Connect with us

Technology

How I almost fell for a Microsoft 365 Calendar invite scam

Published

on

How I almost fell for a Microsoft 365 Calendar invite scam

NEWYou can now listen to Fox News articles!

There’s a new phishing scam that’s sneaking past inbox filters in unexpected ways. Instead of sending suspicious links or obvious malware, this one uses something most people trust: calendar invites. Microsoft 365 and Outlook users are being targeted by a tactic that injects fake billing alerts directly into their calendars. Sometimes it includes malicious attachments, but in other cases, it exploits the default settings of calendars. Paul from Cape Coral, Florida, wrote us to share his experience:

“I had a very disturbing experience with a phishing attempt that almost had me hooked. I’m a Microsoft 365 subscriber and recently got the usual renewal emails. But a few days later, I started getting meeting invites saying my payment failed — they showed up directly on my calendar, even though I never opened or clicked anything. I got nervous when I tried to delete them and saw the only option was ‘delete and decline,’ which might have triggered a response to the attacker. I’ve never seen anything like this before.”

Paul verified his subscription status and avoided interacting with the event, which was the safest move, but his story highlights how easily this type of scam can slip through. Here’s how the attack works, and what to do if it shows up on your calendar.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.

Advertisement

A woman using Microsoft 365 calendar. (Kurt “CyberGuy” Knutsson)

How the Microsoft 365 calendar invite scam works

This type of phishing combines fake calendar events, Microsoft branding, and social engineering tactics to trick users into handing over personal information or clicking on malicious content.

It starts with a fake billing alert: The message appears to be from Microsoft 365, warning that your subscription renewal has either failed or been renewed. Some versions include an .htm attachment designed to look like a billing portal that captures credit card details.

The calendar invite adds pressure: Many of these scams include a calendar file (.ics) that places the event directly on your calendar. If your Microsoft 365 or Outlook settings automatically accept invites, the event appears without you doing anything.

The event looks official: Titles like “Payment Failed” or “Account Suspended” are used to trigger a quick reaction. Even if you never click a link, just seeing the event may prompt panic or confusion.

Advertisement

Deleting can confirm your identity: If your only option is “Delete and Decline,” that sends a response back to the sender. This confirms that your email is active and being monitored, which makes you a bigger target.

Scammers use compromised domains: These events often come from addresses that appear legitimate at a glance but are actually sent through hijacked third-party domains like .shop sites. Some even pass basic security checks, making them harder to detect.

Why Microsoft 365 phishing invites bypass email filters

This tactic is effective because it exploits a loophole in how Microsoft 365 processes calendar invitations. Even if a phishing email is flagged or blocked, the calendar event associated with it can still appear on your calendar. Here’s how:

It bypasses traditional email filters: Tools like Microsoft Defender scan incoming messages for bad links and attachments, but in this case, the attacker sends a malicious calendar invite that gets processed by Microsoft’s backend calendar services. So even if the email itself gets caught, the event still lands on your calendar.

You don’t have to click or open anything: If your settings allow calendar invites to be added automatically, that fake billing alert can show up instantly, making it feel urgent and legitimate, especially when it looks like it’s from Microsoft.

Advertisement

It exploits trust in internal tools: Because the invite appears inside Microsoft 365 or Teams, tools you use every day, it feels more “real” than an email from a random domain. That trust is exactly what scammers are counting on.

Microsoft 365. (Kurt “CyberGuy” Knutsson)

What to do if you get a phishing calendar invite in Microsoft 365

If a suspicious calendar event shows up and you didn’t accept it yourself, do not interact with it. Don’t click links, don’t download attachments, and don’t decline the invite; even that response can confirm your email is active.

Outlook is Microsoft’s interface for managing email and calendar events, and it comes in several different versions. The instructions below cover all three:

  • New Outlook: The modern web-based and desktop app bundled with Microsoft 365 (formerly Office 365). Most users on Microsoft 365 today are using the new Outlook.
  • Classic Outlook: The older desktop version (common in corporate setups) with more granular calendar settings.
  • Outlook.com: The free personal version of Outlook that you access through a web browser. It shares many features with the new Outlook, but some settings are unique to the web version.

