Placeholder Content Image

"Stuff youse": Pensioner who's never owned a phone fights mobile detection camera fine

<p>A pensioner from New South Wales has disputed a fine he was issued for using his phone while driving, despite never owning a phone. </p> <p>Frank Singh, 77, was captured on a mobile phone detection camera while driving on the Pacific Motorway last September, and was issued a fine for $362. </p> <p>Mr Singh has refused to pay the fine, claiming that he was holding his wallet when the image was captured. </p> <p>He also claims to have never owned a mobile phone or a computer in his life, wondering how the camera made such a mistake. </p> <p>The senior man decided to appeal and take Revenue NSW to court, despite the risk of paying thousands in legal fees if he lost the case.</p> <p>"Looks like I'm guilty on it, but I'm not," he told <em>A Current Affair</em>. </p> <p>"I thought, what the bloody hell is this all about, I don't own a mobile phone. I've never used a mobile phone. What a load of s***."</p> <p>When questioned what the item could be, he said, "I think it could be my wallet."</p> <p>While Mr Singh admitted he can't specifically remember what he was doing at the time, he believes he was possibly placing his wallet on the passenger seat after paying for fuel. </p> <p>Unfortunately, the review of the fine was rejected and Frank was ordered to pay the $362, but he has not given up. </p> <p>"Then I thought stuff youse, I'm not guilty, I don't own a bloody phone," he said.</p> <p>While preparing to appeal the fine once more, Revenue NSW revoked the fine after issuing a letter to Mr Singh saying he would not be required in court following an investigation by the government body. </p> <p>"We have decided to cancel the fine," the letter read. </p> <p>"You little bloody beauty, how good's that," Mr Singh said on hearing the news, before planning to celebrate the win with a beer at his local pub. </p> <p><em>Image credits: A Current Affair </em></p>

Legal

Placeholder Content Image

“Turn your phone off”: The simple reason behind Albanese’s warning

<p>Prime Minister Anthony Albanese has issued a clear warning to the public, advising them to "turn their phones off" as a safety measure to avoid potential dangers.</p> <p>Albanese delivered this cautionary message last week while announcing the appointment of Australia's first national cybersecurity coordinator, Air Commander Darren Goldie of the Royal Australian Air Force.</p> <p>Goldie was quick to echo the Prime Minister's sentiments, emphasising the importance of mobilising both the private sector and consumers in the fight against cyber threats.</p> <p>"We all bear responsibility in this matter. Simple actions, such as turning off your phone every night for five minutes, can make a significant difference.</p> <p>"I encourage everyone watching to adopt this practice once every 24 hours, perhaps while engaging in daily routines like brushing your teeth," stated Albanese during the press conference.</p> <p>While rebooting your device on a daily basis may seem like a basic precaution, it can greatly enhance your protection against cybercriminals. Often, various applications and processes continue running in the background of your phone or computer, even when you're not actively using them.</p> <p>If unauthorised individuals gain access to these apps and processes, they can monitor your activities and collect your data, including financial information and identification documents, and even hijack your webcam or phone camera.</p> <p>By rebooting your phone, you force the closure of all background applications and processes, effectively evicting anyone attempting to track your virtual movements.</p> <p>Priyadarsi Nanda, a cybersecurity expert at the University of Technology Sydney, supported Albanese's advice, emphasising the importance of periodically turning off one's phone.</p> <p>"Considering how extensively we use smartphones in our daily lives, there have been cases where individuals haven't turned off their phones for an entire year," Dr. Nanda told <em>The Guardian</em>.</p> <p>"If there is a malicious process running, switching off the phone breaks the chain. While it may only provide protection while the phone is off, it undoubtedly frustrates potential hackers. Although not foolproof, rebooting can make it more challenging for hackers to compromise your device."</p> <p>It is crucial to note that this measure does not safeguard against all forms of cybercrime. If your password has been stolen or you are being repeatedly and strategically targeted, for example, a simple reboot is unlikely to deter the most persistent hackers.</p> <p><em>Image: Wikimedia / Australian Government</em></p>

Technology

Placeholder Content Image

How to avoid mobile phone bill horror stories when travelling

<p>"I'm sorry, calls to this number are not allowed, please try again later". This. Again. At 1am standing outside what I thought was our Galway Airbnb, but instead was a popular alley for Irish revellers to relieve themselves. Brilliant.</p> <p>After begging a convenience store manager, borrowing a phone and stealing some local wi-fi, we made it to bed before 3am (one-star rating for the Airbnb host, naturally). Such was the power of the phone company when you're on holiday, I still got pinged far-too-high amounts for calls and data used to attempt a check-in at the Irish abode.</p> <p>A reader recently contacted me wanting to avoid such a conundrum by asking for the best SIM cards available in Europe. Thankfully, EU law has recently shielded travellers from harsh cross-border roaming charges by ruling that providers cannot charge excessively for access to rival networks in fellow EU nations.</p> <p>You'll see the kiosks hawking pre-paid SIM packages at many major airports. If you want the dependability a SIM provides, assess your needs and shop around. </p> <p>Better yet, get to know your smartphone better and use the whole range of mobile apps that will soon make international call and text roaming redundant. Organising hotels, taxis, tours, dinner reservations as well as calling home and making your friends and colleagues jealous with holiday snaps can all be done with a wi-fi connections, which are readily available and far cheaper (if not free).</p> <p><strong>Avoid phone bill shock when you're away</strong></p> <ul> <li>Contact your mobile phone company rep about your destination and length of stay to see what add-ons and spending caps may be best.</li> <li>Only purchase local SIMs if you're in the country more than a week, have an unplanned itinerary or will have no free wi-fi at your accommodation.</li> <li>If you're on a per-day bundle, choose a few days to be on-the-grid and turn off your mobile data on other days.</li> <li>Go wi-fi only, in North American, Asian and European cities it's readily available.</li> <li>Embrace apps like Uber, Gett, WhatsApp, OpenTable and TripAdvisor to book taxis, call home and book restaurants and tours using hotel wi-fi and thus limiting calls.</li> </ul> <p><em>Image credit: Shutterstock</em></p> <p><em>Written by Josh Martin. Republished with permission of <a href="http://www.stuff.co.nz/" target="_blank" rel="noopener"><strong><span style="text-decoration: underline;">Stuff.co.nz</span></strong></a>.</em></p>

Travel Tips

Placeholder Content Image

Tips for safe mobile banking

<p>As we increasingly turn to our mobile devices for online transactions, it’s crucial to keep security in mind. We’ve all misplaced our mobile phone at some stage and the last thing you want is for some random stranger to get direct access to your bank accounts and other personal details.</p> <p><strong>1. Use a strong password –</strong> This goes without saying.While it might not be as critical with your library pass, someone who cracks or guesses your online banking password can drain your account dry. If you memorise just one strong password, make it your online banking password.</p> <p><strong>2. Never store passwords on your smartphone –</strong> Many people still try to hide passwords or PIN numbers within the body of text or phone numbers. However, despite how cleverly you may think you've concealed them, criminals know what to look for and where. It's always best to commit these security details to memory and not record them anywhere. This includes not ticking "save password" on website and applications that offer to remember your login details. Also make sure you limit other personal information. Criminals are interested in more than just your internet banking details. Any kind of personal information can be used to steal your identity, which criminals can then use to apply for credit cards, personal loans, even mortgages.</p> <p><strong>3. Use a password manager –</strong> Okay, in the real world you probably have more than one online financial account. Rather than strain your brain memorising hard-to-crack passwords for each of them, look at enlisting the help of a password manager. There are plenty of apps available and the best ones not only store your passwords securely but also help you work through your collection of passwords and replace weak ones and duplicates.</p> <p><strong>4. Activate smartphone security settings and password protection –</strong> All smartphones have built-in security features such as auto-locking and password protection. While it may seem like a bit of an inconvenience at times, these physical security measures are your first line of defense in keeping your smartphone and your personal details safe. You can also install smartphone security software as well as remote data wiping software if you lose your phone or it gets stolen.</p> <p><strong>5. Connect through your data plan –</strong> If you're banking online on a mobile device, you have a degree of in-built protection available when you turn off wi-fi tethering and bluetooth and connect using your mobile data plan. It's a lot harder for criminals to sniff your mobile data stream than to snag passwords from network traffic. If you’re on wi-fi only use reputable hot spots that are password protected. If you connect to a shared wi-fi hotspot you are completely dependent on the security of the host network.</p> <p><strong>6. Don't be tempted to jailbreak your smartphone –</strong> If you crack the manufacturer's security on your smartphone, you not only make your warranty invalid but you make it much more vulnerable to attacks by cybercriminals.</p> <p><strong>7. Clear your phone when you replace it –</strong> If you sell or discard your smartphone, it's crucial you delete all personal information first. This includes SMS messages, emails, photographs, contact details and internet links. </p> <p><em>Image credit: Shutterstock</em></p>

Money & Banking

Placeholder Content Image

What the “father of the cell phone” wants you to know

<p dir="ltr">The inventor of the mobile phone has shared his candid opinion about the obsession with smart devices. </p> <p dir="ltr">Martin Cooper, an American engineer dubbed the “father of the cell phone”, invented the very first mobile phone 50 years ago in 1973. </p> <p dir="ltr">Back then, the weighty block of wires and circuits were only used to make calls, a far cry from having the world at your fingertips with smartphones today. </p> <p dir="ltr">Cooper believes that despite all the good that can come from modern technology, the world has become a little obsessed with smart devices. </p> <p dir="ltr">“I am devastated when I see somebody crossing the street and looking at their cell phone. They are out of their minds,” the 94-year-old told AFP from his office in Del Mar, California.</p> <p dir="ltr">“But after a few people get run over by cars, they’ll figure it out,” he joked.</p> <p dir="ltr">Mr Cooper also indulges in the latest gadgets, as he wears an Apple Watch and uses a top-end iPhone, flicking intuitively between his email, photos, YouTube and the controls for his hearing aid.</p> <p dir="ltr">Despite keeping up with all the latest apps, updates and upgrades, he confessed that sometimes it can all seem a little overwhelming. </p> <p dir="ltr">“I will never, ever understand how to use the cell phone the way my grandchildren and great grandchildren do,” he said.</p> <p dir="ltr">“Each generation is going to be smarter … they will learn how to use the cell phone more effectively,” he said.</p> <p dir="ltr">“Humans sooner or later figure it out.”</p> <p dir="ltr"><em>Image credits: Getty Images</em></p>

Technology

Placeholder Content Image

Could mobile phones revolutionise chronic wound treatment?

