Wednesday, March 25, 2026


INTEL


Intel releases new graphics card with up to 32 GB VRAM

Intel has released a new graphics card with up to 32 GB of VRAM. Also leveraging up to 32 Xe2 cores, the Arc Pro B70 will soon be joined by the cheaper Arc Pro B65, which Intel claims are 'cost-effective' yet 'high-performance solutions'.

Dell has updated its commercial portfolio with a suite of new devices today. For instance, the company has announced the Core Ultra Series 3 for business PCs with dedicated vPro SKUs. Additionally, it has unveiled new Arc Pro B-series GPUs, which it bills as being 'cost-effective' yet 'high-performance solutions'.

For the time being, Intel is being rather coy about hardware specifications. Currently, the company has confirmed that the Arc Pro B65 and Arc Pro B70 utilise its older Xe2 architecture, just like the Arc B570 and Arc B580 before them (curr. $299 on Amazon).

However, Intel's new Arc Pro discrete GPUs will feature up to 32 GB of VRAM. Also, they will ship with up to 32 Xe2 cores; Intel has not revealed anything else in this regard, though. Intel draws performance comparisons between the Arc Pro B70 and Nvidia RTX Pro 4000, albeit without providing specifics in this regard.

The Arc Pro B70 goes on sale today with a suggested $949 starting price for reference cards. Pricing for Arkn, ASRock, Gunnir, Maxsun, and Sparkle custom cards is unknown at this stage. By contrast, the Arc Pro B65 is set for a mid-April release but without a dedicated reference card. Intel has not yet confirmed how much the Arc Pro B65 will cost.

At its Pro Day 2026, Intel finally unveiled the one GPU that we have all been waiting for. The GPU is the one and only "Big Battlemage", and while we would've loved to see a gaming-oriented variant, Intel's first outing with this GPU is for the rapidly rising AI & Pro segment. These GPUs are designed as a balance for everyday professionals and heavy-duty Pros and are part of the same Arc Pro B-Series, which has seen the likes of the Arc Pro B60 & Arc Pro B50.

The previous entries in the Arc Pro B-series family were based on the Battlemage BMG-G21 GPU with up to 24 GB of memory.

The new cards utilize the brand new BMG-G31 GPU, which is a larger chip, based on the same TSMC N5 process technology, and offering an increased number of cores and memory. Both GPUs are designed for the Pro Workstation segment, a market that is expected to reach $17B by 2029 with a 60% share in mobile and 40% share in desktops. While a small chunk compared to the Local AI inference market, which is expected to reach $250B by 2030, Intel is still catering to its Pro and Workstation markets.

So there are two graphics cards that are based on the Intel Big Battlemage GPU that are launching today. These are the Intel Arc Pro B70 and the Arc Pro B65. Let's start with the specifications of these cards.

                                   Arc B70 Pro                                 Arc B65 Pro
Nucleos Car3220
Ray Tracing Units3220
XMX Motors256160
VRAM32 GB GDDR632 GB GDDR6
Memory width608 GB/s608 GB/s
Memory interface256 bits192 bits
Performance (Int8)367 TOPS197 TOPS
Consumption160-290 W200 W
SystemsWindows e LinuxWindows e Linux
OthersPCIe 5 x16, DisplayPort 2.1 (4)PCIe 5 x16, DisplayPort 2.1 (4)

The Intel Arc Pro B70 graphics card is the flagship Arc B-Series offering. It features the full BMG-G31 GPU, which packs 32 Xe2-HPG cores, 256 XMX Engines, 32 RT units, and provides 367 INT8 TOPS for AI workloads. The graphics card will feature 32 GB of GDDR6 memory across a 256-bit bus interface. The memory is clocked at 19 Gbps, delivering 608 GB/s of total bandwidth. The GPU itself is clocked at 2800 MHz.

