Recent Posts

Pages: [1] 2 3 ... 10
1


Most of us think deleting a file means it’s gone for good. But “delete” on a Windows device often just means “out of sight,” not necessarily “out of reach.”

That’s where File Shredder, a new feature within Malwarebytes Tools for Windows, comes in. File Shredder lets you securely delete files from your hard drive or USB drive, so the files are not just removed—but completely unrecoverable, even with specialized recovery software.

What File Shredder does differently

When you delete a file by placing it in your Recycle Bin and emptying the contents, your computer typically removes the reference to it—but the data itself can remain on the drive until it’s overwritten. That leftover data can sometimes be recovered using basic digital tools, some of which can even be downloaded for free online. These data traces pose a problem if the file you want to delete includes personal, financial, or other sensitive information, like tax documents, scanned IDs, contracts, or anything else you would like to remain private forever.

File Shredder goes beyond standard deletion by instead permanently overwriting the file data, ensuring it can’t be reconstructed or recovered. Once a file is shredded, it’s gone for good—no undo, no recovery, no second chances.

That makes File Shredder especially useful when:

   • You’re cleaning up sensitive files before selling or donating a device

   • You need to securely remove files from a USB drive

   • You’re minimizing digital clutter without leaving data behind

   • You want peace of mind that private files stay private

How to use File Shredder

File Shredder is designed to be powerful without being complicated.

To use File Shredder:

• Open the Malwarebytes app and select the “Tools” icon from the lefthand menu (the screwdriver and wrench icon)

• From this menu, find and click on “File Shredder”

• Once here, you can manually add files or folders to the list and then click on the button “Delete permanently”

• You will be asked to confirm your request before File Shredder deletes the files



After your files are deleted by File Shredder you can move on, confident that the data can’t be accessed again.

Protection means your data is in your control

Cybersecurity isn’t just about blocking threats—it’s also about giving you control over your own data. File Shredder provides a way to do exactly that, helping you close the door on files that you no longer want on your devices.

Because when you’re done with a file, it should really be done.

source
2
Chrome’s Gemini “Live in Chrome” panel (Gemini’s embedded, agent-style assistant mode within Chrome) had a high‑severity vulnerability tracked as CVE‑2026‑0628. The flaw let a low‑privilege extension inject code into the Gemini side panel and inherit its powerful capabilities, including local file access, screenshots, and camera/microphone control.

The vulnerability was patched in a January update. But the deeper story is that AI or agentic browsers are stepping outside long‑standing isolation boundaries, so extension abuse, prompt injection, and trusted‑UI phishing all become much more dangerous.

Chrome’s Gemini “Live in Chrome” panel runs the Gemini web app in a special, privileged side panel that can see what’s on screen and perform actions like reading local files, taking screenshots, and using the camera and microphone to automate tasks.

Researchers found that an extension using the declarativeNetRequest API (Application Programming Interface) could tamper with traffic to gemini.google.com/app when it loaded inside this side panel, not just in a normal tab.

As a result, a basic‑permission extension could inject JavaScript into a high‑privilege browser component and start camera and microphone without new consent prompts, enumerate local files and directories, take screenshots of any http site, and even turn the Gemini panel itself into a phishing UI.

Normally, extensions cannot control other extensions or core browser components, but due to this vulnerability, a low‑privilege extension could effectively drive a privileged AI assistant and inherit its powers.

And because the Gemini panel is a trusted part of the Chrome browser, users would not expect it to silently activate camera or microphone or scrape local files at an extension’s whim.

Therefore, it is good to be aware that agentic browsers, such as Gemini in Chrome, Copilot in Edge, Atlas, Comet, etc., embed an AI side panel that sees page content, keeps context, and can autonomously execute multi‑step actions like summarization, form‑filling, and automation.

These assistants need broad access to the web pages you’re looking at, including everything you see and interact with on the screen, sometimes local files, and in some designs even application data (emails, messages). That makes them an attractive “command broker” for attackers.

