
Internet Newslinks - Page: 6
| | PC World - 23 Oct (PC World)For one reason or another, we’ve all become very familiar with Zoom calls in recent years. Although we thankfully don’t need to use them quite as much as we used to, they’re still an important part of many people’s work and socializing. Unfortunately, Zoom isn’t 100% private and there are ways in which nefarious individuals and organizations can use your calls to steal your information, identity, or private data.
Foruntately then, there are ways in which you can protect yourself and make Zoom more of the secure platform it can be. Here are some of our top tips.
Use a meeting password
Jon Martindale
The most important safeguard you can have in place to protect you, your meeting participants, and any information and data shared there, is to put a password on your meeting room. This ensures no one can just wander in unexpected, shutting down Zoom-bombing opportunities. It also means that no one can enter without your knowledge and snoop on what you’re discussing.
Passwords are enabled by default on all meetings for free users, as well as licensed users, so it should be enabled, but it never hurts to check. Similarly, when setting up your meeting, you can set a custom password in the meeting settings if you prefer.
Use a waiting room
Enable a waiting room in Zoom for enhanced security.
Jon Martindale
A password ensures no one can just enter your room uninvited, but if that password leaks, someone shares it without realizing it, or someone’s system is compromised, it can still be possible for troublemakers to enter your meeting. The best way to ensure that doesn’t happen by surprise and disrupt your proceedings, is with a waiting room. This means anyone wanting to join the meeting has to receive your approval to enter. If they don’t belong, you can boot them easily.
You can add a waiting room to a meeting using the toggle option when you set up the meeting under the “Meeting Security,” heading. Alteratively, if you’ve started a meeting already and want to add a waiting room to it, select Host Tools and then tick the Waiting room setting.
Enable End-to-End encryption
Use end-to-end encryption to hide meeting contents from outsiders, including Zoom itself.Jon Martindale
Zoom’s standard “Enhanced encryption” is pretty good at securing your data, but if you want to make it so that no one but the meeting participants can see you or what you’ve talked about (even Zoom itself) enabling End to End encryption is a more secure solution. When it’s enabled, your devices store your private encryption keys locally, so any intercepted data will be garbled and illegible.
To enable end-to-end encryption, when you’re setting up the meeting, navigate to the Encryption section and toggle on the End-to-end encryption.
Note: The end-to-end encryption is not supported by the Zoom web client, so all meeting participants will need to use the Zoom app to take advantage of it. Video recording is also not possible when end-to-end encryption is enabled. Other disabled features include AI companion, live streaming, polling, and companion Zoom apps like Whiteboard and Notes.
Use a random Meeting ID
When you set up a meeting you have the option of using your own personal meeting ID or a random one. Although using your own ID can be useful for repeat meetings with friends, family, or select colleagues, it does let people enter your personal meeting space even after the meeting is over. Instead, use a randomly generated meeting ID for each meeting.
If you can, use 2FA
If you have a Pro, Business, Education, or Enterprise account, or your work administrator has enabled Two-Factor-Authentication (2FA) you can use it to better secure your account. It means that when you login you’ll have to input a code from an authentication app as well as your username and password, making it much harder for someone else to break into your account.
Sign in to your chosen authentication app, and tap the option to scan a QR code. Sign in the Zoom web portal and navigate to Profile > Sign In and then toggle Two Factor Authentication to On.
Once it’s enabled, select Set up and scan the QR code using your phone in the Authentication app. Follow the on-screen instructions to complete setup.
Don’t share meeting links in public
When you’re inviting people to a meeting, make sure to only share the links with each participant directly. That way you reduce the chance of someone you don’t want in the meeting from trying to get in – they can’t if they don’t have the meeting ID and/or password.
There are range of ways you can share meeting IDs or links with people you want to join. Private messages, emails, individual messaging apps are all fine ways to distribute the details of the meeting.
Manage participants
As the person who set up the meeting and its host and administrator, you are in charge of the meeting and its participants, and can set the tone for what is acceptable. Make sure everyone conducts themselves in a manner that respects other users and the privacy.
Restrict file sharing and screen sharing in the meeting if you have any concerns over malware or information theft. Equally, watch out for phishing scams. Although they’re unlikely in pre-arranged meetings, any unauthorized participants could use fake login screens or requests for personal information to steal the identities of participants. Each user should exercise strong personal caution in this regard, but as the meeting administrator you can also play a role in keeping everyone safe.
Turn off optional data gathering
Turn off “Optional Diagnostic Data” to keep any personal data from being shared with Zoom.
Jon Martindale
Zoom does gather some data on its users. It’s anonymized and nothing to do with the actual content of your meeting, but if you want to cut out any extra data Zoom has on you, you can disable the collection.
Navigate to the Zoom web portal and login to your account. Then navigate to My Account > Data & Privacy and toggle off Optional Diagnostic Data.
Keep Zoom up to date
Zoom, like every app and program out there, gets updates from time to time and some of them improve security and privacy, or fix a bug in the system that might allow your data to be leaked. Keeping your Zoom client up to date and using the latest version for all your meetings, rather than the web client, is a good way to make sure your meetings are as secure as they can be.
