Error message

  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

Technology

New forum topics

Garmin surprise launches two new Forerunner watches – the Garmin Forerunner 570 and Garmin Forerunner 970 – plus the HRM 600

TechRadar News - Thu, 05/15/2025 - 09:36
  • Garmin has announced the Garmin Forerunner 570 and Garmin Forerunner 970, along with a new HRM 600
  • The two watches include new-to-the-Forerunner-line hardware such as a speaker, mic and LED light
  • The 970 offers new metrics such as Running Economy and Tolerance

Garmin has announced the release of two new watches, the Garmin Forerunner 570 and Garmin Forerunner 970, along with a new Garmin HRM 600 heart rate monitor. The two watches boast Garmin's 'brightest AMOLED screen yet' and other features new to the Forerunner series such as a speaker and microphone, allowing you to take calls during a run without touching your phone, along with an Evening Report to add to Garmin's existing Morning Report functionality.

Read on to see our initial impressions, and whether they'll be worthy of a place in our best Garmin watches list.

Garmin Forerunner 570

(Image credit: Garmin)

The Gamrin Forerunner 570 is priced at $549.99 / £459.99 / AU$999 for the 42mm, and $549.99 / £459.99 / AU$999 for the larger 47mm watch as well. With 11 days of battery life in smartwatch mode (the shortest of any watch in the last several generations of Forerunners) it sports a selection of jazzy new colorways including Slate Grey Aluminum, Raspberry Aluminum and Cloud Blue Aluminum, all with new translucent silicone bands.

Apart from the brightest screen yet, Evening Report and speaker/microphone combo, the watch seems to share a great deal of DNA with the rest of the Forerunner line. This includes access to Garmin Coach training programs, health metrics such as a skin temperature and Pulse Oximeter sensor, and Garmin's usual five-button design.

Unlike many of the other best Garmin watches, there is no solar-powered option with a duller, memory-in-pixel display to conserve battery life. You're stuck with a maximum of 11 days, which is likely to realistically top out at just over a week with repeated GPS workouts.

Garmin Forerunner 970

(Image credit: Garmin)

The Garmin Forerunner 970 comes in a single size, 47mm, priced at $749.99 / £629.99 / AU$1,399, with a 1.4-inch AMOLED screen that retains that 'brightest ever' distinction. It lasts up to 15 days in smartwatch mode: an improvement over the 570, but it seems that screen technology does suck more battery life than other Forerunners before it.

The 970 packs in all the features of the 570, with additions, including the LED light seen on the Garmin Epix Pro and Garmin Instinct 3 watches. New metrics include Eunning Economy, Step Speed Loss (both of which require the new Garmin HRM 600 to work) and Running Tolerance, which tells you about your body's limits and recommends a weekly mileage. It sounds like a useful feature worthy of one of the best running watches.

It also sports ECG functionality, more premium materials such as Sapphire Glass on the lens, and comes in different colorways, including Soft Gold Titanium and Carbon Grey DLC Titanium. Clearly Garmin wanted to evoke a little more luxury here.

Garmin HRM 600

(Image credit: Garmin)

The HRM 600 is Garmin's latest and best heart rate monitor, priced at $169.99 / £149.99 / AU$299. It's compatible with the two new Forerunners above to enable their expanded running dynamics measurement, as well as other smartwatches, Garmin cycling computers, or can be worn on its own.

It's capable of sending pace and distance data (indoor workouts only), steps, time and calories burned to Garmin Connect, allowing you to sync your workouts with your smartwatch. This can be done for greater accuracy, or during workouts where it's not appropriate to wear a smartwatch, such as boxing or climbing.

Categories: Technology

Scattered Spider moves beyond the UK, places crosshairs on US companies

TechRadar News - Thu, 05/15/2025 - 09:31
  • US retailers should "take note", Google is warning
  • Scattered Spider was seen targeting multiple US retailers this year
  • The group has been on a "long hiatus"

Scattered Spider, a known ransomware collective, is widening its target scope, no longer focusing exclusively on UK firms. This is according to Google’s Threat Intelligence Group (TIG), who told BleepingComputer that US retailers “should take note.”

"The US retail sector is currently being targeted in ransomware and extortion operations that we suspect are linked to UNC3944, also known as Scattered Spider," John Hultquist, Chief Analyst at Google Threat Intelligence Group, told the publication. Hultquist added that Scattered Spider has returned after a “long hiatus” to target multiple firms.

The group is not as tightly-knit as organizations such as LockBit or Cl0p. It is relatively loose, and operates within a larger hacking community known as “the Com”. Its members engage in all kinds of attacks, from social engineering and SIM swapping, to ransomware. Scattered Spider’s usual targets are financial institutions, technology firms, and entertainment/gambling organizations.

TechRadar Pro readers can get 60% off Premium Plans at RoboForm now!

New users can take advantage of RoboForm’s exclusive deal and get 60% off the Premium Plan. With this deal, you can get unlimited password storage, one-click login & autofill, password sharing, two-factor authentication for added protection, cloud backup, and emergency access for trusted contacts. To claim this deal, visit this link and sign up for the Premium Plan to lock in this huge discount.