The graphics card will be offered in both AIC and Intel-branded variants. The power rating for the Intel-branded variant is 230W, while the AIC models can scale from 160W up to 290W. Power will be provided through a single 16-pin connector interface for the Intel-branded variant, while AICs have the choice to select the number of connectors based on their designs. Another important thing to remember is that a few AICs made multi-GPU models of the Arc Pro B60 with two BMG-G21 GPUs and up to 48 GB of VRAM. So we can expect some partners to be given the green light to produce such variants with two BMG-G31 GPUs and up to 64 GB of memory.

Some highlights of the graphics card include:

32 GB memory runs large AI models with higher precision & accuracy

256 XMX AI Engines (Intel Xe Matrix eXtensions)

Xe2 architecture for fast content creation & AI applications

Scalable multiple-GPU LLM Linux support

XMX AI Engines for AI-enhanced gaming, content creation & media

Ray tracing hardware acceleration for fast, photo-realistic renders

Pro drivers with ISV software certifications

Windows & Linux OS support

Xe Media Engine - Comprehensive content creation toolkit 

by mundophone

Tuesday, March 24, 2026


DIGITAL LIFE


New framework addresses privacy, dignity risks posed by modern AI systems

In a new article, researchers introduce the capabilities approachcontextual integrity (CA-CI), a framework that addresses privacy and dignity risks posed by modern artificial intelligence (AI) systems, especially foundation models whose capabilities evolve across contexts and purposes. In a case study, they demonstrate how CA-CI can operationalize the European Union (EU)'s AI Act's fundamental rights impact assessments, harm thresholds, and anticipatory governance. The article, by researchers at Carnegie Mellon University and the University of Michigan, is published in IEEE Security & Privacy.

"By grounding AI oversight in both contextual norms and universal dignity requirements, our framework offers a practical and robust approach to operationalizing ethics in AI governance," explains Kirsten Martin, dean of Carnegie Mellon's Heinz College of Information Systems and Public Policy, who coauthored the study. Kat Roemmich, research associate at the University of Michigan, led the study, and Florian Schaub, associate professor of information as well as electrical engineering and computer science at the University of Michigan, is a co-author.

The widespread use of AI systems carries with it risks to privacy and challenges to governance that correspond with models' complexity, autonomy, and cross-domain integration. Regulators, providers, and users struggle to manage risks within systems that learn and generalize autonomously. As these systems evolve, the once-assumed observability, traceability, and contextual stability of information flows erodes as their potential for breach, misuse, and harms to dignity increases.

Addressing these challenges requires a governance framework that can evaluate the normative appropriateness of AI systems beyond narrow tasks and stable contexts, a challenge the authors addressed by integrating contextual integrity with the capabilities approach. Specifically, CA-CI:

-Extends and strengthens Helen Nissenbaum's contextual integrity (a theory of privacy) by elevating purpose to a constitutive parameter of information flows, enabling better detection of scope creep and cross-context reuse, and

-Incorporates dignity thresholds from Martha Nussbaum's capabilities approach, defining minimum conditions required for a dignified human life; these capability thresholds function as universal standards for assessing when AI systems cause significant harm.

"Uniting contextual integrity and the capabilities approach into a single normative governance framework, CA-CI evaluates privacy and dignity in any socio-technical context by whether it secures the integrity of social life and each human life within it," says Martin, who pointed to Roemmich's dissertation as the foundation of the framework.

The EU's General Data Protection Regulation enshrines a purpose limitation principle, requiring data to be "collected for specified, explicit, and legitimate purposes and not further processed in a manner incompatible with those purposes." It also mandates data protection impact assessments for high-risk data processing that may affect fundamental rights and freedoms.

The EU's AI Act, passed in 2024, extends this logic, prohibiting AI practices deemed to present an unacceptable risk to fundamental rights, health, or safety. It also requires certain users of high-risk systems to conduct fundamental rights impact assessments before use and after relevant system changes, and it requires providers to maintain continuous, purpose-specific risk assessments throughout the system's life cycle.

But the act lacks a clear standard for determining what constitutes a violation of dignity beyond broad reference to fundamental rights, according to the authors. These ambiguities hinder evaluators in determining when a given practice crosses the moral boundary of dignity, and by extension, the derivative human rights it grounds. As a result, the enforceability of dignity as a foundational normative principle becomes increasingly tenuous.

