That would be useful, says Schneider, who co-authored a 2020 analysis that found that as little as 4% of citations to retracted studies note that the referenced paper has been retracted1.
Meyler says that RedacTek is currently in talks with scholarly-services firm Cabell’s International in Beaumont, Texas, which maintains pay-to-view lists of suspected predatory journals, which publish articles without proper quality checks for issues such as plagiarism but still collect authors’ fees. The plan is to use these lists to improve the tool so that it can also automatically flag any cited papers that are published in such journals.
Spring isn’t just the time for cleaning your home. It’s also the time for renovating, refurbishing, and restoring. That yardwork project you put off last fall? Those garage projects you wanted to do all winter when it was too cold to work out there? Now’s the time to stock up on tools and gear, but you have to act quickly if you want to snag a deal. Home Depot’s Spring Black Friday ends after April 28, and Lowe’s SpringFest ends after May 1, but there are still deals on loads of our favorite gear from brand favorites, such as DeWalt, Milwaukee, Ridgid, Klein, and Kobalt.
Special offer for Gear readers: GetWIRED for just $5 ($25 off). This includes unlimited access toWIRED.com, full Gear coverage, and subscriber-only newsletters. Subscriptions help fund the work we do every day.
If you buy something using links in our stories, we may earn a commission. This helps support our journalism. Learn more.
Tool Deals
Gearwrench 232-Piece Mechanics Tool Kit
Photograph: Home Depot
The Gearwrench brand is my favorite entry-to-mid-level tool brand for chrome hand tools. Made in Taiwan, these sockets, combination wrenches, and ratchets have excellent manufacturing tolerances, meaning less slipping off bolt heads and potentially damaging them. This kit only comes with 1/4-inch and 3/8-inch drive sockets and ratchet handles, not 1/2-inch, but that shouldn’t matter unless you’re working on large projects, such as cars’ axle components or building a deck. The organization box is also excellent, with sturdy slide-out drawers and built-in handles that make picking up the heavy box a breeze.
An impact driver is a power tool that delivers rapid, repeated forward thrusts as it rotates on a bolt or screw head. It works wonders for stubborn screws and bolts that may be too rusted in place to remove without a power tool. An impact driver typically fits small screws and bolts. Similarly, a hammer drill delivers the same thrusts but is designed for drilling through tough materials that could choke up a normal cordless drill. This combo kit includes two batteries and a charger, so when you run one dry, you’ve got another to use while the first one is charging.
An impact wrench is similar to an impact driver in that it uses repeated forward thrusts to loosen stubborn bolts, but it tends to be more powerful and meant for larger bolts. I’ve used one to loosen rusty suspension bolts and engine bolts enough times in the garage to consider one a godsend for heavy-duty mechanical work.
DeWalt 20V Max XR Cordless Drill Kit
Photograph: Lowe’s
The cordless drill is arguably the most versatile power tool in a homeowner’s toolbox. Not only can it drill, but it can be fitted with screwdriver bits for Phillips head screws, Torx, triple square, and hex bolts. A similar 20-volt DeWalt has been my standby for years, and the XR version adds a brushless electric motor for a longer life span. The speed is adjustable from 650 to 2,000 rounds per minute, which is useful because you won’t need a high RPM all the time. The ergonomics are perfect. I’ve spent hours in a row with an ergonomically identical DeWalt with no hand pain. The small LED in front of the trigger lights up dark work areas nicely.
If I were to “hypothetically” say that I’ve drilled more than 100 holes in my apartment walls (and if my hypothetical landlord wasn’t reading this), I’d tell you that these budget drill bits performed excellently in drilling through pre-war drywall, which in my place measures a particularly thick 3/4 inches. I’ve used these bits to repair the frame of a couch, build wooden furniture, and drill through metal picture frames, and they’re the best value out there. They come in several sizes that have never left me wanting.
Gearwrench makes the best value in tools. I tested this 12-piece screwdriver set earlier this year, and I was enamored with how tightly the Phillips head screwdrivers fit into screw heads. That means less slippage that can damage screws and potentially make them nearly impossible to remove or reuse. The rubber-wrapped handle is comfortable for extended periods too.
Garage and Yard Deals
Ridgid Compact Miter Saw Stand
Photograph: Home Depot
Perform any woodworking, even if you’re cutting boards, and you practically need a miter saw. The hang-up comes in finding a stable, secure place to put it while you’re using it. Choosing a stand is vital because a miter saw is dangerous when it’s unstable. I’ve always been impressed by Ridgid stands. The mounting brackets are quick and easy to use, and the structural parts have robust materials that don’t scream cost-cutting. This stand can hold up to 400 pounds, which is plenty for a miter saw.