Preferred partner (What does this mean?)View Deal

Names and addresses

Google is warning retailers to take note, however, Silent Push reported that in 2025 some of Scattered Spider’s victims included Chick-fil-A, Forbes, Instacart, New York Digital Investment Group, News Corporation, Nike, Twitter/X, Tinder, T-Mobile, and Vodafone.

Among the retailers targeted this year, BleepingComputer singled out Marks & Spencer, Co-op, and Harrods. In all of these attacks, the threat actors used DragonForce - a ransomware operation that emerged in December 2023 and gained some notoriety since then.

In April 2025, the UK National Cyber Security Centre (NCSC) published new guidance, helping UK firms defend against Scattered Spider better. The organizations urged the retail sector to “wake up” and tighten up on security.

"Whilst we have insights, we are not yet in a position to say if these attacks are linked, if this is a concerted campaign by a single actor, or whether there is no link between them at all," the NCSC said. "We are working with the victims and law enforcement colleagues to ascertain that."

Via BleepingComputerd

You might also like
Categories: Technology

As political violence manifests through cyber attacks, companies must prepare

TechRadar News - Thu, 05/15/2025 - 09:27

The Allianz Risk Barometer, an annual report detailing the risks businesses are most concerned about for the year ahead, has seen companies rank political risks and violence as a top 10 global risk for the past three years. Businesses’ concerns have been exacerbated by 2024’s record-breaking number of elections, the developing conflict in the Middle East, and ongoing war in Ukraine.

The negative impact of political violence on companies can manifest in many ways, from endangering employee and customer safety to operational disruptions caused by material damage to premises or assets. As technology advances, uncertainty grows, and political tensions remain high around the world, businesses must consider their vulnerabilities, particularly in the cyber realm.

According to Allianz Commercial’s new Political Violence and Civil Unrest Trends 2025 report, cyber breaches represent one important way that political violence activity can impact businesses. This year’s report identified a key trend: that “new tech versus old tech” has increased the threat of rogue state-triggered damage and disruption, alongside increased reliance on technology around the world and ongoing instability in the geopolitical landscape. Addressing areas of vulnerability will be essential as companies grow operations in an increasingly volatile cyber environment.

New tech, new threats

Advances in technology and global connectivity have increased production and dissemination of misinformation and disinformation. To sow discord, Advanced Persistent Threat (APT) actors, which are usually sponsored by rogue nations or organizations, leverage cyber-attacks to disseminate false information, using techniques such as manipulated online news platforms and compromised social media accounts to instigate real-world events such as aggravating political polarization, promoting social unrest and riots and undermining democratic elections.

APT groups often engage in sophisticated cyber espionage, such as in the case of the Southport attacks and subsequent far-right riots during 2024 in the UK, which spread disinformation and caused social disruption.

Increased digital reliance and geopolitical instability are also heightening the risk of cyber-attacks that inflict physical harm at the same time.

Exposures in critical infrastructure

Critical infrastructure, including energy, transportation, and manufacturing, faces growing vulnerability to disruptions, equipment damage, and threats to human safety via cyber means.

To manage physical processes at these large installations, complex Industrial Control Systems (ICS) or operational technology (OT) systems are used for control and monitor purpose. Typically, these systems are legacy in nature and have obsolescence issues. That means they are vulnerable to attacks that can disrupt physical processes which can lead to potentially hazardous scenarios. For example, in refinery operations manipulation of ICS and safety systems can lead to catastrophic fire, explosions and can cause major environmental damage due to hydrocarbon releases.

Utility companies, too, depend extensively on OT systems. The prevalence of outdated, internet-unsecured devices within such networks poses a major security challenge due to infrequent updates. The utility sector’s cyber security weaknesses render it highly vulnerable. Exploiting internet-accessible OT and ICS devices, including those in the wastewater and water sectors could affect millions of people, with potentially severe consequences for public health and safety.

The vulnerability of transportation systems to cyber threats also raises critical concerns regarding the potential for cyber-physical attacks to cause tangible damage. While modern aircraft possess strong security protocols, vulnerabilities within airport infrastructure, including baggage handling and air traffic control, present a tangible risk of physical damage stemming from cyberattacks. Cyber-attacks targeting other transportation infrastructure also pose a significant risk of physical damage, with disruptions to signaling systems capable of triggering collisions or derailments. In August 2023, a cyber-attack on Poland’s railway system, where hackers manipulated unsecured radio signals to activate emergency train stops, demonstrates the susceptibility of outdated infrastructure to digital threats.

Addressing cyber vulnerabilities

Assessing the robustness of cybersecurity for key infrastructure demands a multi-faceted approach. Companies should engage with their insurance providers through cyber risk dialogue to discuss potential threats to the industry, as well as the insured’s weaknesses in people, technology and processes. Beyond traditional IT defenses, evaluations also include scrutinizing vulnerabilities, including legacy systems which are often ill-equipped for modern cyber threats, as well as an end-to-end assessment of the insured’s value chain.

