...
Connect with us

Tech

Gmail Users on High Alert: Sophisticated AI Phishing Scams Uncovered

Gmail High Alert 1

More than 2.5 billion Gmail users are currently at risk of falling victim to a new wave of sophisticated AI-generated phishing attacks. These scams, which closely imitate legitimate support services, are becoming increasingly difficult to detect, even for tech-savvy individuals like Sam Mitrovic, a Microsoft solutions consultant who recently shared his experience of being targeted by one of these scams. Gmail Users on High Alert.

Gmail Users on High Alert

The Threat: AI-Generated Phishing Scams

In a report shared by Forbes, Mitrovic described receiving a dubious notification supposedly from Google, requesting approval for an account recovery. This was followed by a phone call from an Australian number, which Mitrovic wisely ignored. However, the scam didn’t end there. A week later, he received another notification and phone call, this time with the caller pretending to be from Google Support.

Gmail Users on High Alert

Mitrovic took to his blog to warn others about this new phishing strategy designed to deceive users into sharing sensitive information. The scammers use Google Forms, a legitimate tool within Google Workspace, to create official-looking documents that appear trustworthy. The responses are then sent through Google’s own servers, making the phishing attempt seem even more authentic.

Gmail Users on High Alert

The fraudulent scheme typically begins with an email or notification claiming that the user’s account is being recovered or a password reset has been initiated. The unsuspecting user is then tricked into visiting a fake login page where they are prompted to enter their credentials in order to “cancel” the unauthorized request. This tactic can lead to users unknowingly providing hackers with their login details, which can then be used to compromise their accounts.

Gmail Phishing Scams on the Rise

Garry Tan, founder of Y Combinator, recently shared his own experience with these scams on X (formerly Twitter). In his case, a scammer posing as a Google Support representative falsely claimed that a family member was attempting to recover his account. Like Mitrovic, Tan’s experience highlights the growing sophistication of these attacks, which are designed to look as genuine as possible, making it difficult for even cautious users to distinguish between legitimate and fraudulent communication.

Advertisement
Gmail Users on High Alert

Google has been working hard to enhance its security features and reduce phishing attempts, but the use of AI in generating these scams has proven to be a significant challenge. The sophisticated technology behind these phishing schemes allows scammers to generate convincing emails, notifications, and even voice calls that sound like they’re coming from official Google sources.

Gmail Users on High Alert

What Gmail Users Should Watch Out For

Phishing scams are evolving, and it’s critical for Gmail users to be vigilant. Here are a few warning signs to look out for:

  1. Unsolicited Emails or Notifications: Be cautious of any unexpected messages claiming that your account is at risk or requires immediate action.
  2. Suspicious URLs: Always double-check the URL of any login page. Scammers often create fake sites that look like Google’s but have slightly altered web addresses.
  3. Unexpected Phone Calls: Google rarely contacts users via phone. If you receive a call claiming to be from Google Support, it’s best to ignore it and contact Google directly through their official channels.
  4. Requests for Sensitive Information: Be wary of emails or messages asking for passwords or verification codes. Google will never ask for your login credentials in this manner.

What Google is Doing to Combat the Issue

Despite the rise of these sophisticated attacks, Google is taking steps to protect users by alerting them to potential phishing threats and blocking malicious attempts before they reach your inbox. However, scammers are constantly adapting, and even with Google’s robust security features, no system is completely foolproof.

Gmail Users on High Alert

Google has acknowledged that more needs to be done to address the rise of AI-generated phishing and is working on improving its technology to detect and block these more advanced threats. Google Forms, the tool being used to generate fake documents, is also being scrutinised to prevent its misuse in these scams.

Gmail
Gmail Users on High Alert

How to Protect Yourself

To avoid falling victim to these phishing schemes, here are a few practical steps you can take:

  • Enable Two-Factor Authentication (2FA): This adds an extra layer of security to your Gmail account, making it harder for hackers to gain access.
  • Use Strong Passwords: Avoid using easily guessed passwords and change your password regularly.
  • Report Suspicious Activity: If you suspect you’ve received a phishing email or call, report it to Google immediately.
  • Stay Informed: Keep up with the latest news on phishing attacks and security threats to ensure you’re aware of new tactics scammers may use.
Gmail Users on High Alert

With over 2.5 billion users at risk, phishing scams continue to pose a significant threat to Gmail’s vast user base. By remaining vigilant and following security best practices, users can safeguard their accounts from these increasingly sophisticated attacks.