<p>Australian researchers are developing a contactless, thermal imaging system that uses artificial intelligence to help nurses determine the best way to treat leg ulcers without waiting to see if the wound is going to heal properly.</p> <p>It’s estimated that 450,000 thousand Australians currently live with a chronic wound.</p> <p>Being able to predict early on which wounds will become chronic could improve outcomes by enabling nurses to start specialised therapy as soon as possible. But current techniques rely on physically monitoring the wound area over several weeks.</p> <p>New research from RMIT in Melbourne paired thermal imaging with AI.</p> <p>The software was able to accurately identify unhealing ulcers 78% of the time, and healing ulcers 60% of the time, according to the new study <a href="https://www.nature.com/articles/s41598-022-20835-y" target="_blank" rel="noreferrer noopener">published</a> in <em>Scientific Reports</em>.</p> <p>“Our new work that identifies chronic leg wounds during the first visit is a world-first achievement,” says lead researcher Professor Dinesh Kumar, from RMIT’s School of Engineering.</p> <p>“This means specialised treatment for slow-healing leg ulcers can begin up to four weeks earlier than the current gold standard.”</p> <p><strong>How do you normally assess wound healing?</strong></p> <p>The work builds on <a href="https://www.nature.com/articles/s41598-021-92828-2.epdf?sharing_token=7SIEmbOksKOou2TGQ5qPWdRgN0jAjWel9jnR3ZoTv0NntGTf8gfSMhoDjLAz58SefUeGL0aP2A-0mDVnZaiZTcBjNNpA4cvP9FgK6-aoPzyk4oQ0OSbPh83HNS_AwGDQVMg43K4WmG60QDoQohtsdkaRv70YSxfPg4Dn0qa_CUs%3D" target="_blank" rel="noreferrer noopener">previous research</a> by the same team, which found that this method could be used to predict wound healing by week 3 after initial assessment. But they wanted to know whether healing could be predicted from the first wound assessment only, reducing any delay in treatment.</p> <p>If a wound is healing normally it’s area would reduce by 50% within four weeks, but more than 20% of ulcers don’t heal in this expected trajectory and may need specialist interventions.</p> <p>Venous leg ulcers (VLUs) are the <a href="https://treasury.gov.au/sites/default/files/2022-03/258735_wounds_australia.pdf" target="_blank" rel="noreferrer noopener">most common</a> chronic wound seen in Australia and currently, the gold standard for predicting their healing– conventional digital planimetry – requires physical contact. Regular wound photography is also less accurate because there can be variations between images due to lighting, image quality, and differences in camera angle.</p> <p>But a non-contact method like thermal imaging could overcome this.</p> <p>The thermal profile of wounds changes over the healing trajectory, with higher temperatures signalling potential inflammation or infection and lower temperatures indicating a slower healing rate due to decreased oxygen in the region. So, taking thermal images of wounds can provide important information for predicting how they will heal.</p> <p><strong>What did they do?</strong></p> <p>The study collected VLU data from 56 older participants collected over 12 weeks, including thermal images of their wounds at initial assessment and information on their status at the 12<sup>th</sup> week follow-up.</p> <p>“Our innovation is not sensitive to changes in ambient temperature and light, so it is effective for nurses to use during their regular visits to people’s homes,” says co-author Dr Quoc Cuong Ngo, from RMIT’s School of Engineering.</p> <p>“It is also effective in tropical environments, not just here in Melbourne.”</p> <p>“Clinical care is provided in many different locations, including specialist clinics, general practices and in people’s homes,” says co-author Dr Rajna Ogrin, a Senior Research Fellow at Bolton Clarke Research Institute.</p> <p>“This method provides a quick, objective, non-invasive way to determine the wound-healing potential of chronic leg wounds that can be used by healthcare providers, irrespective of the setting.”</p> <p><strong><strong>So, what’s next?</strong></strong></p> <p>There are a few limitations to this study. First, the number of healed wounds in the dataset was relatively small compared to unhealed wounds, and the study only investigated older people.</p> <p>The authors recommend that “future research should focus on improving the predictive accuracy and customising this method to incorporate this assessment into clinical practice on a wider pool of participants and in a variety of settings.”</p> <p>Kumar says that they are hoping to adapt the method for use with mobile phones.</p> <p>“With the funding we have received from the Medical Research Future Fund, we are now working towards that,” he says. “We are keen to work with prospective partners with different expertise to help us achieve this goal within the next few years.”</p> <p><!-- Start of tracking content syndication. Please do not remove this section as it allows us to keep track of republished articles --></p> <p><img id="cosmos-post-tracker" style="opacity: 0; height: 1px!important; width: 1px!important; border: 0!important; position: absolute!important; z-index: -1!important;" src="https://syndication.cosmosmagazine.com/?id=222978&amp;title=Could+mobile+phones+revolutionise+chronic+wound+treatment%3F" width="1" height="1" /></p> <p><!-- End of tracking content syndication --></p> <div id="contributors"> <p><em><a href="https://cosmosmagazine.com/health/revolutionise-chronic-wounds-treatment/" target="_blank" rel="noopener">This article</a> was originally published on Cosmos Magazine and was written by Imma Perfetto.</em></p> <p><em>Image: RMIT University</em></p> </div>

Technology

Placeholder Content Image

Man beats mobile phone driving charge in “unusual” ruling

<p dir="ltr">A Queensland man has had his charge of using a mobile phone successfully overturned in court - but the ruling could see state legislation changed to close any existing “loophole” that exists.</p> <p dir="ltr">Konrad Gordon Gallaher appeared in the Southport Magistrates Court last week to fight the charge from the transport department after he was photographed holding an electronic device while driving by traffic cameras.</p> <p dir="ltr">Mr Gallaher provided evidence that he was actually handling an Apple iPod, highlighting the fact that his mobile phone could be seen mounted on the dashboard in the photo.</p> <p dir="ltr">Showing the device in question to the court, he said it had “no phone functionality”.</p> <p dir="ltr">His evidence was accepted by magistrate Dzenita Balic, who also clarified that it was up to the prosecution to prove beyond unreasonable doubt that Mr Gallaher was using a mobile phone.</p> <p dir="ltr">While she found that the device in question was actually an iPhone, Mr Gallaher had testified that the device didn’t have a SIM card and was unable to make calls.</p> <p dir="ltr">“I could not find, and I do not, that he was dishonest in his description of the device as a portable music player,” she said in <a href="https://archive.sclqld.org.au/qjudgment/2022/QMC22-002.pdf" target="_blank" rel="noopener">her verdict</a> delivered on Friday.</p> <p dir="ltr">“Although to my mind he is clearly wrong about the device being an iPod, his other assertions as to the limited musical functionality of the device remained unchallenged.</p> <p dir="ltr">“I should add that to me, the use of this device by Mr Gallaher was just as dangerous as the use of a mobile phone.</p> <p dir="ltr">“(But) a mobile phone therefore must take on its natural meaning. It is a device capable of communication.</p> <p dir="ltr">“My view is that, at the time of the driving, I cannot be satisfied, considering the evidence by Mr Gallaher, which I have now discussed from different angles, that this was indeed a mobile phone at the relevant time.”</p> <p dir="ltr">In Queensland, rules about driver distractions are under the <em>Transport Operations (Road Use Management-Road Rules) Regulation 2009</em>, which states that it’s an offence for a person to hold a phone or rest it on any part of their body while the car is moving or stationary but not parked outside of limited circumstances, such as using it to pay in a drive-through or to provide their digital documents to police.</p> <p dir="ltr">These laws specifically refer to mobile phones rather than any kind of electronic device.</p> <p dir="ltr">Queensland Transport Minister Mark Bailey told <em><a href="https://7news.com.au/news/qld/queensland-man-beats-mobile-phone-driving-charge-in-ruling-set-to-have-major-implications-c-8841473" target="_blank" rel="noopener">7News</a></em> that Balic’s ruling was “unusual” and that he would be seeking advice on the matter.</p> <p dir="ltr">“Clearly the driver was still distracted, which is the intent of the legislation,” he said.</p> <p dir="ltr">“So I’ll be getting advice on this matter.</p> <p dir="ltr">“If there is any loophole that exists, we’ll be seeking to close it.”</p> <p><span id="docs-internal-guid-6c31715d-7fff-53a3-a4d7-80f6fb053f9c"></span></p> <p dir="ltr"><em>Image: Getty Images</em></p>

