Wednesday 28 June 2023

Tech Info Update 2023: All you need to know about NFC tags and stickers #drmobileslimited #nfc #virtualcard #businesscard #aucklandrepair

NFC (near field communication) is the technology that allows two devices — like your phone and a payments terminal — to talk to each other when they're close together. NFC is the technology that enables contactless payments.

Near Field Communication, known as NFC, may sound like a dry, technical specification. In many ways, it is. However, the applications of NFC are worth considering.
Android smartphones have had access to NFC for many years, while Apple's iPhones previously had a feature-limited version. However, both platforms use the wireless technology for contactless payments, headphone pairing, and some level of automation.

 
What is NFC?

Near Field Communication (NFC) allows wireless communication between two electronic devices close to each other. Officially, NFC can support distances of up to 1.5 inches apart, but it can be up to four inches in practice.

Generally, this comes in two forms; device-to-device communication or readable tags. While it is possible to make two devices interact via NFC, there are generally better methods of achieving this either through physical cables or other wireless technologies like Bluetooth or Wi-Fi.

That said, contactless payments are facilitated via NFC. So, when you walk into your local store and pay with your phone using Google Pay or Apple Pay, the transaction is initiated via NFC.

The primary interaction method, then, is between a device like a smartphone and a readable NFC tag. These tags are small, cheap, and unpowered. This is made possible because the reading device, often your smartphone, can generate a Radio Frequency (RF) field that will power the tag.

Can you use NFC stickers with an iPhone?
How to Use NFC on iPhone
Using NFC on iPhone is incredibly simple. All you need to do is bring your iPhone into close proximity with the NFC device or tag. To use NFC on iPhone: If you're using an iPhone XR or later, simply wake your iPhone to turn on the screen and Background Tag Reading will be enabled.

How do I use NFC on my iPhone 13 Pro Max?

From iPhone 12 to current iPhone 13, there is no need to turn on or off anything in control center (there is no setting actually) for NFC. Just hold your phone over an NFC Tag and your phone should automatically read it.

What can you do with NFC tags?
Here are the top 10 uses for NFC tags.
No.  1 NFC tags as virtual business cards.
No.  2 Launch a website with your NFC tag.
No.  3 Lock/Unlock your door with NFC tags.
No.  4 Use an NFC tag to share photos and videos.
No.  5 NFC tags for making payments.
No.  6 Connect to your car with an NFC tag via Bluetooth.

Can you put a NFC sticker on your phone?
What is the NFC sticker on Your Phone and How Do You Use It ...
NFC Sticker is used in a variety of applications, such as contactless payments, sharing data, and connecting to NFC-enabled devices. NFC is built into all the latest Android phones and tablets and is also available on some iPhones and iPads.

What is the point of an NFC sticker?

You can use NFC tags for contactless payments, sharing contact information as a business card, location tracking, identity verification, access control along with hundreds of other uses and applications.

Can you reuse NFC stickers?

NFC Tags are rewritable by default. Potentially, the NFC Tag can be rewritten endlessly. They are guaranteed to be rewritten up to 100,000 times (depending on the IC). However, you can also block them, so that they will no longer be rewritten.

Can NFC stickers get wet?
High quality, durable and heat resistant NFC Tags. They can be applied to metal surfaces and are fully waterproof.




Can you write NFC with an iPhone?
In summary. With the upgrade to iOS 13+, all iPhone 7 and newer can read and write an NFC Tags. The NFC behavior of iPhones updated to iOS 13 (and later) is very similar to that of Android smartphones: for NFC Tag programming, an application is required (as for Android);

What is the best NFC tool app for iOS?

Best Overall: Decode - NFC Scanner
Users can launch scans from both within the app and the quick launch menu. Force touching the app icon on the home screen to launch a scan brings you the most similar experience to scanning NFC on Android on iOS.1

How do I set up NFC automation on my iPhone?
To create a shortcut, follow these steps:
- Open the Shortcuts app on your iPhone.
- Select 'Automation' at the bottom of the screen.
- Now tap the '+' icon at the top of the screen.
- Now select 'Create Personal Automation'
- Now you can scroll down and select 'NFC'
- Scan and names your NFC tag.

