Wednesday, January 29, 2025

What’s DeepSeek, China’s AI startup sending shockwaves through global tech?

What’s DeepSeek, China’s AI startup sending shockwaves through global tech?

Chip giant Nvidia shed nearly $600bn in market value after Chinese AI model cast doubt on supremacy of US tech firms.

DeepSeek, which is based in Hangzhou, was founded in late 2023 by Liang Wenfeng [Dado Ruvic/Reuters]
Published On 28 Jan 2025
DeepSeek, a little-known Chinese startup, has sent shockwaves through the global tech sector with the release of an artificial intelligence (AI) model whose capabilities rival the creations of Google and OpenAI.

DeepSeek-R1’s creator says its model was developed using less advanced, and fewer, computer chips than employed by tech giants in the United States.

In a research paper released last week, the model’s development team said they had spent less than $6m on computing power to train the model – a fraction of the multibillion-dollar AI budgets enjoyed by US tech giants such as OpenAI and Google, the creators of ChatGPT and Gemini, respectively.

Marc Andreessen, one of the most influential tech venture capitalists in Silicon Valley, hailed the release of the model as “AI’s Sputnik moment”.

The sudden emergence of a small Chinese startup capable of rivalling Silicon Valley’s top players has challenged assumptions about US dominance in AI and raised fears that the sky-high market valuations of companies such as Nvidia and Meta may be detached from reality.

On Monday, Nvidia, which holds a near-monopoly on producing the semiconductors that power generative AI, lost nearly $600bn in market capitalisation after its shares plummeted 17 percent.

US President Donald Trump, who last week announced the launch of a $500bn AI initiative led by OpenAI, Texas-based Oracle and Japan’s SoftBank, said DeepSeek should serve as a “wake-up call” on the need for US industry to be “laser-focused on competing to win”.

What is DeepSeek?

DeepSeek, which is based in Hangzhou, was founded in late 2023 by Liang Wenfeng, a serial entrepreneur who also runs the hedge fund High-Flyer.

Though little known outside China, Liang has an extensive history of combining burgeoning technologies and investing.

In 2013, he co-founded Hangzhou Jacobi Investment Management, an investment firm that employed AI to implement trading strategies, along with a co-alumnus of Zhejiang University, according to Chinese media outlet Sina Finance.

Liang went on to establish two more firms focused on computer-directed investment – Hangzhou Huanfang Technology Co and Ningbo Huanfang Quantitative Investment Management Partnership – in 2015 and 2016, respectively.

In an interview with Chinese media outlet Waves in 2023, Liang dismissed the suggestion that it was too late for startups to get involved in AI or that it should be considered prohibitively costly.

“Reproduction alone is relatively cheap — based on public papers and open-source code, minimal times of training, or even fine-tuning, suffices. Research, however, involves extensive experiments, comparisons, and higher computational and talent demands,” Liang said, according to a translation of his comments published by the ChinaTalk Substack.

Liang said his interest in AI was driven primarily by “curiosity”.

“From a broader perspective, we want to validate certain hypotheses. For example, we hypothesise that the essence of human intelligence might be language, and human thought could essentially be a linguistic process,” he said, according to the transcript.

“What you think of as ‘thinking’ might actually be your brain weaving language. This suggests that human-like AGI could potentially emerge from large language models,” he added, referring to artificial general intelligence (AGI), a type of AI that attempts to imitate the cognitive abilities of the human mind.

DeepSeek did not immediately respond to a request for comment.

On Monday, Gregory Zuckerman, a journalist with The Wall Street Journal, said he had learned that Liang, who he had not heard of previously, wrote the preface for the Chinese edition of a book he authored about the late American hedge fund manager Jim Simons.

“Simons left a deep impact, apparently,” Zuckerman wrote in a column, describing how Liang praised his book as a tome that “unravels many previously unresolved mysteries and brings us a wealth of experiences to learn from”.

“Even my mother didn’t get that much out of the book,” Zuckerman wrote.

Why has DeepSeek taken the tech world by storm?

Put simply, the company’s success has raised existential questions about the approach to AI being taken by both Silicon Valley and the US government.

US tech firms have been widely assumed to have a critical edge in AI, not least because of their enormous size, which allows them to draw top talent from around the world and invest massive sums in building data centres and purchasing large quantities of costly high-end chips.

DeepSeek’s arrival on the scene has challenged the assumption that it takes billions of dollars to be at the forefront of AI.