Key weaknesses often reside in unpatched, poorly secured legacy systems, and the convergence of IT and OT networks. Supply chain vulnerabilities, inadequate incident response plans, and a lack of robust security awareness training further exacerbate these risks. Human error, particularly in access management and patching protocols, remains a significant entry point for malicious actors.

The convergence of Artificial Intelligence, social media, phishing, and Business Email Compromise attacks creates a potent and evolving threat landscape. These technologies are being weaponized to create more convincing and effective cyber-attacks.

How an organization will recover and maintain critical functions during and after a disruption is key. A robust business continuity plan encompasses a business impact analysis to pinpoint critical functions, defined recovery strategies and procedures, clear communication protocols, reliable data backup and recovery systems, flexible alternative work arrangements, and regularly conducted testing and exercises. Comprehensive audits encompass physical security, incident response protocols, and supply chain resilience. Regular penetration testing and threat intelligence integration are also crucial for identifying and mitigating emerging risks, ensuring the continuous protection of essential services.

We've featured the best antivirus software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

The iPhone will soon turn 20, but the last thing it needs is an all-glass makeover

TechRadar News - Thu, 05/15/2025 - 09:27

Steve Jobs was a design and materials guy. He grew up around homes built by legendary architect Joseph Eichler. Even if you don't know the name, you're likely familiar with their signature feature: floor-to-ceiling glass exterior walls. Eichler's influence on Jobs can be seen to this day in dozens of iconic Apple Stores around the world and at Apple Park, where the Steve Jobs Theater is, above ground, wrapped in 22-foot-tall glass panes.

Job's love of glass is the reason your iPhone 16 screen is covered in Corning's Gorilla Glass. As recounted in Walter Isaacson's biography of the late Apple CEO and founder, Steve Jobs hopped on the phone with Corning execs and convinced them to start making Gorilla Glass again, specifically for the first iPhone.

The rest, as they say, is history. How, though, might Apple celebrate this history when the iPhone turns 20 in 2027? According to multiple rumors, the iOS-running device is due for a major makeover, one that might include a significant increase in the use of glass.

Glasserversary

According to GSM Arena, for this anniversary handset Apple might do away with the bezel, the thin black bar that currently runs around your Super Retina XDR display, completely. With the glass running not only to the edges of the phone but seemingly spilling over them to the sides, the effect would be as if the handset were made entirely of glass.

This rumored design decision might have pleased Jobs. His love of glass never diminished, and most of his designs were built around the concept of mass-produced beauty. Jobs, according to his biography, once took his team to a Tiffany Glass exhibit at the Metropolitan Museum in New York to show them how to build repeatable beauty at scale.

What made Apple special almost 20 years ago is no longer unique among smartphone manufacturers.

Like Jobs, I appreciate beautiful design and exquisite materials. Job's decision to build the first iPhone chassis out of glass and aluminum is why I had such a strong emotional reaction when I first held the phone in 2007.

What made Apple special almost 20 years ago is no longer unique among smartphone manufacturers. They all use Gorilla Glass and some form of steel, aluminum, or even titanium. The battle for smartphone supremacy is now less about aesthetics and more about features, performance, and photography.

That alone might justify Apple completely overhauling the design for the iPhone 19. But making it virtually all glass is not the right way to go.

Never scratchproof

For as good as Gorilla Glass is (most phones now use the Victus 2 formula, and some add a Ceramic covering for more strength), it's still not as strong as metal, or even as resilient as plastic.

Every phone I've tested and owned has scratches, sometimes significant ones, on the screen. I haven't dropped these phones from a great height or dragged them across concrete, and yet they still have these blemishes.

Most people carry their iPhones in thick shock-proof cases to protect the comparatively fragile front and back glass. Like most smartphones, iPhones remain especially vulnerable at the corners; drop your iPhone just right on the pavement and it could shatter.

Broken glass

Now imagine what it would be like owning a phone that's all but dipped in glass. Glass along the edges, even if they're curved, will be far too exposed. No one would ever dare carry such a phone unprotected, would they?

So why would Apple do this? As I said, they want to celebrate 20 years of the iPhone, and what better way to do it than with a design that's too precious to hold or use. I could see a 'Special Edition iPhone 19', one that's covered in glass and which costs twice as much as the most expensive flagship. Few will buy it, but some will end up in museums and behind more glass inside glass-encased Apple Stores.

Those will be the perfect home for those iPhones, if Apple does insist on building them.

You might also like
Categories: Technology

Safeguarding data for the quantum era

TechRadar News - Thu, 05/15/2025 - 09:15

Staying ahead of potential cyber threats is a constant challenge with ransomware, phishing and AI just a few risks organizations must guard against. But what about quantum computing?

While not an immediate threat, quantum computing is one of the most complex and far-reaching challenges on the horizon. Thanks to its ability to perform complex calculations exponentially faster than classical computers, quantum will revolutionize numerous scientific fields – including chemistry, physics, and materials science. It also poses a significant cybersecurity risk due to its ability to break modern encryption methods and expose sensitive data – with ‘collect now, decrypt later’ attacks underscoring the urgency of preparing for a future where current cryptographic standards may be rendered obsolete.

So how can we protect against the cybersecurity threat this technology poses, both now and in the future?