Most people using Microsoft 365 today are on the new Outlook. Here’s what to do next, depending on your version:

A woman using Microsoft 365 on her laptop. (Kurt “CyberGuy” Knutsson)

Advertisement

1) Don’t click or decline the phishing calendar invite

It might be tempting to hit “Decline” and move on, but that can actually send a response back to the attacker, letting them know your account is active. Previewing the event is generally safe, but avoid clicking links, opening attachments, or interacting with it in any way. 

2) How to delete a phishing calendar event without alerting the attacker

New Outlook (desktop or web): This version no longer offers a “delete without response” option from the calendar view, making it trickier to handle suspicious invites. Here’s what you can do instead:

  • Option 1: Leave it alone – If the event is already on your calendar and there’s no inbox email to ignore, your safest bet is to leave it untouched. Even if you uncheck “Email organizer,” it still logs your RSVP. In the new Outlook, there’s no way to fully disable this tracking.

Option 2: Use “Ignore” from the inbox – This won’t necessarily remove the event from your calendar, but it’s a helpful way to get rid of the email without sending a response.

  • Go to your Inbox view (not your calendar)
  • Find the calendar invite email
  • Right-click and choose Ignore

This will move the email to your Trash without sending any response or showing RSVP tracking. However, in some cases, the event may remain on your calendar, and you can delete it manually afterward. Based on testing, this usuallydoesn’t notify the sender, but there is still no guarantee that RSVP tracking is avoided. If the invite is still on your calendar, the safest approach is to leave it.

Note: The “Ignore” option is only available in the inbox/mail view. If you try to manage the invite from the calendar view, your only options are Accept, Tentative, or Decline, all of which either notify the sender or leave behind RSVP tracking. 

Classic Outlook desktop (older version)

This version still gives you a clean, no-reply option:

Advertisement
  • Right-click the event in your calendar
  • Choose Delete
  • Select “Do not send a response” when prompted

This removes the invite without alerting the sender or recording your RSVP.

3) Change Outlook settings to block calendar spam and phishing invites

New Outlook

Unfortunately, there is no way to prevent meeting invites from being automatically added to your calendar. Microsoft removed this control in newer versions, and users can only limit certain types of “Events from email” (such as travel reservations), not actual meeting invites.

Classic Outlook desktop

You can limit auto-processing of invites so Outlook doesn’t automatically add them:

  • Go to FileOptions > Mail
  • Scroll to the Tracking section
  • Uncheck “Automatically process meeting requests and responses to meeting requests and polls”

This doesn’t block invites completely, but it stops Outlook from acting on them without your input.

4) How to report a phishing calendar invite without alerting the sender

If the event also appeared in your inbox, you can report it using Outlook’s built-in phishing tool.

Advertisement

New Outlook

  • Select the invite from your inbox
  • In the toolbar ribbon, go to HomeReportReport phishing
  • Or right-click the email and choose ReportPhishing

Do not forward the invite from the calendar, as this may notify the sender and confirm your account is active.

If the phishing report button doesn’t work, you can email a report to phish@office365.microsoft.com. To do this safely:

  • Open the email in your inbox view
  • Click the three dots on the top right of the message
  • Select Other reply actions > Forward as attachment

This method forwards the email as an attachment, avoiding the risk of sending the actual invite and notifying the sender.

Classic Outlook

  • Go to your Inbox
  • Open the calendar invite email (don’t just select it from the inbox)
  • In the top ribbon, click Report phishing or Report message

To manually forward it to Microsoft:

  • Open the email in your Inbox view
  • Click the three dots on the top right of the message > Forward as attachment
  • Send to phish@office365.microsoft.com

Again, do not forward directly from the calendar. Always forward from the inbox view using “Forward as Attachment” to avoid interacting with the calendar invite or notifying the sender. 