“OpenAI was founded 10 years ago, has 4,500 employees, and has raised $6.6 billion in capital. DeepSeek was founded less than 2 years ago, has 200 employees, and was developed for less than $10 million,” Adam Kobeissi, the founder of market analysis newsletter The Kobeissi Letter, said on X on Monday.

“How are these two companies now competitors?”

In their research paper, DeepSeek’s engineers said they had used about 2,000 Nvidia H800 chips, which are less advanced than the most cutting-edge chips, to train its model.

The team said it utilised multiple specialised models working together to enable slower chips to analyse data more efficiently.

For the US government, DeepSeek’s arrival on the scene raises questions about its strategy of trying to contain China’s AI advances by restricting exports of high-end chips.

DeepSeek’s research paper suggests that either the most advanced chips are not needed to create high-performing AI models or that Chinese firms can still source chips in sufficient quantities – or a combination of both.

California-based Nvidia’s H800 chips, which were designed to comply with US export controls, were freely exported to China until October 2023, when the administration of then-President Joe Biden added them to its list of restricted items.

In his 2023 interview with Waves, Liang said his company had stockpiled 10,000 Nvidia A100 GPUs before they were banned for export. GPUs, or graphics processing units, are electronic circuits used to speed up graphics and image processing on computing devices.

Tanishq Abraham, former research director at Stability AI, said he was not surprised by China’s level of progress in AI given the rollout of various models by Chinese firms such as Alibaba and Baichuan.

“While there have been restrictions on China’s ability to obtain GPUs, China still has managed to innovate and squeeze performance out of whatever they have,” Abraham told Al Jazeera.

“I think it is a lesson to US companies that there is still a lot of performance they can squeeze out of.”

Tara Javidi, co-director of the Center for Machine Intelligence, Computing and Security at the University of California San Diego, said DeepSeek made her excited about the “rapid progress” taking place in AI development worldwide.

“My only hope is that the attention given to this announcement will foster greater intellectual interest in the topic, further expand the talent pool, and, last but not least, increase both private and public investment in AI research in the US,” Javidi told Al Jazeera.

The New York Stock Exchange at the opening on January 27, 2025 [Angela Weiss/AFP]

Meanwhile, investors’ confidence in the US tech scene has taken a hit – at least in the short term.

Apart from Nvidia’s dramatic slide, Google parent Alphabet and Microsoft on Monday saw their stock prices fall 4.03 percent and 2.14 percent, respectively, though Apple and Amazon finished higher.

“If DeepSeek’s cost numbers are real, then now pretty much any large organisation in any company can build on and host it,” Tim Miller, a professor specialising in AI at the University of Queensland, told Al Jazeera.

“So, in this sense, the game has changed completely because there is a new ‘rule’ that anyone can play.”

Does this mean China is winning the AI race?

Not necessarily.

While tech analysts broadly agree that DeepSeek-R1 performs at a similar level to ChatGPT – or even better for certain tasks – the field is moving fast.

OpenAI CEO Sam Altman said earlier this month that the company would release its latest reasoning AI model, o3 mini, within weeks after considering user feedback.

On Monday, Altman acknowledged that DeepSeek-R1 was “impressive” while defending his company’s focus on greater computing power.

“We will obviously deliver much better models and also it’s legit invigorating to have a new competitor! We will pull up some releases,” Altman said on X.

“But mostly we are excited to continue to execute on our research roadmap and believe more compute is more important now than ever before to succeed at our mission.”

OpenAI CEO Sam Altman appears during a news conference with US President Donald Trump at the White House, Washington, DC on January 21, 2025 [Andrew Harnik/Getty Images via AFP]

Rui Ma, the founder of Tech Buzz China, said the Chinese tech sector had itself been taken aback when OpenAI initially released ChatGPT in 2022.

“Most entrepreneurs had completely missed the opportunity that generative AI represented, and felt very humbled,” Ma told Al Jazeera.

“It’s clear that they have been hard at work since. I think what this past weekend shows us is how seriously they self-reflected and took the challenge to ‘catch up’ to Silicon Valley. I think that for the US to retain its lead, Washington should focus on boosting Silicon Valley instead of on suppressing China.”

Abraham, the former research director at Stability AI, said perceptions may also be skewed by the fact that, unlike DeepSeek, companies such as OpenAI have not made their most advanced models freely available to the public.