How to stay safe

After responsible disclosure, Google shipped fixes in early January 2026, so current versions are not vulnerable. Anything lagging that baseline is at risk and should be updated, especially if you’re using “Live in Chrome.”

Install as few extensions as possible, from vendors you can identify and contact. Prefer open‑sourced or well‑audited extensions for anything that touches sensitive workflows.

Be suspicious of sudden permission changes or unexplained new capabilities after updates.

Monitor for anomalies like cameras activating unexpectedly, unexplained screenshots, or Gemini‑related processes touching unusual file paths.

source
3
Third-party software is the weak link

Google's latest threat report warns that third-party tools are now prime targets for attackers - and businesses have only days to secure them.


Westend61 via Westend61 / Getty Images
The jury is still out on whether most businesses get any measurable benefit from implementing AI in their organizations, and the debate is likely to get more contentious over time.

But at least one sector is reaping massive productivity gains in the Age of AI: Cybercriminals are more successful than ever before at leveraging vulnerabilities to attack businesses in the cloud, where they're most vulnerable.

That's the conclusion of a just-released report from Google's army of security investigators and engineers that I was able to review in advance of its publication. Based on its observations from the second half of 2025, Google Cloud Security concluded, "The window between vulnerability disclosure and mass exploitation collapsed by an order of magnitude, from weeks to days."

The report concludes that the best way to fight AI-powered attacks is with AI-augmented defenses: "This activity, along with AI-assisted attempts to probe targets for information and continued threat actor emphasis on data-focused theft, indicates that organizations should be turning to more automatic defenses."

Sneaking in through third-party code

These days, Google's report notes, security threats are not targeting the core infrastructure of services like Google Cloud, Amazon Web Services, and Microsoft Azure. Those high-value targets are well secured. Instead, threat actors (a polite name that includes both criminal gangs and state-sponsored agents, notably from North Korea) are aiming attacks at unpatched vulnerabilities in third-party code.

The report contains multiple detailed examples of these attacks -- with victims not mentioned by name. One involved exploitation of a critical remote code execution (RCE) vulnerability in React Server Components, a popular JavaScript library used for building user interfaces in websites and mobile apps; those attacks began within 48 hours of the public disclosure of the vulnerability (CVE-2025-55182, commonly referred to as React2Shell).

Another incident involved an RCE vulnerability in the popular XWiki Platform (CVE-2025-24893) that allowed attackers to run arbitrary code on a remote server by sending a specific search string. That bug was patched in June 2024, but the patch wasn't widely deployed, and attackers (including crypto mining gangs) began exploiting it in earnest in November 2025.

A particularly juicy account involves a gang of state-sponsored attackers known as UNC4899, probably from North Korea, that took over Kubernetes workloads to steal millions of dollars in cryptocurrency. Here's how the exploit took place:

Quote
UNC8499 targeted and lured an unsuspecting developer into downloading an archive file on the pretext of an open source project collaboration. The developer soon after transferred the same file from their personal device to their corporate workstation over Airdrop. Using their AI-assisted Integrated Development Environment (IDE), the victim then interacted with the archive's contents, eventually executing the embedded malicious Python code, which spawned and executed a binary that masqueraded as the Kubernetes command-line tool. The binary beaconed out to UNC4899-controlled domains and served as the backdoor that gave the threat actors access to the victim's workstation, effectively granting them a foothold into the corporate network.

Another incident involved a series of steps that started with a compromised Node Package Manager package that stole a developer's GitHub token and used it to access Amazon Web Services, steal files stored in an AWS S3 bucket, and then destroy the originals. That all happened within a matter of 72 hours.