Legal

Placeholder Content Image

Mobile phone hoarding: e-waste not good news for the environment

<p>What happened to your previous mobile phone after you upgraded or replaced it? Did it go in a drawer? A box in the garage, perhaps?</p> <p>Today marks International E Waste Day, with this year’s slogan, “Recycle it all, no matter how small!”, specifically targeting small devices with a high recycling value that are often hoarded for years before they become waste.</p> <p>It’s a timely reminder, as results from surveys conducted across Europe suggest that the roughly 5.3 billion mobiles and smartphones dropping out of use this year would reach a height of around 50,000 km if stacked flat and on top of each other.</p> <p>That’s well-and-truly over the average orbiting height of the International Space Station and about an eighth of the distance to the moon.</p> <p>“In 2022 alone, small EEE (Electrical and Electronic Equipment) items such as cell phones, electric toothbrushes, toasters and cameras produced worldwide will weigh an estimated total of 24.5 million tonnes – four times the weight of the Great Pyramid of Giza”, says Magdalena Charytanowicz of the WEEE (Waste Electrical and Electronic Equipment) Forum, responsible for organising <a href="https://www.genevaenvironmentnetwork.org/events/international-e-waste-day-2022/" target="_blank" rel="noreferrer noopener">International E Waste Day</a>. “And these small items make up a significant proportion of the 8% of all e-waste thrown into trash bins and eventually landfilled or incinerated.”</p> <p>With their valuable components of <a href="https://cosmosmagazine.com/technology/critical-minerals-mining-australia/" target="_blank" rel="noreferrer noopener">gold, copper, silver, palladium and other materials</a>, mobile phones ranked fourth amongst small Electrical and Electronic Equipment (EEE) hoarded or unrecoverably discarded – that is put in draws, cupboards or garages – rather than repaired or recycled – or sent to landfill or for incineration.</p> <p>The surveys ran for four months from June 2022 and covered 8,775 households across Portugal, Netherlands, Italy, Romani, Slovenia and the UK and asked participants about common items such as phones, tablets, laptops, electric tools, hair dryers, toasters and other appliances. The top five hoarded small EEE products were (in order): small electronics and accessories (e.g., headphones, remotes), small equipment (e.g., clocks, irons), small IT equipment (e.g., hard drives, routers, keyboards, mice), mobile and smartphones, small food preparation appliances (e.g., toasters, grills).</p> <p>Italy hoarded the highest number of small EEE products, while Lebanon hoarded the least.</p> <p>You might recognise some of the reasons given, which included potential future use, plans to sell or give away, sentimental value, future value, use in a secondary residence or contains sensitive data. Others were also unsure how to dispose of the item or felt there was no incentive to recycle it, and some argued that they’d forgotten, didn’t have time or that the item didn’t take up very much space.</p> <p>This is a shame because such items, despite being small, pack a big punch in recyclability.</p> <div class="newsletter-box"> <div id="wpcf7-f6-p218602-o1" class="wpcf7" dir="ltr" lang="en-US" role="form"> <form class="wpcf7-form mailchimp-ext-0.5.62 spai-bg-prepared init" action="/earth/e-waste-mobile-phone-bad-news-environment/#wpcf7-f6-p218602-o1" method="post" novalidate="novalidate" data-status="init"> <p style="display: none !important;"><span class="wpcf7-form-control-wrap referer-page"><input class="wpcf7-form-control wpcf7-text referer-page" name="referer-page" type="hidden" value="https://cosmosmagazine.com/" data-value="https://cosmosmagazine.com/" aria-invalid="false" /></span></p> <p><!-- Chimpmail extension by Renzo Johnson --></form> </div> </div> <p>“We focussed this year on small e-waste items because it is very easy for them to accumulate unused and unnoticed in households, or to be tossed into the ordinary garbage bin”, says Pascal Leroy, Director General of the WEEE Forum, who have organised International E Waste Day. “People tend not to realise that all these seemingly insignificant items have a lot of value, and together at a global level represent massive volumes.”</p> <p>“These devices offer many important resources that can be used in the production of new electronic devices or other equipment, such as wind turbines, electric car batteries or solar panels – all crucial for the green, digital transition to low-carbon societies,” says Charytanowicz.</p> <h4>What can be done about e-waste?</h4> <p>At the governmental level, there are a number of initiatives including legislation that are coming into effect or being tightened up in order to address this increasing problem.</p> <p>“The continuing growth in the production, consumption and disposal of electronic devices has huge environmental and climate impacts,” says Virginijus Sinkevičius, European Commissioner for the Environment, Oceans and Fisheries. “The European Commission is addressing those with proposals and measures throughout the whole product life-cycle, starting from design until collection and proper treatment when electronics become waste.”</p> <p>“Moreover, preventing waste and recovering important raw materials from e-waste is crucial to avoid putting more strain on the world’s resources. Only by establishing a <a href="https://cosmosmagazine.com/technology/can-a-circular-economy-eliminate-e-waste/" target="_blank" rel="noopener">circular economy</a> for electronics, the EU will continue to lead in the efforts to urgently address the fast-growing problem of e-waste.”</p> <p>There is also a role for more education and communication.</p> <p>Launched today by UNITAR, the UN Institute for Training and Research (UNITAR), is the first self-paced e-waste<a href="https://www.uncclearn.org" target="_blank" rel="noopener"> online training course</a> open to anyone. A UNITAR certificate is available upon graduation of the roughly 1.5-hour course which aims to use scientific findings in a practical way for international training and capacity building,” says Nikhil Seth, UNITAR’s Executive Director.</p> <p>Finally, The WEEE Forum has been actively involved in collecting, de-polluting, recycling or preparing for re-use more than 30 million tonnes of WEEE and has also run communication campaigns for almost twenty years.</p> <p>“Providing collection boxes in supermarkets, pick up of small broken appliances upon delivery of new ones and offering PO Boxes to return small e-waste are just some of the initiatives introduced to encourage the return of these items,” says WEEE’s Leroy.</p> <p>At the personal level, all you have to do is quite your hoarding habits and recycle, instead!</p> <p><!-- Start of tracking content syndication. Please do not remove this section as it allows us to keep track of republished articles --></p> <p><img id="cosmos-post-tracker" style="opacity: 0; height: 1px!important; width: 1px!important; border: 0!important; position: absolute!important; z-index: -1!important;" src="https://syndication.cosmosmagazine.com/?id=218602&amp;title=Mobile+phone+hoarding%3A+e-waste+not+good+news+for+the+environment" width="1" height="1" /></p> <p><!-- End of tracking content syndication --></p> <div id="contributors"> <p><em><a href="https://cosmosmagazine.com/earth/e-waste-mobile-phone-bad-news-environment/" target="_blank" rel="noopener">This article</a> was originally published on <a href="https://cosmosmagazine.com" target="_blank" rel="noopener">Cosmos Magazine</a> and was written by <a href="https://cosmosmagazine.com/contributor/clare-kenyon" target="_blank" rel="noopener">Clare Kenyon</a>. </em></p> <p><em>Image: Getty Images</em></p> </div>

Technology

Placeholder Content Image

7 tricks to use less phone data – and lower your phone bill

<p><strong>Turn off background app refresh</strong></p> <p><img src="https://oversixtydev.blob.core.windows.net/media/2022/10/01-background-simple-ways-use-less-data-770.jpg" alt="" width="770" height="514" /></p> <p>When this feature is enabled, your apps are constantly refreshing so that they can show you the most recent content when opened. This includes email synching, weather widgets updating, and feeds refreshing. For the iPhone: Turn off the background app refresh by going to Settings &gt; General &gt; Background App Refresh. For Android: Go to Settings &gt; Data Usage &gt; Restrict app background data. This will allow you to turn the feature off for all apps or you can pick and choose which ones you want to turn off.</p> <p><strong>Disable apps that use a lot of data</strong></p> <p><strong><img src="https://oversixtydev.blob.core.windows.net/media/2022/10/02-disable-simple-ways-use-less-data-770.jpg" alt="" width="770" height="514" /></strong></p> <p>There are certain apps that use more data than others, whether you use them frequently or not. For ones that you don’t use often, turn off cellular data. For the iPhone: Go to Settings &gt; Cellular &gt; then under “Use Cellular Data For” switch certain apps to off.</p> <p><strong>Turn off app updates</strong></p> <p><img src="https://oversixtydev.blob.core.windows.net/media/2022/10/03-updates-simple-ways-use-less-data-770.jpg" alt="" width="770" height="514" /></p> <p>If your apps update automatically your phone will start the download whether you are connected to Wi-Fi or not. To turn this off on an iPhone, go to Settings &gt; iTunes &amp; App Stores &gt; turn off Use Cellular Data. For an Android, go to Settings &gt; under General click Auto-update apps &gt; Auto-update apps over Wi-Fi only. Then, your apps will only update when you are connected to Wi-Fi.</p> <p><strong>Turn off Wi-Fi assist</strong></p> <p><img src="https://oversixtydev.blob.core.windows.net/media/2022/10/04-wifi-simple-ways-use-less-data-770.jpg" alt="" width="770" height="514" /></p> <p>Wi-Fi assist automatically uses your cellular data when the Wi-Fi signal is poor. To disable Wi-Fi assist for an iPhone go to Settings &gt; Cellular &gt; turn off Wi-Fi Assist.</p> <p><strong>Turn off iCloud drive</strong></p> <p><strong><img src="https://oversixtydev.blob.core.windows.net/media/2022/10/05-icloud-simple-ways-use-less-data-770.jpg" alt="" width="770" height="514" /></strong></p> <p>When iCloud is enabled it is constantly moving documents in and out of the cloud. Use less cell phone data by turning iCloud off. To do this on the iPhone got to Settings &gt; iCloud &gt; turn off iCloud Drive.</p> <p><strong>Download music</strong></p> <p><img src="https://oversixtydev.blob.core.windows.net/media/2022/10/06-download-simple-ways-use-less-data-770.jpg" alt="" width="770" height="514" /></p> <p>When you are on the go, streaming music, podcasts, or videos can really eat away at your data. Both the iPhone and Android phones let you restrict these apps to Wi-Fi only. Turning this setting on will force you to download them when connected to a Wi-Fi network and then allow for data free listening on the move.</p> <p><strong>Turn off cellular data completely</strong></p> <p><strong><img src="https://oversixtydev.blob.core.windows.net/media/2022/10/07-turn-simple-ways-use-less-data-770.jpg" alt="" width="770" height="514" /></strong></p> <p>If you know that you are about to reach you data limit or are saving it for the road trip you have coming up, you can simply turn off cellular data. This way, no data will be used, and certain apps will only work if you are connected to a Wi-Fi network.</p> <p><em><span id="docs-internal-guid-a9e22df5-7fff-1897-03fe-9c3a3e5e32d8">Written by M</span></em><em>organ Cutolo</em><em>. This article first appeared in <a href="https://www.readersdigest.com.au/culture/7-tricks-to-use-less-phone-data-and-lower-your-phone-bill" target="_blank" rel="noopener">Reader’s Digest</a>. For more of what you love from the world’s best-loved magazine, <a href="http://readersdigest.innovations.com.au/c/readersdigestemailsubscribe?utm_source=over60&amp;utm_medium=articles&amp;utm_campaign=RDSUB&amp;keycode=WRA87V" target="_blank" rel="noopener">here’s our best subscription offer.</a></em></p> <p><em>Images: </em><em>NICOLE FORNABAIO/RD.COM</em></p>