“DeepSeek made its best model available for free to use. On the other hand, OpenAI’s best model is not free,” he said.

“So most people who use ChatGPT for free are shocked by DeepSeek and believe there is a huge jump in capabilities when OpenAI has had a similar performing model paywalled for a few months already. This pay-walling of frontier AI models leads to people not truly grasping the progress and capabilities of AI.”

Miller, the University of Queensland professor, said DeepSeek’s advances and other recent developments suggest that China is at least “up there” with the US in AI.

“I made somewhat of a throwaway prediction late last year that the next scientific breakthrough in AI could come from a small player such as an individual university researcher who doesn’t have access to much computing power – they would need to be smarter to compete,” he said.

“DeepSeek’s apparent progress is almost an example of this: by not having enough computational power to build models as large as ChatGPT, they had to be smart. Necessity is the mother of invention.”

Source: Al Jazeera

Saturday, January 25, 2025

cybersecurity: Networking Devices and Initial Configuration.

cybersecurity: Networking Devices and Initial Configuration.
                    Ethernet Switching

Ethernet is a widely used technology for local area networks (LANs) that defines the physical and data link layer standards for wired communication.

Switch operates at the Data Link layer (Layer 2) of the OSI model and plays a crucial role in connecting multiple devices (like computers, printers, or servers) within a local area network (LAN).

Key Characteristics of Ethernet:
Physical Medium: Ethernet typically uses twisted pair cables (e.g., Cat5e, Cat6) or fiber-optic cables for transmission, though earlier versions used coaxial cables.
Data Link Layer (Layer 2): Ethernet operates at the Data Link layer of the OSI model, which is responsible for framing data, addressing, and error detection.
Ethernet Frames: Ethernet data is transmitted in packets called frames, which contain: Destination MAC address, Source MAC address, Payload/Data and CRC (Cyclic Redundancy Check) 
Speed and Standards: Ethernet has evolved over time to support varying speeds: 10 Mbps (Ethernet), 100 Mbps (Fast Ethernet),1 Gbps (Gigabit Ethernet),10 Gbps, 40 Gbps, and 100 Gbps Ethernet are also available for high-performance networks, especially in data centers and enterprise environments.

Key Concepts of Ethernet Switching:
MAC Address Table (Forwarding Table): Switches use the Media Access Control (MAC) addresses of devices to determine where to forward packets. 
Learning: When a switch receives a frame from a device, it "learns" the source MAC address and associates it with the port on which the frame was received.
Forwarding: After learning the MAC addresses, the switch can forward frames to the correct destination port. 
Collision Domain: A switch reduces the size of collision domains. 
Full-Duplex Communication: Ethernet switches typically allow full-duplex communication, meaning data can flow in both directions simultaneously between devices. 

Types of Ethernet Switching:
Unicast: The switch forwards the frame to a specific MAC address (one-to-one communication).
Broadcast: The switch sends the frame to all devices in the network (one-to-all communication).
Multicast: The switch forwards the frame to a specific group of devices (one-to-many communication).

Types of Ethernet:
* Standard Ethernet (10BASE-T)
* Fast Ethernet (100BASE-T)
* Gigabit Ethernet (1000BASE-T)
* 10-Gigabit Ethernet (10GBASE-T)
* Fiber Optic Ethernet

Advantages of Ethernet:
* Scalability
* Cost-Effective
* Speed
* Compatibility

Ethernet switching enables efficient, high-performance communication between devices on a network.

Friday, January 24, 2025

Cybersecurity: Networking Devices and Initial Configuration

Cybersecurity: Networking Devices and Initial Configuration

                                       Cloud and Virtualization
Cloud computing refers to the delivery of computing services (like servers, storage, databases, networking, software, and analytics) over the internet, or "the cloud." It allows users to access and use these resources without owning or maintaining physical hardware. 

Key Characteristics of Cloud Computing:
On-Demand Self-Service: Users can provision computing resources as needed, without requiring human intervention from the service provider.

Broad Network Access: Cloud services are accessible over the network, typically using standard devices like laptops, smartphones, or tablets.

Resource Pooling: Cloud providers use multi-tenant models, pooling resources to serve multiple customers, dynamically allocating and reallocating resources based on demand.

Scalability: Cloud resources can be scaled up or down based on usage needs. This allows businesses to respond to changing demand without large upfront investments in infrastructure.

Pay-as-You-Go: Users are billed only for the resources they use, making cloud services cost-effective, especially for businesses with fluctuating demand.

