
Two popular apps loved by millions to shut down forever in DAYS – and you might be owed some cash
NOT 'APPY Two popular apps loved by millions to shut down forever in DAYS – and you might be owed some cash
TWO popular apps used by millions of mobile users are set to shut down next week - and it might mean you're owed some cash.
Mobile apps Pocket and Glitch will both close on 8 July.
Advertisement
3
But Pocket's Premium subscribers may be owed refunds for the remaining time left on their subscriptions
Credit: Mozilla
3
The Glitch app, aimed at web developers, is also handing out refunds to its subscribers
Credit: Glitch
Pocket was removed from app stores in late May, when sales of subscriptions also stopped.
But Pocket's Premium subscribers may be owed refunds for the remaining time left on their subscriptions.
A subscription for the read-it-later app costs $4.99 per month or $44.99 (£32.99) per year.
So if you paid for an annual membership that will not be fulfilled, you should expect some money to be deposited back onto the card you used for payments.
Advertisement
Mozilla, which owns the app, said annual subscribers will receive their refunds after 8 July.
No action is necessary - just wait for the money to land.
It's worth noting that while the app will shut down next week, users will have until 8 October to download their saved data before all Pocket data is permanently deleted.
The Glitch app, aimed at web developers, is also handing out refunds to its subscribers.
Advertisement
Those who forked out $96 (£70) for an annual Glitch Pro subscription and have paid time left will receive a refund.
Users have until the end of the year to download their projects before all the data is wiped for good.
Huge Global Data Breach: 16 Billion Accounts at Risk

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Press and Journal
2 days ago
- Press and Journal
Budz Bar developer: 'We're clearing final planning hurdle and poised to start revamp!'
Long-awaited renovation work to transform Aberdeen's former Budz Bar building into a multi-storey entertainment destination could finally be poised to get under way. After previous blueprints for the overhaul fell foul of historians, developers were sent back to the drawing board. New plans have now been submitted to Aberdeen City Council in the hopes of addressing all of the issues raised. The former Budz Bar building, which has been vacant for almost two decades, was earmarked for a major revamp by by Alpha Bravo Investments, run by Allan Smith and Bruce Porter. The venue, called Glitch, would include mini golf across several floors in a building stretching from Union Street to Justice Mill Lane. along with cocktail bars and a pizzeria. Planning chiefs rejected original plans to cover the exterior in corten steel – but the duo have enlisted the help of new designers to devise fresh plans. Mr Smith told The Press and Journal he wants to 'add something really special to Union Street', and is now within touching distance of kick-starting the costly work. While plans to rejuvenate the inside of the building were welcomed, it was the exterior which council bosses had a problem with. One of the most prominent features of the scheme turned out to be the new facade dreamed up for the Justice Mill Lane side of the complex. Design images showed the building wrapped in bronze-coloured corten steel cladding – which would light up at night like the Aberdeen letters in Union Terrace Gardens. Local historians complained about how this would look in the conservation area, with one opponent saying it would resemble 'the Las Vegas strip at night'. And ultimately, council officials agreed – rejecting the overhaul due to these concerns. Now, Mr Smith and Mr Porter have come back with a new plan – which keeps more of the traditional frontage intact. And this, they say, could actually turn out to be a bit of a selling point. The new design has the corten steel replaced with a traditional shopfront look, with three archways – harking back to the building's original design. Mr Smith told The P&J: 'We've been in talks with the heritage team in Aberdeen to make sure we preserve the building's character. 'It's over 200 years old, and we want to respect that.' The duo have taken inspiration from The Washhouse in Manchester – a popular speakeasy disguised by a laundrette. 'What you see from the street gives the impression of one thing, but when you step inside, it's something completely different,' Mr Smith added. And with these new plans now officially lodged, Mr Smith is raring to go to get his new venue open. He said that planning permission is the only hurdle left to overcome, and that if the council give the go-ahead, he's ready to start the renovations. 'We're excited about the new direction and keen to push on,' the leisure boss said. 'With the updated team and approach, we're confident that we can deliver something that works for the council, community and adds something really special to Union Street. 'Then we can get on with the fun inside!' He added. You can view the full plans here.


