Connect with us

Tech News

Mobile networks are upgrading to 5G, but it may lead to more dangers

(TECH NEWS) New networks technology means better speeds, and more data; But with more 1s and 0s flying around, there are more vulnerabilities that some may exploit.

Published

on

networks hacker

New technology is exciting, but with new tech comes new security concerns. The rise of 5G networks is no different. With the recent announcement of T-Mobile’s “5G For All”, the next generation of cellular communication is on everyone’s radar, including hackers.

Before we get too far ahead of ourselves it’s important to remember that we are still not living in a 5G world – even if T-Mobile’s marketing campaigns want you to believe it.

The G in 5G stands for generation. 5G is the latest generation of cellular wireless technology. It’s nearly 10x faster than 4G networks and promises to make mobile communication nearly instantaneous. But 5G will do so much more than just make your text messages get to your friends faster. 5G will play a pivotal role in connecting various technologies from GPS systems in vehicles to robots in factories.

The problem is it’s not actually here yet. 5G exists only in small pockets across the country and there are still some issues to sort out. Current 5G networks have a transmission radius of just a few hundred feet, plus they have trouble going through normal stuff like walls and heavy rain.

Major mobile carriers are currently working to redevelop their system of transmitters in order to make “5G For All” more than just a marketing pitch. Despite its current shortcomings, 5G is the future of communications. and everyone from criminal organizations to military groups will be trying to hack it.

According to European computer security company, Enisa, there are five groups most likely to try hacking into the new 5G networks. First on their list is cyber criminals, so no surprise there. Also on their potential hackers list are insiders, nation states, military, hacktivists, and script kiddies (individual junior hackers). These groups have the most to gain from hacking into 5G networks either for stealing data or committing fraud.

The amazing connectivity of 5G could leave certain systems vulnerable to attacks by hackers. Still, let’s not go hitting the panic button on 5G. The rise of 5G networks will mean users, businesses, and governments will have to take on new security tactics, but that is a small price to pay for progress.

Staff Writer, Natalie Gonzalez earned her B.A. in English and a Creative Writing Certificate from the University of Texas at Austin. She is a writer and social media nerd with a passion for building online communities.

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech News

Want to save snippets of a Zoom meeting? Listener makes it possible!

(TECHNOLOGY) Listener lets you screenshot or bookmark important sections of live meetings, as well as curate a playlist of snippets, to share or playback.

Published

on

Listener for Zoom tool landing page on laptop.

We live in a very computer-mediated world where the bulk of communication is done virtually. Many of us spend a great deal of time – whether for work or pleasure – on video calls connecting with people that we’re unable to meet with in person.

Zoom became the unofficial mascot for the pandemic and has shown no signs of going anywhere. So naturally, people are looking for ways to put this to even more of an advantage – like by creating messaging extensions to utilize in lieu of live meetings.

Now the folks behind Listener are getting in on the action by creating Listener for Zoom.

The new tool allows users to bookmark important moments of Zoom calls in real-time and easily turn long recordings into bite-sized video clips.

As founder Nishith Shah puts it, “Zoom meetings just got more productive!”

Listener allows users to do a myriad of things, including live bookmarking to create short video clips; ability to transcribe your entire meeting; edit video clips by using transcripts instead of struggling with video editing tools; share video highlights with your team; create playlists from video highlights across different Zoom meetings to tell powerful stories; use projects to organize your meetings and playlists.

Founders say that Listener is designed for pretty much anyone who uses Zoom. In early testing, the founders found that it is especially helpful for product managers and UX researchers who do customer interviews.

They also reported that early-stage founders have been using Listener to add powerful customer videos to their investor pitch decks. It is also helpful for recruiters and hiring managers who search transcripts across hundreds of hiring interviews to remember who said what and to pass on important clips to other people in the interview process.

The tool is also beneficial for teams and hiring, as customer success and sales teams create a knowledge base with Listener to train and onboard new employees. They also use it to pass on customer feedback to the product teams.

This could also be great for clipping video elements that are appropriate for social media use.

On January 11, 2022, Listener was awarded #3 Product of the Day on Product Hunt.

Listener for Zoom is free while in Beta. The tool works only with licensed (paid) Zoom accounts.

Continue Reading

Opinion Editorials

Job listings are popping up left and right, so what exactly *is* UX writing?

(EDITORIAL) While UX writing is not technically new, it is seemingly becoming more and more prevalent. The job titles are everywhere, so what is it?