5) Check your Microsoft account for signs of phishing or hacking and install strong antivirus 

Even if you didn’t interact with the invite, it’s smart to review your account just in case:

  • Go to mysignins.microsoft.com
  • Review your recent sign-ins and devices
  • Change your password if anything looks off
  • Make sure two-factor authentication (2FA) is turned on

Once you’ve checked your account activity, it’s also worth strengthening your defenses moving forward. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. 

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com/LockUpYourTech.

Advertisement

6) Monitor your identity after a phishing attempt

If your email or login info has been exposed, scammers may try again later. Use an identity protection service to scan the dark web for leaked credentials and alert you before they can be misused.

Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com/IdentityTheft.

7) Remove your personal info from data broker sites to avoid future scams

Scammers often buy personal information from data broker sites, which makes it easier for them to target you again later. A removal service can help stop that by automatically scanning and deleting your data from hundreds of these sites. 

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete.

Advertisement

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan.

Kurt’s key takeaways

If a suspicious event suddenly shows up on your calendar, avoid interacting with it. That means no clicking, no declining, and no replies of any kind. Just opening the event is usually safe, but responding in any way can let scammers know your account is active. The new Outlook versions make this harder to manage, so the safest move is to leave the event alone, report it from your inbox, and double-check your account security. Until Microsoft adds stronger controls, calendar scams will continue to sneak through, but a few careful steps can keep you protected.

What responsibility does Microsoft have to protect users from security flaws in its own ecosystem, especially when default settings can expose people to phishing attacks without their knowledge? Let us know by writing to us at Cyberguy.com/Contact.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.

Copyright 2025 CyberGuy.com. All rights reserved.
 

Advertisement

Technology

You need to listen to Sudan Archives’ violin opus for the club

Published

on

You need to listen to Sudan Archives’ violin opus for the club

My introduction to Sudan Archives was the song “Nont for Sale” from her first EP Sink in 2018. I’ve been a die-hard fan ever since. With each album, she finds new ways to sculpt the sound of her violin, contorting it in defiance of expectations.

Athena found her in conversation with it, leaving its timbre largely recognizable and organic, veering from experimental pop to more ambient passages. Natural Brown Prom Queen embraced the aesthetics of sound collage, samples, and modern R&B, blending her violin with more expressly electronic elements. The BPM has identifiable violin passages, but it fully embraces the more technological elements of Sudan Archives’ sound.

The album opens with “Dead,” which begins with gentle orchestral swells and a processed, but identifiable violin. Then, at the 1:30 mark, the beat drops — what sounds like high-pitched vocal chops dance around the stereo field, and an undulating synth bass drags he whole thing to the dance floor. The track serves as something of a mission statement, with multiple movements exploring the various incarnations of Archives’ sound as she asks, “Where my old self at? Where my nеw self at?” answering herself by chanting “right here, right hеre” in response to each.

What follows is a volatile tour of dance music, from the four-on-the-floor funk of “My Type,” to the trap-tinged tongue-in-cheek sex raps of “Ms. Pac Man” — there’s even an Irish jig in the middle of “She Got Pain.” Across the record, there are flashes of autotune, drum ’n’ bass breaks, house piano stabs, techno synth bass, and, of course, soaring violin flourishes. Often, there are multiple of these things in a single track as Archives eschews typical pop song structures, bouncing giddily from one style to the next.

Unsurprisingly, the tempo on The BPM is generally amped up compared to much of Archive’s previous records. But it’s not all club bangers. “Come and Find You,” winks at 80s and early 90s R&B of acts like Sade. And often the lyrics turn to matters of the heart, “I found a way to travel to you even when we’re not in sync, I’m gonna find my way back to you, Even when it’s really hard I like the push and pull,” she sings on “David & Goliath.”

Advertisement

The BPM is a dense, hectic record that revels in its unpredictability and sonic shrapnel. It’s also my favorite record of 2025. Despite only coming out in mid-October, it was my most listened to album according to my Apple Music Recap. Sudan Archives The BPM is available on Bandcamp and most streaming services, including Qobuz, Tidal, Apple Music, Deezer, YouTube Music, and Spotify.