Real world OPSEC
This doesn’t relate to Zoom itself, but operational security that you and your meeting participants should consider as part of the meeting. They’re the kind of things you can do to enhance your privacy and that of everyone in the meeting by adjusting the way you conduct it.
Only participate in meetings in a private place where no one else can look at your screen.
Use headphones and a headset microphone to limit what anyone else can hear.
Use a mute switch on your microphone, rather than the mute function in Zoom itself (or as well as). This way you can be doubly sure that no one can hear what you’re saying.
Consider using a camera cover when you don’t want to be seen. This ensures that even if you accidentally enable your camera, no one can see you.
If you have to conduct a meeting using Wi-Fi that you aren’t sure is 100% secure, such as in a hotel or public space, consider using a VPN to hide your data from anyone else on the network. Read...Newslink ©2025 to PC World |  |
|  | | | PC World - 22 Oct (PC World)TL;DR: Grab this refurbished 13.3-inch M1 MacBook Air with 8GB RAM and 512GB SSD for $399.99 and get fast, quiet performance, a Retina display, and all-day battery in a 2.8 lb package.
If your current laptop stutters through tabs and spreadsheets, this is a clean upgrade path. This Apple MacBook Air 13.3-inch refurb runs on Apple’s M1 chip, so everyday tasks feel snappy and quiet thanks to its fanless design. You get 8GB of memory for smooth multitasking and a generous 512GB SSD for apps, photos, and projects. This grade-A refurbished model keeps the premium feel without the premium price — it’s $399.99.
The 13.3-inch Retina display (2560 × 1600) makes text crisp and photos pop, while the 720p FaceTime HD camera, stereo speakers with Dolby Atmos support, and backlit Magic Keyboard cover calls and late-night typing. Touch ID speeds up logging in and making purchases, and two Thunderbolt / USB 4 ports handle charging, fast storage, and external displays. The wireless features are modern, too, with Wi-Fi 6 and Bluetooth 5.0 onboard.
Battery life remains a highlight, with up to 15 hours of wireless web and up to 18 hours of Apple TV app playback, so you can work or stream longer between charges. At 2.8 pounds, it’s easy to slip into a bag for class, commute, or couch.
Pick up this 2020 refurbished Apple MacBook Air M1 on sale for $399.99 while supplies last.
Apple MacBook Air 13.3? (2020) M1 MGN63LL/A 8GB RAM 512GB SSD Space Gray (Refurbished)See Deal
StackSocial prices subject to change. Read...Newslink ©2025 to PC World |  |
|  | | | PC World - 22 Oct (PC World)SpaceX’s Starlink satellite network has reached a new milestone. As of this past weekend, the company launched its 10,000th Starlink satellite into orbit, marking a new record in space history.
10,000 Starlink satellites in space
Two Falcon 9 rockets were launched from California and Florida on Sunday, carrying a total of 56 new satellites into orbit, as SpaceX announced on social media. This means the company has officially passed the 10,000 mark for satellites launched.
According to astrophysicist Jonathan McDowell of the Harvard-Smithsonian Center for Astrophysics, there have been 10,044 Starlink satellites launched since the project started in 2019. Around 8,680 of these are currently in active orbit above Earth, while approximately one to two satellites burn up every day in Earth’s atmosphere.
Space internet… with side effects
Starlink aims to bring broadband internet to pretty much every region of the world, but the project is controversial. Researchers warn that mega-constellations—such as Starlink, Amazon Kuiper, and Chinese systems—could increasingly clog up low-Earth orbit and generate dangerous space debris through collisions. Astronomers also criticize the fact that the bright satellites interfere with sky observations.
According to US researchers, the growing number of satellites in low-Earth orbit could soon leave measurable traces in the atmosphere. Aluminium oxide is produced when old satellites burn up and is deposited in high layers of air. A recent study warns that if more than 60,000 satellites are in low orbit by 2040, up to 10,000 tons of aluminium oxide could be released every year.
This would warm the top layer of the atmosphere by around 1.5 degrees Celsius and influence chemical processes that also affect the ozone layer. The researchers emphasize that further studies are urgently needed to better understand the exact effects. And while there’s still uncertainty about the exact extent, experts also agree that rapid satellite expansion also increases risks to the environment and climate.
This is still just the beginning
For SpaceX, the current record is just an interim step. While old satellites burn up every day, new ones are launched regularly. The average life span of a Starlink satellite is around five years, as reported by The Verge.
If the expansion plans become reality, more than 30,000 Starlink satellites could be orbiting the earth in a few years—more than all other satellite programmes combined.
Further reading: What I wish I knew before I got Starlink home internet Read...Newslink ©2025 to PC World |  |
|  | | | PC World - 22 Oct (PC World)There’s a new version of Outlook for Windows, basically a web skin. A lot of people aren’t thrilled about it and are still using the older, standalone version for its better offline capabilities. Unless they can’t… because a weird bug is making error messages pop up and Exchange logins are failing. If you’ve been seeing the alert box above, give it another try — Microsoft says it should be fixed now.