Types of Cloud Services:
Infrastructure as a Service (IaaS): Provides virtualized computing resources over the internet. Examples include Amazon Web Services (AWS) and Microsoft Azure.

Platform as a Service (PaaS): Offers hardware and software tools to developers for building and hosting applications. Examples include Google App Engine and Heroku.

Software as a Service (SaaS): Delivers software applications via the cloud. Examples include Google Workspace, Salesforce, and Microsoft Office 365.

Deployment Models:
Public Cloud: Cloud services provided over the internet by third-party providers (e.g., AWS, Azure).

Private Cloud: Cloud infrastructure operated solely for a single organization, either on-premises or hosted externally.

Hybrid Cloud: A combination of public and private clouds, allowing data and applications to be shared between them.

#Cyber #cybersecurity #cloud #cloudcomputing #networking

Tuesday, January 21, 2025

TikTok Still Off App Stores As Trump Freezes Ban—Here’s What To Know

Alison Durkee Forbes Staff
Alison is a senior news reporter covering US politics and legal news.
02:35pm EST

Topline

President Donald Trump signed an executive order Monday temporarily pausing the federal ban on TikTok, after access to the app was restored before he even took office, but while companies like Oracle have willingly put the app back online, Apple and Google’s app stores still haven’t restored TikTok and other ByteDance-owned apps yet—and they could open themselves to legal liability if they do

Getty Images

Key Facts

TikTok restored access to U.S. users Sunday afternoon following a brief outage, after a federal law took effect that bans companies from hosting TikTok and other ByteDance-owned apps unless ByteDance divests from the apps, which the Chinese-owned company so far hasn’t.

The company said it restored access “as a result of President Trump’s efforts”—even though he hadn’t taken office yet—and Trump then signed an executive order Monday that directs his Justice Department not to enforce the law for 75 days, in order to give his administration “an opportunity to determine the appropriate course forward in an orderly way that protects national security while avoiding an abrupt shutdown.”

Companies that handle TikTok’s U.S. user data, including Oracle and Akamai, restored access to the app in order to put it back online, according to NPR, but the app still has not yet been restored to Apple and Google’s app stores, meaning U.S. users cannot download or update TikTok.

Neither Apple nor Google have responded to requests for comment on whether they plan to restore access to TikTok or other ByteDance-owned apps, though Apple has published a webpage informing U.S. users the company is “obligated to follow” the law banning TikTok and other ByteDance-owned apps, and thus users cannot download or update them.

The companies’ refusal thus far to make TikTok available again is in line with predictions from legal experts before the law took effect, as they suggested any assurances from Trump that he wouldn’t enforce the policy likely wouldn’t be enough to get companies like Apple and Google to comply, given they could still face legal liability if Trump were to reverse course and start enforcing the ban.

University of Minnesota law professor Alan Rozenshtein wrote for Lawfare Tuesday that Trump’s assurances not to enforce the law “offers minimal security” for companies who violate it by restoring access to TikTok, noting Trump “could change his mind at any time or selectively enforce against companies that fall from political favor” and the law’s five-year statute of limitations means future presidential administrations can still pursue violations of the law.

Can I Update The Tiktok App If It’s Not On The App Store?

It’s still unclear if or when Apple and Google could put TikTok back on their app stores. If a circumstance arises in which Trump keeps the law on pause indefinitely and TikTok stays online but can’t be updated or downloaded, users will likely eventually stop being able to use TikTok, as the app will get increasingly obsolete without the ability to update it.

Which Bytedance Apps Are No Longer On The App Store?

According to Apple, the list of apps owned by ByteDance or its subsidiaries that the company has taken off its App Store include TikTok, TikTok Studio, TikTok Shop Seller Center, CapCut, Lemon8, Hypic, Lark - Team Collaboration, Lark - Rooms Display, Lark Rooms Controller, Gauth: AI Study Companion and MARVEL SNAP.

Why Can’t Apple And Google Put Tiktok Back Online?

Rozenshtein noted for Lawfare there’s a murky history of defendants avoiding legal consequences because of orders declaring something is legal—as courts have ruled both for and against those defendants—but concluded companies face risks for putting TikTok back online. While there are some instances where courts have been more lenient, major companies like Apple and Google would face greater scrutiny for going against the federal law and just relying on Trump’s statements, Rozenshtein argued. Courts are hesitant to be too lenient when it comes to executive orders like this, Rozenshtein noted, given that doing so could set a precedent suggesting presidents can just overturn laws as much as they want by issuing orders saying they won’t be enforced.