Continue Reading

Technology

Smart home hacking fears: What’s real and what’s hype

Published

on

Smart home hacking fears: What’s real and what’s hype

NEWYou can now listen to Fox News articles!

News of more than 120,000 Korean home cameras being hacked recently can shake your confidence in connected devices. Stories like that make you picture cybercriminals breaking into homes with high-tech gadgets and spying on families through smart cams. That reaction is natural. But most of these headlines leave out important context that can help you breathe a little easier.

First, smart home hacking is rare. Most incidents stem from weak passwords or from someone you already know, rather than from a stranger with advanced tools. Today’s smart home brands push out updates to block intrusion attempts, including patches for new AI-related vulnerabilities that often make headlines.

Let’s break down what actually puts a smart home at risk and what you can do to stay safe.

Sign up for my FREE CyberGuy Report

Advertisement

Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

SMART HOME DEVICE MAKER EXPOSES 2.7 BILLION RECORDS IN HUGE DATA BREACH

Smart home hacking headlines can look scary, but most threats come from weak passwords rather than targeted attacks. (Kurt “CyberGuy” Knutsson)

Why criminals are not circling your house with hacking gear

Many people imagine cybercriminals driving around neighborhoods with scanners that look for vulnerable devices. In reality, Wi-Fi ranges and technical limits make that nearly impossible. Even high-profile hacks of casinos and large companies do not translate to criminals trying to breach residential smart locks for petty theft.

Burglars still choose low-tech methods. They look for unlocked doors or easy entry points. They avoid complicated hacking tools because the payoff is too small to justify the work.

Advertisement

So how do smart homes get hacked? Here are the real attack paths and how they work.

Common ways smart homes get attacked

Smart homes face a handful of digital threats, but most come from broad automated attacks rather than someone targeting your house.

1) Automated online attacks

Bots constantly scan the internet for weak passwords and outdated logins. These brute force attacks throw billions of guesses at connected accounts. When one works, the device becomes part of a botnet used for future attacks. That doesn’t mean someone is targeting your home on purpose. Bots search for anything they can breach. A strong password stops them.

2) Phishing attempts

Some phishing emails impersonate smart home brands. Clicking a fake link or sharing login details can open the door for criminals to reach your network. Even a general phishing attack can expose your Wi-Fi info and lead to broader access.

3) Data breaches from IoT companies

Hackers often go after company servers, not individual homes. These breaches may expose account details or stored camera footage kept in the cloud. Criminals may sell that data to others who might try to use it. It rarely leads to direct smart home hacking, but it still puts your accounts at risk.

Advertisement

4) Attacks on device communications

Early IoT devices had vulnerabilities that allowed criminals to intercept the data they sent and received. (IoT stands for Internet of Things and includes everyday connected gadgets like smart plugs, smart thermostats or Wi-Fi cameras.) Modern products now use stronger encryption, making these attacks extremely rare in the real world.

5) Bluetooth malware

Bluetooth issues still pop up from time to time, but most modern smart home devices use stronger security than older models. When a new flaw is discovered, companies usually release fast patches, which is why it’s important to keep your apps and gadgets updated. Today, these Bluetooth risks rarely lead to real smart home problems.

ADT HACKED: IS YOUR HOME SECURITY SYSTEM REALLY SECURE?

Who actually tries to hack smart homes

When hacking happens, it usually involves someone with some level of access already. In many cases, no technical hack occurs at all.

Simple steps like stronger Wi-Fi security and regular updates go a long way toward protecting connected devices. ( Al Drago/Bloomberg via Getty Images)

Advertisement

A relation or acquaintance

Exes, former roommates or relatives often know login info. They may try to spy or cause trouble. Update all passwords if you suspect this.

Untrustworthy employees

There have been cases where employees at security companies snooped through camera feeds. This isn’t remote hacking. It’s a misuse of internal access.