Bleeping Computer spotted the updated page, which says that the service team has implemented changes to work around the problem. Not every instance of the issue is necessarily solved; you’ll need to capture a Fiddler trace to get more specific if you’re still having problems launching the older 2024 version of Outlook. According to the support page, there’s one more workaround if Monday’s fix hasn’t solved the problem. “To workaround the issue, use Outlook Web Access (OWA) or new Outlook for Windows.” Great.
Windows 10 to Windows 11 isn’t the only awkward transition that the company is dealing with at the moment, as plenty of users are less than pleased with the new, “free” version of Outlook that leans more heavily on cloud services. The older, locally-installed version of Outlook 2024 has an official “death date” of April, 2026. Read...Newslink ©2025 to PC World |  |
|  | | | PC World - 22 Oct (PC World)In my work as a tech reviewer, I’ve had plenty of opportunities to test $300 keyboards with overly advanced tech inside and mice capable of tracking subtle movements so precisely they could almost surely be hacked to record my voice (thanks for the paranoia, Tom’s Hardware).
But as much as I love the ultimate tech accessories—give me that 8,000Hz polling rate, adjustable actuation depth, plush wrist rest, heavy metal base—there are plenty of times when such gear isn’t necessary. That’s where this cheap Arteck keyboard-trackpad combo is a winner.
Mark Knapp / Foundry
The Arteck HW197 (catchy, right?) is a versatile device. It combines a trackpad and keyboard into one device. It supports wireless USB connections up to 33 feet away with a compact USB-A dongle, as well as Bluetooth connections. Three buttons at the top right of the keyboard make switching between connections quick and easy. The keyboard even has a metal top plate for extra durability and a nice splash of style.
I got the Arteck HW197 at the end of 2023 for $26—it’s now gone up to about $36, though you can snag discount codes at times—and it’s been a staple of my living room since. I use it with my smart TV because I hate typing on that thing using the remote’s arrow buttons to navigate an on-screen keyboard. And the built-in trackpad even comes in handy in certain smart TV apps that support cursors, like the web browser. It also works well with home theater PCs, streaming sticks, gaming consoles, and even Raspberry Pi and Arduino projects.
Mark Knapp / Foundry
That might seem like too cheap a price, but let’s be real: a simple TV keyboard doesn’t need all kinds of bells and whistles, nor does it need extra longevity or durability. While I’d happily splurge on a premium keyboard for my PC (where I’d be hitting millions of keystrokes per year), that just isn’t needed for a media center keyboard. For the most part, it’s just there for quick searches and the occasional logins.
Get one of these for yourself
Arteck HW197 Wireless Keyboard with Trackpad
Best Prices Today:
$35.99 at Amazon
In that case, why buy this keyboard instead of any other cheap keyboard? Well, there’s a huge gulf between a good cheap keyboard and a bad one. The Arteck HW197 gets the balance right for the money. It has a simple membrane keyboard with scissor switches, and the keycaps have a helpful contour that avoid awkward binding and prove consistent enough to never become a nuisance. (Looking at you, Logitech K400 Plus.) In fact, I’m able to hit 116 words per minute with 98% accuracy in Monkeytype, which is a strong result for a “cheap” keyboard.
Mark Knapp / Foundry
The trackpad is less impressive, with soft physical buttons at the bottom and a far-from-smooth plastic surface. It can also struggle to track consistently when the keyboard is far from the wireless USB receiver. (Bluetooth surprisingly works a little better.) But in a home theater environment, mousing around is an infrequent activity—and it’s simply more convenient to have even a subpar trackpad than to also buy and keep track of a separate “cheap” mouse.
Mark Knapp / Foundry
To be frank, there’s a lot that isn’t great about the Arteck HW197. It has printed keycap legends that’ll fade, it charges via old-school Micro USB, and it lacks backlighting. But all of those are fine trade-offs for the convenience of a keyboard-trackpad combo, plus it hardly ever needs to be recharged. It’s versatile, effective, and affordable. If you’re after an all-in-one keyboard-and-mouse solution for your smart TV or home theater, the Arteck HW197 is precisely what I’d recommend.
This all-in-one keyboard-and-mouse accessory is perfect for any smart TVBuy the Arteck HW197 on Amazon Read...Newslink ©2025 to PC World |  |
|  | | | - 22 Oct ()Trump’s former cyber boss warns China and criminals are studying internet crashes such as the AWS outage to launch devastating strikes on Australia. Read...Newslink ©2025 to |  |
|  | | | PC World - 22 Oct (PC World)Recall is a feature in Windows 11 that regularly creates screen recordings and saves them locally. This also involves processing with AI so that users can search through the data. The aim is to make past work steps, websites, or documents retrievable via a search feature.
Microsoft first introduced Recall in 2024, but withdrew it after massive criticism due to insufficient security. The feature has been integrated again since the current versions of Windows 11 from 24H2. In Europe, it is available as an opt-in and can be completely deactivated or removed.