Technology

Placeholder Content Image

"This is shocking": Police slammed over sneaky trap

<p dir="ltr">A New Zealand man has clashed with police after he accused an officer of posing as a window washer to catch drivers using their mobile phones.</p> <p dir="ltr">While he was stopped at a traffic light in Manurewa, South Auckland, the man began filming after noticing an undercover cop in a hoodie standing nearby.</p> <p dir="ltr">"He's the cop who gave me the ticket!" he can be heard telling a friend sitting in the car with him.</p> <p dir="ltr">"This is bad, man. He's pretending to be a window washer!"</p> <p dir="ltr">The passenger then gets out of the car and makes his way toward the officer to “let the public know” what was happening.</p> <p dir="ltr">"Alright guys so we've got police here hiding, pretending to be window washers," he says while standing next to the police officer.</p> <p dir="ltr">"So what they do is they stand here and they dress up in hoodies with a window washer thing and they're looking and trying to get people tickets for fines, maybe phones, seatbelts."</p> <p dir="ltr">Within moments, several other officers approach the man.</p> <p dir="ltr">One officer confirms that the “window washer” was an undercover cop, and when the man questions whether the tactic was “saving lives”, an officer says it was.</p> <p><span id="docs-internal-guid-0d908dfb-7fff-01e3-7576-17123380c286"></span></p> <p dir="ltr">The man is then told by police that he could film but has to do it from the opposite side of the road so that the undercover operation isn’t interfered with.</p> <blockquote class="twitter-tweet"> <p dir="ltr" lang="en">😂😂😂 wish one of your cousins is the undercover cop lmao? <a href="https://t.co/5QWvlg2hYy">pic.twitter.com/5QWvlg2hYy</a></p> <p>— Danny (@disndatnz) <a href="https://twitter.com/disndatnz/status/1577420707008417816?ref_src=twsrc%5Etfw">October 4, 2022</a></p></blockquote> <p dir="ltr">The hoodie-wearing officer is then encouraged to return to his spot by the side of the road.</p> <p dir="ltr">The clip has since been shared on TikTok and by Today FM, with morning talk show host Duncan Garner speaking to the man’s friend, Neil, who was in the car during the incident.</p> <p dir="ltr">“I've driven up and down the country all the time and I’ve never seen any sort of act like this anywhere apart from there," Neil said.</p> <p dir="ltr">"And the fact that he put on clothes to sort of fit into that area is really quite rude."</p> <p dir="ltr">Stuff reported that NZ Police Inspector Tony Wakelin said the impersonation was inappropriate and that the operation would cease.</p> <p dir="ltr">Meanwhile, social media users have been slamming the police for their “sneaky ways”.</p> <p dir="ltr">"You cannot tell me this isn’t insanely deceptive," one commented.</p> <p dir="ltr">"This is shocking," another shared.</p> <p dir="ltr">"Isn't this entrapment?" a third said.</p> <p dir="ltr">Others defended the operation, saying that the police were just trying to prevent people from doing the wrong thing.</p> <p dir="ltr">"Lord. Get off your phone while you're driving. End of story," one wrote.</p> <p dir="ltr">"No this is good, I have been rear-ended by someone texting and driving," another added.</p> <p dir="ltr">"They are trying to prevent crime and save lives but at the same time they are distracting drivers which can cause accidents," one person shared on Reddit.</p> <p dir="ltr">“So it’s not a good method".</p> <p dir="ltr"><span id="docs-internal-guid-3b55a891-7fff-3770-adae-3246ffd162ab"></span></p> <p dir="ltr"><em>Images: Today FM</em></p>

Legal

Placeholder Content Image

Here’s the real reason to turn on aeroplane mode when you fly

<p>We all know the routine by heart: “Please ensure your seats are in the upright position, tray tables stowed, window shades are up, laptops are stored in the overhead bins and electronic devices are set to flight mode”.</p> <p>Now, the first four are reasonable, right? Window shades need to be up so we can see if there’s an emergency, such as fire. Tray tables need to be stowed and seats upright so we can get out of the row quickly. Laptops can become projectiles in an emergency, as the seat back pockets are not strong enough to contain them.</p> <p>And mobile phones need to be set to flight mode so they can’t cause an emergency for the aeroplane, right? Well, it depends whom you ask.</p> <h2>Technology has advanced a great deal</h2> <p>Aviation navigation and communication relies on radio services, which have been coordinated to minimise interference <a href="https://ntrs.nasa.gov/api/citations/20050232846/downloads/20050232846.pdf">since the 1920s</a>.</p> <p>The digital technology currently in use is much more advanced than some of the older analogue technologies we used even 60 years ago. <a href="https://www.sciencedirect.com/science/article/pii/S2352146521008851">Research has shown</a>personal electronic devices can emit a signal within the same frequency band as the aircraft’s communications and navigation systems, creating what is known as electromagnetic interference.</p> <p>But in 1992, <a href="https://www.livescience.com/5947-real-reason-cell-phone-banned-airlines.html">the US Federal Aviation Authority</a> and Boeing, <a href="https://www.boeing.com/commercial/aeromagazine/aero_10/interfere_textonly.html">in an independent study</a>, investigated the use of electronic devices on aircraft interference and found no issues with computers or other personal electronic devices during non-critical phases of flight. (Take-offs and landings are considered the critical phases.) </p> <p>The US Federal Communications Commission also began to create <a href="https://www.livescience.com/5947-real-reason-cell-phone-banned-airlines.html">reserved frequency bandwidths</a> for different uses – such as mobile phones and aircraft navigation and communications – so they do not interfere with one another. Governments around the globe developed the same <a href="https://ntrs.nasa.gov/api/citations/20050232846/downloads/20050232846.pdf">strategies and policies to prevent interference</a> problems with aviation. In the EU, electronic devices have been <a href="https://www.easa.europa.eu/en/newsroom-and-events/news/easa-allows-electronic-devices-remain-and-connected-throughout-flight">allowed to stay on since 2014</a>.</p> <h2>2.2 billion passengers</h2> <p>Why then, with these global standards in place, has the aviation industry continued to ban the use of mobile phones? One of the problems lies with something you may not expect – ground interference.</p> <p>Wireless networks are connected by <a href="https://www.livescience.com/5947-real-reason-cell-phone-banned-airlines.html">a series of towers</a>; the networks could become overloaded if passengers flying over these ground networks are all using their phones. <a href="https://www.statista.com/statistics/564717/airline-industry-passenger-traffic-globally/">The number of passengers that flew in 2021</a> was over 2.2 billion, and that’s half of what the 2019 passenger numbers were. The wireless companies might have a point here. </p> <p>Of course, when it comes to mobile networks, the biggest change in recent years is the move to a new standard. Current 5G wireless networks – desirable for their higher speed data transfer – have caused concern for many within the aviation industry.</p> <p>Radio frequency bandwidth is limited, yet we are still trying to add more new devices to it. The aviation industry points out that the <a href="https://www.sciencedirect.com/science/article/pii/S2352146521008851">5G wireless network bandwidth spectrum</a> is remarkably close to the reserved aviation bandwidth spectrum, which may cause <a href="https://www.newscientist.com/article/2304975-will-5g-mobile-networks-in-the-us-really-interfere-with-aircraft/">interference with navigation systems near airports</a>that assist with landing the aircraft.</p> <p>Airport operators <a href="https://www.itnews.com.au/news/australian-airports-fret-over-5g-interference-582222">in Australia</a> and <a href="https://www.faa.gov/5g">the US</a> have voiced aviation safety concerns linked to 5G rollout, however it appears to have rolled out without such problems <a href="https://edition.cnn.com/2022/01/19/business/5g-aviation-safety-europe/index.html">in the European Union</a>. Either way, it is prudent to limit mobile phone use on planes while issues around 5G are sorted out.</p> <h2>Ultimately, we can’t forget air rage</h2> <p>Most airlines now provide customers with Wi-Fi services that are either pay-as-you-go or free. With new Wi-Fi technologies, passengers could theoretically use their mobile phones to <a href="https://ieeexplore.ieee.org/abstract/document/8010762">make video calls with friends</a> or clients in-flight. </p> <p>On a recent flight, I spoke with a cabin attendant and asked her opinion on phone use during flights. It would be an inconvenience for cabin crew to wait for passengers to finish their call to ask them if they would like any drinks or something to eat, she stated. On an airliner with 200+ passengers, in-flight service would take longer to complete if everyone was making phone calls. </p> <p>For me, the problem with in-flight use of phones is more about the social experience of having 200+ people on a plane, and all potentially talking at once. In a time when disruptive passenger behaviour, including “air rage”, <a href="http://www.jairm.org/index.php/jairm/article/view/156">is increasingly frequent</a>, phone use in flight might be another trigger that changes the whole flight experience. </p> <p>Disruptive behaviours take on various forms, from noncompliance to safety requirements such as not wearing seat belts, verbal altercations with fellow passengers and cabin crew, to physical altercations with passengers and cabin crews – typically identified as air rage. </p> <p>In conclusion – in-flight use of phones does not currently impair the aircraft’s ability to operate. But cabin crews may prefer not to be delayed in providing in-flight service to all of the passengers – it’s a lot of people to serve. </p> <p>However, 5G technology is encroaching on the radio bandwidth of aircraft navigation systems; we’ll need more research <a href="https://theconversation.com/how-5g-puts-airplanes-at-risk-an-electrical-engineer-explains-175306">to answer the 5G question</a> regarding interference with aircraft navigation during landings. Remember that when we are discussing the two most critical phases of flight, take-offs are optional – but landings are mandatory.</p> <p><em>Image credits: Getty Images</em></p> <p><em>This article originally appeared on <a href="https://theconversation.com/heres-the-real-reason-to-turn-on-aeroplane-mode-when-you-fly-188585" target="_blank" rel="noopener">The Conversation</a>. </em></p>