Meeting this challenge requires a normative governance framework for privacy and data protection that can substantively assess dignity risks across evolving socio-technical contexts throughout the AI life cycle. In applying CA-CI to key requirements of the EU's AI Act, the authors show how the framework:

-Enables context-sensitive assessment of dignity risks within fundamental rights impact assessments,

-Defines principled thresholds for what counts as significant harm, and

-Supports anticipatory governance by identifying dignity-based risks that have not yet been recognized or codified.

While the EU's AI Act provides a compelling case study given its rights- and risk-based framework grounded in dignity, CA-CI can be used more broadly to evaluate privacy and dignity in any socio-technical context, regardless of jurisdiction, say the authors.

Provided by Carnegie Mellon University's Heinz College 



SAMSUNG



First Galaxy Z Fold 8 CAD renders show familiar design and an absurd price of US$1,999...marginally thicker than Z Fold 7

Samsung is expected to unveil the next generation of foldables in July and there have been quite a few leaks about the Fold and the Flip phones. Despite Samsung’s efforts to curb leaks, information seems to be getting around. This time, however, renders based on rumored dimensions have surfaced, giving a first look at what the Galaxy Z Fold 8 might look like. To no one’s surprise, no major changes this year.

The renders come from known leaker OnLeaks via Android Headlines and they show a very familiar design for the Galaxy Z Fold 8. The only notable aspect is that the phone could be slightly thicker than the Galaxy Z Fold 7. As per the report, the upcoming device is said to measure 158.4x143.2x4.5 mm when unfolded and 158.4x72.8x9 mm when folded. With the Galaxy Z Fold 7, Samsung managed to bring the thickness down to 4.2 mm when folded and 8.9 mm when unfolded. The rest of the dimensions seem to be the same, indicating that there will be no change to the screen size.

The rest of the design remains the same as well. There is said to be a center hole punch for the selfie camera and three vertically placed cameras at the back. There have been reports of Samsung using new display technology for the folding screen that will ensure better durability. It is referred to as “dual-layer” Ultra Thin Glass (UTG) with a laser-drilled metal support plate, and Apple is said to be using the same with its first foldable.

Leaked CAD renders obtained by the Android Headlines portal reveal that the Samsung Galaxy Z Fold 8 should focus on strategic internal refinements. Maintaining the established aesthetic allows the South Korean company to concentrate efforts on solving long-standing user demands, such as battery life.

This move prepares the ground for a direct clash with the foldable market, which should gain even more traction with new competitors in the summer of 2026. Approximate dimensions indicate that the device may be slightly thicker than its predecessor, reaching about 9 mm when folded.

This subtle change in the chassis suggests the return of S Pen support, a feature that requires the integration of an additional digitizer under the flexible panel. Sacrificing a few millimeters for the sake of productivity seems to be Samsung's bet to differentiate the Fold 8 as a robust and versatile tool.

The battery upgrade is one of the most anticipated new features, with rumors pointing to a 5,000 mAh cell for the first time in the category. Combining this capacity with support for 45W fast charging solves one of the main bottlenecks of the line, offering greater longevity for intensive screen use.

Although the Galaxy S26 Ultra has already advanced to higher marks, the leap to foldables represents a necessary evolution to maintain competitiveness. The camera setup will also receive an important update in the ultrawide sensor, which should now adopt a 50-megapixel component.

This improvement raises the quality of captures at wide angles, bringing the foldable's photographic experience closer to the level of conventional S-series models. Despite the retention of the 10-megapixel telephoto lens, the evolution in post-processing promises to deliver more professional results.

Samsung is expected to officially unveil the Galaxy Z Fold 8 during the next Unpacked event, maintaining the suggested price at around US$1,999. Although the price increased in the previous generation, stability is expected despite the rise in RAM and Flash storage costs.