Access is via a timeline or by entering keywords in the search. The results appear regardless of the program or browser window in which the content was originally visible.
Chris Hoffman / Foundry
Tip: If you are using Windows 11 Home, you will miss out on the many advantages of the Pro version, which you can get for a significant discount at the PCWorld Software Store.
Activation and everyday use
Recall is an optional feature in the current versions of Windows 11, which is only offered on Copilot models. This includes computers with a Neural Processing Unit (NPU), at least 16 gigabytes of RAM, and active drive encryption. After installing a corresponding update, the new “Recall and snapshots” section appears in the settings under “Data protection and security.” The feature can be activated here.
Sam Singleton
The system only starts to capture screenshots after this conscious consent has been given. In practice, Recall checks every five seconds to see if any content has changed and then adds new recordings. After just one working day, several hundred files are created, which can take up several gigabytes of storage space in total.
It is operated via a timeline in which you can jump back to specific points in time. Alternatively, a keyword search can be started. One example is entering “orange sofa,” whereupon Recall suggests a shopping page with the product you are looking for. Content from Office documents, PDFs, or locally saved images also appear in the hits.
Deactivation via settings and group policies
The feature can be paused or completely deactivated at any time via the settings. Companies have further options via group policies. The “Allow Recall to be enabled” policy exists there. If it is set to “Disabled,” the feature disappears completely from the system, the associated files are removed, and a restart completes the process. This method is intended for the Pro and Enterprise editions of Windows.
The recall search via keywords divides the results here into text and visual matches. Text matches are assigned to the applications from which the recorded content originates.Mark Hachman / IDG
Windows 11 Home users must use the registry editor. Under “HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsAI,” a new DWORD value with the name “AllowRecallEnablement” can be created and set to 0. After a restart, all components are removed. Microsoft also offers administrators the PowerShell command “Disable-WindowsOptionalFeature -Online -FeatureName ‘Recall’ -Remove” which also removes the feature from the system.
Security protection
The data that Recall collects remains stored on your own computer. It is not automatically transferred to Microsoft servers or a cloud. To ensure that no one can access these recordings unnoticed, Windows requires you to log in via Windows Hello. This means that you must either enter your PIN or use a biometric method such as fingerprint or facial recognition.
The recall search via keywords divides the results here into text and visual matches. Text matches are assigned to the applications from which the recorded content originates.Chris Hoffman / Foundry
Windows also protects the recall data with a technology called VBS Enclave. You can imagine this as a closed area in the computer that is separated from all other programs. Only Windows itself is allowed to look into this area. This prevents external programs from simply reading the recall data. This is exactly what has happened in the past. Microsoft therefore withdrew this feature at the end of 2024.
Encryption keys are anchored in the device’s TPM chip. In theory, this prevents attackers from reading the database without a valid login. However, our tests have shown that this protection has its limits.
If a device is controlled via remote software such as Teamviewer, it is sufficient to enter the PIN to gain access to the entire recall history. Biometric procedures can be bypassed in this scenario. The risk of an external connection allowing access to all stored content remains.
Filter mechanisms and their limits
To protect sensitive data, Microsoft promises a filter that removes passwords or credit card information from the recordings. In practice, this only works to a limited extent. Although passwords are hidden in bank login windows, user names still appear.
Credit card numbers in form fields are recognized in most cases, but in emails or unprotected text documents they end up unchanged in the recordings. Account balances from online banking applications also regularly appear in the database, even if parts of the page are anonymized by the filter.
The handling of self-created password lists is also problematic. If a text file does not contain any unique keywords such as “password,” it is saved by Recall without restriction. This means that access data can be searched for in plain text if it is visible on the screen in an unprotected document.
Benefits in everyday working life
Regardless of the risks, Recall certainly offers advantages. In an environment with many applications open in parallel, the search makes it easier to find your way around. If you switch between projects, you can pick up where you left off with just a few clicks. The feature also saves time when researching on the web when dozens of tabs are open. Instead of laboriously searching through the history, a keyword is enough to open the page you are looking for.
Recall can also be helpful for users who frequently work with visual content. A designer reviewing visual material can use the keyword search to find screenshots that were only briefly displayed. In this use case, Recall replaces manual documentation of work steps.
Legal framework conditions in Europe
The delayed introduction in the European Union shows that the regulatory framework plays a central role. Data protection authorities only gave the green light after Microsoft designed the feature as an opt-in and created the option to uninstall it. Users must actively agree before Recall starts. The European version also allows the feature to be removed completely.
Mark Hachman
Additional requirements apply for companies. Recall may not be used without the consent of employees. Administrators can control the provision, but cannot force snapshots. Microsoft is thus complying with the General Data Protection Regulation, which sets particularly high standards for the processing of personal data.
Weighing up the benefits and risks
The tests so far have made it clear that Recall is a tool with considerable potential, but also with clear weaknesses. While local storage and encryption provide a solid foundation, the filters remain unreliable. Confidential information can end up in the database and be accessed remotely.