While Trump and his Justice Department aren’t going to punish companies who restored access to TikTok any time soon, Rozenshtein suggested those companies could still face legal liability should Trump change his mind or during the next presidential administration. Companies could particularly be targeted for the decision to put TikTok back online even before Trump took office, as Rozenshtein noted the companies have “minimal defensive options” for restoring service then. Trump was still a private citizen at the time, so his statements promising to keep the app legal didn’t carry any legal weight, Rozenshtein noted. Oracle and Akamai have not yet responded to requests for comment about their decisions to restore service.

Big Number

$850 billion. That’s how much companies that have restored access to TikTok could potentially face in fines should the government decide to enforce the TikTok ban and punish them for enabling access to the app. The law allows a $5,000 fine per user and TikTok says its app is used by more than 170 million U.S. users, though likely not all of them have accessed the app since the law took effect. Apple and Google would likely face smaller fines if they reinstated TikTok and were punished for it, as those fines would only be calculated based on the number of people who downloaded or updated the app, versus who actually used the app.

Key Background

The federal law outlawing TikTok took effect Sunday following a last-minute court battle as TikTok challenged the ban, which led to the Supreme Court upholding the federal law in a unanimous ruling. While TikTok has argued the law violates its First Amendment rights, Congress passed the law with bipartisan support last year, arguing taking action against the app was necessary due to the national security threat posed by ByteDance’s Chinese ownership. TikTok has long denied any links to the Chinese government or wrongdoing, though Forbes has reported on numerous concerns involving the app, including TikTok spying on journalists, promoting Chinese propaganda that criticized U.S. politicians, mishandling user data and tracking “sensitive” words. Trump signaled he planned to take action against the TikTok ban shortly before taking office, though it was still unclear what steps he would take until Sunday, when Trump said he planned to issue an executive order pausing the ban. The president has justified his support for TikTok in part because of his own popularity on the app, though his move to keep the app online marks an about-face from his first term, when he issued an executive order banning TikTok that was later overturned in court.

Source: www.forbes.com 

Saturday, January 18, 2025

Nigerian hackers break into UnitedHealthcare database, steal private files of 120 million Americans

Nigerian hackers break into UnitedHealthcare database, steal private files of 120 million Americans

Although Russia-based BlackCat mainly orchestrated the hack, they said the stolen files were downloaded mostly by Nigerians.

 • January 17, 2025
Hacker; UnitedHealthcare

Agroup of Nigerian hackers breached the UnitedHealthcare database to steal more than six terabytes of confidential health records and private information of 120 million Americans registered with the insurance company, according to court filings seen by Peoples Gazette. a series of coordinated cyber attacks against UnitedHealthcare, the hackers broke into the company’s computer systems in February 2024. They stole the names, addresses, emails, and social security numbers of registered clients who are now seeking redress in court.

Scores of Americans have filed a class action lawsuit against the company before the U.S. District Court for the District of Minnesota, saying their private health data was stolen following a 2024 database breach.

The hacking started on February 21, 2024, according to the lawsuit filed on January 15, 2025. 

Although Russia-based BlackCat mainly orchestrated the hack, they said the stolen files were downloaded mostly by Nigerians, but some downloads also occurred in Russia and Brazil.

“The data was quickly spread across five continents: North America, Asia, Europe, Africa, and South America. In the end, it was downloaded by 47 different parties,” stated the suit filed on Wednesday.

“It was mainly downloaded by users in Nigeria, Russia, and Brazil, with the most activity coming from Nigeria and Russia,” it added. “This experiment demonstrated that data released on the dark web will quickly spread around the world.”

At least 60 Americans are taking part in the lawsuit, each alleging in court filings how they were adversely impacted by the breach, considered among the largest in the healthcare industry’s history.

Source: https://gazettengr.com/nigerian-hackers-break-into-unitedhealthcare-database-steal-private-files-of-120-million-americans/


Saturday, January 4, 2025

FG unveils free AI Academy for Nigerian youths, civil servants.

FG unveils free AI Academy for Nigerian youths, civil servants
The Federal Government has unveiled a free Artificial Intelligence (AI) Academy with the aim of positioning Nigeria as a leader in the global digital economy.

