As smartphone prices continue to soar beyond the $1,000 mark, many users are turning to more economical options, such as used or older phones, despite the security risks associated with them. According to an article published by Al Jazeera on April 16, 2025, these older devices often run outdated versions of operating systems like Android and iOS, which do not receive critical security updates.
While the physical condition of these phones may be satisfactory, the lack of security support makes them easy targets for hackers who are constantly searching for vulnerabilities in operating systems. When cybercriminals discover security flaws, manufacturers typically respond by issuing updates to patch these issues. This ongoing battle between hackers and developers serves as the first line of defense for our personal data.
The article notes that companies like Samsung, Google, and Apple are increasingly cutting support for older phones, which raises concerns for users who own devices that no longer receive updates. Cybersecurity studies indicate that using devices without security updates poses a significant risk, as compromised phones can expose emails, contact information, financial data, and even call logs. Furthermore, these devices may be used to track users and capture images without their consent.
To determine whether a phone has become too outdated, users can check the settings for software updates. If the last update was months or even years ago, it is likely that the phone is no longer supported. In recent years, major companies have extended their support periods to seven years for modern phones, but this policy does not apply retroactively to older devices.
A clear sign that a user is dealing with an outdated system is the inability to download new applications. Many newer apps will not be compatible with older phones, limiting functionality. Although using security applications like 'Kaspersky' or similar software on unsupported devices provides an additional layer of protection, these apps only offer partial solutions. Since they operate within the operating system, if there are unpatched vulnerabilities in the basic system, hackers can bypass these protective measures.
Experts recommend that when purchasing a used phone, users should perform a factory reset, avoid unofficial app stores, and refrain from installing 'APK' files from untrusted websites. Most importantly, users should avoid storing sensitive information, photos, and banking data on these devices. A phone that saves a few hundred dollars could cost its owner dearly in terms of privacy and security. In an age where personal data is considered more valuable than oil, users need to balance financial savings with digital security requirements, or risk facing much greater costs down the line.
In a separate technological advancement, scientists and engineers are striving to create robots that possess human-like capabilities in movement, interaction, and management, aiming to make them more than mere machines. These robots represent an ideal platform to test the potential of artificial intelligence in understanding, learning, and interacting with their environments. This raises questions about whether the world is on the brink of a new era that merges human and machine into a single entity.
Researchers from the University of Tokyo recently unveiled a prototype of a biological robotic limb that relies on real human muscle cells for its movement. This innovation falls under a burgeoning research field that explores the possibilities of integrating robotics with living tissues, a concept known as 'biological hybrid systems'. This new development is seen as a promising step toward creating more lifelike prosthetic limbs that are compatible with human body functions, although significant biological and engineering challenges remain before practical applications can be realized.
The researchers explained in a paper published in Science Robotics how they replaced traditional actuators in the robotic hand with muscle tissues. Unlike previous experiments that used muscle cells derived from mice, this time the team utilized human cells developed in a specialized laboratory environment and grown directly. The lead researcher, Shoji Takoyoshi, described a new technique called "Momota," which stands for "multiple tissue assembly". This technique involves thin strips of cultivated muscle tissue that are rolled and shaped into bundles resembling sushi rolls, serving as muscle units that act like tendons to move the joints of the hand.
Takoyoshi noted that this design helped them overcome one of the major challenges in the field: achieving sufficient contractile force and appropriate muscle length to operate the robotic hand, which measures about 18 centimeters. However, similar to natural human muscles, the biological tissues showed signs of fatigue after about 10 minutes of continuous electrical stimulation, recovering after about an hour of rest. Additionally, the fingers still lack the ability to return to their original position automatically, a challenge researchers are working to address by using more durable materials or adding 'Momota' anti-friction units to enhance efficiency.
Despite these challenges, the team believes that this model represents an initial step toward developing more dynamic prosthetic limbs that can function harmoniously with the human body. However, significant biological and engineering hurdles still need to be overcome before this technology can be widely applied.
In conclusion, as the landscape of technology continues to evolve, users must remain vigilant about the security of their devices while also keeping an eye on the exciting developments in robotics that promise to blur the lines between human and machine.