Anyone using Recall must be aware that the added convenience of seamless documentation comes with a loss of control over sensitive data.
This may be acceptable on private devices with manageable risks. In a corporate environment, however, the concerns outweigh the benefits. Recall should only be used here after careful consideration if there are clear guidelines on the use and protection of data.
Conclusion
Recall in Windows 11 is technically mature enough to be used productively, but at the same time not yet reliable enough to dispel security concerns. The feature creates transparency about past work steps, but inevitably also saves content that does not belong in a search database.
If you want to use Recall, you should check the settings carefully, adjust filters, and empty the database regularly. For security-conscious users, deactivation via group policies, registry, or Powershell remains a necessary means of minimizing risks.
It is to be expected that Microsoft will make improvements, but it is also to be expected that tools will appear that can override Recall. From our point of view, the use of Recall is currently not recommended.
Further reading: Windows Recall is too risky for your PC. I can’t recommend it Read...Newslink ©2025 to PC World |  |
|  | | | PC World - 21 Oct (PC World)At a glanceExpert`s Rating
Pros
Powerful performance
Large and tall display
Great I/O selection
Cons
Keys are a bit soft
The display’s color could be richer
It could be slightly lighter weight
Our Verdict
The HP Zbook Ultra G1a is a classy mobile workstation, featuring a large display, a robust design, and plenty of graphics power.
Price When Reviewed
This value will show the geolocated pricing text for product undefined
Best Pricing Today
Best Prices Today: HP Zbook Ultra G1a
Retailer
Price
$2229
View Deal
Check
Price comparison from over 24,000 stores worldwide
Product
Price
Price comparison from Backmarket
Best Prices Today: Check today’s prices
HP’s Zbook Ultra G1a is an all-round performer. It benefits from a powerful Ryzen AI Max Pro 390 chip that made all my computing needs so easy. From mucking around in office apps to browsing the web, the G1a did it all. This laptop could even play a few triple-A games thanks to the integrated Radeon 8050S chip. On top of all that, it just oozes luxury. From the spacious keyboard to the large display, this is a mobile workstation that feels very smooth to use.
The HP Zbook Ultra G1a is an ideal mobile workstation. With a generously sized display and keyboard, it provides the kind of luxurious computing that office workers seek.
HP ZBook Ultra G1a: Specifications
HP’s website shows the HP Zbook Ultra G1a in configurations up to AMD Ryzen AI Max Pro 395 and AMD Radeon 8060S graphics with a top-of-the-line model costing $3,699. My laptop had the step-down build with an AMD Ryzen AI Max Pro 390 processor with an integrated Radeon 8050S chip, which, at the time of writing, cost $2,229. The full specifications are as follows:
Model number: B90JJUA#ABA
CPU: AMD Ryzen AI Max Pro 390
RAM: 64GB LPDDR5x 8533 MT/s
Graphics: Integrated Radeon 8050S
Display: 14-inch WUXGA (1920 x 1200) UWVA, anti-glare, 400nits, 100 percent sRGB color gamut.
Storage: 1TB PCIe Gen 4 NVMe
Connectivity: 2 x Thunderbolt 4, USB-C 3.2 Gen 2, USB-A 3.2 Gen 2, HDMI 2.1, 3.5 mm combo jack, Kensington lock.
Networking: Wi-Fi 7, Bluetooth 5.4
Battery capacity: 74.5 Wh Li-ion polymer
Dimensions: 12.29 x 8.45 x 0.71 inches
Weight: 3.31 lbs (1.50kg)
Cost: $2,229 (this configuration)
Compared to competitors, Dell offers the Dell 14 Premium, which features a Core 7 255H CPU with Intel Arc 140T graphics, and an MSRP of $1,899.99. At 3.79 pounds, it’s the slightly heavier of the two options and its NPU features only 13 TOPS of neural processing power.
HP Zbook Ultra G1a: Design and build
The HP Zbook Ultra G1a looks a lot like the laptops in HP’s EliteBook series. The design is very compact measuring just 12.29 x 8.45 inches, but the design is pretty luxurious. The laptop is comprised of an aluminum body that feels strong and very robust. There’s a scarcity of plastic here and more metal than you’ll find in a heap of cheaper laptops, However, the metal material means it’ll last a good while.
At 0.71 inches thick, the Zbook Ultra G1a is also very slender. It’s relatively light too at 3.33 pounds. It’s even lighter than the HP Pavilion Laptop 16. it was easy to pick up with one hand and carry around the office. When I slipped it into my work bag, it nestled right up against my work laptop without any fuss.
Dominic Bayley / Foundry
HP did such a great job balancing the main components that the whole design feels effortless. 14-inch The 1920×1200 display is generous and frames up to a tall 16:10 aspect ratio.
The keyboard is large and the keys spacious. The hinges are strong and hold the lid at any angle you want it to. I couldn’t get any flex out of the lid despite using a lot of weight on it. The 140W charger is also small and compact and suitable for carrying.