Compromising identity

The other major finding is a shift away from attacking weak credentials with brute force attacks in favor of exploiting identity issues through a variety of techniques:

   • 17% of cases involved voice-based social engineering (vishing)

   • 12% relied on email phishing

   • 21% involved compromised trusted relationships with third parties

   • 21% involved actors leveraging stolen human and non-human identities

   • 7% resulted from actors gaining access through improperly configured application and infrastructure assets

And the attackers aren't always coming from far away; the report notes that "malicious insiders" -- including employees, contractors, consultants, and interns -- are sending confidential data outside the organization. Increasingly, this type of incident involves platform-agnostic, consumer-focused cloud storage services like Google Drive, Dropbox, Microsoft OneDrive, and Apple iCloud. The report calls this "the most rapidly growing means of exfiltrating data from an organization."

One ominous note is that attackers these days are taking their sweet time before making their presence known. "45% of intrusions resulted in data theft without immediate extortion attempts at the time of the engagement, and these were often characterized by prolonged dwell times and stealthy persistence."

What can businesses do to protect themselves?

Each section of the report includes recommendations for IT professionals to follow for securing cloud infrastructure. Those guidelines are neatly divided into two categories: specific advice for Google Cloud customers and more general guidance for customers using other platforms.

If you're an admin at a large organization with security responsibilities, that advice is worth reading carefully and adding to existing security measures. But what are small and medium-sized businesses supposed to do?

• Step up your patching game by ensuring that all software applications, especially those from third-party developers, are updated automatically.

• Strengthen Identity and Access Management, using multi-factor authentication and ensuring that only authorized users have access to administrative tools.

• Monitor the network with an eye toward identifying unusual activity and data movement. That includes attacks from the outside as well as insider threats.

• Have an incident response plan ready to go at the first sign of an intrusion. Those first few hours can be a crucial time, and scrambling to assemble investigative and containment resources can take days if you're not prepared.

For small businesses that don't have security experts on staff, the best solution is to find a managed service provider that has the skills and experience you need. You do not want to be starting that search after an attacker has already succeeded.

source
4


It’s one of those muscle memory frustrations that hits every time I switch from a Mac to a PC: I highlight a file or photo, hit the spacebar, and nothing happens. While macOS users have long enjoyed the convenience of Quick Look, Windows users have been forced to double-click and wait for a heavy app to launch just to see if they have found the right document.

Enter PowerToys Peek. This tiny, official utility from Microsoft finally fixes this frustration. It brings lightning-fast file previews to Windows with a simple shortcut.

The issue with the current implementation
The open-and-close fatigue



The ‘open-and-close’ cycle affects my productivity on Windows. When I’m deep in a project, I usually have a folder overflowing with files named things like Final_v1, Final_v2_edit, and Actual_final. On my Mac, I just press the Spacebar, see what’s inside, and move on. It’s seamless.

But it’s not as hassle-free when I switch to Windows. Without a quick preview, I’m forced to go into this routine: double-click the file, wait for a couple of seconds for a heavy app like Microsoft Photos or a sluggish PDF reader to initialize, realize within half a second that it’s the wrong decision, and then look for X to close it.

By the time I have done that three or four times, I have completely lost the flow. You don’t realize how much that drains you until you find a way to make it stop.

What exactly is PowerToys Peek?
Official from Microsoft











I usually stay away from third-party hacks that promise to fix Windows. They usually end up bloated, buggy, or shady. But PowerToys Peek is different because it’s part of Microsoft’s own open-source suite. It feels like a Pro version of Windows that should have shipped from the factory.

At its core, Peek is a lightweight-fast, system-level previewer. Once you install it, you just highlight a file in File Explorer and hit a shortcut (I have remapped mine to the Spacebar, obviously), and a clean, high-res window instantly pops up showing you exactly what’s inside.

What I love is that it doesn’t just show a blurry thumbnail. Whether it’s a massive 4K photo, a complex PDF, or even a large Markdown file, Peek renders is immediately. Although I would like to have better animations when opening or closing a file using Peek.

It’s using the system’s native preview engines to give you a snapshot without launching a full-blown application.