Published

on

UX writing

The work of a UX writer is something you come across every day. Whether you’re hailing an Uber or browsing Spotify for that one Drake song, your overall user experience is affected by the words you read at each touchpoint.

A UX writer facilitates a smooth interaction between user and product at each of these touchpoints through carefully chosen words.

Some of the most common touchpoints these writers work on are interface copy, emails, and notifications. It doesn’t sound like the most thrilling stuff, but imagine using your favorite apps without all the thoughtful confirmation messages we take for granted. Take Eat24’s food delivery app, instead of a boring loading visual, users get a witty message like “smoking salmon” or “slurping noodles.”

Eat24’s app has UX writing that works because it’s engaging.

Xfinity’s mobile app provides a pleasant user experience by being intuitive. Shows that are available on your phone are clearly labeled under “Available Out of Home.” I’m bummed that Law & Order: SVU isn’t available, but thanks to thoughtful UX writing at least I knew that sad fact ahead of time.

Regardless of where you find these writer’s work, there are three traits an effective UX writer must-have. Excellent communication skills are a must. The ability to empathize with the user is on almost every job post. But from my own experience working with UX teams, I’d argue for the ability to advocate as the most important skill.

UX writers may have a very specialized mission, but they typically work within a greater user experience design team. In larger companies, some UX writers even work with a smaller team of fellow writers. Decisions aren’t made in isolation. You can be the wittiest writer, with a design decision based on obsessive user research, but if you can’t advocate for those decisions then what’s the point?

I mentioned several soft skills, but that doesn’t mean aspiring UX writers can’t benefit from developing a few specific tech skills. While the field doesn’t require a background in web development, UX writers often collaborate with engineering teams. Learning some basic web development principles such as responsive design can help writers create a better user experience across all devices. In a world of rapid prototyping, I’d also suggest learning a few prototyping apps. Several are free to try and super intuitive.

Now that the UX in front of the writer no longer intimidates you, go check out ADJ, The American Genius’ Facebook Group for Austin digital job seekers and employers. User-centric design isn’t going anywhere and with everyone getting into the automation game, you can expect even more opportunities in UX writing.

Continue Reading

Tech News

How Apple is trying to combat the AirTag backlash (hint – its not working)

(TECHNOLOGY) Apple’s weak-kneed attempts at fixing their AirTags issues aren’t working. They can be placed on anything (or anyone), and it is detrimental.

Published

on

Apple airtag being held between two fingers.

A few weeks ago, I wrote up an article on how the Apple AirTag can be used to stalk and track people, and now it’s happening. Unfortunately, not all stalkers have the same glamour as Joe from the hit series You.

Engadget reported that model, Brooks Nader, says someone used an AirTag to track her. Per her account, she didn’t receive the notification until she was walking home, alone, at night. If that’s not scary enough, now imagine she was an android user. The only way for her to know someone was tracking her would be if she had installed the Tracker Detect app.

As stated by TechCrunch, “Apple has made its own post-launch efforts to tighten up how AirTags that don’t belong to a certain user can be detected, but these notifications have proven buggy and have often waited far too long to alert users. Add in the fact that Apple has seemed to treat Android integration as an afterthought, not a necessary partnership in order to ship a device like this, and Apple’s incompetence looks a bit more severe.”

The app itself, which was released on December 11, 2021, is getting a lot of negative feedback. One issue is that to see if you’re being tracked you have to manually scan to find the AirTag. How often and when you do that is up to the user. Whereas with the Apple Find My app, it alerts you automatically without the user having to scan anything. It’s not perfect, however. It’s buggy and can take hours to notify the user that an AirTag is tracking them. However, it’s still better than the android app.

Another dreadful scenario that hasn’t been factored in this equation is children. Not all kids have devices, much less Apple devices, nor should they necessarily, but if someone was going to track them, they would be easy targets.

Apple, for the love of all that’s decent, pull AirTags and reconsider how they function. Examine the ways an AirTag could be used without using the mesh network of all iPhone users so that it doesn’t continue to emit a location or, I don’t know, give up. If it doesn’t mean anything to you to risk other’s lives with this product then consider the possible dangerous consequences as a reflection on Apple.

Contrary to popular belief, not all publicity is good publicity.

Continue Reading
Advertisement

Our Great Partners

The
American Genius
news neatly in your inbox

Subscribe to our mailing list for news sent straight to your email inbox.

Emerging Stories

Get The American Genius
neatly in your inbox

Subscribe to get business and tech updates, breaking stories, and more!