Latest news with #XProtect


Techday NZ
23-05-2025
- Business
- Techday NZ
Milestone Systems empowers South Pacific with local leadership
Video platform vendor Milestone Systems, has today announced a significant shift in its approach to the South Pacific region, granting full decision-making autonomy back to its local team. The move, effective immediately, sees the company realign its regional operations under one strategic umbrella, in a bid to accelerate growth, enhance partner engagement and respond more effectively to market needs. According to the company, the recalibration is already producing tangible results. Jordan Cullis, Regional Director for South Pacific at Milestone Systems, described the change as more than a procedural update: "This is more than an operational change – it's a cultural shift. We're empowering our South Pacific team to lead with clarity and confidence, with decisions made closer to the customers we serve. It's already creating the kind of momentum that drives long-term growth." Milestone's renewed focus on the South Pacific region comes alongside a commitment to invest further in local talent, education, and innovation. The company is doubling down on efforts to support its growing partner ecosystem, not only through investment in people but also via in-person educational events. These events are designed to enhance technical skills, share insights, and foster greater collaboration across Milestone's partner community. Cullis highlighted the practical benefits already being seen: "We're accelerating that innovation right here in the region." He explained that empowering the local team is leading to more streamlined operations, deeper technology integrations and a reinvigorated commitment to partner success. The strategy includes maximising opportunities created by Milestone's recent acquisitions of BriefCam and Arcules. BriefCam brings advanced video analytics, while Arcules offers cloud-based video surveillance solutions—both now integrated more closely into the Milestone platform. Cullis emphasised the advantage this delivers to local partners: "Milestone's open platform approach continues to be our superpower. With closer integration of BriefCam's video analytics and Arcules' cloud solutions, we're unlocking even greater value for our customers. Plus, with decision-making now in local hands, we're accelerating that innovation right here in the region." The recalibration comes at a time when demand for intelligent, flexible video technologies is increasing—not just for traditional security applications, but also for public safety, operational efficiency, and broader situational awareness needs. With the South Pacific business units unified and empowered, Milestone aims to better support the evolving needs of customers and partners alike. Founded in 1998 and headquartered in Copenhagen, Milestone Systems has established itself as a world leader in data-driven video technology. Its solutions are deployed in diverse industries, from manufacturing and airports to law enforcement, retail, and traffic management. The company's XProtect video management software, combined with BriefCam's AI-powered analytics and Arcules' cloud video surveillance as a service (VSaaS), enables customers to gain deeper insights from video data. Since 2014, Milestone has operated as an independent company within the Canon Group. Today, it employs more than 1,500 people worldwide, with a significant focus on regional autonomy and local expertise. Recent expansion in privacy and AI capabilities In a recent move that further strengthens its technology portfolio, Milestone Systems acquired Berlin-based brighter AI, effective from 1 April 2025. Brighter AI specialises in anonymisation solutions for video data, using advanced deep learning to protect individuals' identities in public spaces. The acquisition addresses growing concerns around data privacy in AI development. Brighter AI's technology allows companies to access and use video data in a way that is compliant with global privacy regulations, such as GDPR. This is seen as crucial for training effective AI models while safeguarding personal information. Commenting on the acquisition, Thomas Jensen said: "brighter AI is a perfect match for Milestone. Their proven technology is top-notch and will give us a wider offering to existing and future technology partners and customers. The anonymisation tool for video technology will also enhance our focus on responsible technology." The addition of brighter AI's solutions not only bolsters Milestone's video management and analytics offerings, but also underpins responsible technology initiatives such as Project Hafnia—a data library and AI model training tool announced recently.