The cybersecurity risks posed

Current encryption protocols, such as ECC (Elliptic Curve Cryptography) and RSA (Rivest-Shamir-Adleman), either rely on the difficulty of factoring large numbers or solving discrete logarithm problems for security. However, quantum computers using advanced methods like Shor’s algorithm – which can factor large numbers faster than any other algorithm – could efficiently solve these problems, leaving traditional encryption methods vulnerable to attack.

While a sufficiently powerful quantum computer capable of breaking modern encryption is unlikely to be available within the next decade, this window is narrowing with each quantum-led innovation. The issue is, threat actors are already collecting and storing sensitive data for future decryption, highlighting the need for proactive measures to safeguard information against post-quantum threats now.

To address this demand, the global cybersecurity community is actively developing quantum-safe encryption standards. This includes The National Institute of Standards and Technology (NIST), which has spearheaded the Post-Quantum Cryptography Standardisation project. This aims to evaluate and standardize quantum-resistant algorithms, helping to pave the way for the widespread adoption of quantum-safe encryption.

Organizations in the UK are also being urged to prepare for the cybersecurity risks posed by quantum computing, with a recent report by the Information Commissioner’s Office (ICO) identifying data privacy concerns posed by the technology. The government has also established a Quantum Regulatory Forum to promote safe and responsible development. While significant progress is being made in the development of safe and secure quantum computing, specifically mitigating the cybersecurity threats is crucial. But how can this be done?

Addressing these threats

Adopting quantum-safe encryption strategies is one mitigation technique. This refers to cryptographic protocols designed to resist quantum attacks. Unlike traditional encryption, which depends on computational complexity, quantum-safe encryption is rooted in mathematical problems believed to be insurmountable even for quantum computers.

Three major approaches are already being explored, with the first being Quantum Key Distribution (QKD) – a secure way of sharing encryption keys using the principles of quantum mechanics, ensuring only the intended recipient can access the key. In cryptography terms, these entangled quantum particles or ‘qubits’ are encoded with cryptographic keys and transmitted between a sender and a receiver. If an eavesdropper attempts to intercept these particles, their quantum states will be disturbed, alerting the sender and receiver to an intruder. This ensures any attempt at unauthorized interception is immediately detected.

Despite facing challenges related to scalability, transmission distance and integration with existing infrastructure, this encryption method is already being put into practice. One example is JPMorgan Chase (JPMC), which used QKD to secure multiple high-speed virtual private networks traversing a single 100 Gbps fiber connecting data centers.

Other quantum-safe solutions include Quantum-Safe Encryption, which ensures a secure key exchange resistant to quantum attacks, and Post-Quantum Cryptography (PQC). This implements cryptographic algorithms believed to be difficult for quantum computers to solve, such as lattice-based encryption.

While these approaches offer a means of securing data against quantum computing, we must remember that adopting quantum-safe solutions and protecting data poses several challenges. Interoperability, performance impact, and backward compatibility must be considered and leaders need to carefully assess existing infrastructure and devise a roadmap for migration to quantum-resistant encryption.

The future quantum landscape

As cyber threats continue to evolve, ensuring the long-term security of sensitive information is paramount. This includes for quantum computing. While no single technology will solve this challenge alone, harnessing the power of quantum-resistant cryptographic algorithms and QKD technologies can help protect data while allowing organizations to stay resilient in the face of continued technological advancements.

We've featured the best malware removal.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Huawei Watch 5 Tested: Easy Heart Scanning, but Not for Americans

CNET News - Thu, 05/15/2025 - 09:00
The watch's X-Tap sensor makes it simple to get an overview of your health. But it won't be available in the US.
Categories: Technology

Largest US steel manufacturer puts production on the backburner after cyber attack

TechRadar News - Thu, 05/15/2025 - 09:00
  • Nucor confirmed suffering a cyberattack
  • It was forced to shut down parts of its operations to contain the incident
  • No threat actors claimed responsibility yet

Nucor, one of the biggest steel manufacturers in the United States, was forced to shut down parts of its operations to address an ongoing cyberattack. The company confirmed the news in a new 8-K form filed with the US Securities and Exchange Commission (SEC).

In the filing, Nucor said it recently observed an “unauthorized third party” accessing “certain information technology systems.” When it spotted the intrusion, it activated its incident response plan, brought in a third-party cybersecurity company to assist, and notified relevant law enforcement agencies.

However, it also took “potentially affected systems offline” to implement “other containment, remediation, or recovery measures”.

TechRadar Pro readers can get 60% off Premium Plans at RoboForm now!

New users can take advantage of RoboForm’s exclusive deal and get 60% off the Premium Plan. With this deal, you can get unlimited password storage, one-click login & autofill, password sharing, two-factor authentication for added protection, cloud backup, and emergency access for trusted contacts. To claim this deal, visit this link and sign up for the Premium Plan to lock in this huge discount.

Preferred partner (What does this mean?)View Deal

Was it ransomware?

Nucor told the SEC that it “temporarily and proactively” stopped certain production operations at various locations “in an abundance of caution”. It is now restarting those operations, it added.