Travel Tips

Placeholder Content Image

Can your mobile phone get a virus?

<p>With nearly <a href="https://www.bankmycell.com/blog/how-many-phones-are-in-the-world" target="_blank" rel="noopener">84%</a> of the world’s population now owning a smartphone, and our dependence on them growing all the time, these devices have become an attractive avenue for scammers.</p> <p>Last year, cyber security company Kaspersky detected nearly <a href="https://securelist.com/mobile-malware-evolution-2021/105876/" target="_blank" rel="noopener">3.5 million</a> malicious attacks on mobile phone users. The spam messages we get on our phones via text message or email will often contain links to viruses, which are a type of malicious software (malware).</p> <p>There’s a decent chance that at some point you’ve installed <a href="https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6138859" target="_blank" rel="noopener">malware</a> that infected your phone and worked (without you noticing) in the background. According to a global report commissioned by private company Zimperium, more than <a href="https://www.zimperium.com/global-mobile-threat-report/" target="_blank" rel="noopener">one-fifth</a> of mobile devices have encountered malware. And four in ten mobiles worldwide are <a href="https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/" target="_blank" rel="noopener">vulnerable</a> to cyber attacks.</p> <p>But how do you know if your phone has been targeted? And what can you do?</p> <p><strong>How does a phone get infected?</strong></p> <p>Like personal computers, phones can be compromised by malware.</p> <p>For example, the Hummingbad virus infected <a href="https://www.wired.co.uk/article/hummingbad-malware-10-million-android-devices" target="_blank" rel="noopener">ten million</a> Android devices within a few months of its creation in 2016, and put as many as <a href="https://www.theguardian.com/technology/2016/jul/06/what-is-hummingbad-malware-android-devices-checkpoint" target="_blank" rel="noopener">85 million</a> devices at risk.</p> <p>Typically, a phone virus works the same way as a computer virus: a malicious code infects your device, replicates itself and spreads to other devices by auto-messaging others in your contact list or auto-forwarding itself as an email.</p> <p>A virus can limit your phone’s functionality, send your personal information to hackers, send your contacts spam messages linking to malware, and even allow the virus’s operator to “spy” on you by capturing your screen and keyboard inputs, and tracking your geographical location.</p> <p>In Australia, Scamwatch received <a href="https://www.scamwatch.gov.au/news-alerts/missed-delivery-call-or-voicemail-flubot-scams" target="_blank" rel="noopener">16,000 reports</a> of the Flubot virus over just eight weeks in 2021. This <a href="https://suretyit.com.au/blog/what-is-the-flubot-virus/" target="_blank" rel="noopener">virus</a> sends text messages to Android and iPhone users with links to malware. Clicking on the links can lead to a malicious app being downloaded on your phone, giving scammers access to your personal information.</p> <p>Flubot scammers regularly change their <a href="https://www.bitdefender.com/blog/labs/new-flubot-and-teabot-global-malware-campaigns-discovered" target="_blank" rel="noopener">target countries</a>. According to cyber security firm Bitdefender, FluBot operators targeted Australia, Germany, Poland, Spain, Austria and other European countries between December 1 2021 and January 2 of this year.</p> <p><strong>Is either Apple or Android more secure?</strong></p> <p>While Apple devices are generally considered more secure than Android, and <a href="https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6637558" target="_blank" rel="noopener">less prone</a> to virus attacks, iPhone users who “jailbreak” or modify their phone open themselves up to security vulnerabilities.</p> <p>Similarly, Android users who install apps from outside the Google Play store increase their risk of installing malware. It’s recommended all phone users stay on guard, as both Apple and Android are <a href="https://www.forbes.com/sites/zakdoffman/2021/03/16/iphone-12-pro-max-and-iphone-13-not-more-secure-than-google-and-samsung-android-warns-cyber-billionaire/?sh=596442d623f8" target="_blank" rel="noopener">vulnerable</a> to security risks.</p> <p>That said, phones are generally better protected against viruses than personal computers. This is because software is usually installed through authorised app stores that vet each app (although some malicious apps can occasionally slip through <a href="https://blog.pradeo.com/spyware-facestealer-google-play" target="_blank" rel="noopener">the cracks</a>).</p> <p>Also, in comparison to computers, phones are more secure as the apps are usually “<a href="https://source.android.com/security/app-sandbox" target="_blank" rel="noopener">sandboxed</a>” in their own isolated environment – unable to access or interfere with other apps. This reduces the risk of infection or cross contamination from malware. However, no device is entirely immune.</p> <figure class="align-center zoomable"><a href="https://images.theconversation.com/files/459712/original/file-20220426-12-4550kz.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/459712/original/file-20220426-12-4550kz.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/459712/original/file-20220426-12-4550kz.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=338&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/459712/original/file-20220426-12-4550kz.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=338&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/459712/original/file-20220426-12-4550kz.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=338&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/459712/original/file-20220426-12-4550kz.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=424&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/459712/original/file-20220426-12-4550kz.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=424&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/459712/original/file-20220426-12-4550kz.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=424&amp;fit=crop&amp;dpr=3 2262w" alt="A smartphone with a virus alert warning is held up by a hand in front of a dark background." /></a><figcaption><em><span class="caption">Apple devices are generally considered more secure against malware than Android devices, but they’re still at risk.</span> <span class="attribution"><span class="source">Pixabay/Pexels.com (edited)</span>, <a class="license" href="http://creativecommons.org/licenses/by/4.0/" target="_blank" rel="noopener">CC BY</a></span></em></figcaption></figure> <p><strong>Watch out for the signs</strong></p> <p>While it’s not always easy to tell whether your phone is infected, it will exhibit some abnormal behaviours if it is. Some signs to watch out for include:</p> <ul> <li> <p>poor performance, such as apps taking longer than usual to open, or crashing randomly</p> </li> <li> <p>excessive battery drain (due to the malware constantly working in the background)</p> </li> <li> <p>increased mobile data consumption</p> </li> <li> <p>unexplained billing charges (which may include increased data usage charges as a result of the malware chewing up your data)</p> </li> <li> <p>unusual pop-ups, and</p> </li> <li> <p>the device overheating unexpectedly.</p> </li> </ul> <p>If you do suspect a virus has infected your device, there are some steps you can take. First, to prevent further damage you’ll need to remove the malware. Here are some simple troubleshooting steps:</p> <ol> <li> <p>Use a reliable antivirus app to scan your phone for infections. Some reputable vendors offering paid and free protection services include <a href="https://apps.apple.com/us/app/avast-security-privacy/id1276551855" target="_blank" rel="noopener">Avast</a>, <a href="https://www.avg.com/en-au/antivirus-for-android#pc" target="_blank" rel="noopener">AVG</a>, <a href="https://www.bitdefender.com/solutions/mobile-security-android.html" target="_blank" rel="noopener">Bitdefender</a>, <a href="https://www.mcafee.com/en-us/antivirus/mobile.html" target="_blank" rel="noopener">McAfee</a> or <a href="https://us.norton.com/products/mobile-security-for-android" target="_blank" rel="noopener">Norton</a>.</p> </li> <li> <p>Clear your phone’s storage and cache (in Android devices), or browsing history and website data (in Apple devices).</p> </li> <li> <p>Restart your iPhone, or restart your Android phone to <a href="https://www.digitaltrends.com/mobile/how-to-turn-safe-mode-on-and-off-in-android/" target="_blank" rel="noopener">go into safe mode</a> – which is a feature on Android that prevents third-party apps from operating for as long as it’s enabled.</p> </li> <li> <p>Delete any suspicious or unfamiliar apps from your downloaded apps list and, if you’re an Android user, turn safe mode off once the apps are deleted.</p> </li> </ol> <p>As a last resort, you can back up all your data and perform a factory reset on your phone. Resetting a phone to its original settings will eliminate any malware.</p> <p><strong>Protecting your phone from infection</strong></p> <p>Now you’ve fixed your phone, it’s important to safeguard it against future viruses and other security risks. The mobile security apps mentioned above will help with this. But you can also:</p> <ul> <li> <p>avoid clicking unusual pop-ups, or links in unusual text messages, social media posts or emails</p> </li> <li> <p>only install apps from authorised app stores, such as Google Play or Apple’s App Store</p> </li> <li> <p>avoid jailbreaking or modifying your phone</p> </li> <li> <p>check app permissions before installing, so you’re aware of what the app will access (rather than blindly trusting it)</p> </li> <li> <p>back up your data regularly, and</p> </li> <li> <p>keep your phone software updated to the latest version (which will have the latest security patches).</p> </li> </ul> <p>Continually monitor your phone for suspicious activity and trust your gut instincts. If something sounds too good to be true, it probably is.<img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/181720/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <figure><iframe src="https://www.youtube.com/embed/nvIXGeB1WgE?wmode=transparent&amp;start=38" width="440" height="260" frameborder="0" allowfullscreen="allowfullscreen"></iframe><figcaption><em>Google’s tips on how to spot malware.</em></figcaption></figure> <p><em><a href="https://theconversation.com/profiles/ritesh-chugh-162770" target="_blank" rel="noopener">Ritesh Chugh</a>, Associate Professor - Information and Communications Technology, <a href="https://theconversation.com/institutions/cquniversity-australia-2140" target="_blank" rel="noopener">CQUniversity Australia</a></em></p> <p><em>This article is republished from <a href="https://theconversation.com" target="_blank" rel="noopener">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/can-your-mobile-phone-get-a-virus-yes-and-youll-have-to-look-carefully-to-see-the-signs-181720" target="_blank" rel="noopener">original article</a>.</em></p> <p><em>Image: Getty Images</em></p>