How long do NFC tags last?
10 plus years.  The NFC (near field communication) tag is made up of an antenna and a small passive IC chip usually on a PET substrate with an adhesive backing; no power source required. Tags have a lifespan of 10 plus years

What are the advantages and disadvantages of NFC tags?

NFC pros and cons. While NFC isn't free from security weaknesses, it's more difficult for hackers to access than many other types of RFID because NFC sends information through magnetic field induction, and the field fades faster. However, NFC's short range can be a disadvantage in various use cases.

Can a magnet erase an NFC tag?

No. NFC relies on alternating magnetic (and electrical fields) changing 13560000 times per second. A magnet represents a steady field, or at most one changing at the comparatively low rate at which you could physically move something. There will be no interference in terms of the actual signals.


Contact us today if you want to increase your retail client base using NFC technology!
Dr Mobiles Limited
1, Huron Street, Takapuna
Auckalnd 0622, New Zealand
Toll: 0800429429
Tel: +6495515344
www.drmobiles.co.nz, drmobilesnz(a)gmail.com

Tuesday 27 June 2023

Chat GPT update 2023: All The ChatGPT Updates To Know About #aucklandrepair #drmobilesnz #drmobileslimited #chatgpt



ChatGPT is what everyone is talking about right now. The artificial intelligence (AI) powered chatbot, created by OpenAI, has become the fastest-growing consumer application in history, crossing 100 million users in just two months. As the number of users continues to rise, OpenAI has been busy with introducing unique updates to make ChatGPT more accurate in its responses and factually robust.

The massive popularity of the chatbot has been indeed astonishing. According to a UBS study, the AI-powered chatbot clocked 13 million unique visitors per day in January. TikTok, one of the world's most famous social media apps, took around nine months from its launch to hit the 100 million mark in monthly active users. Meta-owned Instagram, which is almost every month coming up with new updates and features, took two-and-half years to reach the number.

Before we check out the updates, let's try to know what it is about this chatbot that makes it stand above the rest and challenge the authority and dominance of search engine behemoth Google.




Why is ChatGPT famous?

Users are turning to this tool for its obvious utility: it is an AI that can generate human-like responses to almost any question the user may have. The answer is often well-structured and loaded with precise details.

Built on Generative Pre-trained Transformer (GPT), ChatGPT is essentially a neural network learning model through which a machine can be trained to perform tasks that fall within the purview of natural language processing (NLP).

To put it simply, the GPT enables this new chatbot to respond in a conversational way, and the neural network is essentially a learning algorithm which makes the chatbots mimic the brain and understand human languages as they are spoken or typed.

Yet, despite all the hype surrounding it, this tool is still a work in progress.

Many have found problems with its answers, especially with regard to factual accuracy, since the information in it is limited to 2021. This means that the chatbot cannot give accurate answers to queries that would be connected to events after it, such as 'who won the FIFA World Cup 2022?' and similar questions.

Also, there are concerns over the manner in which it can be abused into giving answers it is programmed not to, such as generating ransomware or phishing emails — two of the biggest dark sides of the AI chatbot that researchers have been able to point at.

And, that's why updates become all the more important before it grows into the go-to search engine or digital assistant.

Tuesday 20 June 2023

Tech Update 2023: Ten types of Long Range Wi-Fi Antennas your can make at home #drmobileslimited #iphonerepair #aucklandrepair

Dr Mobiles Limited (Since 2011)
1, Huron Street, Takapuna
Auckland 0622, New Zealand
Toll: 0800 429 429
Tel: +6495515344
drmobilesnz(a)gmail.com


Ten types of Long Range Wi-Fi Antennas your can make at home!!

Why spend big bucks on Wi-Fi extenders, just build a budget-friendly Wi-Fi antenna at home?

While modern Wi-Fi antennas allow you to use the fastest speeds within your ISP's package, they can be quite expensive. Luckily, you can always turn to DIY projects to improve your connection signal without spending too much money.

The current and more popular model is the dual bank WiFi dongle.

A dual-band Wi-Fi dongle is a small device that provides wireless connectivity to devices that don't have built-in Wi-Fi capabilities. It plugs into a USB port and allows the device to connect to Wi-Fi networks.

The term "dual-band" refers to the two frequency bands supported by the dongle: 2.4 GHz and 5 GHz. These frequency bands are used for wireless communication and have different characteristics.