Usually, when a company shuts down its operations to contain a cyberattack, it usually ends up being a ransomware attack. While the company did not explicitly say so, the fact that it halted operations could suggest this is the case.

Furthermore, The Register tried reaching out to the company’s facilities around the US, but found many phone numbers “either shut down or unobtainable.” Sometimes, a ransomware attack also results in inaccessible phone lines.

The importance Nucor plays in supporting the US critical infrastructure would also make it a prime target for ransomware attackers. No threat actors have claimed responsibility just yet, and we don’t know if any sensitive data was taken in the breach.

Nucor is headquartered in Charlotte, North Carolina, and is widely considered as the largest US steel producer, and one of the top recyclers. It operates more than 300 facilities across the US, Canada, and Mexico, and manufactures a wide range of steel products. Last year, it reported annual net sales of $30.73 billion.

Via The Register

You might also like
Categories: Technology

Quordle hints and answers for Friday, May 16 (game #1208)

TechRadar News - Thu, 05/15/2025 - 09:00
Looking for a different day?

A new Quordle puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Thursday's puzzle instead then click here: Quordle hints and answers for Thursday, May 15 (game #1207).

Quordle was one of the original Wordle alternatives and is still going strong now more than 1,100 games later. It offers a genuine challenge, though, so read on if you need some Quordle hints today – or scroll down further for the answers.

Enjoy playing word games? You can also check out my NYT Connections today and NYT Strands today pages for hints and answers for those puzzles, while Marc's Wordle today column covers the original viral word game.

SPOILER WARNING: Information about Quordle today is below, so don't read on if you don't want to know the answers.

Quordle today (game #1208) - hint #1 - Vowels How many different vowels are in Quordle today?

The number of different vowels in Quordle today is 4*.

* Note that by vowel we mean the five standard vowels (A, E, I, O, U), not Y (which is sometimes counted as a vowel too).

Quordle today (game #1208) - hint #2 - repeated letters Do any of today's Quordle answers contain repeated letters?

The number of Quordle answers containing a repeated letter today is 1.

Quordle today (game #1208) - hint #3 - uncommon letters Do the letters Q, Z, X or J appear in Quordle today?

• No. None of Q, Z, X or J appear among today's Quordle answers.

Quordle today (game #1208 - hint #4 - starting letters (1) Do any of today's Quordle puzzles start with the same letter?

The number of today's Quordle answers starting with the same letter is 2.

If you just want to know the answers at this stage, simply scroll down. If you're not ready yet then here's one more clue to make things a lot easier:

Quordle today (game #1208) - hint #5 - starting letters (2) What letters do today's Quordle answers start with?

• S

• S

• D

• B

Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.

Quordle today (game #1208) - the answers

(Image credit: Merriam-Webster)

The answers to today's Quordle, game #1208, are…

  • SHEEP
  • SNUCK
  • DRIFT
  • BREAK

Ramen, which was one of my old start words, featured in yesterday’s Sequence game so I thought I’d re-introduce it into my starting trio.

I’m not sure whether this brought a change of fortune or if today’s round was easier than usual, but I breezed through.

Guessing SNUCK was a gamble, but that aside I had no other options for the other three words.

How did you do today? Let me know in the comments below.

Daily Sequence today (game #1208) - the answers

(Image credit: Merriam-Webster)

The answers to today's Quordle Daily Sequence, game #1208, are…

  • DRINK
  • CRISP
  • SHEET
  • THIEF
Quordle answers: The past 20
  • Quordle #1207, Thursday, 15 May: PAINT, CROUP, PEDAL, FLUKE
  • Quordle #1206, Wednesday, 14 May: FAVOR, METER, PICKY, MAKER
  • Quordle #1205, Tuesday, 13 May: SCENT, AGAPE, POLAR, YEARN
  • Quordle #1204, Monday, 12 May: ROYAL, ARGUE, BUNCH, READY
  • Quordle #1203, Sunday, 11 May: QUASH, MUNCH, ALTER, UNDUE
  • Quordle #1202, Saturday, 10 May: RELIC, BADGE, CHAMP, SATIN
  • Quordle #1201, Friday, 9 May: MINUS, CRIME, NOSEY, SLAIN
  • Quordle #1200, Thursday, 8 May: ELUDE, GREET, POPPY, ELITE
  • Quordle #1199, Wednesday, 7 May: QUOTH, TRUNK, BESET, NAIVE
  • Quordle #1198, Tuesday, 6 May: UNITE, SOGGY, FILET, PORCH
  • Quordle #1197, Monday, 5 May: WREAK, COWER, STEAD, QUEUE
  • Quordle #1196, Sunday, 4 May: PINCH, SMOKE, SCARY, CANNY
  • Quordle #1195, Saturday, 3 May: PLUSH, VERGE, WROTE, CONDO
  • Quordle #1194, Friday, 2 May: CAUSE, RISEN, MACAW, SMELT
  • Quordle #1193, Thursday, 1 May: IDIOM, EXILE, SPOOF, DRAPE
  • Quordle #1192, Wednesday, 30 April: BATON, TORSO, ANNEX, DROWN
  • Quordle #1191, Tuesday, 29 April: HOVER, HENCE, OCTAL, COPSE
  • Quordle #1190, Monday, 28 April: JAUNT, ALLOW, FRUIT, BURNT
  • Quordle #1189, Sunday, 27 April: PRIOR, YOUTH, CREDO, CHIDE
  • Quordle #1188, Saturday, 26 April: LINGO, LOCUS, THROW, CLICK
Categories: Technology

NYT Strands hints and answers for Friday, May 16 (game #439)

TechRadar News - Thu, 05/15/2025 - 09:00
Looking for a different day?