HP Zbook Ultra G1a: Keyboard and trackpad
HP has provided a well-balanced keyboard with left and right Shift keys and right arrow keys, but it doesn’t have a numpad. Although only a 14-inch laptop keyboard, HP has managed to fit in the Page Up and Page Down keys above the arrow keys, the placement of which I really liked after a while.
Dominic Bayley / Foundry
For typing, the large low set keys are a little on the soft side, but the rebound isn’t completely mushy, so they don’t feel fatiguing.
On the plus side, the keys are very stable. They don’t wobble or skew sideways on the down press, which makes for very accurate typing. The backlighting illuminates the top of each key well so that they are bright and easily visible at night. The touchpad is located in a very central position. Its moderate size means there’s plenty of room either side to rest your wrists.
HP Zbook Ultra G1a: Connectivity
The laptop has three USB-C ports and one USB-A port, which accommodated my external mouse and keyboard and my external SSD with no fuss. Two of the USB-C ports are Thunderbolt 4 ports, which means they provide a maximum file transfer speed of up to 40Gbps and you can also output to two displays at 4K resolution at 60Hz. The Ultra G1a also has an HDMI 2.1 port, a 3.5 mm audio jack, and a Kensington lock.
Wi-Fi 7 functionality provided me with a snappy enough connection to download the programs I needed to benchmark the laptop. My review model also had Bluetooth 5.4, which was handy for streaming music through my laptop speaker.
The connectivity was quick enough to render images via the laptop’s 5MP IR camera in fine detail. The AI enhanced camera produced very natural-looking images and the dual array microphones did a decent job making my voice sound clear.
HP Zbook Ultra G1a: Display, audio
My review model shipped with a 14-inch 1920x1200p LCD IPS-grade display. I had the base version, but some configurations come with an upgraded 2880×1800 resolution OLED touchscreen.
Overall, the display itself is quite decent. The panel delivers 100 percent sRGB color and 400 nits of peak brightness, which together make for a sharp image. I’ve seen much richer color saturation and contrast in other OLED panels, though.
Still, I was never unhappy with the visuals. There was no lag or delay playing media, and videos were fluid and flicker free. The anti-glare functionality also kept reflection down to a minimum.
The laptop’s upward firing speakers also produced quite a detailed sound for a laptop so thin.
HP Zbook Ultra G1a: Performance
My review model’s AMD Ryzen AI Max Pro 390 chip is a powerful mobile processor launched in January 2025 and based on AMD’s Zen 5 architecture. It has 12 cores and supports 24 threads, and reaches a maximum boost clock speed of up to 5.0GHz.
The Ryzen AI Max Pro 390 includes the Radeon 8050S integrated graphics chip and a 50 TOPs XDNA 2 neural engine.
The first benchmark I tested it on was Maxon’s Cinebench Multi-Threaded benchmark. This test fired all the processor’s 12 cores to simulate how it could handle a similar all-hands on-deck computing task.
Dominic Bayley / Foundry
As you can see, the Ultra G1a topped the field in this test. That’s not surprising considering the power of the AMD Ryzen AI Max Pro 390 chip compared to the power-conserving ultralight laptop chips in the field.
The Ultra G1a proved it can keep thermals in check to finish heavy tasks quickly, which even gaming laptops with high-performance processors sometimes struggle with. I figured that from the fast time it took to finish our standard PCWorld encoding test in the Handbrake utility. This is a better result than most light and thin laptops will achieve.
Dominic Bayley / Foundry
The PCMark benchmark provided an indication of how the Ultra G1a might handle a range of different office tasks from spreadsheeting to web browsing.
Dominic Bayley / Foundry
To be sure, the Ultra G1a performed very well in this task, almost topping the field again. In fact, a score of 6,083 means it will comfortably run office apps and programs.
HP Zbook Ultra G1a: Graphics performance
The Radeon 8050S features 32 compute units and is based on the RDNA 3.5 architecture. It’s similar in performance to the Nvidia RTX 4060 laptop GPU, so I was expecting better performance than many of the ultralight laptops in the lineup.
In the 3DMark Time Spy 1.2 benchmark, the HP Zbook Ultra G1a performed well. It achieved an overall score of 4,343. This indicates it does have a slightly better graphics performance than a lot of productivity laptops.
Dominic Bayley / Foundry
You can even do some gaming on the HP Zbook Ultra G1a as was confirmed by the Rise of the Tomb Raider benchmark. In this test, the Ultra G1a averaged 59 FPS, which beat out some lower-tier gaming laptops in performance.
Dominic Bayley / Foundry
These results point to the laptop being a strong graphics performer for one with an integrated GPU. Performance is still far below many top-tier gaming laptops, but it’s strong enough for undertaking tasks like 3D editing that would make full use of the laptop’s Radeon 8050S.
HP Zbook Ultra G1a: Battery life
To test the laptop’s battery life, I set a 30GB 4K video on repeat in the Windows Films and TV app. But first I charged it up full, changed the volume to 50 percent, activated airplane mode, and adjusted the brightness.