There is a possibility that the event will be moved to August, bringing the launch window closer to Apple's first foldable iPhone. The Cupertino giant is expected to bet on a wider format, similar to the Pixel Fold, forcing Samsung to accelerate its own design variants for the same period.

mundophone

Monday, March 23, 2026


DIGITAL LIFE


Your smart home can be easily hacked. New safety standards will help, but stay vigilant

On a quiet suburban street, a modern Australian home wakes before its owners do. The lights turn on automatically, the thermostat adjusts to a comfortable temperature, and the coffee machine begins brewing. A doorbell camera watches the front yard, a baby monitor streams live footage to a parent's phone, and a smart speaker waits for its next command.

This is the promise of the smart home: convenience, efficiency, and peace of mind.

But behind this smooth experience is a hidden risk: every connected device can also be a way for cyber attackers to get in.

The Australian government has responded by introducing minimum security standards for smart devices to better protect households in this increasingly connected world.

These standards recently took effect. So what's in them? And are they sufficient to keep people safe?

Starting with manufacturers...From my experience working in cybersecurity, I've seen that security risks start from manufacturers themselves.

Many smart devices are not designed with security as a priority. Manufacturers often focus on keeping costs low, releasing products quickly, and making them easy to use. Security is treated as an afterthought.

For example, many devices arrive with weak default passwords such as "admin" or "1234," which users rarely change. This creates an easy opportunity for attackers to gain access.

The Mirai botnet attack in 2016 clearly demonstrated the risks. In this case, hundreds of thousands of insecure devices such as doorbell cameras were hijacked to launch massive "distributed denial-of-service" (DDoS) attacks. This is a type of cyber attack where many computers or devices are used together to overwhelm a website, server, or network with traffic, so it becomes slow or completely unavailable to legitimate users.

More recent research has shown smart home devices can be exploited not only to disrupt systems but also to spy on households. In some cases, strangers have accessed baby monitors, and poorly secured cameras have exposed private footage online.

Another major issue is the lack of regular software updates.

Many low-cost or older devices don't receive ongoing security patches, which means known software vulnerabilities remain open indefinitely. Attackers actively scan the internet for such devices, exploiting weaknesses at a large scale. Cloud-connected and AI-enabled systems amplify risks.

The consequences of these weaknesses go beyond individual households. Compromised devices can be used as part of larger cyber attacks, forming botnets that target critical infrastructure or businesses.

In effect, an insecure smart lightbulb or camera can become a building block in global cyber crime operations.

What are the new standards? In response to these growing threats, the Australian government has begun introducing mandatory minimum security standards for connected devices.

These standards took effect earlier this month. They aim to establish a baseline level of protection across all products entering the market.

While the details of these standards may evolve, the key ideas are clear.

First, devices must not use universal default passwords. Each device should either require users to create a unique password during setup or be shipped with a unique credential.

Second, manufacturers must provide a clear vulnerability disclosure policy, allowing security researchers to report issues responsibly.

Third, there must be transparency around how long a device will receive security updates, so consumers can make informed decisions.

These changes shift some responsibility from users to manufacturers. Instead of expecting consumers to fix security problems themselves, devices must be designed to be safer from the start.

In practice, this means fewer vulnerabilities and greater accountability across the industry.

Regulation alone isn't enough...However, regulation alone is not enough. Household behavior still plays a critical role in maintaining security. Fortunately, some of the most effective steps are simple.

Changing default passwords to strong, unique ones is one of the most important steps. A strong password should be long, complex, and not reused across multiple devices or accounts.

Enabling multi-factor authentication wherever possible adds a second layer of defense, making it significantly harder for attackers to gain access.

Regularly updating device firmware, also known as "software for hardware," is equally important. Firmware updates often include patches for newly discovered vulnerabilities, and delaying them leaves devices exposed.

Users should also consider their home network design. Placing smart devices on a separate network, such as a guest wifi, can help isolate them from more sensitive information on personal or work devices.

Finally, choosing reputable manufacturers matters. Companies with a strong track record of providing ongoing security updates and transparent policies are generally safer choices than unknown or low-cost alternatives.

Smart homes are becoming an integral part of everyday life, and their benefits continue to grow. But as intelligence and automation expand, convenience must not come at the expense of security and trust.