A new NYT Strands puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Thursday's puzzle instead then click here: NYT Strands hints and answers for Thursday, May 15 (game #438).

Strands is the NYT's latest word game after the likes of Wordle, Spelling Bee and Connections – and it's great fun. It can be difficult, though, so read on for my Strands hints.

Want more word-based fun? Then check out my NYT Connections today and Quordle today pages for hints and answers for those games, and Marc's Wordle today page for the original viral word game.

SPOILER WARNING: Information about NYT Strands today is below, so don't read on if you don't want to know the answers.

NYT Strands today (game #439) - hint #1 - today's theme What is the theme of today's NYT Strands?

Today's NYT Strands theme is… To a degree

NYT Strands today (game #439) - hint #2 - clue words

Play any of these words to unlock the in-game hints system.

  • CHIP
  • CHEEP
  • SPORES
  • SINS
  • SORT
  • RACES
NYT Strands today (game #439) - hint #3 - spangram letters How many letters are in today's spangram?

Spangram has 10 letters

NYT Strands today (game #439) - hint #4 - spangram position What are two sides of the board that today's spangram touches?

First side: left, 8th row

Last side: right, 1st row

Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.

NYT Strands today (game #439) - the answers

(Image credit: New York Times)

The answers to today's Strands, game #439, are…

  • GOWN
  • PHOTO
  • SPEECH
  • DIPLOMA
  • TASSEL
  • PROCESSION
  • SPANGRAM: GRADUATION
  • My rating: Easy
  • My score: Perfect

There are many universal traditions associated with GRADUATION ceremonies, from paying far too much to hire a GOWN to posing for a PHOTO that will be given pride of place in your parents' house until the zombie apocalypse – and even then it’ll still be there, just with added cobwebs and a splatter of green blood.

There is also a whole legend surrounding the tassels on the mortarboard hat. Traditionally, tassels are worn on the right side and moved to the left during a special portion of the ceremony for high-school graduates. For college graduates, Bachelors again wear tassels on the right side until their degrees are conferred, then move to left. 

Goodness knows what might happen to you if you move your tassel from the left to the right – maybe you get burdened with a lifetime of debt or something awful like that. Erm, hang on a sec…

How did you do today? Let me know in the comments below.

Yesterday's NYT Strands answers (Thursday, May 15, game #438)
  • BEETLE
  • BRONCO
  • MUSTANG
  • RABBIT
  • IMPALA
  • JAGUAR
  • SPANGRAM: AUTOMOBILES
What is NYT Strands?

Strands is the NYT's not-so-new-any-more word game, following Wordle and Connections. It's now a fully fledged member of the NYT's games stable that has been running for a year and which can be played on the NYT Games site on desktop or mobile.

I've got a full guide to how to play NYT Strands, complete with tips for solving it, so check that out if you're struggling to beat it each day.

Categories: Technology

NYT Connections hints and answers for Friday, May 16 (game #705)

TechRadar News - Thu, 05/15/2025 - 09:00
Looking for a different day?

A new NYT Connections puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Thursday's puzzle instead then click here: NYT Connections hints and answers for Thursday, May 15 (game #704).

Good morning! Let's play Connections, the NYT's clever word game that challenges you to group answers in various categories. It can be tough, so read on if you need Connections hints.

What should you do once you've finished? Why, play some more word games of course. I've also got daily Strands hints and answers and Quordle hints and answers articles if you need help for those too, while Marc's Wordle today page covers the original viral word game.

SPOILER WARNING: Information about NYT Connections today is below, so don't read on if you don't want to know the answers.

NYT Connections today (game #705) - today's words

(Image credit: New York Times)

Today's NYT Connections words are…

  • RODEO
  • HOURGLASS
  • KUBRICK
  • SUNSET
  • TREE
  • SCRAP
  • WALL STREET
  • VINE
  • MICHAEL JORDAN
  • HOLLYWOOD
  • HERB
  • TAURUS
  • END
  • SHRUB
  • NEUROPLASTIC
  • DISSOLVE
NYT Connections today (game #705) - hint #1 - group hints

What are some clues for today's NYT Connections groups?

  • YELLOW: Greenery
  • GREEN: It’s over
  • BLUE: An animal connects them
  • PURPLE: Hidden raw materials 

Need more clues?

We're firmly in spoiler territory now, but read on if you want to know what the four theme answers are for today's NYT Connections puzzles…

NYT Connections today (game #705) - hint #2 - group answers

What are the answers for today's NYT Connections groups?