The 2.4 GHz band is more common and widely supported. It provides good range and can penetrate through walls and obstacles easily. However, since it is widely used, it can be crowded and susceptible to interference from other devices like cordless phones, microwaves, and Bluetooth devices.

The 5 GHz band offers faster speeds and is less crowded, resulting in potentially better performance. It is especially useful in environments with many Wi-Fi networks or interference from other devices. However, its range is generally shorter compared to the 2.4 GHz band, and it may have more difficulty penetrating through walls.

By having a dual-band Wi-Fi dongle, you can connect to both 2.4 GHz and 5 GHz Wi-Fi networks. This allows you to take advantage of the benefits of each frequency band and choose the one that provides the best performance in your specific situation.


Check out these 10 DIY long range Wi-Fi antennas you can make on a shoestring budget. Note that some of them may require you to obtain a license from the FCC (or relevant authority governing wireless devices in your territory), so do check before making yours.

1. Homemade Wi-Fi Antenna

2. DIY Tin Can Wi-Fi Antenna

3. DIY Long Range Wi-Fi Antenna

4. Wi-Fi Signal Catcher

5. Dual Band Wi-Fi Repeater

6. Wi-Fi Scanner Made Using ESP8266
https://www.youtube.com/watch?v=Wn71WxR8YYs

7. Long Range Wi-Fi MSP/PPM

8. Ultra-Long Range Wi-Fi Router

9. From Scrap to a 2.4GHz Wi-Fi Antenna

10. DIY 1KM Wi-Fi Antenna

 Boost Your Wi-Fi Range

There you have it, 10 DIY Wi-Fi projects you can make for cheap and enjoy a long distance internet range. Most of the projects will only require you to invest in basic hand tools and a few locally available materials.

You're already paying a premium to your ISP; it only makes sense to get the most out of the subscription. Now is the right time to maximize your Wi-Fi potential.

Read the rest of the article here....


Thursday 15 June 2023

​Scam Warning 2023: Phishing Attack, #iphonerepair, #aucklandrepair, #iPadunlock, #drmobileslimited #northshore

Scam Warning 2023:  Phishing Attack


According to Wikipedia, phishing is a fraudulent attempt to obtain sensitive data by impersonating oneself as a trustworthy entity.
Phishing Attack 🎯

Much like any other kind of fraud, the perpetrator can cause a significant amount of damage, especially when the threat persists for an extended period.

Phishing has a list of negative effects on a business, including loss of money, loss of intellectual property, damage to reputation, and disruption of operational activities. These effects work together to cause loss of company value, sometimes with irreparable repercussions.

To fully understand the impact of phishing attacks on businesses, you would need to get a grasp of the common types of phishing scenarios that exist. From then on, it would become easier to comprehend the measures to avoiding and preventing these attacks.


What is a Phishing Attack?

Phishing is a typical type of social designing assault intended to gather client data, for example, login certifications and Visa data. At the point when a casualty opens an email, text, or instant message subsequent to being hoodwinked into doing as such by a culprit acting like a dependable source, it happens. The beneficiary is in this manner fooled into clicking a hazardous connection, which might introduce malware, lock the framework as a feature of a ransomware assault, or uncover private data.

Phishing is additionally consistently used to get sufficiently close to corporate or administrative organizations as a component of bigger assaults like high level determined danger (APT) occurrences. In the last situation, workforce is compromised to evade safety efforts, engender malware inside a protected setting, or get to private data.

As well as experiencing huge monetary misfortunes, an organization that is the casualty of such an assault habitually has its piece of the pie, notoriety, and client certainty decline. A security emergency from which an association will experience difficulty recuperating could result from a phishing endeavor, contingent upon its expansiveness.

History of Phishing

In the 1990s, programmers began using fake messages to "fish" for data from unwary clients, leading to the expression "phishing." Phishing, with a "ph," acquired the name since these early programmers were habitually alluded to as "phreaks." Phishing messages expect to entice beneficiaries into taking the trap. Furthermore, the shopper and the association are both in a difficult situation on the off chance that they get dependent.

Phishing's set of experiences traces all the way back to the 1990s, similar to those of numerous other well-known dangers. At the point when AOL was a notable substance stage with web access, programmers claimed to be AOL laborers in phishing and texting efforts to misdirect clients into unveiling their login data so they could assume command over their records.