Data thieves

They steal account lists and login details to sell. Others may buy those lists and try to log in using exposed credentials.

Blackmail scammers

Some send fake messages claiming they hacked your cameras and threaten you. Most of these scams rely on lies because they have no access at all.

Foreign governments

Some banned foreign manufacturers pose surveillance risks. The FCC maintains a list of companies that cannot sell security tech in the U.S. Always check that list before buying unfamiliar brands.

Advertisement

Smart home devices that can raise concerns

Some everyday gadgets create small but real entry points for trouble, especially when their settings or security features get overlooked.

Smart fridges

They often arrive with default passwords that owners forget to change. Older models may use outdated IoT protocols with weaker protections. Many do not get frequent security updates.

Wi-Fi baby monitors

Wi-Fi offers convenience but also adds risk. Weak routers and poor passwords can allow strangers to access a feed. Closed network monitors avoid Wi-Fi risks but still face basic signal interception attempts.

Smart bulbs

During setup, some bulbs broadcast an open temporary network. If a criminal joins at the exact right moment, they could reach the rest of your devices. These cases are rare but possible in theory.

Smart speakers

Voice ordering can be exploited by curious kids or guests. Set a purchase PIN so no one can order items with simple voice commands.

Advertisement

Steps to stay safe in your smart home

Strong habits and a few simple tools can block the most common threats that target connected homes.

1) Use strong passwords

Choose long, complex passwords for your Wi-Fi router and smart home apps. A password manager makes this simple. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.

Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

2) Turn on two-factor authentication

Brands like Ring and Blink already use it. Add two-factor authentication (2FA) to every account that supports it.

Advertisement

3) Use a reputable data removal service

Removing your personal details from data broker sites helps prevent criminals from using leaked or scraped information to access your accounts or identify your home.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

4) Add strong antivirus software on phones and computers

Strong antivirus protection blocks malware that could expose login details or give criminals a path into the devices that manage your smart home. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Advertisement

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

Choosing brands with clear privacy practices and local storage options helps keep your home and data in your control. (CyberGuy.com)

5) Choose brands with strong encryption

Pick smart home products from companies that explain how they protect your data and use modern encryption to lock down your footage and account details. Look for brands that publish clear security policies, offer regular updates and show how they keep your information private.

6) Store sensitive footage locally

Pick security cameras that let you save video directly to an SD card or a home hub, rather than uploading it to the cloud. This keeps your recordings under your control (and helps protect them if a company server is breached). Many cameras from trusted lines support local storage, so you do not have to rely on a company server.

7) Keep devices updated

Install firmware updates quickly. Enable automatic updates when possible. Replace older gadgets that no longer receive patches.

Advertisement

8) Secure your Wi-Fi

Your router is the front door to your smart home, so lock it down with a few simple tweaks. Use WPA3 encryption if your router supports it, rename the default network, and install firmware updates to patch security holes. For a full step-by-step guide on tightening your home network, check out our instructions in “How to set up a home network like a pro.”

Kurt’s key takeaways

Smart homes feel intimidating when scary headlines surface. But when you look at real-world data, you see far fewer risks than the stories suggest. Most attacks rely on weak passwords, poor router settings or old devices. With the right habits, your smart home can stay both convenient and secure.

What smart home risk concerns you most, and what part of your setup makes you nervous? Let us know by writing to us at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

Advertisement

Copyright 2025 CyberGuy.com.  All rights reserved.

Continue Reading

Technology

A new old idea about video stores

Published

on

A new old idea about video stores

Hi, friends! Welcome to Installer No. 109, your guide to the best and Verge-iest stuff in the world. (If you’re new here, welcome, hope you’re staying warm, and also you can read all the old editions at the Installer homepage.)

This week, I’ve been reading about Google Maps and shopaganda and life as a pop star, finally getting to watch F1 now that it’s streaming, rewatching the first two Avatars ahead of the next one’s release, pretending the new Taylor Swift tour doc is a reasonable replacement for actually seeing the tour, buying a bunch of Ikea smart buttons now that they’re on sale in the US, playing with the excellent new Obsidian update for mobile devices, and spending altogether too much time trying to figure out why my house is so cold.