Technology

Placeholder Content Image

What hackers can do with just your phone number

<p><strong>Your number can be used in many malicious ways</strong></p> <p>Your phone number is an easy-to-find key that can be used by hackers and scammers to unlocking your personal data. They can also use your number in many other malicious ways.</p> <p>I used to think that maybe, at best, a person could possibly find my name and address using my phone number. I was wrong. Recently, someone I don’t know used my phone number to find out the private details of my life, then emailed me everything they had discovered.</p> <p>With just my phone number this person found out where I live, my previous addresses, information on if I’ve ever been evicted, some personal financial information, a map of my neighbourhood, and my birth date. They even found the only speeding ticket I’ve ever had, way back in 2006. It was disturbing, to say the least.</p> <p>I felt, and still feel, violated. I reported the person to the social media site they contacted me through and blocked them, but is there more I can do?</p> <p>After contacting some security experts for their take, it turns out that finding important details about someone’s life with just a phone number is incredibly alarmingly easy…and profitable.</p> <p>“In the wrong hands, your phone number can be used to steal your identity and take over almost every online account you have,” Veronica Miller, cybersecurity expert at VPN overview, tells Reader’s Digest.</p> <p>There are several ways a hacker can use a phone number to turn your life upside down. Here are some ways criminals can target you.</p> <p><strong>Data mining the easy way</strong></p> <p>The easiest way to use your phone number maliciously is by simply typing it into a people search site. Sites like these can reveal personal information about you in less than a few seconds, according to tech expert Burton Kelso.</p> <p>People search sites, purchase your personal information and then sell it to people who want your data, like hackers with your phone number.</p> <p>The information found through these sites includes your address, bankruptcies, criminal records and family member’s names and addresses. All of this can be used for blackmail, stalking, doxing or identity theft.</p> <p><strong>Rerouting your number</strong></p> <p>Another tactic is to contact your mobile carrier provider claiming to be you, said Miller. Then, the hacker can make it so your number routes to their phone. From there, the hacker will log into your email account. Of course, they don’t have your password, but they don’t need it.</p> <p>They just click “Forgot your password” and get the reset link sent to their phone that now uses your phone number. Once the hacker has access to your email account, it’s easy to gain access to any of your accounts.</p> <p>While many service providers have some security features to prevent scammers from switching phones, if the person has your phone number, though, they may be able to find enough information about you to get past the security questions.</p> <p><strong>Spoofing</strong></p> <p>There were billions of scam calls in 2019, according to data collected by YouMail, and scammers are getting smarter. Now they are using a technique called spoofing to make it easier to scam you. Spoofing is when someone makes your phone number pop up on a caller ID when it really isn’t you that’s making the call.</p> <p>For example, a scammer once spoofed my daughter’s phone number to make me think she was calling me. The goal was to trick me into answering the phone. It worked, because what if it was an emergency and my daughter needed me?</p> <p>When a scammer gets you to pick up, they have the chance to trick you into whatever scheme they’ve come up with, like tricking you into giving them your credit card information.</p> <p>It doesn’t take much to spoof a phone number. There are apps and websites that allow scammers to simply type in a phone number and make a call. It’s super easy and quick, which makes it appealing to scammers.</p> <p><strong>Texting scams</strong></p> <p>Scammers can also use your phone number to send you malicious text messages. This type of scam is called ‘smishing’, according to digital privacy expert Ray Wallsh.</p> <p>In these texts, scammers can send links that can infect your phone with malware that can steal your personal information, or they can straight-up scam you by pretending to be your bank, the IRS, or your doctor.</p> <p>Posing as someone you trust, the scammers will then try to trick you into giving them personal information and credit card numbers.</p> <p><strong>How to protect yourself</strong></p> <p>All of the experts I contacted recommended that to combat your phone number being misused, share it as little as possible. “Many apps and services require a cell number for verification at sign up. By handing your data to these apps, services and businesses, you increase the likelihood that your phone number will be passed on to third parties and data aggregators,” said Wallsh. Limit giving out your phone number to friends and family and your doctor.</p> <p>For everyone else, you need a virtual number that can forward calls to your phone so you don’t need to give anyone your real number that is linked to your personal information. You can set up a virtual number for free through Google Voice or through services like Burner.</p> <p>Also, never click on links sent to you in text messages, even if they look like they were sent from a trusted contact. If your bank, credit card company, doctor or service you use contacts you through text, call them using a verified number from their website to confirm the communication was truly sent from them to avoid malware or scams.</p> <p>To protect yourself from hackers rerouting your number, ask your mobile carrier to add an extra layer of security like a password or PIN number to your account, advises Miller.</p> <p>All of these steps can help keep your personal information private, but it only works to a point. Your personal data has probably already been sold to people search sites and while you can send these sites requests to remove your information, it’s a huge task. Plus, the site may simply repost your information later.</p> <p>So, in the end, there may not be a way to completely prevent hackers and scammers from getting access to your phone number. Knowing what someone can do with your number, though, can help you avoid scams and protect your information from being more widely spread.</p> <p><em>Image credits: Getty Images</em></p> <p><em>This article originally appeared on <a rel="noopener" href="https://www.readersdigest.com.au/true-stories-lifestyle/science-technology/what-hackers-can-do-with-just-your-phone-number" target="_blank">Reader's Digest</a>.</em></p>

Technology

Placeholder Content Image

Here’s how to charge your phone faster

<p><strong>Switch into aeroplane mode</strong></p> <p><span>A quick way to keep the battery from draining so quickly is to switch it to plane mode. </span></p> <p><span>You won’t be able to get texts or search online, but you’ll save power because your phone won’t be constantly searching for a cellular or WiFi connection.</span></p> <p><strong>Turn it off</strong></p> <p><span>There’s no better way to make sure all the power goes directly to your battery than making sure there’s no competition for it by switching it off. </span></p> <p><span>Alternatively, leave your phone in low power mode. You can find it in settings. Sometimes it’s known as battery saver mode.</span></p> <p><strong>Plug it into a wall socket</strong></p> <p>The USB port of your computer may be convenient when you’re working remotely, but an outlet will charge your phone faster.</p> <p>This is because USB ports usually only charge at 0.5 amps, so it’s going to take twice as long to charge your phone than the one amp power adapter it came with.</p> <p><strong>Use a powerful wall charger</strong></p> <p><span>It can also be helpful to have a charger that works faster than the one that comes with your phone, such as a rapid charger. </span></p> <p><span>Just find an outlet, plug it in in, and connect it to your phone.</span></p> <p><strong>Keep a charged battery pack handy</strong></p> <p><span>For those situations when you know you’re going to be away from a traditional power source, buying a battery pack is a good idea. </span></p> <p><span>Just make sure to plan for it in advance, so you can charge the battery pack before you leave.</span></p> <p><strong>Get your phone out of the sun</strong></p> <p><span>Avoid exposing your phone to temperatures above 35º Celsius. </span></p> <p><span>The heat can damage your battery capacity, and your phone’s software may limit charging to about 80% when the phone gets hotter than the recommended temperature.</span></p> <p><strong>Take your phone out of the case</strong></p> <p><span>If you notice that your phone gets hot when you charge it, take it out of its case. </span></p> <p><span>“Charging your device when it’s inside certain styles of cases may generate excess heat, which can affect battery capacity,” according to Apple.</span></p> <p><strong>Clean out your lightning port</strong></p> <p><span>The problem may not be with the power of your battery itself. Over time, lint and dust can accumulate in your lightning port (that’s where you plug your charger into your phone) and clog it. </span></p> <p><span>CNET recommends turning your phone off and using a toothpick to gently remove any debris from the port. Then plug in your charger again and see if it works better.</span></p> <p><strong>Get a powerful wireless charger</strong></p> <p><span>For a quick juice boost, look for a charger with high wattage. “The higher the number of watts, the faster your device will charge,” Macworld reports. </span></p> <p><span>The typical chargers that come with iPhones and older Androids carry one amp of current and produce five watts of power, according to the consumer blog Techlicious. </span></p> <p><span>But “new rapid chargers with technology such as Quick Charge support two amps and 12 watts or more, potentially charging your phone up to four times faster.”</span></p> <p><strong>Get a wireless charging pad</strong></p> <p><span>Though wired charging is faster, wireless charging is also a good option.</span></p> <p><strong>Invest in a charging case</strong></p> <p>For an ongoing solution to ensure you can charge your phone quickly, consider getting a charging case.</p> <p>Some models can extend your battery’s life for 22 hours. They come in a range of prices and designs.</p> <p><em>Image credits: Getty Images</em></p> <p><em>This article originally appeared in <a rel="noopener" href="https://www.readersdigest.com.au/true-stories-lifestyle/science-technology/heres-how-to-charge-your-phone-faster?pages=1" target="_blank">Reader's Digest</a>.</em></p>