Aggressors utilized ledgers during the 2000s. Clients were fooled into revealing their ledger data through phishing messages. The messages had a connection to a malignant site that impersonated the real financial site, albeit the malevolent site's space was a nearby form of the genuine site's name (e.g., paypai.com rather than paypal.com). Afterward, the assailants continued on toward different records, remembering those for eBay and Google, to take advantage of the qualifications to take cash, participate in extortion, or spam different clients.


Phishing attack in action

The foundation subtleties of a casualty's private and expert history might be assembled by phishers utilizing open sources, especially informal communities. The names, occupations, email locations, and interests and diversions of the potential casualty are completely assembled from these sources. When this data is gotten, the phisher can use it to make a reliable fake message.

Messages that the casualty gets regularly appear to be from notable individuals or associations. Assaults are sent off by means of connections to rebel sites or noxious connections. Aggressors every now and again make fake sites that appear as though they are controlled by respectable associations like the casualty's bank, work environment, or establishment. Aggressors attempt to accumulate delicate information from these sites, like installment data or usernames and passwords.

Unfortunate phrasing, erroneous utilization of typefaces, logos, and designs can make certain phishing messages simple to detect. In any case, a ton of online law breakers are getting better at making correspondences look certifiable, and they're using master promoting methodologies to survey and upgrade the progress of their messages.

Signs of Phishing

Dangers or a Sense of Urgency

Messages that compromise adverse results ought to constantly be treated with distrust. Another procedure is to utilize criticalness to support or request prompt activity. Phishers trust that by perusing the email in a rush, they won't completely examine the substance and won't find irregularities.

    Message Style

A quick sign of phishing is that a message is composed with unseemly language or tone. In the event that, for instance, a partner from work sounds excessively relaxed, or a dear companion utilizes formal language, this ought to set off doubt. Beneficiaries of the message ought to check for anything more that could show a phishing message.

    Peculiar Requests


It could be an indication that an email is unsafe on the off chance that it demands strange way of behaving from you. For example, on the off chance that an email demands the establishment of programming and implies to be from a particular IT group while truly, the IT division frequently handles these undertakings halfway, the email is most certainly false.

    Language Mistakes

Language blunders and incorrect spellings are further signs of phishing messages. For active messages, most organizations have introduced spell browsing in their email programs. Subsequently, messages with spelling or language slip-ups ought to raise warnings since they probably won't come from the source that is being recognized.

    Varieties in Web Addresses

Looking for jumbled email locations, URLs, and area names is one more straightforward strategy to recognize likely phishing assaults. Checking a prior message that matches the source's email address is a fantastic model.

Prior to clicking a connection in an email, the beneficiary ought to constantly drift over it to see the connection's objective. At the point when an email seems to have come from Bank of America yet the email address' space doesn't contain "bankofamerica.com," it is probable a phishing email.

    Interest for Identification, Payment, or Other Personal Information

Aggressors habitually use messages that look legitimate to connection to false login locales that look genuine. A login box or a solicitation for ledger subtleties can be found on the fake login page. The beneficiary shouldn't tap the connection or enter their login data in the event that they didn't anticipate the email. Beneficiaries ought to go promptly to the site they accept is the email's shipper as a safety measure.

See here for the article:
https://www.wallarm.com/what/types-of-phishing-attacks-and-business-impact




Scam Warning: The 4 Most Dangerous Email Security Threats in 2023 #scamalert #iphonerepair #drmobileslimited #davidlimnz



In this article, we will discuss the top 4 email security threats that Australian businesses are likely to face in 2023, and explore some of the solutions that can be implemented to mitigate these risks.

According to a recent report, in 2022, 82% of all data breaches involved 'the human element' (the use of stolen credentials, phishing, misuse or human error).

This statistic is a stark reminder of the importance of email security in today's digital landscape, particularly for Australian businesses.

With email being one of the primary communication channels used by businesses across all industries, it's not surprising that cybercriminals are increasingly targeting email accounts in their attempts to gain unauthorised access to sensitive data or networks.

By understanding the nature of these security threats and taking proactive steps to address them, businesses can safeguard their data and ensure the continued trust of their clients and partners.