The Minister of Innovation, Science and Technology, Chief Uche Nnaji, who inaugurated the AI Academy on Thursday in Abuja, said the programme is set up in partnership with the Commonwealth Secretariat and Intel Corporation.

While emphasising that the online programme is free, the minister called on all Nigerians particularly students, youths and civil servants to avail themselves of the opportunity to be part of a movement that would redefine the future of the nation.
 
Registration opens 
According to the Minister, registration for the free AI Academy opens from Thursday, December 19, 2024, and it is expected to close by January 30, 2025.

“I encourage you to visit our website at 
https://scienceandtech.gov.ng/academy/ and seize this chance to acquire cutting-edge AI skills. 

“The AI Academy is not just a training platform but a transformative opportunity for Nigerians–students, youths and civil servants–to acquire critical skills in AI. 

“In a world where AI is reshaping industries, solving complex problems and creating new economic frontiers, it is imperative that Nigeria not only keeps pace, but leads the charge,” the  Minister stated.

What trainees stand to gain 
The Minister said that the programme would provide participants with access to self-paced courses on AI fundamentals, ethics, tools and real-world applications.

He said that beyond learning the AI Technology, it offered opportunities to compete for AI ambassadorial roles and internships with Intel Corporation as well as ensuring hands-on global experience.
Nnaji said that the role of AI in nation-building could not be over emphasised as AI was no longer a distant concept.
He described it as a transformative tool that could drive progress in agriculture, healthcare, education, security and many other sectors.
“By equipping Nigerians with these skills, we are not just preparing individuals for jobs but creating a pipeline of innovators, problem-solvers and leaders who will shape Nigeria’s technological and economic destiny. 

“Most importantly, AI will go a long way to help us develop innovative solutions for the unique challenges we face as a nation,” he said.

What you should know 
Since the beginning of the President Bola Tinubu’s administration, there has been a lot of focus on AI spearheaded by the Minister of Communications, Innovation, and Digital Economy, Dr. Bosun Tijani.

According to the Minister, all the efforts are geared towards positioning Nigeria as AI leader in Africa and ensuring that the country does not miss the benefits of the global AI revolution.

To that effect, the Communications Ministry recently released the country’s National Artificial Intelligence Strategy document, which is currently being reviewed by MDAs. It will be adopted as a national policy to guide all government efforts in Al.

The government has also formed the Al Collective which will collaborate on research, projects of interest, hackathons, and seminars to develop an inclusive approach to Nigeria’s AI initiatives.
Aside from the AI Strategy, the Nigerian government recently launched its Large Language Model, which is expected to position the country as an AI leader in Africa.
According to the Minister of Communications, Innovation and Digital Economy, Dr. Bosun Tijani, the LLM will be trained in 5 low-resource languages and accented English to ensure stronger language representation in existing datasets for the development of Artificial Intelligence solutions.

Friday, December 27, 2024

Social Media Scams

Social media scams

Be suspicious of anyone who unexpectedly contacts you on social media. Scammers use these platforms to gain your trust and steal your money.

Scammers set up fake profiles on social media,  messaging platforms and apps. They may pretend to be a friend, family member or interested in a relationship. They impersonate the government, real businesses, employers and investment or online trading platforms.

They may:

  • impersonate celebrities or public figures to recommend and promote products or services (these include AI-generated 'deepfakes' and fake news)
  • use the logo of real organisation they are pretending to be
  • use other people's photos and identities to create fake profiles to make friends with you and gain your trust.

Scammers learn a lot about you from what you share on social media, and deceive you into sharing personal information. They use this to guess your passwords or target you with other scams.

Warning signs it might be a scam

Stop and think. It could be a scam if the post or message:

  • shows or suggest that a celebrity or public figure recommends or promotes a product or service
  • comes from someone you've only met online or by phone, urgently asking for your money to help pay for a personal emergency
  • threatens to share a private image of you unless you pay them money.

Social media scams use common tactics like:

  • offering a way to make quick, easy money with little risk or effort
  • inviting you to enter a competition or limited time offer
  • offering to buy something you're selling for a high price without seeing it first
  • offering items for much lower prices than usual or compared to other sites
  • saying they live overseas and can’t meet you in person. 

These simple steps can help prevent loss of or personal information to scams.

Make sure the person is who they say they are

  • Research profiles to check how long an account has been active, how many friends or followers they have and how much activity they have had online including posts and photos. Lack of history, detail and followers can be a sign of a fake profile.
  • Be wary if a job is offered to you without an interview, or discussion about your experience, suitability, and references. Research the recruiter and the business or individual offering the position. Contact the recruitment agency via phone numbers sourced pany investment opportunity fully before investing money. Visit MoneySmart for advice.