Technology

Placeholder Content Image

One Nation under fire for leaking Jacqui Lambie’s mobile number

<p dir="ltr">Jacquie Lambie is calling for One Nation to apologise after a Tasmanian One Nation candidate reportedly published her private mobile number on his Facebook page, leading to her receiving a torrent of abuse from his supporters.</p> <p dir="ltr">Senate President Slade Brockman said on Tuesday that he would look into Senator Lambie’s call for a review of MPs’ safety. Meanwhile, Senator Malcolm Roberts has thus far refused to apologise for publicising Lambie’s number, claiming a constituent of his found Senator Lambie’s number on her Facebook page.</p> <p dir="ltr">On Monday, Lambie criticised One Nation for using the Commonwealth government to end state vaccine mandates, which led to a One Nation candidate in Tasmania, Steve Mav, posting a screenshot of a text from Senator Lambie to a constituent, saying she opposed vaccine mandates. The constituent claimed to have found the number on Lambie’s own page. Roberts then shared Mav’s post to his own Facebook page, which has a much wider audience. On Tuesday, Senator Lambie told the Senate that Senator Roberts had leaked her personal phone number.</p> <p dir="ltr">Speaking to the Senate, Lambie said, “Since then I’ve received any number of nasty, abusive and threatening phone calls and messages. I give my phone number to veterans whose mental health is not so good and are on their last legs.</p> <p dir="ltr">“These veterans know they can call me at any time of the day or night if they need someone to listen to them. If you’ve got someone’s number it’s not hard to find out personal details that are linked to it. I’m going to have to change my number because I need to make sure my family and friends are safe.”</p> <p dir="ltr">According to the<span> </span><a rel="noopener" href="https://www.smh.com.au/politics/federal/one-nation-under-fire-for-sharing-lambie-s-phone-number-triggering-wave-of-abuse-20211123-p59bfj.html" target="_blank"><em>Sydney Morning Herald</em></a><em>,<span> </span></em>Lambie has previously posted her number to Facebook, but not in the past two years, and never in the context of the debate around vaccine mandates.</p> <p dir="ltr">Examples of the abuse she received via text can be found on other social media platforms, and include slurs and other offensive language, personal insults, and cruel references to Lambie’s son’s battle with methamphetamine use.</p> <p dir="ltr">Labor’s leader in the Senate, Penny Wong, and Finance Minister Simon Birmingham have both supported Lambie’s call for an apology, with Wong stating that civility in politics is essential, and Birmingham saying that the government was willing to let Senator Roberts speak on the matter in order to provide an apology. Roberts declined the offer, instead claiming that Lambie was misrepresenting One Nation because the party is gaining momentum in Tasmania.</p> <p dir="ltr"><em>Image: Sam Mooy/Getty Images</em></p>

Legal

Placeholder Content Image

Cracking the code of unbreakable phone screens

<div> <div class="copy"> <p>Unbreakable phone screens might seem too good to be true, but some chemical engineers reckon they’ve cracked the secret, developing a new material that combines glass with nanocrystals to make a resilient screen that would produce high-quality images in phones, LEDs and computers.</p> <p>The breakthrough substance could even be used to make phone screens that double as solar panels.</p> <p>The technology revolves around <a rel="noreferrer noopener" href="https://cosmosmagazine.com/science/overcoming-atomic-level-perovskite-defects/" target="_blank">perovskites</a>: nanometre-sized crystals that have a range of exciting electrical properties, making them prime candidates for better solar cells, LEDs and touchscreens.</p> <p>While perovskites have had a few early commercial successes, their physical properties have mostly stopped them from getting far out of the lab.</p> <p>“The stability of perovskites is the most difficult challenge which has hindered their commercialisation,” says Professor Lianzhou Wang, a materials scientist at the University of Queensland and co-author on a paper describing the research, <a rel="noreferrer noopener" href="http://www.science.org/doi/10.1126/science.abf4460" target="_blank">published</a> in <em>Science.</em></p> <p>Lead author Dr Jingwei Hou, also from UQ, says the material is “super sensitive to almost everything – oxygen, water, gas, temperature, and even sensitive to light.</p> <p>“I think it’s a fantastic material, but it doesn’t really make sense if we want to use it on a solar panel, or display, if it’s sensitive to light.”</p> <p>The researchers have overcome this sensitivity by figuring a way to encase lead-halide perovskites in glass.</p> <p>“We created a lot of very small, nano-sized pores within the glass,” explains Hou. “That offers a very nice host material environment for the perovskite.</p> <p>“If we just put those very small nanocrystals within the pores, they will be not only stabilised against all of the external environment…it also makes the perovskite somewhere between 100 to 1000 times more efficient.”</p> <p>At the level of nanometres, the material resembles a chocolate chip cookie. “The perovskite nanocrystals are the chocolate chips, and the glass surrounds them,” says Hou.</p> <p>The material is also much more durable than normal glass. “Conventional glass is so brittle [because] it’s really dense. If you zoom in and look at the molecular structure, it’s silicon, aluminium, oxygen – very densely packed atoms,” says Hou.</p> <p>“Once you apply any pressure or any mechanical force to it, there’s no way to get it relaxed, and that’s what leads to the breakage of chemical bonds.”</p> <p>The pores, on the other hand, allow the glass to absorb more stress.</p> <p>“This is really a kind of platform technology,” says Hou. “The pore size can be tuned, the chemistry can be tuned. So that means it can be used to host a different type of perovskite.”</p> <p>In the paper, the international team of researchers – who are based at the University of Leeds and the University of Cambridge in the UK, and Université Paris-Saclay in France – demonstrate several different types of “lead halide perovskite and metal-organic framework glasses”, all of which they’ve been able to create.</p> <p>As well as their potential applications in screens and LEDs, the glasses could be used to make higher-quality X-ray images and more efficient solar panels.</p> <p>“We’re looking at trying to combine a solar panel with a display,” says Hou.</p> <p>“Think about mobile phones, for example – when you use it, it will become a display. When you don’t use it, put it in the sunlight, it will charge the battery. So it’s one device for two functions.”</p> <p>Manufacture of the material is scalable, according to Hou, and the researchers are currently looking at building prototype devices with it.</p> <p>“We’re really confident that we’ll be able to generate devices in the next stage,” says Hou.</p> <p>“We are also looking for some industrial collaborators who are really interested in bringing this exciting material into the real world.”</p> <em>Image credits: Shutterstock            <!-- Start of tracking content syndication. Please do not remove this section as it allows us to keep track of republished articles --> <img id="cosmos-post-tracker" style="opacity: 0; height: 1px!important; width: 1px!important; border: 0!important; position: absolute!important; z-index: -1!important;" src="https://syndication.cosmosmagazine.com/?id=171112&amp;title=Cracking+the+code+of+unbreakable+phone+screens" alt="" width="1" height="1" /> <!-- End of tracking content syndication -->          </em></div> <div id="contributors"> <p><em>This article was originally published on <a rel="noopener" href="https://cosmosmagazine.com/technology/materials/unbreakable-phone-screens/" target="_blank">cosmosmagazine.com</a> and was written by Ellen Phiddian.</em></p> </div> </div>

Technology

Placeholder Content Image

The iconic Nokia 3310 turns 21

<p><span style="font-weight: 400;">It is widely known as the toughest substance on Earth, and became a staple in international households. </span></p> <p><span style="font-weight: 400;">The Nokia 3310 mobile phone was released in September 2000, and is now celebrating its 21st anniversary. </span></p> <p><span style="font-weight: 400;">The device boasted a black and white display, enough memory to save eight numbers in call logs, and zero capabilities that smartphones offer today. </span></p> <p><span style="font-weight: 400;">The phone became an iconic early 2000s reference with many millennials referring to the device as “a brick”, as the body seemed completely unbreakable. </span></p> <p><span style="font-weight: 400;">Some people may even remember the miraculous tale of a Nokia 3310 surviving a fall from the second storey of a building completely unscathed. </span></p> <p><span style="font-weight: 400;">Another classic feature of the device was the simple, but completely addictive game of Snake, that would keep users entertained for hours. </span></p> <p><span style="font-weight: 400;">Nokia 3310 owners could also customise their own ringtones, to play slightly different variations of the same tune when a call was incoming. </span></p> <p><span style="font-weight: 400;">Many phone users today still think of the device’s extraordinary battery life, which could last over two days: completely winning against modern day smartphone batteries that last a mere 12 hours (if you’re lucky).</span></p> <p><span style="font-weight: 400;">The phone received so much love and attention over the years that a 4G version of the Nokia 3310 was released a few years ago, but the buzz of the revival version didn’t garner as much attention as the original. </span></p> <p><span style="font-weight: 400;">With modern day smartphones having unlimited capabilities, it is interesting to see why the Nokia 3310 still gets recognised on a  global scale. </span></p> <p><span style="font-weight: 400;">From all its unique quirks and early 2000s charm, it has mostly become a pop culture staple and distinct timestamp of the technology revolution. </span></p> <p><em><span style="font-weight: 400;">Image credit: Shutterstock</span></em></p>