With stronger standards, better-designed devices, and more informed users, it is possible to enjoy the benefits of smart homes without exposing ourselves to unnecessary cyber risks.

mundophone


DIGITAL LIFE


Researchers achieve 100-meter underground wireless communication

Korean researchers have confirmed that underground wireless communication is possible, moving beyond the terrestrial wireless communication they have primarily focused on until now. This opened up a new wireless channel for confirming the survival of buried people in the event of a collapse of an underground facility such as a mine, conducting underground rescue operations, or conducting underground military operations.

ETRI has succeeded in developing the world's first "magnetic field underground communication source technology" that can transmit and receive voice signals 100 meters underground in a mine using a 1-meter diameter transmitting antenna and a several-centimeter-class receiving antenna.

This technology confirms the feasibility of voice transmission and reception in underground spaces previously inaccessible by wireless technology. Accordingly, this technology is expected to be applied in activities such as rescue operations, military operations, and common utility tunnel safety management.

In particular, this research is based on test results conducted in a limestone bedrock environment where underground communication is known to be virtually impossible, and is considered to have opened up a new area of underground space communication technology, such as rescue operations and military operations.

Underground mines have very severe signal attenuation, making them inaccessible using existing wireless communication technologies.

ETRI focused on the stable transmission of magnetic fields in underground media and developed a low-frequency magnetic field-based communication system.

The researchers implemented communication using a 1-meter-diameter transmitting antenna, a small magnetic field receiving sensor of several centimeters in size, a frequency of approximately 15 kHz, and a data rate of 2–4 kbps, which is sufficient for voice communication.

They successfully conducted bidirectional communication testing within a 100-meter straight-line distance between the mine entrance (ground level) and the fifth underground layer. This is the world's first demonstration that surpasses existing tens-of-meters-level overseas research.

This outcome signifies the possibility of communication between buried people and rescue teams in situations such as underground disasters, including mine collapses.

Also, it can be widely utilized in various fields, such as responding to disasters in common utility tunnels, gas pipelines, and oil pipelines, ensuring communication continuity during military operations in underground bunker environments, and more.

ETRI explained that it is advancing technologies linked to personal devices such as smartphones, and that this will make wireless relays (APs) connecting ground and underground possible.

This technology has been described in the IEEE IoT Journal, and domestic and international patent applications have been completed for key elements such as the transmitter/receiver, antenna, low-frequency modem, and bandwidth expansion technology.

Twelve SCI papers in publication, two presentations at international academic conferences, eight international patents, and technology transfers were accomplished.

Cho In Kui, Principal Researcher of ETRI's EM Wave Basic Technology Research Section, stated, "This is a technology that can significantly reduce the possibility of communication disruption during rescue operations in the event of a mine accident, as much as it has succeeded in communication in underground environments where radio waves do not reach."

Seung Keun Park, Assistant Vice President of ETRI's Radio Research Division, said, "This is an innovative technology necessary not only for mines but also for extreme environments such as tunnels, underground facilities, offshore drilling, and national defense. It will be utilized in various industrial sectors as a highly reliable communication means."

Achieving wireless communication at a depth of 100 meters, typically utilizing low-frequency magnetic induction (MI) or Through-the-Earth (TTE) technology, offers significant advantages in safety, operational efficiency, and environmental monitoring where wired, or high-frequency systems, fail.

Key advantages include(below):

Enhanced mine safety and rescue: The primary advantage is reliable, post-accident communication. Unlike wired systems that break, TTE systems can transmit through hundreds of meters of rock, allowing trapped miners to communicate their location and condition to the surface, and assisting in emergency evacuations.

Deep-earth operation visibility: It enables real-time monitoring of geotechnical data, such as rock stress, gas concentration, and humidity at extreme depths, helping to prevent disasters.

Operational continuity in mining: Deep, wireless nodes can be used to track personnel and manage autonomous machinery at the working face of deep mines, increasing production efficiency without the need for constant maintenance of extensive cabling.