Be careful about what information you share on social media

  • Never send money to a person you have only met online
  • Never send personal pictures of yourself to someone you have only met online.
Source: https://www.scamwatch.gov.au/types-of-scams/

Friday, December 20, 2024

start a blog on Facebook and earn money, you can:

 start a blog on Facebook and earn money, you can:
  • Create a Facebook page
    Go to facebook.com, log in, and select Create. Then, choose Page and select the type of page you want to create. POPublish blog posts
  • Once you have followers, you can start publishing blog posts to your page.  your blog
  • Share links to your blog posts on your Facebook page and ask questions to encourage engagement. 
  • Grow your page
    Invite your friends to like your page and ask your followers to invite their friends. 
  • Create thea shareable content
    Make your content interesting and engaging so people want to read and share it. 
  • Partne with brands
    Brands pay creators to create content that helps build their brand awareness and reach new audiences. I'm
  • You your content
    You can monetize your content through subscription revenue, Facebook Shop, or in-stream ads on videos. You can also blog from your personal Facebook account if you want to connect with people you already know. However, this method can limit your audience's reach because you can only have up to 5,000 friends. You can also watch this video to learn how to make money with Facebook:

Here are some tips for writing a blog post:

Here are some tips for writing a blog post:
  • Choose a topic: Pick a topic that will engage your readers. 
  • Research keywords: Use keyword research to find phrases that will help your blog appear in search results. 
  • Create an outline: An outline will help you plan your content and streamline the writing process. 
  • Write a compelling title: A descriptive and concise title will grab readers' attention. 
  • Write an engaging introduction: Craft an introduction that will grab readers' attention. 
  • Organize your content: Use subheadings to create a clear hierarchy and break up the content into paragraphs. 
  • Add visuals: Use visuals effectively to make your blog post more appealing. 
  • Include a call to action: A call to action (CTA) can guide your readers with next steps. 
  • Edit and proofread: Take a critical look at your post and edit and proofread it. You can also watch this video to learn more about how to write a blog post:

Wednesday, August 28, 2024

flagHow to Recover a Hacked WhatsApp Account on Android

Left image
2024-01-19
Jide Mbaka

Discovering that your WhatsApp account has been hacked can be a distressing experience. It not only compromises your personal conversations and sensitive information but also poses a risk to your contacts. Fortunately, WhatsApp provides several measures to help you regain control of your account and secure it from future unauthorized access.

In this article, we will walk you through the necessary steps to recover a hacked WhatsApp account on Android. Whether your account has been compromised due to a phishing attack, weak password, or any other security breach, these methods will assist you in regaining access and restoring the security of your account.

 

How to recover a hacked WhatsApp account on Android 

Part 1. How can I Recover a Hacked WhatsApp Account?

Take these steps as soon as you discover that someone other than you is using your WhatsApp account. This happens when your contacts start receiving WhatsApp messages from you that you did not send, you see status updates and posts in WhatsApp groups that you did not create. This does not apply to cases of stolen or lost phones.

It is possible that someone else might be using your decide from a desktop or WhatsApp Web that you had earlier connected to. You have to undo this first to be sure you are not dealing with a case of hackers.

  • Open your WhatsApp > Tap the three vertical dots at the top right beside the search bar > Tap on WhatsApp web > Log out of all devices

If you find out that no device is linked and you still continue to experience same thing, then follow the steps below to recover a hacked WhatsApp account.

  • Log out of your WhatsApp messenger and login again using your phone number
  • A six-digit code will be sent to your phone number via sms. Enter the code.
  • This logs you into your account immediately, and automatically logs out the hacker.
  • If you are asked to provide a two-step verification code, even though you did not set up one, it means the individual using your account must have activated a two-step verification code. Since you do not have the code, it means you have to wait 7 days again before you can sign in without the two-step verification code.
  • Remember that the hacker had been logged out immediately you were logged in with the 6-digit SMS code? So no worries. The hacker cannot continue any chat with your contacts and they cannot even get access to your WhatsApp account during this period.

Part 2. Phone Lost or Stolen, How do I Recover WhatsApp Account?

If your phone gets missing, recovering your WhatsApp account takes completely different steps. In this case, you do not have access to your sim card and so cannot just log in.