Several configuration options
Play with PowerToys settings



Microsoft didn’t just offer Peek in PowerToys and call it a day. It’s packed with a range of customization options. For instance, I can choose any key combination to activate it in File Explorer.

I also spent some time playing with the window behavior. I realized I didn’t want the preview window jumping all over the place, so I used the pinning feature.

Now, if I resize the Peek window to a specific spot on my second monitor, it stays there. It’s perfect for when I’m dealing with a massive folder of photos.

Since I occasionally peek at code, the Source Code settings were a surprise win for me. I can toggle Wrap text (essential for long lines of code) and even turn on Minimap, just like in VS Code.

Explore other File Explorer add-ons
There is more



While Peek is the headline act for me, PowerToys can quietly upgrade the rest of File Explorer.

The recently introduced New+ is an interesting add-on. It integrates with the context menu and lets you create custom templates.

For example, I have a specific ‘Project Starter’ folder that contains a Notes.md file, an Assets subfolder, and a Draft.docx. Instead of manually creating these, I just right-click, hit New+, and select my template.

It clones that entire folder structure instantly. It’s one of those things you don’t need until you are saving five minutes every time you start a new project.

You can even head into the Thumbnail Previewer and make multiple changes to elevate your File Explorer experience.

Finally, if you are a fan of the built-in Preview Pane (the one you toggle with Alt + P), PowerToys supercharges it. It adds support for Markdown files. Sometimes, I don’t even need to use Peek; I just click the file, and the code appears beautifully formatted in the side panel.

It’s these little things like Peek, templates, thumbnails, and smarter previews that turn File Explorer from a basic file browser into a serious productivity hub.

Make File Explorer better

Whether you are a recent macOS convert or a longtime Windows power user, adding Peek to your File Explorer can instantly boost your workflow. Of course, going forward, I would love to see a native implementation of the File Explorer app with smooth animations.

If you are tired of the endless cycle of opening and closing apps just to find the right image or document, PowerToys is a mandatory download. It’s small, it’s official, and once you remap that shortcut to the Spacebar, you will never look at a file the same way again.



PowerToys is an all-in-one productivity tool from Microsoft.



Download from Github

source
5
Including access to third-party apps



Windows 11 has a new policy called “Make Print Screen key yiedable,” which allows third-party apps to intercept the keyboard shortcut. This means third-party apps can easily use the ‘Print’ screenshot, which typically opens Snipping Tool or Windows 11’s built-in screen capture interface.

There are many ways to capture a screenshot in Windows 11, but the most popular shortcut remains the Print key. That’s given because the key itself is called “Prntscr,” which stands for Print Screen. On most PCs, when you press the Print key, it opens the Snipping Tool.

As noticed by Tero and verified by Windows Latest, Microsoft is testing a new Group Policy, which enables third-party apps to override the default screenshot key.

In Build 26300, if you open Group Policy Editor, which requires Windows 11 Pro, and go to Computer Configuration > Administrative Templates > Windows Components > File Explorer, you’ll find a policy called “Make Print Screen key yieldable.”


Print Screen key in Group Policy | Image Courtesy: WindowsLatest.com

By default, this policy is set to “not configured,” which means third-party apps can use your Print key whenever they want, replacing ‘Snipping Tool’ as the default app.

“This policy setting determines whether the Print Screen key can be yielded to other applications,” Microsoft noted in an explanation seen by Windows Latest.

“If you enable this policy setting, the Print Screen key can be intercepted by applications, allowing them to override the default screenshot functionality. If you disable this policy setting, the Print Screen key will retain its legacy behavior for taking screenshots and cannot be intercepted by applications.”

If you don’t want third-party apps to take over the Print key, you should set the policy to “Disabled”. In all other cases, you should leave it as it is. Third-party apps randomly do not hijack your Print key, and if they do, you can always remove the app or simply use the Group Policy.

In our tests, Windows Latest observed that the Group Policy that gives you greater control over the Print key requires a reboot to fully apply the changes.