Time of India
13-05-2025
- Time of India
Signs your laptop might be bugged. And how to fight back
Ever get the feeling that your laptop's watching you… a little too closely? Maybe your battery's draining faster than usual, your fan's running loud even when nothing's open, or your cursor moves when you're not even touching it. Sounds dramatic — but it could be more than just a glitch. #Operation Sindoor The damage done at Pak bases as India strikes to avenge Pahalgam Why Pakistan pleaded to end hostilities Kashmir's Pahalgam sparks Karachi's nightmare Monitoring software — aka spyware, keyloggers, remote access tools — is designed to stay invisible while silently tracking what you do. If that freaks you out a little, good. Because today, we're diving into the signs that someone might've installed monitoring software on your laptop — and how to spot it before it's too late. First: Is Your Laptop Acting Off? One of the first signs that something shady might be running in the background is a sudden shift in how your laptop behaves. It just starts… being weird. Sluggish for no reason, booting up like it's wading through mud, or sounding like it's prepping for takeoff — even if all you've got open is Spotify. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Co-Founder of Google Brain, Andrew Ng, Recommends: "These 5 Books Will Turn Your Life Around" Blinkist: Andrew Ng's Reading List Undo That's usually because monitoring software runs in stealth mode, logging your every move and hogging resources while pretending to do nothing. You might also start seeing: Pop-ups showing up in weird places — not just when you're online. A sudden flood of ads on sites that never had them before. Random system crashes, unexpected restarts, or fast-draining battery. And here's a sneaky one: if you tether your laptop to your phone and notice a data spike you can't explain, something's probably uploading in the background. That's not just bad luck — it's a red flag. Bottom line: If your device starts acting like it's haunted, it might just be bugged. Step One: Run a Full System Scan Start simple. Run a full scan using a trusted antivirus — and no, not the random free one that's been sitting idle for years. Even built-in tools like Windows Defender or Apple's XProtect are better than most people give them credit for. Just make sure: Your virus definitions are updated. You run a full system scan, not a quick one — because spyware knows how to hide deep in system files. Still feel like something's lurking? Let's go deeper. Extra Steps to Sniff Out Monitoring Software If your antivirus came up clean but your laptop's still giving you side-eye, it's time for some manual checks. 1. Check Your Startup Items Your first clue might be hiding in what launches when your laptop boots up. Windows: Task Manager > Startup tab Mac: System Settings > General > Login Items If there's an app you don't recognize — Google it. Then disable or remove it. 2. Audit Installed Programs Think of this like digital spring cleaning. Scroll through your list of installed apps. Names like 'System Helper' or ' are classic spyware covers. If you didn't install it, dig deeper — or uninstall it. 3. Use a Network Monitor Apps like GlassWire (Windows) or Little Snitch (Mac) show you which programs are calling home. If something's constantly pinging a remote server and you don't know why? Shut it down. 4. Keep Your OS Updated It's not exciting, but it works. Most malware relies on known vulnerabilities — and system updates patch those holes. If you've been hitting 'Remind Me Later' for a week… stop that. 5. Enable Firewall Protection Your OS comes with a built-in firewall — turn it on. It helps block shady software from sending data out behind your back. 6. Avoid Sideloading & Cracked Apps This should go without saying — but if you're downloading cracked software from sketchy forums, you're basically inviting spyware in for dinner. 7. Use Strong, Unique Passwords Spyware often tries to grab your credentials. Use a password manager. Stop recycling your Netflix password for your email. You know better. 8. Encrypt Sensitive Files Built-in tools like BitLocker (Windows) and FileVault (Mac) let you encrypt your hard drive. Even if something gets in, it won't get far. 9. Cover Your Webcam & Mic Seriously. Just cover it. Some spyware can access your camera and mic without you knowing. A sticker or a cheap webcam cover is an easy fix. Final Thoughts: Trust Your Gut You know your laptop. If it's acting weird — don't ignore it. Most people don't realize they're being monitored until it's too late. So run the scans, check the background activity, and if anything feels off… it probably is. Better paranoid than compromised.