Technology

Placeholder Content Image

The real reason we have to use flight mode on a plane

<p>With flying for vaccinated passengers looking like it will happen soon, we could be back on a plane some time soon and putting our phone on flight mode is always one of the things we have to do when we get in our seat.</p> <p>Most of us think if we don’t do this as soon as possible, there could be a major problem somehow but we don’t really know why we have to do it. Sometimes we think - does it even matter?</p> <p>But now, thanks to TikTok, we finally have the answers from a flight attendant called Cierra Mistt who’s shared the real reason we must put our phone on flight mode.</p> <p>Already her TikTok video has gathered more than 1.7 million views.</p> <p>As Mistt says in her video: “There are approximately 45,000 flights that happen every single day, with about 2.9 million passengers on board,” she explains in the video.</p> <p>“And how does all this flying happen successfully? Believe it or not, pilots actually aren’t in charge of flying.”</p> <p>Mistt explains that although the pilot is operating the plane, it’s the communication between the ground and the pilot which is even more critical.</p> <p>“From the moment the boarding door closes to the moment we’re landing, the pilots are following specific instructions given to them by a group of people on the ground called Air Traffic Control,” she says.</p> <p>“In order for the pilot to be able to communicate with air traffic control, they use frequencies. Yep, just like the frequencies we use to send messages, stream video and insta-stalk our fave influencers on our phones,” she adds.</p> <p>Cierra goes on to explain that sometimes these frequencies collide, causing a complete loss of signal.</p> <p>“Picture how bad it would be for a pilot, who is taking directions from ATC on the ground to all of a sudden lose signal and [need to] start flying blindly. All because the frequency of a passenger’s phone has intercepted it.”</p> <p><strong>Many commented, thanking her for the explanation</strong></p> <p>Mistt received a lot of comments and thanks for the fact that she finally explained the full reason behind the need to use flight mode.</p> <p>As well, there were one or two sceptics and clarifications from experts in the field, particularly around the terminology used in the video.</p> <p>One electrical engineer said the real reason for flight mode was “unintended radio waves emitted by phones and other devices” or “intended radio waves being inadvertently picked up by the pilot’s equipment”.</p> <p>He added that nowadays, “our devices don’t emit or accept unintended waves as much” and questioned whether flight mode was still “absolutely necessary”, but added: “Out of caution, do it.”</p> <p>So, after watching this video, it’s great that we know more about why we need to use flight mode – and given it’s such a small, simple thing to do, it hardly seems like a big thing to ask of passengers.</p> <p><em>Photo: Shutterstock</em></p> <p><em> </em></p>

Domestic Travel

Placeholder Content Image

If you can read this headline, you can read a novel. Here’s how to ignore your phone and just do it

<p>Public anxiety about the capacity of digital-age children and young adults to read anything longer than a screen grab has come to feel like moral panic. But there is plenty of evidence to suggest we must take such unease seriously.</p> <p>In 2016, the US National Endowment for the Arts reported the <a href="https://www.washingtonpost.com/news/wonk/wp/2016/09/07/the-long-steady-decline-of-literary-reading/">proportion of American adults</a> who read at least one novel in 2015 had dropped to 43.1% from 56.9% in 1982.</p> <p>In 2018, a <a href="https://theconversation.com/why-it-matters-that-teens-are-reading-less-99281">US academic reported</a> that in 1980, 60% of 18-year-old school students read a book, newspaper or magazine every day that wasn’t assigned for school. By 2016, the number had plummeted to 16%.</p> <p>Those same 12th graders reported spending “six hours a day texting, on social media and online”.</p> <p>American literacy expert and neuroscientist Maryanne Wolf describes the threat screen reading poses to our capacity for “the slower cognitive processes such as critical thinking, personal reflection, imagination, and empathy that are all part of deep reading”.</p> <p>She <a href="https://www.scribd.com/document/386632978/Excerpt-from-Reader-Come-Home-by-Maryanne-Wolf">asks</a>:</p> <blockquote> <p>Will the mix of continuously stimulating distractions of children’s attention and immediate access to multiple sources of information give young readers less incentive either to build their own storehouses of knowledge or to think critically for themselves?</p> </blockquote> <p>But rather than taking up defensive positions on either side of the digital-analogue reading divide, Wolf encourages us to embrace both. As parents and teachers we can help our children develop a <a href="https://now.tufts.edu/articles/slow-down-reader">bi-literate reading brain</a>. There are several ways we can do this.</p> <p><strong>Reading pathways</strong></p> <p>Reading is a learned skill that <a href="https://pdfs.semanticscholar.org/71cf/5d3dd4a5037003f0bca787874f2d68077cf9.pdf">requires the development</a> of particular neural networks. And different reading platforms encourage the development of different aspects of those networks.</p> <p>Screen-reading children, immersed from toddlerhood in the pleasures and instant gratification of skimming, clicking and linking, develop cognitive skills that make them adept power browsers, good at the useful ability to scan for information and analyse data.</p> <p>But Wolf suggests this kind of reading “can short-circuit the development of the slower, more cognitively demanding comprehension processes that go into the formation of deep reading and deep thinking.”</p> <p>Unless the cognitive skills required for deep reading are similarly developed and nurtured, new generations of readers – distracted by the ready availability of digital information – may not learn to venture beyond the shallows of the reading experience.</p> <p><a href="https://images.theconversation.com/files/309816/original/file-20200114-103966-4rr4lz.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/309816/original/file-20200114-103966-4rr4lz.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" alt="" /></a> <span class="caption">We can help children gain a love of reading on paper from an early age.</span> <span class="attribution"><span class="source">from shutterstock.com</span></span></p> <p>Along with others concerned with early childhood education Wolf advises encouraging paper literacy from infancy. She doesn’t recommend forbidding devices. Instead we should regularly turn them off and make the time and space to read books on paper with children.</p> <p>We can model our own reading practices by setting aside our own smart phones to lose ourselves in a book.</p> <p>But how can secondary and tertiary teachers help inexperienced readers? The problem is likely to be aliteracy, meaning students can read but they choose not to because they don’t see it to be important for learning. And because they haven’t read much, it’s hard work. The problem can seem intractable. But it can be done.</p> <p><strong>Turn off the phone and read</strong></p> <p>My first venture into helping tertiary students read better was a 2011-2013 <a href="https://ltr.edu.au/resources/CG10_1566_Kennedy_Toolkit_2013.pdf">cross-university government-funded project</a> that set out to foster what we termed “reading resilience”. We found if students were persuaded to prioritise reading as they did a test or an essay, they would invest the time to get into the zone that is the other world of the text.</p> <p>We complemented complex texts with a guide that encouraged students to think critically as they read and to keep going when the language seemed impenetrable, the narrative incomprehensible (or dull) and the length endless. Or when the siren call of the smart phone became irresistible.</p> <p>They experimented with switching off their devices for blocks of two hours while they simply read. And they did read.</p> <p>Students prioritised this difficult work because we rewarded pre-class reading with marks. Some classes uploaded one-page, carefully argued responses; others answered complex feedback-rich quizzes.</p> <p><a href="https://images.theconversation.com/files/309826/original/file-20200114-103982-1pgksj5.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/309826/original/file-20200114-103982-1pgksj5.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" alt="" /></a> <span class="caption">Can you ignore your phone for two hours and keep reading?</span> <span class="attribution"><span class="source">from shutterstock.com</span></span></p> <p>I surveyed a large first-year introduction to literary studies at the University of Queensland in 2013 before testing a version of the same “reading resilience” course in 2014. The rise in reading rates was exponential.</p> <p>The number of students who completed all ten primary texts (including the poem Beowulf and Toni Morrison’s Beloved) more than tripled, and the number who completed the ten accompanying secondary texts (selected chapters from an <a href="http://site.iugaza.edu.ps/ahabeeb/files/2012/02/An_Introduction_to_Literature__Criticism_and_Theory.pdf">introduction to literary theory and criticism</a>) went up by more than six times.</p> <p>Reported student satisfaction for this course from 2008 to 2012 had ranged between 64% and 75%. Once reading resilience was introduced, many complained about the reading load yet the level of overall satisfaction jumped to 86%.</p> <p><strong>We can all do it</strong></p> <p>It’s not just readers raised in a digital-age who have difficulty with long-form text. Have you have lost the skill of deep reading? Are you finding it increasingly difficult to stay with, say, a literary novel? You are not alone.</p> <p>Wolf, who despite having two degrees in literature, confesses to the shocking discovery that <a href="https://www.theverge.com/2018/8/27/17787916/reader-come-home-maryanne-wolf-neuroscience-brain-changes">recently she found herself</a> struggling to stick with a beloved Herman Hesse novel.</p> <p> </p> <p>We too can switch off our devices and set aside a space and time to revitalise the neural pathways that once made us immersive readers.</p> <p>As Wolf <a href="https://pdfs.semanticscholar.org/71cf/5d3dd4a5037003f0bca787874f2d68077cf9.pdf?_ga=2.263432204.1683872892.1573681450-1249221942.1573681450">argues</a>, the skills of “deep reading” that involve “slower, more time-consuming cognitive processes […] are vital for contemplative life”. Deep readers are likely to be more thoughtful members of the community at a time when good citizenship may never have been more important.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important; text-shadow: none !important;" src="https://counter.theconversation.com/content/116524/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><span><a href="https://theconversation.com/profiles/judith-seaboyer-131588">Judith Seaboyer</a>, Senior Lecturer, <em><a href="https://theconversation.com/institutions/the-university-of-queensland-805">The University of Queensland</a></em></span></p> <p>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/if-you-can-read-this-headline-you-can-read-a-novel-heres-how-to-ignore-your-phone-and-just-do-it-116524">original article</a>.</p>

Books

Our Partners