Environmental monitoring (landslides/water): Deep underground sensors can measure pore pressure, moisture levels, and water levels inside dams, providing critical early warning data.

Minimal environmental impact: Because the infrastructure is concealed, it avoids interference with surface operations, such as agricultural tiling or topsoil activity.

High reliability in harsh conditions: Underground communication channels, particularly those using magnetic induction, are less affected by complex tunnel structures or mining-related rubble compared to high-frequency RF systems.

Researchers (such as those at ETRI) are actively developing technologies, including micro-magnetic field communication, to make reliable communication at depths exceeding 100 meters a standard for safety in mines and tunnels

Provided by National Research Council of Science and Technology

Sunday, March 22, 2026


TESLA


Tesla Model Y is the world's best-selling car for the 3rd year

Tesla's electric SUV continues to dominate the global market, surpassing all combustion engine competition, despite new challenges in China and Europe.

The global automotive landscape is experiencing a historic moment that confirms the paradigm shift in mobility. For the third consecutive year, the Tesla Model Y has become the best-selling passenger car on the planet. This feat, shared by Elon Musk's brand based on data from consultancies such as JATO Dynamics and Statista, marks the first time a purely electric vehicle has managed to maintain this throne for such a prolonged period, leaving behind iconic combustion engine models and hybrid offerings from traditional brands.

Over three years of uninterrupted leadership, the Model Y has already put more than four million units on the roads. In the last year of 2025 alone, Tesla managed to produce approximately 1.65 million vehicles, having delivered 1.63 million to its customers worldwide. If you look closely at these numbers, you realize the gigantic scale of the American brand's operation, which seems to have found in the Model Y the perfect formula between space, technology, and performance.

One cannot talk about Tesla's global success without mentioning the Shanghai Gigafactory. This production unit has become the true beating heart of the company. In 2025, it was responsible for delivering 851,732 vehicles, which is equivalent to more than half (52%) of all Tesla's worldwide sales. It is from here that not only the cars for the gigantic Chinese market come, but also many of the units that reach other continents.

After a few months of uncertainty and sales declines, Tesla seems to be regaining momentum in China. In February, data shows an annual growth of more than 42% in retail sales, allowing the brand to recover a market share of almost 14% in the electric vehicle segment. If you're looking for the culprit behind this oxygen balloon, you'll find the Model Y again, whose sales skyrocketed impressively that month compared to the same period last year.

The pressure from the competition and the Xiaomi phenomenon...However, not all the news is perfect for Tesla. The Chinese market is more competitive than ever, and the pressure from local manufacturers is constant. BYD remains a persistent shadow, but the big surprise came from the technology sector. The Xiaomi YU7 managed to steal the title of best-selling electric car in China in recent periods, proving that Tesla's dominance is no longer unquestionable.

If we analyze the total balance for 2025 in China, the Model Y suffered a 34.44% drop in retail sales compared to the previous year. Despite this sharp decline, the model remains the pillar that sustains Tesla's operation in Chinese territory, representing almost 68% of the brand's total sales volume in that country.

mundophone


DIGITAL LIFE


AI applications and the hidden danger of smartphone permissions

Every time you install a new application, your smartphone presents a series of access requests that most users accept without reading. ESET, Europe's largest cybersecurity company, issued a warning on March 19, 2026, about the real and growing risks associated with this practice, with particular emphasis on AI apps (Artificial Intelligence applications). The habit of clicking "allow" without evaluating the implications can expose banking credentials, real-time location, and screen content to third parties without the user's knowledge.

Whenever a new application is installed or a feature is activated, the operating system presents a permission request. This mechanism acts as an "invisible sentinel" that regulates access to device data and resources — but its effectiveness depends entirely on the user's attention. While some permissions are essential for the functioning of applications, others are excessive or serve purposes that have nothing to do with the stated usefulness of the tool. One of the most sophisticated attack vectors exploited by malicious applications is the use of overlay permissions to execute clickjacking techniques. In this scenario, the user believes they are interacting with legitimate interface buttons, but in reality, they are clicking on invisible elements that authorize actions in the background. This tactic subverts the operating system's security mechanisms and facilitates the installation of malware without raising immediate suspicion.