Tom's Guide
11-05-2025
- Tom's Guide
Mac users once skipped antivirus software — here's why that's no longer a good idea
Though it's often thought that Apple users with a Mac are exempt from worrying about viruses and malware, that isn't the case anymore and these days, more and more malware is being developed specifically for macOS. According to a blog post from security researcher Patrick Wardle who specialized in Apple products, there were 22 new Mac malware families in 2024 – up from 13 in 2022. Even without the surge of new malware being developed for Apple's operating system, much of the viruses and scams that are designed to infect Macs rely on user error, like phishing, cryptojacking or USB jacking. There are ways to protect yourself against those threats too, but they rely on, well, you. Here's a rundown of what security features are included in Apple's ecosystem, as well as what you can do to stay informed and alert on your end. XProtect runs in the background automatically without interrupting anything that you're doing, and you won't need to configure it or touch it much at all if ever really. It's basically a scanning tool that helps your system continuously check apps against a reference list of malicious and infected programs. If you attempt to open one that XProtect identifies as being on that list, it will tell you what kind of malware it is and give you a pop-up warning with details. If that happens, you should delete the file, though this won't provide you with complete protection. XProtect is considered basic protection, with the benefit of it being written directly into the operating system which keeps it from bogging down system performance. But because the updates to XProtect are vital to keeping its list relevant, and effective in protecting your system, it's essential that you keep your Mac up to date to keep it protected. Unfortunately though, unlike with Windows Defender on PC, you can't tweak its settings or run a manual malware scan. Gatekeeper, also automatic, is designed to block any software that is "unsigned" which means the developer hasn't been approved or verified by Apple. The company is notoriously strict about the software it approves, and though it is not unheard of for malware to sneak through, this is extremely rare. Get instant access to breaking news, the hottest reviews, great deals and helpful tips. The Gatekeeper program checks for malicious software every time you run an app, and if you try to open something that is unsigned you'll get a warning message to notify you that the program is from an unidentified developer. Gatekeeper can be configured to only allow you to install programs from verified developers (as well as the App Store). You may be familiar with sandboxing from iOS, as it is also used there, but the concept carries over into macOS as well: Apps are isolated from the operating system and other apps in a way that keeps them from making any changes without prior permission. This means that, hypothetically, even if you were to download an infected app it couldn't spread to other apps or areas of your computer. However, there are various flaws known to sandboxing – such as, users are frequently asked permission to use the camera or microphone and don't think deeply upon giving this approval to apps. Additionally, Mac apps that are not sold on the App Store do not have to be sandboxed. Lockdown mode is a pretty straightforward feature, and was more recently introduced in order to combat cyberattacks. If you toggle the feature on to activate it, all your Apple devices are protected and threat actors will (theoretically) be prevented from stealing your data. The setting limits a variety of apps like Messages, Safari, FaceTime and Apple services from full functionality. Once you've regained control of your devices, it can be disabled and you can restart your device to enable normal functions. There are a variety of protections in place for Apple's Safari web browser from phishing prevention and anti-tracking technology. If you visit a fraudulent website, Safari will disable the page and show an alert. It also provides a Privacy Report that gives users information on the cross-trackers that Apple has prevented and allows users to keep advertisers from tracking them on the web. Other Safari features include alerts that inform users of weak passwords when they're creating accounts online, and Private Browsing which keeps others from viewing your screen when you're not around and stops trackers from using tracking codes and recording data about you online. As we mentioned, Apple will warn you if you try to create a weak password, but ecosystem will also alert you if you have reused a password, if your password has appeared in a leak, or if your password is easy to hack. And with the recent transition to Passkeys, more secure methods are being used more frequently in addition to the increased use of the iCloud Keychain password manager across all devices. There's a dedicated app to manage passwords, and one password to unlock all others as well as an option to set up verification codes instead of using an authentication app. So, with all of those features (and more) do you still need a third-party option on your Mac? Well, the answer to that depends on what kind of device you have, what version of the software you're running and how you're using your device. Apple offers a lot of well integrated features to keep users protected, and a third-party solution may provide you with an added layer of security. For instance, you might need a VPN or parental control software too. Third-party options like Bitdefender or Intego can scan your machine for malware, but can also back up files, provide dark web monitoring or identity theft coverage, cloud storage and more. Some of these features can extend to your mobile devices as well, so depending on what your needs are, it may be well worth an additional subscription fee to include a third-party software in your Mac security arsenal while also relying on Apple's built-in protection. However, that doesn't let you off the hook. Given that much of the malware that's developed for macOS is intended to prey on user error, you still need to watch your own online habits and make sure you're well informed. Whether or not you opt to install a third-party solution, you need to know and practice good security habits to stay safe. Phishing is one of the main ways that threat actors look to prey on Mac users, so make sure you know the signs: Don't click on or download anything from someone you don't know or are not expecting. When in doubt, ask the sender through an independent channel about a particular message or file they've sent over. Also, be suspicious of anyone who is trying to pressure you to do something with a sense of urgency or immediacy. Update your software as soon as new patches become available. Your Mac's built-in security features rely on those updates to keep you safe and hackers love to exploit any holes left by old or outdated software. Also, don't install apps from unknown sources, and don't plug your device into power chargers in public spaces or put unknown USB flash drives into your machine. Likewise, you want to avoid connecting to public Wi-Fi unless you're using a VPN. With this bit of background knowledge in hand and taking some proactive steps, you can keep both your Mac and the sensitive personal and financial data it contains safe from hackers and cyberattacks.