  • YELLOW: KINDS OF PLANTS 
  • GREEN: DISCONTINUE 
  • BLUE: ASSOCIATED WITH BULLS 
  • PURPLE: ENDING WITH BUILDING MATERIALS 

Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.

NYT Connections today (game #705) - the answers

(Image credit: New York Times)

The answers to today's Connections, game #705, are…

  • YELLOW: KINDS OF PLANTS HERB, SHRUB, TREE, VINE
  • GREEN: DISCONTINUE DISSOLVE, END, SCRAP, SUNSET
  • BLUE: ASSOCIATED WITH BULLS MICHAEL JORDAN, RODEO, TAURUS, WALL STREET
  • PURPLE: ENDING WITH BUILDING MATERIALS HOLLYWOOD, HOURGLASS, KUBRICK, NEUROPLASTIC
  • My rating: Moderate
  • My score: 1 mistake

Seeing HOLLYWOOD and VINE beside each other along with SUNSET convinced me we were looking for famous Los Angeles streets.

Unable to think of a fourth I added KUBRICK to the group, reasoning that the great director must have a road named after him somewhere – it turns out he does, but Stanley Kubrick Avenue is in Denham just outside of London, England rather than California.

After this ding I went for the more obvious KINDS OF PLANTS and DISCONTINUE – which discontinued my search for streets.

I failed to see the very obvious connection with MICHAEL JORDAN and BULLS – a classic Connections group of four very different things with something in common – but instead saw the less obvious ENDING WITH BUILDING MATERIALS after staring at the word HOURGLASS for far too long.

How did you do today? Let me know in the comments below.

Yesterday's NYT Connections answers (Thursday, May 15, game #704)
  • YELLOW: RATIONALE BASIS, FOUNDATION, GROUNDS, REASON
  • GREEN: TYPES OF SNOW CRUST, ICE, POWDER, SLUSH
  • BLUE: LAST WORDS OF FAMOUS OPERA TITLES BESS, BUTTERFLY, FLUTE, SEVILLE
  • PURPLE: REAL ___ DEAL, ESTATE, MADRID, WORLD
What is NYT Connections?

NYT Connections is one of several increasingly popular word games made by the New York Times. It challenges you to find groups of four items that share something in common, and each group has a different difficulty level: green is easy, yellow a little harder, blue often quite tough and purple usually very difficult.

On the plus side, you don't technically need to solve the final one, as you'll be able to answer that one by a process of elimination. What's more, you can make up to four mistakes, which gives you a little bit of breathing room.

It's a little more involved than something like Wordle, however, and there are plenty of opportunities for the game to trip you up with tricks. For instance, watch out for homophones and other word games that could disguise the answers.

It's playable for free via the NYT Games site on desktop or mobile.

Categories: Technology

Apple Debuts CarPlay Ultra on Aston Martins With Fresh Customization Options

CNET News - Thu, 05/15/2025 - 08:45
The more deeply integrated system will come to older Aston Martins in a few weeks, and is also set to roll out to Hyundai, Kia and Genesis vehicles.
Categories: Technology

Apple CarPlay Ultra finally rolls out –here are 4 things you need to know about its Aston Martin debut

TechRadar News - Thu, 05/15/2025 - 08:41

Aston Martin has become the first automaker in the world to offer deeper integration of Apple CarPlay in its vehicle’s infotainment system with the debut of the new Apple CarPlay Ultra.

Having been in development for a number of years, both Porsche and Aston Martin revealed in 2023 that they would be among the first to offer Apple’s latest infotainment offering, but the British sports car maker has beaten all other manufacturers to it.

Apple CarPlay Ultra builds on the existing CarPlay platform by taking over both the infotainment head unit and the vehicle’s digital instrument cluster for the first time.

The new CarPlay will initially be limited to the new Aston Martin DBX on models ordered in North America and Canada, but is coming to other Aston cars and regions over the next 12 months. Apple also says it's working with Hyundai, Kia, and Genesis to bring CarPlay Ultra to more models.

Want to know what all the fuss is about? Here are four things you need to know, plus a gallery of images to show what CarPlay Ultra looks like in Aston Martin's latest drive...

1. It offers a more personal experience Image 1 of 2

(Image credit: Apple / Aston Martin)Image 2 of 2

(Image credit: Apple / Aston Martin)

Now, drivers can select between a number of Aston Martin-designed digital options for the speedometer and tachometer dials, while the ability to toggle between live maps from a preferred navigation provider, as well as media applications, gives owners a way to "curate their own multi-screen set-up," according to James Bond's favorite brand.

What’s more, the British marque has also provided a number of different instrument cluster themes, as well as the ability to tailor wallpapers, color schemes and the general look to their personal tastes.

The key to making the tie-up work was to ensure Aston Martin had full control over design, with Apple claiming CarPlay Ultra allows automakers to "express their distinct design philosophy with the look and feel their customers expect".

2. It offers everything in one place Image 1 of 2

(Image credit: Apple / Aston Martin)Image 2 of 2

(Image credit: Apple / Aston Martin)

One of the biggest bugbears about the current CarPlay environment is that users often have to leave it in order to interact with key vehicle functionality, such as changing driving modes or adjusting the climate control, for example.