A stalwart tool of any garage, whether you’re cleaning up after a woodworking project or washing the car, is the shop vac. It’s a supercharged cousin of your household vacuum cleaner. It can suck up wet messes, thanks to its built-in drain, as well as dry ones. Ridgid makes my favorite shop vacs because, with five horsepower on tap (for this model), it has no shortage of power for sucking up large messes, the included hose attachments fit securely, the caster wheels glide easily, and I’ve never had one break while on duty.
Maybe it’s the number of times I’ve stood on a Werner ladder and didn’t fall off, but when I need to purchase a new ladder, I almost always go with Werner. This 8-foot-tall model is made of thick, durable fiberglass that helps cut down on some of the weight when you’re moving it, and it holds up to 300 pounds. There’s a magnetic tool strip at the top, along with a paint can holder and a slot for holding a drill or hammer.
Kobalt 630-CFM Leaf Blower
Photograph: Lowe’s
Leaf blowers aren’t just for fall. They can be a major time saver when you want to clean up the grass shrapnel that remains after edging your lawn, for example. Gone are the days of a bulky, smoke-spewing, gasoline-powered leaf blower. This cordless, electric model from Kobalt moves 630 cubic feet per minute of air, meaning it offers plenty of power while weighing just under 9 pounds. There’s a battery and charger included too.
Other Tool Deals
Klein Digital Multimeter Kit
Photograph: Home Depot
Being able to measure the electrical current flowing through an outlet, car battery, or the like is essential when working with electronics. Klein is a longtime stalwart in tools designed specifically for electricians. This multimeter measures up to 600 AC/DC voltage and 10A DC, and it comes packaged with GFCI outlet testers and cables. If all the dials and screens look complicated, don’t be scared. The included instructions will tell you how to set everything, and it’s far easier than it appears at first glance.
It’s easy to find a decent utility knife, but hard to find a great utility knife. I’ve used tons, from Craftsman to Stanley to no-name brands off Amazon, and the Fastback is my favorite. The replaceable blades are sharper than those from other brands, and you can flick the blade open and shut one-handed with ease. You can store a spare blade in the handle, and there’s a bit holder for a common-sized flat head and Phillips head screwdriver bit. A battle opener and wire stripper round out the features list.
Stanley makes my favorite tape measures in their Fat Max series, but these DeWalt tape measures are nearly good, and hey, they’re on sale. I’d say they’ve earned the right to use “tough” in their name, because I’ve thrown some around a few job sites, and the thick plastic casing can put up with a lot of abuse. One of the few differentiators among tape measures is their ability to extend without collapsing. The DeWalt’s thick tape manages this well, so if you need to stretch it out 10 feet across the room to measure something (which is quite common), then you’ll have a lot fewer headaches with this than a cheaper tape measure.
Plastic trigger clamps won’t be the clamp to grab for the heaviest-duty jobs, but they may be the clamps you reach for the most often. More times than I could count in a month, I need a third hand to hold something steady for me while I work on a project. From pinning a bracket to an awkward place while you bolt it in to keeping hands safely clear when cutting something, you need a few clamps in your toolbox. With 100 pounds of clamping force, these will be more than capable of many day-to-day, small tasks.
The sun continues to set on the iconic WindowsControl Panel, as another key part, the Fonts page, makes its way to the Settings app instead. The Control Panel isn’t on the way out just yet, but it’s directing users to the Settings app for an increasing number of functions. And now, reports suggest that later this year, if you try to open the Fonts page from the Control Panel you’ll be automatically redirected to the Settings app.
The Fonts page can currently be found in the following location:
Control Panel > Appearance and Personalization > Fonts
This is the latest development in an ongoing migration process that Windows Latest has been documenting for several years, which has seen features transition from the Control Panel to the Settings app. Windows Latest reports that Microsoft doesn’t currently seem to have plans to completely remove Control Panel from regular Windows 11 versions.
(Image credit: Future)
The next version of font management in Windows 11
Over in the Settings app, there will be a modern font management interface and it will work similarly to its Control Panel predecessor. At the moment, the legacy version of the Fonts page still exits and can be found in Control Panel, and it can be located using Windows Search.
Here, you can browse the fonts available on your system and use the legacy font management page.