Email Security Threats

(1). Phishing


Phishing is one of the most common email security threats faced by businesses today.

In fact, the global average cost of a successful phishing attack was $4.91M USD (approx. $7.1M AUD) in 2022.

Phishing attacks typically involve an attacker sending an email that appears to be from a legitimate source, such as a bank or other trusted organisation, in an attempt to trick the recipient into providing sensitive information such as login credentials or financial data.

Read the rest of the article here:
https://www.tekspace.com.au/blog/top-email-security-threats-2023/




Tech Update 2023: Top Facebook Scams of 2023 and How to Avoid Them #scam alert #aucklandrepair #iphonerepair #drmobileslimited



Facebook is the most popular social media app in the world, and scammers flock to it to fleece unsuspecting users. Here are some of the most common ways they try.

    Phishing: Emails or direct messages with sketchy links that download malware or capture login credentials on spoofed websites.
    Romance: Friend requests and direct messages that attempt to create a romantic interest with the goal to steal money from the victim
    Prizes or job offers: Claims designed to obtain personal information or money from the victim
    Shopping: Selling counterfeit goods under a faux brand account or selling nothing at all using fake accounts
    Quizzes and games: Designed to ellicit personal information in the answers, then hacking accounts with it
    Friend requests: Either from people you don't know or people you're already friends with (cloned accounts)
    Charity pleas: Creating fake charities to get donations during times of disaster
 


Phishing scams

Scams involving fake emails have been around for years, and Facebook users are not immune from receiving them.

Phishing email will include a link and some wording that encourages you to follow the link to Facebook — except it isn't the real Facebook, just a spoofed website.

Sometimes the website will be that you have compromised accounts. Other times, it will ask you to validate your login information. One growing trend is to send you an email link to reset your Facebook account, claiming it has been disabled for security purposes.

Money being phishedWhatever the reason, the goal is always the same — to get you to provide confidential information to cybercriminals.

Unfortunately, if you fall for this common scam, cybercriminals have all the information they need to wreak havoc in your life. Depending on the information you provide, they can take over your Facebook account and con your friends, pretending to be you. They might also be able to access and drain your bank account or use your credit card to rack up fraudulent purchases.

This strategy isn't limited to actual emails, either. More and more often, cybercriminals are using Facebook Messenger to send the same kind of links.
Romance scams

One of the oldest scams involves fraudsters posing as love interests to target unsuspecting Facebook users. These faux romancers are people you've never heard of before. Scammers pretend they've gone through a traumatic breakup or use flattery to woo you. A romance scam is designed to play on your emotions and gain your trust.

This isn't a short-term effort. Chats build up over the course of weeks and months before the con-man makes their pitch. But it always ends the same way — they eventually ask you to send money. It's one of the most popular spots for catfishing online. A recent romance scam that's been making the rounds is the so-called "Mason" scam.

The scammer can use a variety of reasons to get your money. One of the most popular is for the "romantic interest" to purchase airline tickets and visas so they can come and meet you in person. Another popular tactic is to say they need help covering their daily living expenses until they can eventually join you.

In all cases, the affection is not real. If you fall for their pleas, you'll end up with an empty bank account and a romance that never was.




You've won! scams

Trophy with Question MarkThe excitement of winning a prize is hard to resist. The problem is that scammers know this and use that excitement against you. Sometimes they pose as celebrities, other times as big brands you trust. In all cases, the prize is irresistible. All you have to do to claim your prize is to send a small fee to cover shipping or other processing costs. In some cases, you don't even have to do more than scan a QR code.

The goal is to get you to divulge your personal information and bank or credit card information. Once you do, you never hear from the scammer again, and your only prize is identity theft or an empty bank account.
Bogus job scams

The allure of a high-paying job opportunity might be hard to resist, especially when it comes without having to do anything yourself. But before you say yes to any unexpected offer, understand this is a common technique used by cybercriminals to extract personally identifying information from you.

If you respond to an offer like this, you'll be asked to provide the typical information needed to start any job — your home address, your social security number, and perhaps even a copy of your driver's license or passport. Unfortunately, this is all a clever criminal needs to steal your identity. Instead of a job, you get a financial mess to clean up.
Shopping scams

Facebook has grown from a simple social network app to a robust e-commerce platform. Businesses of all sizes maintain a page and regularly promote their goods and services via sponsored posts. Unfortunately, cybercriminals capitalize on the popularity of Facebook shopping, too, particularly with scam ads.