AI applications as a new risk vector...The proliferation of Artificial Intelligence-based applications has introduced a new layer of risk to digital privacy. Many of these tools request permanent access to the microphone, contact list, and even the content visible on the device's screen. This continuous collection allows for the creation of detailed business profiles and exposes confidential information in case of interception or data leakage.

Health and fitness applications represent a similar risk, collecting biometric data with potential real-world impacts, such as sharing with insurance companies or third-party entities. In both cases, the user grants permissions voluntarily, convinced that they are interacting with a trustworthy application. Accessibility as an attack vector...Originally designed to support users with motor or visual limitations, accessibility services offer almost total control over the smartphone. When this permission is granted to an untrusted application, attackers can intercept SMS authentication codes and monitor all interactions performed on the device. This is often the central mechanism used by spyware and ransomware to steal banking credentials and demand financial ransoms.

Managing app permissions safely...Before allowing or blocking, always consider if a permission is necessary for the app in question to do its job.Another good rule of thumb is to only “allow once” or “while using.” Only safety apps like “Find My” should really have access 24/7/365.

You should be asked to review your permissions regularly with many apps. But it may be a good idea to proactively audit permissions. Here’s how:

iOS...Go to Settings > Privacy & Security.

Scroll to the bottom and tap (or turn on) App Privacy Report.

This shows you which apps accessed your data and when.

Alternatively:

Go to Settings > Apps.

Select a specific app (e.g., Instagram).

You will see a list of all toggles (Camera, Mic, Contacts). Turn off anything that isn't essential.

Android...Go to Settings > Security & Privacy > Privacy > Privacy Dashboard.

Tap on 7-Day View (top right menu) to see a timeline of every app that used your sensors over the last week. (These steps may not be the same across all Android-powered devices, so do check.)

If you see an app using the microphone at 3:00 AM, tap it to revoke access immediately.

Alternatively (navigation paths still vary across Android skins):

Go to Settings > Apps > [App Name].

Ensure "Manage app if unused" (or "Pause app activity if unused") is toggled ON.

If you don't use the app for a few months, Android will automatically strip its permissions, delete temporary files, and stop notifications.

Above all, only ever download apps from legitimate stores (Google Play/App Store). Read their reviews first before deciding whether to do so. Consider installing a mobile security solution from a reputable security provider.

Permission risk levels...The assessment of the danger associated with each permission depends on the application's context and its potential for abuse:

Permission--Risk level--Security impact(below):

-Screen overlay--Critical--Allows clickjacking and interaction with invisible elements

-Accessibility services--Critical--Grants total control and interception of SMS authentication

-Microphone and camera--High--Enables active listening and remote activation

-Background location--Medium/High--Allows continuous physical tracking and routine profiling

-SMS and call logs--High--Exposes security codes and two-factor authentication

Risk mitigation strategies...The most effective defense requires regular auditing of granted access through the privacy settings available on both Android and iOS. Ricardo Neves, Head of Marketing and Communication at ESET Portugal, recommends applying the principle of least privilege: “before accepting any permission, users should question whether this authorization is truly necessary for the application to function.”

Fundamental best practices include (below):

-Downloading apps only from official stores

-Reading reviews and comments from other users before installation

-Revoking unnecessary permissions after installation

-Selecting “allow only during use” or “only once” whenever possible

-Regularly updating the operating system and installed applications

-Using antimalware solutions from recognized vendors

Key highlights(below):

-AI applications are increasingly requesting permanent access to the microphone, contacts, and screen content.

-Overlay permissions allow clickjacking — the user clicks on invisible elements without knowing.

-Accessibility services, when granted to malicious apps, allow total control of the device.

-Background location allows continuous physical tracking without active user interaction.

-Regular review of permissions on iOS and Android is the main line of individual defense.

mundophone

INTEL Intel releases new graphics card with up to 32 GB VRAM Intel has released a new graphics card with up to 32 GB of VRAM. Also leveragin...