That said, Microsoft wants to guide users to the Settings app for font management and Windows Latest writes that Fonts will be completely removed from the Control Panel in a future Windows update. Instead, users will be redirected to Settings > Personalization > Fonts, which is where the new Fonts page resides.
Get the hottest deals available in your inbox plus news, reviews, opinion, analysis and more from the TechRadar team.
This will be a noticeable change, but it shouldn’t be too disruptive as it apparently has all of the functionality and features of the legacy page. Also, the future update probably won’t remove the legacy Control Panel Fonts page right away, and users will still be able to find it in C:\Windows\Fonts within File Explorer.
If you’re particularly annoyed by the change and want to stick to the classic interface, you can create a shortcut link in your Settings page which will open the above location in File Explorer as well.
Again, Microsoft is pretty insistent that it would like users to get used to performing font management through Settings, and when Windows Latest opened the Fonts page in File Explorer, it got this message:
“This page is being decoupled from Fonts Control Panel. For more font settings, go to the Fonts page in the Settings app.”
A lot of users are used to Control Panel, which has been a part of Windows since the very first version in 1985, so Windows Latest thinks it’s here to stay. What will change is that with every new feature that’s migrated to the Settings app from Control Panel, users will be redirected to the new analogous page in Settings.
I think this is a wise decision from Microsoft as it makes sense to have a single place where you can manage all of your computer’s settings, especially as new generations of people are introduced to the operating system. It’s preserving the interface and (it seems like) full functionality of Control Panel, while attaching it to the new architecture that’s being built in a way that isn’t especially disruptive or difficult for existing users.
Proton Mail has just unveiled a new Dark Web Monitoring feature in a bid to bolster its security capabilities against widespread data breaches.
Incidents of data leaks are reportedly on the rise, as billions of people’s credentials are exposed. The longer this sensitive information remains on the web, the easier is for cybercriminals to exploit it to their advantage. This new tool from Proton seeks to challenge this. By identifying and alerting you as soon as your credentials appear in a breach, you will be able to take action before bad actors get to them.
Already one of the most secure email providers on the market, Proton Mail now claims to be the first email service to combine end-to-end encryption and dark web monitoring protections. The new feature is now available on its web and desktop apps, but only for paid subscribers.
Encryption alone isn’t enough
As the Head of Anti-Abuse & Account Security at Proton, Eammon Maguire, explained, the dark web is filled with leaked information, data, and credential dumps—and that’s something that not even the strongest end-to-end encryption alone cannot protect against.
Take the data leak that occurred in January this year, for instance. Dubbed the “Mother of all data breaches,” it unveiled a 12TB database that contained more than 26 billion records. It is the largest data breach to date. One of the best VPN providers, Surfshark, has analysed data breach records from 2004 onwards, and calculated that 3,353 accounts have been breached every minute in the first quarter of 2024—a considerable jump from the end of last year’s average of just 627.
The owners of this leaked data are often unaware, yet cybercriminals are busy trading their sensitive details to launch identity fraud and other attacks. By taking advantage of the fact that most people may reuse their passwords on multiple accounts, criminals often execute what’s known as a “credential stuffing attack.” They enter thousands of these stolen passwords and email addresses across various platforms on the lookout for a potential match.
“While data breaches of third-party sites leading to the leak of personal information (such as your email address) can never be entirely avoided, automated early warning can help users stay vigilant and mitigate worse side effects such as identity theft,” said Maguire.
Get the hottest deals available in your inbox plus news, reviews, opinion, analysis and more from the TechRadar team.
That’s exactly when Proton Mail’s new Dark Web Monitoring tool comes in—a way for you to react as quickly as possible in case your credentials are being exposed.
The feature regularly scans all the corners of the dark web, which is exactly the section of the internet where your stolen personal information ends up. It looks for email addresses, passwords, and any other personal details linked to your account.
Proton will alert you in case it finds leaked details of any of your accounts for third-party websites. You’ll receive comprehensive information about the breach and the data compromised. The provider will also suggest the steps to take to safeguard your digital identity and mitigate potential risks.
Stay safe from cyber threats!Dark Web Monitoring is available to all paying users of #ProtonMail. If you register for an online service that gets hacked or suffers a #databreach, Proton will now alert you, so you can take immediate action. 1 / 2 pic.twitter.com/qijm01eV3eApril 22, 2024
See more
Proton’s dark web detection tool relies upon the company’s very own threat intelligence datasets alongside data coming from a leading firm in digital threat management, Constella Intelligence.