Advertisement

Read more about cool stuff here at https://whatshotinuae.com.

Tech

How to Hide Files and Folders on macOS

How to hide your files on MacOS

Keeping your private files secure on a Mac is essential, especially when you share your device with family or friends. While macOS has built-in security features like password protection, Touch ID, and Apple Watch authorization, there’s always a chance that someone might stumble upon sensitive files while browsing through your system. We look into How to Hide Files on macOS.

Fortunately, macOS provides several ways to hide files and folders, ensuring that your personal data remains out of sight. Whether you use Finder, Terminal, or third-party encryption software, here’s how to keep your data private on macOS.

How to hide files on your MacOS
How to hide files on your MacOS


Method 1: Hide Files and Folders Using Finder

macOS allows you to hide files and folders by renaming them with a period (.) at the beginning of the file name. However, before you start hiding files, you’ll need to enable visibility for hidden files so you can see what’s already concealed.

Step 1: View Hidden Files in Finder

🔹 Press Shift + Cmd + . (period) in Finder.
🔹 Hidden files and folders will appear faded but visible.

Step 2: Hide a File or Folder in Finder

1️⃣ Select the file or folder you want to hide.
2️⃣ Click on the name to edit it.
3️⃣ Add a period (.) at the beginning of the name.
4️⃣ Press Enter, then select Use Dot to confirm.

Advertisement

🔹 The file or folder will remain visible but faded. To fully hide it, press Shift + Cmd + . (period) again.

Step 3: Unhide Files in Finder

🔹 Rename the file or folder removing the period.
🔹 Restart Finder by opening Terminal and typing:

bashCopyEditkillall Finder

🔹 Press Enter to apply the changes.

MacOS Finder
MacOS Finder


Method 2: Hiding Files Using Terminal

If you prefer not to rename files manually, macOS Terminal provides a command-based method to hide and unhide files.

Step 1: Hide a File or Folder

1️⃣ Open Terminal (Cmd + Space, type “Terminal,” and press Enter).
2️⃣ Type the following command:

Advertisement
bashCopyEditchflags hidden 

3️⃣ Drag the file or folder you want to hide into the Terminal window (this automatically adds the file path).
4️⃣ Press Enter to hide it.
5️⃣ Restart Finder using:

bashCopyEditkillall Finder

🔹 The file is now hidden.

Step 2: Unhide a File or Folder

1️⃣ Open Terminal and enter:

bashCopyEditchflags nohidden 

2️⃣ Drag the hidden file or folder into Terminal and press Enter.
3️⃣ If the file remains hidden, press Shift + Cmd + . (period) to reveal it in Finder.

🔹 Note: This method is quick and easy but not entirely secure—anyone familiar with macOS can still reveal hidden files.

Advertisement
MacOS Terminal
MacOS Terminal


Method 3: Using Third-Party Software for Extra Security

If you need stronger protection than Finder or Terminal, consider third-party tools that offer password-protected file encryption.

1️⃣ Funter (Basic File Hiding Tool – Free)

Funter is a menu bar utility that allows you to hide and unhide files with a single toggle switch.

🔹 Key Features:
✔️ Quickly hide/unhide files from the menu bar.
✔️ Search for hidden files on your Mac.
✔️ Works similarly to the Shift + Cmd + . shortcut but with a simpler interface.

🔹 Limitations:
❌ Files can still be revealed without a password, meaning it’s not a fully secure solution.

2️⃣ Encrypto (Password-Protected File Encryption – Free)

For maximum security, Encrypto allows you to encrypt and lock files with a password.

Advertisement

How to Use Encrypto to Secure Files on macOS

1️⃣ Download and install Encrypto.
2️⃣ Open the Encrypto app.
3️⃣ Drag and drop the file or folder you want to hide into the app.
4️⃣ Enter a password to encrypt the file.
5️⃣ Click Encrypt to lock it.
6️⃣ Save the encrypted file anywhere on your system.

🔹 To decrypt the file, simply double-click it, enter the password, and retrieve your data.

💡 Pro Tip: For extra security, use Finder or Terminal to hide the Encrypto-protected file so that even if someone finds it, they won’t be able to open it without the password.

Encrypto
Encrypto


Final Thoughts: Which Method Should You Use?