I also have for you a fun new source of movies to watch, a game to play this holiday season, a new speaker worth a listen, and much more.

And I have a question, looking ahead to the last Installer of the year: What’s your favorite new thing from this year? It doesn’t have to be new this year, just new to you. (And you don’t have to pick your one favorite forever, just hit me with something new you loved this year.) I want to hear about books you discovered, podcasts you’re into, decade-old games you’re loving, things that made your house or office or whatever better, anything and everything is fair game. I’ll share mine if you share yours — email me at installer@theverge.com, find me on Threads at @imdavidpierce, or message me on Signal at @davidpierce.11.

All right, lots of stuff this week! Let’s go.

Advertisement

(As always, the best part of Installer is your ideas and tips. What are you playing / reading / watching / listening to / cuddling up with by the fire this week? Tell me everything: installer@theverge.com. And if you know someone else who might enjoy Installer, forward it to them and tell them to subscribe here.)

  • The Letterboxd Video Store. A tightly curated set of movies to rent, filled with stuff Letterboxd knows people want to see but that you almost certainly won’t find anywhere else. Like all things Letterboxd, it’s all a bit high-minded, but I love this idea and suspect I will check it often. Perfect amount of stuff in there, too.
  • Skate Story. A late-breaking contender for the best game of 2025! You’re a demon, you skate. And skate. And skate. A lot of reviews say the controls take a little getting used to, but that they give way to something that feels great and looks spectacular.
  • The iFixit app. I can’t say I’m shocked that iFixit’s AI bot, FixBot, isn’t quite up to the task of automatically sussing out how to fix all your gadgets. But that’s fine; I’ll just be using this new iOS and Android app as a library of manuals and repair guides. Plus, the built-in battery monitor for your phone is extremely clever.
  • Darkroom 7.0. I totally forgot about Darkroom! It has long been one of the best photo editors for Apple devices, and the new version cleans up the user experience a bunch while also adding some retro-film effects and some high-end video features. Also: Being able to zoom all the way down to the individual pixel is pretty wild.
  • Google Photos. On the other end of the professional spectrum, the Google Photos app just got a bunch of CapCut-style video editing features along with some better tools for making highlight reels and slideshows. I’m suddenly tempted to make a lot of stupid year-in-review stuff to send to my friends.
  • Kill Bill: The Whole Bloody Affair. I’m a sucker for a weird re-edit of a movie, so this is extremely my jam: two Kill Bill movies turned into the single, 4.5-hour bloodfest they were apparently always supposed to be. Apparently it’s a totally different story now! This feels like the best possible use of a weekend afternoon in a movie theater.
  • The Wiim Sound Lite. From one of the Installerverse’s favorite audio brands comes a new $229 portable speaker that looks like a strong competitor to Sonos’ new gear. (Or a HomePod, I guess.) If I were starting a home audio system right now, I’d probably start with Wiim.
  • Google Disco. An experimental new browser based on a weird and novel idea: turning collections of tabs into AI-generated, one-off web apps. I don’t expect Disco itself to ever leave Google Labs, but there’s something awfully futuristic in here.

Raffi Chilingaryan’s Spotted in Prod has long been one of my favorite sites for finding cool design and product touches from around the web. (I feel like, if you’re an app developer, your goal should be to make something weird and cool enough to catch Raffi’s eye.) Raffi’s also a designer and developer. He says right now he’s working on two iOS apps, a Strava competitor called Runbuds and a super clever alarm app called Shift that is designed to help you wake up earlier.

That’s all well and good, but my personal favorite Raffi thing is his new personal website, which includes an actual interactive version of his phone, so you can click around his homescreen and see into his apps. Dude took the whole “show us your homescreen” and just put me to shame on it. (Also, it’s a .zip domain, which I kind of love for a personal site?)