It’s not the first time Microsoft has tried to change how the Print Screen key works

Back in 2023, Windows Latest spotted a new toggle “Use the print screen key to open Snipping Tool” under Settings > Accessibility > Keyboard that lets you block Print Screen from opening Snipping Tool by default.


“Use the Print screen key to open Snipping Tool in Windows 11” option appeared in 2023, but now
disappeared | Image Courtesy: WindowsLatest.com


Microsoft even called it out in a 2023 blog post: “Pressing the print screen key will now open Snipping Tool by default. This setting can be turned off via Settings > Accessibility > Keyboard. If you have previously modified this setting yourself, your preference will be preserved.”

That toggle showed up in preview builds at the time, but it’s effectively gone now. On Windows 11 24H2 (and 25H2), heading to Settings > Accessibility > Keyboard doesn’t show any option to control Print Screen behaviour when Snipping Tool is installed.

What makes it more confusing is that Snipping Tool still points you to Accessibility settings to change the Print Screen shortcut, but the setting it references isn’t there anymore.



So you get sent to the “right” place, only to hit a dead end. Either way, the new Group Policy is more powerful for managing the Print Screen key, and it’s now rolling out to users.

source
6
The follow-up to the 2025 iPhone 16E comes with double the base storage of last year's budget device.


An iPhone 17E is the followup to last year's $599 iPhone 16E. Apple/Jeffrey Hazelwood/CNET

Apple on Monday unveiled its newest budget phone, the iPhone 17E. Like last year, it starts at $599 (£599, AU$999), but it comes with 256GB of base storage -- double last year's entry-level iPhone 16E. Perhaps the biggest upgrade: the iPhone 17E supports MagSafe, so you can charge wirelessly faster and attach accessories like stands, wallets and cases.

Apple's latest-generation A19 chip powers the iPhone 17E, which is the same one found in the baseline iPhone 17. But there's a small caveat: the iPhone 17E has a quad-core GPU, versus five cores on the regular iPhone 17. Apple's C1X cellular modem is also on board, which the company says is twice as fast as the C1 on the iPhone 16E.

The iPhone 17E has a 48-megapixel rear camera and, with sensor cropping, offers 2x magnification. Although the camera hardware may be similar to last year's, adding an A19 chip to the 17E could boost image quality. There's also a 12-megapixel selfie camera, but no Center Stage camera -- the feature that debuted on the iPhone Air and 17 lineup that can automatically switch between portrait and landscape orientation without having to rotate the phone.

The 6.1-inch display is protected by Ceramic Shield 2, which Apple says offers 3x the scratch resistance of the iPhone 16E and reduces glare. There's no Dynamic Island or always-on display, setting it apart from the baseline iPhone 17.


Apple has finally brought MagSafe to its budget iPhone.
Apple/Jeffrey Hazelwood/CNET


The iPhone 17E is outfitted with an aluminum frame and weighs 169 grams -- making it just 2 grams heavier than the iPhone 16E, despite the addition of MagSafe. It has an IP68 rating for dust and water resistance.

There's still no Camera Control button, but you can access Visual Intelligence from the phone's Control Panel. You'll find other Apple Intelligence features on board, including Live Translation, Call Screening and Clean Up. There is an Action button to quickly access your favorite features and apps.

The iPhone 17E's battery can last through 26 hours of video playback, according to Apple. That's helped by the A19 processor, C1X cellular modem and the "advanced power management of iOS 26," Apple notes. Because the new phone has the same battery capacity as last year's iPhone 17E and should hold up well despite its budget-friendly price, judging by how the iPhone 16E performed in CNET's battery tests.

With wired charging, the iPhone 17E can reach 50% battery in about 30 minutes, according to Apple. MagSafe boosts wireless charging from 7.5 watts on the iPhone 16E to 15 watts on the 17E.