🔹 If you just want to temporarily hide files, use Finder or Terminal.
🔹 If you need quick access to hidden files, try Funter.
🔹 If you require serious security and password protection, Encrypto is the best option.

By following these methods, you can effectively hide and secure your files on macOS, ensuring your privacy remains intact. Whether you’re protecting personal documents, sensitive work files, or private media, macOS offers multiple ways to keep your data safe from prying eyes.

Advertisement

📌 Read more in our online magazine: 😎
👉
https://whatshotinuae.com

Continue Reading

Tech

Akai And Native Instruments Collab for MPC 3

Akai Pro MPC 3

Native Instruments has just made a groundbreaking announcement at NAMM 2025, unveiling its Native Kontrol Standard (NKS) Hardware Partner Program. Designed to streamline and enhance music production, this initiative bridges the gap between hardware and software, offering music producers unparalleled creative possibilities. Major industry players like Akai Professional, Novation, Nektar, Korg, and M-Audio have joined the program, ensuring seamless integration of their renowned controllers with Native Instruments’ software ecosystem.

Akai And Native Instruments MPC 3 Collection
Akai MPC 3 Collection of Instruments

This marks a significant evolution for Native Instruments’ vision of creating an open and connected platform for music creators. With over 2,000 NKS-compatible instruments and effects from 250+ brands, producers now have access to a diverse and premium library of sounds—all at their fingertips.

AKAI Professional MPC 3
AKAI Professional MPC 3

Pioneering a Unified Music Production Ecosystem

At the core of this development is the Native Kontrol Standard (NKS), a technology that unifies virtual instruments, effects, and hardware. This integration allows music makers to bypass complex setups, delivering an intuitive workflow that keeps their focus squarely on creativity.

Simon Cross, Chief Product Officer at Native Instruments, underscores the collaborative spirit of this expansion, stating:

“This expansion highlights the impact of collaboration. It marks an important milestone in our mission to provide musicians with an open, connected platform, making professional-grade tools, instruments, and technology more accessible to creators everywhere.”

Advertisement

What the NKS Hardware Partner Program Offers

The NKS Hardware Partner Program enables basic integration for partner controllers, giving users access to Native Instruments’ Komplete Kontrol desktop software. With this, musicians can fully explore the 2,000+ NKS-compatible instruments and effects library. Supported hardware now benefits from:

  • Intuitive Mappings: Supported controllers offer plug-and-play functionality, allowing hands-on control without the need for extensive configuration.
  • Future-Ready Features: The program sets the stage for advanced functionality in upcoming products, ensuring creators remain at the forefront of innovation.
  • Streamlined Workflows: Producers can stay immersed in their music-making process without unnecessary distractions.
Akai And Native Instruments
Akai And Native Instruments Expansion Packs Are Available Now.

Industry Leaders Joining the NKS Ecosystem

The partnership with Akai Professional, Novation, Nektar, Korg, and M-Audio is a game-changer for music production. Here’s how each brand’s hardware integrates with NKS:

  • Akai Professional:
    The MPK Mini Series (MPK Mini, MPK Mini Play, and MPK Mini Plus) now features NKS compatibility, bringing Akai’s widely loved compact controllers into the Native Instruments fold.
  • Novation:
    NKS integration enhances the Launchkey MK3 and MK4, FLkey, and SL MK3 controllers, expanding their already exceptional DAW workflows. The addition of NKS compatibility means creators can now combine Novation’s ease of use with Komplete Kontrol’s powerful sound library.
  • Nektar:
    The LX MK3 Series gains velocity-sensitive NKS functionality, enabling producers to enjoy expressive control and streamlined creative workflows.
  • Korg:
    With MIDI 2.0-ready Keystage controllers, Korg brings its signature innovation into the NKS ecosystem. These controllers cater to both live performers and studio producers, offering advanced sound design possibilities.
  • M-Audio:
    The Oxygen Series keyboards now boast NKS integration, empowering music makers with cutting-edge tools for studio and stage performances alike.
akai x ni 1
Akai And Native Instruments

Why This Matters

For producers, this expansion eliminates the frustration of incompatible hardware and software. By integrating their favourite controllers with Native Instruments’ Komplete Kontrol platform, music makers gain a seamless and expressive workflow that fosters creativity and innovation. The addition of industry-leading hardware ensures that the NKS ecosystem continues to set the standard for music production.