Scammers create fake brand accounts to push counterfeit goods. Other times, they create unheard-of shop names with "too good to be true" offers, then push scam ads like the one below. These unknown sellers offer goods at ridiculously cheap prices but don't deliver anything at all. Instead, they take your money and disappear.

See the full detail here.....
https://vpnoverview.com/privacy/social-media/facebook-scams/

Wednesday 7 June 2023

2023 Tech News Update: Six Reasons the ChatGPT iOS App Is Better Than the Website

6 Reasons the ChatGPT iOS App Is Better Than the Website


OpenAI is a private research laboratory that aims to develop and direct artificial intelligence (AI) in ways that benefit humanity as a whole. The company was founded by Elon Musk, Sam Altman and others in 2015 and is headquartered in San Francisco.

The biggest difference between Bing AI ChatGPT and OpenAI ChatGPT is that the version of Bing leverages the Prometheus technology to connect the chatbot with the Microsoft search engine to provide more accurate answers and offer responses to current events.

The Italian authority claims OpenAI processes data inaccurately and lacks a legal basis to justify the mass collection and storage of data. It also claims that there is no age verification system in place for children.

OpenAI has been generating money from licensing since the time it transitioned to a for-profit organization in 2019. OpenAI licenses its language models to businesses and organizations that require them to create virtual assistants, chatbots, and other applications.

OpenAI's ChatGPT app for iPhone can do more than what its website can, and here's why you should install it.

In November 2022, OpenAI released ChatGPT to the public, which kickstarted a hefty AI arms race pivotal enough for the history books. To keep the momentum going, OpenAI launched the ChatGPT app for iOS in 2023.

If you're an iPhone user, you're probably curious about the features OpenAI has baked into its app. Below, we'll discuss everything you can get in the ChatGPT iOS app that puts it a notch above its website.


1. Voice Input

Voice input has probably been the most anticipated feature ever since the launch of ChatGPT, and it's finally available in the iOS app through OpenAI's open-source speech recognition system called Whisper. While you can already use Whisper in Windows to turn voice into speech, it's a first for iOS devices.

The advantages of voice input are endless, and the benefits are amplified even more so when paired with the powerful skills of the AI-powered chatbot. You can converse with ChatGPT while performing other tasks using voice input.

It is considerably faster and less tedious than typing long texts, eliminates the need for punctuation and spelling, and better mimics a natural human conversation. Moreover, it is especially beneficial for anyone with physical impairments that restrict them from using their hands, promoting inclusivity and equal access for everyone.

To use voice input in the app, all you have to do is tap on the microphone icon in the Message bar, and your recording will begin. Tap anywhere in the blue area to stop recording, and the app will automatically convert your words into text. Then, tap the blue arrow to send your message.

2. Better User Interface and Accessibility


When using the ChatGPT website, one would repeatedly have to go through the cumbersome process of opening a browser, launching a website, and logging in before actually getting to use it. The ChatGPT iOS app eradicates the need for such a lengthy process as the app is available to use at a single touch and is right at your fingertips, much like any other app.

Apart from a much-needed improvement in accessibility, the app also offers a sleek interface and a clean layout, making your experience incredibly convenient. As soon as you tap on the app's icon, the first page that opens up is the chatbot itself. There are no other tabs and pages you need to browse through, and all the features are in plain sight.

Due to its simplistic design, people from all age groups can easily begin using the app without much need for intensive learning and practice.

3. Change Your Preferred Language for Speech


If introducing voice input wasn't enough to be a step ahead of everyone else in the AI race, this feature certainly seals the deal. Not only can you now use speech to interact with ChatGPT, but you can do so in more than 35 different languages, with more to come as time passes.

If your language isn't listed, it may still be supported via auto-detection, so you might want to try it anyway. You can use ChatGPT in other languages on the website too, but not in the form of speech.

To change your preferred language in the ChatGPT iOS app, follow these steps:

Tap the three horizontal dots in the top-right corner and choose Settings.
Select Main Language under Speech. It will be set to Auto-Detect by default.
Now, choose your preferred language.

Read the rest of the article here....