Preorders for the iPhone 17E begin Wednesday, March 4, at 6:15 a.m. PT, and the phone goes on sale March 11. It comes in black, white and soft pink, and there's also a 512GB storage option, along with the 256GB base.



source
7
The Honor Robot Phone has made a public reappearance, this time with its flagship feature in action.


Kerry Wan/ZDNET
It's bizarre to think that, on the same day Honor announced its most ambitious foldable phone yet, I was drawn to a different device.

At Mobile World Congress, the Chinese electronics maker reintroduced its Robot Phone: first unveiled at CES, now on the Barcelona show floor with working features to please the crowd.

It was apparent from the oohs and ahhs of the weekend audience (and larger crowds now that the showfloor has opened) that this pocketable robot may be even more appealing than the back-flipping humanoid ones that brands continue to pitch as slow-paced housekeepers and pet sitters. It certainly was for me.

That's because the Honor Robot Phone is built with more practicality than I expected, though some features may raise more privacy and security concerns than anything else. Let's break it all down.

A familiar gimmick

The Robot Phone's highlight is its gimbal-stabilized camera that pops out from the back of the device. Perhaps I'm a believer in such a feature because I've long been using gimbal-stabilized webcams for work meetings. They're ideal for keeping subjects in frame, recordings steady, and portable in size.

Integrating one into a phone offers those same benefits, but can now be leveraged for more powerful use cases like recording 4K videos with the 200MP sensor and capturing smooth-panning panoramic shots (though limited to 90° and 180°, according to Honor).


The camera can tuck itself into the back of the phone and be protected by a sliding glass cover.
Kerry Wan/ZDNET
Some folks may be more charmed by the multimodal AI capabilities the gimbal camera provides, such as providing real-time wardrobe suggestions or solutions -- correct and accurate ones, hopefully -- to general problems. I'm sure we're all familiar with the "how to fix my bike tire" example by now.

To give the Robot Phone more personality, Honor's playfully developed software makes the camera nod, shake its head, and even dance when interacted with. Watching the introduction video for the Robot Phone reminded me of the whimsical qualities we now attribute to robots like WALL-E and R2-D2.

When not in operation, the camera can tuck itself compactly into the back cover, thanks to the micro motor that powers it. This is important, as physically hiding the camera is the only way to guarantee that it's not recording anything without you knowing. An LED indicator is simply not enough in this day and age.

What comes next?

Honor hasn't shared much about the "phone" part of Robot Phone, but the company has confirmed that the device will launch in China in the second half of this year, first before anything else. That's what the company has done with its traditional phone releases, so it's not a surprising market strategy.

It remains to be seen how a phone with a motorized, 'dancing' neck survives the reality of clumsy hands, lint-filled pockets, and the thousand tiny accidents of daily life. Honor is betting on a new kind of smartphone -- now we'll see if it's tough enough to survive the wild.

source
8
I switch phones at least once or twice a year, and every new device comes loaded with a barrage of preinstalled apps. I mostly ignore them since they are duplicate browsers, preloaded games, or carrier apps that I did not ask for.

But over time, the constant notifications and the cluttered app drawer started to wear me down. And so, I finally decided to clean house — and the difference surprised me.

Bloatware didn't disappear
It evolved

Most Android phones no longer ship with as much bloatware as before. Or at least that's what it looks like at first glance.

Gone are the days of half a dozen carrier-branded apps. However, that does not mean bloatware has gone — it has simply changed form.

Unwanted carrier apps and tools have been replaced with duplicate app stores, browsers, texting apps, galleries, and more. You may not find many preloaded games anymore, but there are still apps and cloud services you didn't ask for.

It's still clutter; just more legitimate clutter. And that's a bigger problem.

When I set up a new phone, I see two browser apps. It does not immediately trigger as junk in my brain, and so I let it be. After all, more choice is always good, right?

Eventually, I began to notice the problems these duplicate apps, which are just bloatware in disguise, were creating.