I also switched the keyboard backlighting off and plugged in a cheap pair of headphones to keep the noise down. Just before pressing play, I unplugged the laptop from the power outlet and timed how long it took to run out of juice.
Dominic Bayley / Foundry
The HP Zbook Ultra G1a managed just over 14 hours before running out of juice. That result is better than expected. That said, our battery test is a lightweight one (it’s not too demanding). You can expect the laptop to last approximately half that time running more demanding applications.
HP Zbook Ultra G1a: Conclusion
The HP Zbook Ultra G1a is an ideal mobile workstation. With a generously sized display and keyboard, it provides the kind of luxurious computing that office workers seek. It also features powerful performance that beats out most ultrabooks. It even holds its own against some gaming laptops. While it may be more powerful than most ultrabooks, it’s just as portable, being a slim and relatively lightweight 14-inch laptop, perfect for the daily commute. Read...Newslink ©2025 to PC World |  |
|  | | | PC World - 21 Oct (PC World)1. What is search parameter injection?
Search parameter injection attacks are a new, sophisticated method used by criminals to obtain your data or even gain access to your PC.
Criminals place adverts on Google that are displayed whenever someone searches for the word “support” and a specific company, such as “support Netflix.” The advert appears directly above the first search hit and is designed to look as if it comes from Netflix itself.
Anyone who clicks on this advert is — and this is the special thing about this scam — not directed to a fake website, but to the original Netflix support website. However, the attackers have entered their own telephone number in the search function on the support page (see image).
Here, criminals have inserted their own telephone number on the real Netflix support website. Anyone who calls there reveals their data and, in the worst case, risks catching a Trojan.
Foundry
A victim who calls this number then reveals their data to the criminals, such as the password for the Netflix login. In some cases, victims are also persuaded to install what appears to be support software.
However, this is actually a Trojan that gives the attackers access to the PC.
Not only Netflix is affected by this scam; the websites of other large companies such as HP, Dell, and others are also hijacked by the criminals.
How to protect yourself: Many security suites offer a web filter for the browser. This should recognize such attacks. The current malware campaign was discovered by the antivirus specialist Malwarebytes. The Malwarebytes website filter should therefore reliably block these attacks.
2. Is Defender enough?
The Microsoft Defender antivirus program is integrated into Windows as standard. It is free to use, it updates itself automatically, and the integration with Windows could not be closer — after all, the tool comes from the Windows manufacturer itself.
In addition, Microsoft Defender’s virus detection has almost always performed very well in past tests. Defender is therefore sufficient for any IT-interested user who has a healthy level of mistrust towards emails and websites.
However, anyone who is not at all interested in IT security and has never heard of phishing emails and dangerous websites is better advised to use a comprehensive antivirus suite, as this offers more additional protection functions.
Further reading: Best antivirus software for Windows
3. Are passkeys really more secure?
Passkeys are the new superstars when it comes to secure login to online services. Instead of authenticating yourself with a password, you use a passkey.
This is stored on a compatible device (any current smartphone or computer) and released using fingerprint, face scan, or PIN authentication (Windows Hello). As there is no password when logging in with a passkey, it cannot be stolen. Passkeys also provide very good protection against phishing attacks.
So: Yes, passkeys are much more secure than passwords. Wherever possible, you should use passkeys to log in to a service.
However, if you lose your smartphone, you will also lose your passkey. In such a case, it is difficult for an online service to reliably identify a user. In other words, to grant them access to their account again. That’s why there are only a few services that allow you to authenticate yourself using a passkey only. There is still a password for logging in.
One exception is the Microsoft account, which can be used without a password as of this year. In addition, the use of passkeys is not as straightforward as many people think. There are problems, for example, if you have saved passkeys both in the operating system (such as Android) and in a password manager.
4. How do I protect myself from crypto miners?
Crypto miners are malware that use your PC to calculate digital money. The threat comes in two forms:
First, as classic malware that embeds itself in your computer. You can block this malware with good antivirus software.
Second, crypto-miners lurk on the web: Javascript-based mining is embedded on prepared websites, which becomes active directly when the page is called up. In this case, the malware only runs while the browser session is open and disappears when the page is closed.
How to protect yourself: To prevent mining in the browser, use the Opera browser for unknown and possibly infected websites. It automatically blocks mining code.
5. How dangerous are AI attacks?
Artificial intelligence creates convincing texts, cloned voices, fake videos, and functional program code within minutes. It finds security loopholes in software and server services and is extremely inexpensive. Cyber criminals also take advantage of this.
However, the question of how dangerous AI attacks are as a result varies. However, there are some experts who expect a flood of extremely dangerous attacks in the coming years.
Below are a few concrete examples of how AI is changing cyber attacks.
Artificial intelligence improves existing attacks and makes criminals’ work easier. While phishing emails could still be easily distinguished from genuine emails with a little suspicion, some of the current phishing emails created with AI appear deceptively genuine. This means that they can hardly be distinguished from genuine emails in terms of form and content.
A free tool can be used to replace a face in a live video. Another tool can also be used to replace the voice.