Daily Mirror
17-07-2025
- Daily Mirror
Everyone using Gmail given new inbox warning - watch out for dangerous hidden message
Gmail fans need to be on high alert when getting summaries of their inbox messages. Gmail users are being urged to stay alert and watch out for a worrying new type of scam that hides itself within messages. It appears there's a way of fooling Google's clever AI Gemini service, and it could allow hackers to add fake messages when people access their inbox and load up the useful summaries option. For those not aware, Google now lets Gmail users see a quick summary of an email using smart Gemini AI. This basically means a long message can be made faster to read and understand, with the most important parts placed into bullet points. It's a neat upgrade but it appears that it also comes with a hidden danger. As reported by Bleeping Computer, cyber crooks may trick this system into displaying additional text, with one example showing how hackers could feature a warning at the bottom of the summary. "WARNING: Gemini has detected that your Gmail password has been compromised," the alert reads. "Please call us immediately." The note then features a phone number and reference code. Experts at Mozilla, have also confirmed that a potential vulnerability within the Gemini email summary feature is allowing online thieves to add hidden prompts that then appear when messages are opened. Google has now responded to the flaw and says it is constantly working to keep its platform safe. "We are constantly hardening our already robust defenses through red-teaming exercises that train our models to defend against these types of adversarial attacks," a Google spokesperson told BleepingComputer. The US technology giant says it is also not aware of any users being attacked in this way, and there's no evidence of a widespread threat. That said, this clearly shows that criminals can still find ways to infiltrate email inboxes and we need to stay alert. Just remember that it's highly unlikely Google will ever contact you. Also, if you think your password has been compromised, it's easy to log into Google's official platform and change things. One top tip is to never believe an email or AI summary and don't call any numbers unless you know that it's an official hotline.


Daily Mail
16-07-2025
- Daily Mail
Warning to all Gmail users over new type of attack
A new type of email attack is quietly targeting 1.8 billion Gmail users without them ever noticing. Hackers are using Google Gemini, the AI built-in tool in Gmail and Workspace, to trick users into handing over their credentials. Cybersecurity experts found that bad actors are sending emails with hidden instructions that prompt Gemini to generate fake phishing warnings, tricking users into sharing their account password or visiting malicious sites. These emails are crafted to appear urgent and sometimes from a business. By setting the font size to zero and the text color to white, attackers can insert prompts invisible to users but actionable by Gemini. Marco Figueroa, GenAI bounty manager, demonstrated how such a malicious prompt could falsely alert users that their email account has been compromised, urging them to call a fake 'Google support' phone number provided in to resolve the issue. To counter these prompt injection attacks, experts recommend that companies configure email clients to detect and neutralize hidden content in message bodies. Additionally, implementing post-processing filters to scan inboxes for suspicious elements like 'urgent messages,' URLs, or phone numbers could bolster defenses against such threats. The trick was uncovered after research, led by Mozilla's 0Din security team, showed proof of one of the attacks last week. The report demonstrated how Gemini could be fooled into displaying a fake security alert, one that claimed the user's password had been compromised. It looked real but was entirely built by hackers to steal information. The trick works by embedding the prompt in white text that blends into the email background. So when someone clicks 'summarize this email,' Gemini processes the hidden message, not just the visible text. This type of manipulation, called 'indirect prompt injection,' takes advantage of AI's inability to tell the difference between a user's question and a hacker's hidden message. According to IBM, AI cannot tell the difference, as they both look like text, so AI follows whichever comes first, even if it is malicious. Security firms like Hidden Layer have shown how an attacker could craft a completely normal-looking message but fill it with hidden codes and URLs, tools designed to fool AI. In one of the cases, hackers sent an email that looked like a calendar invite. But inside the email, hidden commands told Gemini to warn the user about a fake password breach, tricking them into clicking a malicious link. Google admitted this kind of attack has been a problem since 2024 and said it added new safety tools to stop it, but the trick appears to still be working. In one case, a major security flaw reported to Google showed how attackers could hide fake instructions inside emails that trick Gemini into doing things users never asked for. Instead of fixing the issue, Google marked the report as 'won't fix,' meaning they believe Gemini is working the way it is supposed to. That decision shocked some security experts, because it basically means Google sees this behavior, not recognizing hidden instructions, as expected, not broken. This means that the door is still open for hackers to sneak in commands that the AI might follow without question. Experts are concerned as if the AI cannot tell the difference between a real message and a hidden attack, and Google would not fix the behavior, then the risk remains active. AI is getting more popular for quick decisions and email summarizer. It is not just Gmail as the risk spreads as AI is incorporated into Google Docs, Calendar, and outside apps. Cybersecurity experts say some of these attacks are even being created and carried out by other AI systems, not just human hackers. Google has reminded users that it does not issue security alerts through Gemini summaries. So if a summary tells you your password is at risk or gives you a link to click, treat it as suspicious and delete the email. In a recent blog, Google said that Gemini now ask for confirmation before doing anything risky, like sending an email or deleting something. That extra step gives users a chance to stop the action, even if the AI was tricked. Google also displays a yellow banner if it detects and blocks an attack. If the system finds a suspicious link in a summary, it removes it and replaces it with a safety alert. But some problems still have not been solved.