Anyway, all I have for you is a humble screenshot, but here’s Raffi’s homescreen, plus some info on the apps he uses and why:

The phone: iPhone 15 Pro.

The wallpaper: Solid gray background.

Advertisement

The apps: Retro, (Not Boring) Camera, Google Maps, Photos, Claude, Safari, Apple Notes.

I have my apps organized into 4 folders (money, work, social, vibes), but that’s a bit boring so I’ll break it out like this:

  • TestFlights you should keep an eye on: Arena is a community of curious internet folks that I’ve long wanted to immerse myself into but only once the iOS build got to its current level did I find that easy to do. Net is a promising email startup that uses an AI card stack to make flipping through your emails a breeze with impeccable UX.
  • Apps that I will shill till I die: Retro is a weekly photo journal that inspires me to take more photos and lets you send POSTCARDS to your friends & family. (Not Boring) Camera is a gorgeous skeuomorphic camera with really nice presets. Bump is Find My Friends for Gen Z. Radio Garden lets you explore the world through local radio streams. Particle is an amazing AI native news app with super fluid UX. Mercury is the most lovely fintech product for both businesses and now personal banking — I hope they take over the world.

I also asked Raffi to share a few things he’s into right now. Here’s what he sent back:

  • TBPN & Stratechery podcasts.
  • Discovering creative developers and design engineers who showcase their work on tech Twitter.
  • Using Claude Code to ship iOS apps as someone without a formal background in software engineering.
  • The resurgence of Pokémon and the Trading Card Game app.

Here’s what the Installer community is into this week. I want to know what you’re into right now as well! Email installer@theverge.com or message me on Signal — @davidpierce.11 — with your recommendations for anything and everything, and we’ll feature some of our favorites here every week. For even more great recommendations, check out the replies to this post on Threads and this post on Bluesky.

“Now that finals are over I have been diving into Ghost of Yotei. Crazy beautiful game.” — Jeremy

“Finally reading “The Anthropocene Reviewed by John Green. Despite John living an entirely different life than me, his experiences and understanding of the world possess so many similarities to mine. I give it five stars.” — Christopher

“I feel like everyone is sleeping on Amazon Luna, the cloud stream gaming platform that Amazon includes with its yearly subscription. It consistently has A+ games on it. I’m currently addicted to the newest Bethesda Indiana Jones game… I hooked up my PS4 controller and am playing one of the greatest games of the past few years at no extra cost.” — Alex

Advertisement

Audible had an insane three months for $1 deal, so I’ve been getting back into audiobooks while I do chores and commute. Currently listening to / reading Alchemised by SenLinYu and it’s fantastic.” — Colin

“Got myself a Teenage Engineering PO-12 drum machine on a rare sale. What a glorious little device. Lovely design, and hours of music fun, even for a complete amateur like myself. Plus – it even has a headphone jack! That said – I kind of wish that I’d gotten the PO-20 instead.” —

StoneBlock 4, an amazing Minecraft modpack, is ruining all my productivity this week.” — Anne

“Yesterday I watched a badass Polish dude ski down Mt. Everest without oxygen. The feat is unbelievable, but I still think about the incredible footage.” — Denim

“I’m OBSESSED with the Xbloom robotic barista machine I’ve owned for a few weeks now. It’s basically like having a barista on demand 24/7 – if you love drip coffee this is an endgame coffee machine.” — Andrew

Advertisement

“+1 for Skate Story. Also, the OST… 👌” — Andy

I spent a bunch of time this week learning about Model Context Protocol, which is one of those things that most people will never think about but might be crucial to how technology works going forward. The MCP story is fascinating, but if you just want to quickly understand how the protocol works, and why it’s so important to the whole supposed AI-based future of everything, you should watch this 20-minute video. Greg Isenberg and Ras Mic walk through the whole stack at the perfect level of complexity, and with visuals that actually help (unlike so many videos I watched this week). If every educational video on YouTube were like this one, I’d be a much smarter person.

One more Installer to come this year. See you next week!

Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.

Continue Reading
Advertisement

Trending