DeepFaceLive
Internet users are also threatened by so-called deepfakes. These are, for example, videos with well-known personalities, such as a newsreader. However, this person is not reading the news on a website, but is instead advertising dubious cryptocurrencies and shares.
What’s more, attacks of this kind are much faster nowadays, as new AI tools are helping the criminals. These tools are called FraudGPT, WormGPT, AI Phish, or ScamGPT. They generate new attacks within minutes, which would otherwise have taken the criminals days.
How to protect yourself: It helps to carefully check the sender address and the links contained in improved phishing emails. You can find more information on this in our guide.
To combat deepfakes, it helps to be suspicious and take a very close look at the photo or video in question. You can find out how to recognize the scam in our guide to deepfakes.
In the following guide, on the other hand, we show you tips against attacks with fake voices.
6. Why are zero-day vulnerabilities so dangerous?
A zero-day vulnerability is a previously unknown security hole in software or an operating system for which no update is yet available. The term “zero-day” refers to the fact that the manufacturer had zero days to react to the discovered vulnerability. Either it has not yet been reported or it is already being actively exploited.
At the same time, vulnerabilities in software — at least if they are serious vulnerabilities — are a real boon for hackers. This is because they can use them to gain access to the system without having to trick the user.
The CVSS 4.0 calculator shows how dangerous a vulnerability is according to the Common Vulnerability Scoring System, and at the same time how high the risk is that it will be exploited.
Foundry
How to protect yourself: The software itself cannot protect itself against zero-day vulnerabilities, as the corresponding update is still missing. However, the heuristics of antivirus software can usually recognize the malicious code.
In the case of high-risk zero-day vulnerabilities, however, it may also be necessary to disconnect the affected system from the internet until an update against the vulnerability is available.
7. Where can I find an online virus scanner?
In fact, there are no longer any online virus scanners that can scan your entire hard drive for malware. One of the reasons for this is that code from the browser now has significantly fewer rights on the PC than around 20 years ago, when many online virus scanners worked via ActiveX in the browser. However, today’s browsers no longer offer ActiveX support.
The term “online virus scanner” has survived, but what you get today under this name are simple antivirus programs. They are downloaded to your PC as an .exe file. Some need to be installed, others start without installation. As a second opinion to the result of your already installed antivirus program, they are certainly justified.
Examples of such virus scanners come from Eset, Trend Micro, and F-Secure.
Under the term “online virus scanner,” there are also websites where a limited number of suspicious files can be uploaded. These are then analyzed to determine whether they are dangerous.
The best-known representative of this type is VirusTotal, which scans a file with over 40 antivirus tools. The service is always worth a visit if you have a suspicious file in front of you.
8. Can I recover files encrypted by ransomware?
There are suitable decryption tools for many ransomware viruses. However, finding the right tool is usually not easy, as the ransomware virus does not disclose the code used.
You can find help on the website www.nomoreransom.org. A wizard will guide you through a process at the end of which, if all goes well, you will be offered a decryption tool for your files.
If you don’t find anything there, try ID Ransomware. If no help is offered there either, you should keep the encrypted files and check again in a few months.
Security researchers often crack the encryption codes of ransomware only after some time, or the criminals publish the master key — at least this has happened in the past.
9. How do I protect myself against ransomware?
Ideally, reliable antivirus software should recognize and block ransomware before the malware becomes active and can encrypt personal data. However, even modern protection solutions do not offer 100 percent security.
The most effective protection against ransomware is therefore an up-to-date and externally secured backup. See our roundup of the best backup software for Windows to learn more.
Windows 11 has also offered special protection against ransomware for several years.
10. Are my files safe in the cloud?
Cloud storage is not secure, but it can be made secure. There are several threats to sensitive data in the cloud: Hackers can gain access to the cloud. The cloud provider has access to the data, as do government agencies.
The cloud provider can also lock you out of your account, for example if they suspect that you have violated the rules. Something that has reportedly happened more frequently at Microsoft this year.
How to protect yourself: You can protect yourself against espionage with good end-to-end encryption. We recommend the Cryptomator tool, for example. There are apps for Android and iOS as well as tools for Windows, Linux and Mac OS. The Windows software from Cryptomator is donationware. The Android and iOS apps cost 19 euros each.
The best way to protect yourself from being locked out of a cloud account is to create a backup of your data on your own PC. This can be set up quite easily with the Cryptsync tool, for example. Read...Newslink ©2025 to PC World |  |
|  | | | - 21 Oct ()When Amazon sneezes, the world catches a cold. It’s time we stopped accepting that as normal. Read...Newslink ©2025 to |  |
|  |  |
|
 |
 | Top Stories |

RUGBY
All Blacks first five Beauden Barrett has taken it upon himself to underline how close Scotland have come to tipping up New Zealand in the last two visits More...
|

BUSINESS
Major US tech companies have lost more than $1 trillion in market value since the beginning of November 2025 More...
|

|

 | Today's News |

 | News Search |
|
 |