Advertisement
Akai And Native Instruments
Akai Professional Unveils MPC 3 Feature

What’s Next for Native Instruments?

This launch is just the beginning. Native Instruments has hinted at upcoming advanced features and hardware updates within the NKS framework, promising even greater possibilities for musicians. As the ecosystem grows, users can expect enhanced tools to further connect their creative processes.


Explore the future of music production with Native Instruments and its NKS Hardware Partner Program.
Read more in our online magazine: 😎
https://whatshotinuae.com

Continue Reading

Tech

Blockchain Beyond Bitcoin: How the UAE is Using Crypto in Real Estate and Fashion

Crypto in Real Estate and Fashion 7

Blockchain technology has become synonymous with cryptocurrencies like Bitcoin, but its potential stretches far beyond digital currencies. The UAE has embraced blockchain’s versatility, pioneering its use in sectors such as real estate and fashion. These innovative applications are transforming industries, enhancing transparency, and redefining how businesses operate in the digital age. Crypto in Real Estate and Fashion is here to stay.

Crypto in Real Estate and Fashion

Revolutionising Real Estate with Blockchain

In the UAE, blockchain is redefining the real estate sector by introducing property tokenisation. This process divides real estate assets into digital tokens, allowing fractional ownership that can be traded seamlessly on blockchain platforms. By lowering entry barriers, property tokenisation makes real estate investment more accessible, even to those with limited capital.

One standout player in this arena is Propchain, a UAE-based company tackling issues like high transaction costs and liquidity constraints in traditional property markets. Their blockchain-based solutions allow investors to trade tokens representing portions of real estate assets, bringing unprecedented flexibility to property transactions.

Crypto in Real Estate and Fashion

Dubai Land Department (DLD) has also been instrumental in integrating blockchain technology. It uses a decentralised database to record property transactions, lease registrations, and contracts. This approach eliminates intermediaries, reduces fraud, and provides an unparalleled level of transparency for buyers and sellers alike. By streamlining these processes, blockchain not only saves time but also builds trust among stakeholders in the real estate industry.

Crypto in Real Estate and Fashion in the UAE

Transforming Fashion with Blockchain

Blockchain’s impact isn’t confined to real estate; the technology is making waves in the fashion industry too. Leading the charge is the Aura Blockchain Consortium, a global alliance of luxury brands including Dior, Prada, and Cartier. This initiative provides digital identities for luxury goods, ensuring authenticity and traceability throughout the product’s lifecycle.

Advertisement
Crypto in Real Estate and Fashion

Through blockchain, consumers can access detailed information about a product’s origin, including the materials used, ethical sourcing, and sustainability practices. This level of transparency is crucial in combating counterfeit goods and aligns with the increasing demand for ethical fashion choices.

Blockchain’s use in fashion is also shaping the resale market for luxury goods. By guaranteeing authenticity and verifying ownership history, blockchain enhances consumer confidence, thereby boosting the value of pre-owned items. This innovation aligns perfectly with the UAE’s luxury retail market, which thrives on trust and exclusivity.

Crypto in Real Estate and Fashion

Blockchain’s Wider Implications

Blockchain adoption in the UAE reflects the country’s forward-thinking approach to technology. Beyond real estate and fashion, the nation is exploring blockchain’s potential in healthcare, education, and even public services. These initiatives are part of the UAE’s broader vision to become a global leader in blockchain technology, as evidenced by the Dubai Blockchain Strategy.

The UAE’s openness to blockchain innovation fosters a vibrant digital economy. The government’s regulatory frameworks, combined with a strong focus on infrastructure and technology, provide an ideal environment for blockchain to flourish. The UAE’s push for blockchain adoption not only strengthens its position as a global business hub but also inspires other nations to explore the transformative potential of this technology.

Crypto in Real Estate and Fashion

The Future of Blockchain in the UAE

By integrating blockchain into real estate and fashion, the UAE demonstrates how this technology can enhance efficiency, transparency, and accessibility across industries. The use of blockchain in these sectors is just the beginning; its potential applications are boundless, promising further innovation in the years to come. Whether it’s reshaping property investments or redefining luxury goods, blockchain is set to remain a cornerstone of the UAE’s digital transformation.

Advertisement

Read more in our online magazine: 😎
https://whatshotinuae.com

Continue Reading

Trending