Every time my wife used my phone, she'd use the wrong browser. Or use the preloaded gallery app instead of Google Photos and then complain about not finding previously shared albums. That created confusion.

Plus, I always replace certain preinstalled apps on every new phone. This added to the chaos.

Another annoying problem? Every time I open a PDF, image, or Word file, the "Open with" dialog pops up with multiple options — many of them preloaded apps I never use.

Instead of seeing a simple, predictable list of the apps I actually rely on, I have to pause, scan through the clutter, and pick the right one before tapping it.

All this made me realize that bloatware is not only about apps occupying unwanted storage or running background processes.

Modern bloatware silently ruins the experience by trying to offer you more choice — one that you never asked for in the first place. They try to create multiple ecosystems, making the phone more complicated than it needs to be.

There's another form of bloatware on most Android phones today. It disguises itself as a feature that automatically changes your lock screen wallpaper.

When the pop-up for the feature first appears, it's easy to dismiss it as harmless — or even enable it, thinking it might be useful. A rotating wallpaper with news, entertainment, or shopping suggestions sounds appealing at first.

In reality, though, features like Glance turn the lock screen into a content feed you never asked for. So, instead of a clean, distraction-free space, you're met with trending stories, ads, and unwanted recommendations.

Taking back control
Making my phone mine again

Things eventually reached my tipping point. What felt like a minor annoyance initially became an unwanted friction.

So, I finally decided to take the time and fix the issue for good. Unlike in the past, I did not have to root my phone or install any advanced tools.

Instead, I opened Settings > Apps and went through the preinstalled apps one by one.

Anything I couldn't uninstall, I disabled. And anything that could not be disabled, I turned off its notification. All this took me only 10 minutes, but the difference was immediate.

The phone didn't suddenly become twice as fast. Its battery life didn't magically double either. But over time, the cleanup made a noticeable difference. It reduced friction and finally put an end to those little moments of confusion.

Now, when my wife uses my phone, she does not open the wrong gallery app or the browser. Photos opens directly in Google Photos. Everything works predictably and reliably, and there's no second-guessing.

Even better, unwanted notifications stopped cluttering my phone's notification panel. I was no longer dismissing notifications from apps that I never used. As someone who receives hundreds of alerts daily, this made a noticeable difference. It reduced the chaos in my life.

My phone's app drawer finally looked intentional instead of chaotic. It made me realize how long I had been tolerating silent bloatware without even questioning it.

After doing all this, I turned my attention to something even more intrusive: the lock screen. Turning off Glance made it mine again. No more headlines, ads disguised as personalized recommendations, or constantly changing wallpapers competing for my attention.

The lock screen went back to doing what it was supposed to: showing the time and unread notifications.

Less clutter, more control

Cleaning up my phone made me realize that removing bloatware is not just about uninstalling unwanted preinstalled apps to free up storage. It is about removing the friction and unwanted distraction that modern bloatware poses itself as.

It also made me rethink what bloatware really means on modern Android phones. It's no longer limited to obvious preinstalled apps. It can hide inside system features or present itself as more choices that only complicate the experience.

Removing these unwanted additional layers helped make my phone cleaner, less chaotic, and more personal.

source
9

Is your Windows PC running slow?

9 ways to Clear RAM Cache in Windows PC👉 http://bit.ly/3ZUbrhh

Learn how to clear RAM cache and free up memory using Microsoft's official RAMMap tool! This simple method works on both Windows 10 and Windows 11 and can instantly boost your computer's performance.

source
10
How it works

Arriving on the heels of OpenClaw, Computer is described as 'a general-purpose digital worker' that can work on tasks for months in the background.


Perplexity/Elyse Betters Picaro/ZDNET

There's been a lot of excitement (and nervousness) lately about AI agents that can work autonomously in the background of a user's computer, accessing sensitive files, API keys and the like to perform various tasks. Some say they're a monumental productivity unlock, others say they're a security nightmare. Perplexity is betting they're the future of AI.