The provider promises that no user data is ever shared with third parties to do this. However, Maguire explained the team does analyze reports “from third parties any time they find leaked information or data stolen in a hack from a third-party online service that’s tied to a Proton Mail email address or a Proton Pass/SimpleLogin alias.”
Now available for paid subscribers on the web and desktop apps, Proton Mail Dark Web Monitoring can show all known breaches that have affected your accounts over the last two years. Those that carry a higher risk to your privacy are marked with red, while those where fewer details have been compromised are marked with orange.
Maguire said that Dark Web Monitoring will soon send notifications also to your Android or iPhone device so that you can take action even quicker. The plan is also to extend the data to watch out for, including custom domain emails and external email addresses you used to register to its Proton VPN, Proton Pass, and Proton Drive.
He said: “You may not be able to avoid data breaches, but thanks to Dark Web Monitoring and other Proton security features, you can mitigate risks and stay in control of your digital identity.”
In case you believe to be particularly at risk of cyberattack, we also recommend checking out its Proton Sentinel program which is available for all Unlimited, Family, and Business subscribers.
The role of AI in security has come under severe scrutiny in recent years as companies of all sizes look to establish their footing in the industry.
The recent Google Cloud Next 24 event saw a major focus on AI, but security was also a prominent presence, with a number of security-focused releases and services unveiled at the conference.
Since its acquisition in September 2022, Mandiant has played a major role in helping boost the security of Google’s entire security portfolio, and we sat down with Kevin Mandia the company’s CEO, to find out just how big a role AI can play in helping stop the latest threats around today.
AI advantage?
“We get asked a lot – what is AI, and is it an advantage, the defence or the offence?” Mandia tells us.
“AI is another technology that’s coming along that good people will use, and bad people will use – it’s just another tool in the toolbox now.”
Google was keen to promote the role that AI can play in security during Cloud Next 2024, revealing a host of new updates and upgrades that leverage Mandiant services.
This includes Gemini in Threat Intelligence, part of the new Gemini in Security platform, which allows users to utilize conversational search to quickly discover details on existing issues or threat actors, as well as offering researchers automated web crawling for relevant open source intelligence (OSINT) articles, ingesting information and providing concise summaries to help the fightback.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Elsewhere, Gemini in Security Operations is also able to use natural language to explain key findings to security admins and professionals via its assisted investigations feature. Once a threat is detected, the platform can summarize event data, then recommend the next steps to take to contain or mitigate, and help guide users through the platform using easy-to-follow instructions and prompts.
(Image credit: Pixabay)
So with AI taking over a lot of the heavy lifting when it comes to threat detection, where does that leave the role of the human?
“The innovation cycle is going to be different – it used to be that humans would learn and create rules with what we are building, the others will build a system that learns and thinks,” Mandia says.
“You’ll always need cybersecurity folks, and AI is the sidecar to that for now,” he adds, pointing out the benefits the technology can have on bringing new workers on board and up to speed.
“We can take someone who’s only been doing security for half a year and make them way faster and smarter,” he says, highlighting how defenses can be scaled much quicker for businesses of all sizes.
“I think we’ll see more secure code being built with AI as well, because it’s very good at structured languages, and code is a structured language.”
(Image credit: Shutterstock)
Ultimately, there is still work to be done in certain areas of threat intelligence, with Mandia flagging the definition of “normal” behavior in a business as something that is still tricky to pin down when spotting possible issues.
“Every day in a lot of businesses, people do the same things all the time – about the only anomalous thing is email,” he notes. “When you look at actual business and work functions and work processes, most people are doing the same things and logging into the same systems, so you should see processes doing the same thing all the time, and humans doing the same things all the time.”
Voice and video spoofing has also grown in scrutiny as AI platforms get better at imitating humans, with Mandia noting more rules need to be created to help crack down.
“Folks that do a lot of business by voice are going to have to start looking into what can be faked, and what can be done about it,” he admits, “the problem right now is that it’s hard to be 100% certain – but we’re getting better on defense to detect these kinds of things.”
(Image credit: Pixabay)
So AI may still have a way to go before it fully takes over security protections, but as it ingests more data and learns more, the time may not be too far away.
For now though, Mandia says he sees humans and AI working together, helping create a multi-fronted approach to stopping attacks.
“(AI) won’t replace a security operator yet,” he notes, “you do need to have (them) – it’s going to speed up things, and train people well, but ultimately you’re not ready to risk transfer to the machines just yet…you want security operations by people still, but they’re getting powered by AI.”
“Security is too important to just remove a gating factor without knowing and ensuring that whatever you’re replaced it with works.”