  • The first thing you should do is to inform everyone including WhatsApp. If people are aware that you no longer have control over your account, they will be prepared for any fraudulent chats.
  • Now, you should send a mail to Whatsapp at support@whatsapp.com. You can state the details of the incident to the mail, but make sure you add “Lost/Stolen: Please deactivate my account” in the subject and text body and also provide the mobile number registered with the WhatsApp account.
  • Please ensure that you are sending this mail from the email address registered in your two-factor authentication process. If you did not do the two-factor authentication before your phone got lost or was stolen, then you can use any of your email addresses.

Once the account has been successfully deactivated, the thieves will no longer be able to use it to chat with your contacts. Now you have 30 days to recover your account if you still want to be able to access all your saved chats and media backed up in the cloud. It you delay this beyond 30 days, you will lose access to all that data.

Part 3. How do I Secure my WhatsApp Messenger Account?

WhatsApp Messenger has become an indispensable part of our daily communication, allowing us to connect with friends, family, and colleagues effortlessly. As the popularity of the platform continues to grow, it is essential to prioritize the security and privacy of your WhatsApp account. By following a few simple steps, you can strengthen the security of your account and minimize the risk of unauthorized access. Here are some effective measures to secure your WhatsApp Messenger account:

  • Enable Two-Step Verification: Two-step verification adds an extra layer of security to your WhatsApp account. It requires you to set up a six-digit PIN that will be prompted whenever you register your phone number with WhatsApp. To enable two-step verification, go to WhatsApp settings, select "Account," then "Two-step verification," and follow the instructions to set up your unique PIN. Remember to choose a PIN that is easy for you to remember but difficult for others to guess.
  • Keep WhatsApp Updated:
    Regularly updating your WhatsApp Messenger app ensures that you have the latest security patches and bug fixes. Developers continuously work to address vulnerabilities, and by updating your app, you benefit from these improvements. Enable automatic updates on your device or manually check for updates in your app store to ensure you are running the latest version of WhatsApp.
  • Be Cautious with Links and Downloads:
    Exercise caution when clicking on links or downloading files shared through WhatsApp, especially if they come from unknown sources or seem suspicious. Malicious links and downloads can compromise your account's security or infect your device with malware. Avoid clicking on suspicious links and only download files from trusted sources.
  • Protect Your Phone with a Strong Password:
    Ensure that your Android device has a strong and unique password or PIN to prevent unauthorized physical access. This adds an extra layer of security and protects your WhatsApp account from being compromised if your phone falls into the wrong hands.
  • Be Mindful of WhatsApp Web:
    If you use WhatsApp Web to access your account on a computer, make sure to log out after each session, especially if you are using a shared or public computer. Additionally, regularly review the active WhatsApp Web sessions in your account settings and terminate any sessions you don't recognize or no longer use.
  • Control Your Privacy Settings:
    WhatsApp provides various privacy options to control who can see your profile information, status updates, and last seen timestamps. Navigate to the "Privacy" section in your WhatsApp settings and adjust these settings according to your preferences. Restricting access to your information enhances your account's privacy and security.
  • Use Biometric Locks:
    Many Android devices offer biometric authentication options, such as fingerprint or face recognition. Enable these features to add an extra layer of security to your WhatsApp account. This ensures that only you can access your WhatsApp Messenger app.

By implementing these security measures, you can significantly enhance the protection of your WhatsApp Messenger account. Remember, being proactive and vigilant about your account's security is essential in today's digital landscape.

Fluid image

Account security tips

 

WhatsApp account security tips


To better secure your WhatsApp account, follow these tips:
  • Never share your registration code or two-step verification PIN with others.
  • Enable two-step verification and provide an email address in case you forget your PIN.
  • Set a voicemail password on your phone that's difficult to guess to prevent anyone from accessing your voicemail.
  • Check your linked devices regularly. Go to WhatsApp Settings > Linked Devices to review all devices linked to your account. To remove a linked device, tap the device > Log Out.
  • Set a device code and be aware of who has physical access to your phone. Someone who has physical access to your phone might use your WhatsApp account without your permission.
We recommend you share this advice with friends and family to help secure their WhatsApp accounts.
Note:If you receive unrequested emails to reset your two-step verification PIN or registration code, don't click on any links. Someone could be attempting to access your phone number on WhatsApp.

Resources



From Meta Logo
© 2024 WhatsApp