On Wednesday, the company introduced Computer, a multiagent orchestration system that harnesses the strongest capabilities from more than a dozen frontier AI models. Currently available only to Perplexity Max users -- and expected to roll out to Enterprise and Pro subscribers in the coming weeks -- "Computer is a general-purpose digital worker," the company wrote in a press release, that "reasons, delegates, searches, builds, remembers, codes, and delivers."

Multiagent orchestration

The logic behind Computer is basically that, rather than becoming general-purpose tools, as they're commonly described, AI models have instead branched off into different specialties: Anthropic's Claude, for example, is famously popular among software engineers. Relying on a single model to complete a complex task -- building a website, say -- is therefore a bit like trying to assemble an Ikea dining table using a butter knife; it could be possible, but the finished product is going to be a little wonky. Wouldn't you rather have a multi-bit screwdriver?

To use another analogy, think of Computer like the CEO of a company, delegating tasks across a hierarchy of teams and employees. A user can describe their vision for a final outcome ("Build an app that provides up-to-date snow conditions at different ski resorts"), and Computer will automatically break the task down into different tasks and subtasks, according to Perplexity, all of which will be handled by whatever model is called for.

Its "core reasoning engine" is Claude Opus 4.6. Google's Nano Banana and Veo 3.1 handle imagery and video, respectively, while Grok handles "lightweight tasks" and GPT-5.2 is deployed for queries that require long-context recall and an expansive web search.

The current model arrangement within Computer is subject to change, according to Perplexity: new models could be added if they excel in specific domains, and the existing lineup could shift as the models evolve. Users also have the option of stepping into the orchestrator role and delegating specific subtasks to particular models. Users can also execute dozens of tasks in parallel to one another; Computer can operate quietly in the background for months, according to Perplexity, checking in only "if it truly needs you."

Safety considerations

If you're reading this and thinking, "This sounds a lot like OpenClaw," you're not wrong.

The AI agent formerly known as Clawdbot and Moltbot went viral earlier this month as a kind of always-on automated assistant that could essentially work across users' entire digital ecosystem, and interact with them directly via apps like WhatsApp, Slack, and Telegram. Its creator, an Austrian programmer named Peter Steinberger, was promptly hired by OpenAI: In a X post, company CEO Sam Altman called him "a genius with a lot of amazing ideas about the future of very smart agents interacting with each other to do very useful things for people," and that "this will quickly become core to our product offerings."

(Disclosure: Ziff Davis, ZDNET's parent company, filed an April 2025 lawsuit against OpenAI, alleging it infringed Ziff Davis copyrights in training and operating its AI systems.)

But the field of fully autonomous agents that can work across apps and files is a very young one, and mistakes happen. Earlier this week, Meta AI security researcher Summer Yue posted screenshots on X of her desperate attempts to instruct OpenClaw to refrain from deleting her entire email inbox, which it was ignoring. "I had to RUN to my Mac Mini" -- the hardware of choice for running OpenClaw in the background -- "like I was diffusing a bomb," she wrote.

(Yue wrote in a comment beneath that post that OpenClaw had gained her trust after successfully managing her "toy" inbox, but that when she moved it to her much larger, actual inbox, it triggered a process called compaction, in which an agent is faced with an excessively large context window and starts taking shortcuts -- in this case, overlooking her original instruction not to "action until I tell you to.")

Yue's episode highlights two very real risks: Prompts can be misinterpreted by agents, and they can act in unexpected (sometimes disastrous) ways.

Perplexity appears to be selling Computer as a safer, more controllable multiagent orchestration system than those that are currently available. The system runs in "a safe and secure development sandbox," according to the company, which means that any security glitches can't spread to a user's main network. The company also said it's "run thousands of tasks" internally using Computer, from publishing web copy to building apps, and "been consistently surprised by the quality of the output."

source
Pages: [1] 2 3 ... 10