Apple CarPlay Ultra banishes this sort of behavior to the naughty step and finally allows drivers to tweak the radio station, adjust the climate control or fire up the heated seats from within the Ultra interface via touchscreen controls, physical buttons, or by using Siri voice commands.

Better still, the British marque talks about “Punch-through UI”, which essentially means its has been able to bring very vehicle-specific menus and settings into the CarPlay environment for the first time.

So, if you wan’t to adjust the balance and fader on the swanky Bowers & Wilkins, it is possible to do so through a specific menu screen that is housed within the CarPlay Ultra environment.

3. It has a highly customizable cluster with more info Image 1 of 1

(Image credit: Apple / Aston Martin)

Aston says customers can also select from a number of widgets that can reside on either the 10.25-inch infotainment screen or on the digital driver display for a highly customizable cluster. This could include things like tyre pressure monitoring, weather forecasts or advanced driver assistance system settings.

Although it is not explicitly mentioned by Aston Martin or Apple, it is understood that owners will need to initially pair an iPhone 12 or later (running iOS 18.54 and later) either by plugging it in or choosing the wireless option.

The system will the automatically recognize the handset and the driver every time they enter the vehicle, even going to far as to knowing the region they are from, adjusting the units of measurement accordingly.

Of course, it opens up easy access to things like email, WhatsApp messages and the ability to hop on Zoom calls, all without having to juggle between interfaces.

4. It's coming to other car brands Image 1 of 9

(Image credit: Apple)Image 2 of 9

(Image credit: Apple)Image 3 of 9

(Image credit: Apple)Image 4 of 9

(Image credit: Apple)Image 5 of 9

(Image credit: Apple)Image 6 of 9

(Image credit: Apple)Image 7 of 9

(Image credit: Apple)Image 8 of 9

(Image credit: Apple)Image 9 of 9

(Image credit: Apple)

Unfortunately, Android users won’t be able to enjoy a similar sort of Android Automotive experience in the car, seeing as this is a specific Apple tie-up.

Instead, Aston Martin provides physical buttons and switches for most of its functionality and explains that its next-generation infotainment system, which debuted on the all-new DB12 in 2023, is perfectly a perfectly decent digital offering as it is.

Also, CarPlay Ultra is currently limited to the new Aston Martin DBX, and only those models ordered in North America and Canada for now. Although it will be rolled out to other Aston models and markets in the coming 12 months.

What’s more, Apple said it is working with a number of automakers to bring CarPlay Ultra into a variety of new models soon, including those from Hyundai, Kia, and Genesis.

Aston Martin's 10.25-inch Pure Black touchscreen technology is relatively modest compared to many rivals, so it will be interesting to see what other manufacturers can do with larger and more impressive screen arrays.

Apple Arcade while waiting to charge up, anyone?

You might also like
Categories: Technology

Wednesday season 2 has a release date and the Netflix show's confirmed all-star cast could make it even better

TechRadar News - Thu, 05/15/2025 - 08:37
  • Wednesday season 2 has a confirmed release date on Netflix
  • It will be split into two parts arriving in August and September
  • The streaming service has also announced the cast, and some of the new names are huge

Wednesday season 2 is almost upon us after a three year gap. Indeed, fans of one of the best Netflix shows don't have to wait much longer after its release dates were confirmed. As part of the Netflix Upfront presentation, the streaming service has confirmed the new season will arrive later this year.

Netflix has revealed that Wednesday season 2 will be split into two parts, with the first arriving on August 6, and the second on September 3. And yes, aptly enough, both of those are Wednesdays!

We've all been waiting patiently for the return of Jenna Ortega's child of woe, and now it's only a couple of months away. If you missed the trailer, you can watch it below.

Who's in the cast of Wednesday season 2?

Gwendoline Christie has left the Wednesday cast, and the new school principal is played by Steve Buscemi. (Image credit: Vlad Cioplea/Netflix)

Perhaps the better question is, who isn't? Seriously though, it's a stacked line-up and as well as returning names like Ortega, Catherine Zeta-Jones, Isaac Ordonez, Fred Armisen and Luis Guzmán, we've got plenty of great new stars joining the macabre Tim Burton series.

Joanna Lumley joins the Addams Family this season, playing the role of Morticia's mother, Hester. Following the departure of Gwendoline Christie's principal, Nevermore has a new one in the form of Steve Buscemi, and I'm so excited to see how he steps into the role.

The faculty is huge this season with Billie Piper and Christopher Lloyd joining the ranks and, of course, we have returning students such as Emma Myers and Joy Sunday, so fans will be pleased to see the cast has increased in size, with plenty of favorites coming back.

You might also like
Categories: Technology

The FTC's 'Click to Cancel' Rule Delay Could Make It Harder to Ditch Unwanted Subscriptions

CNET News - Thu, 05/15/2025 - 08:04
The rule is meant to make it just as easy to cancel as it is to sign up. Companies asked for more time to comply.
Categories: Technology

Motorola Razr 2025 Review: It's Got the Look

CNET News - Thu, 05/15/2025 - 08:00
The $700 Razr exudes elegance with its design, but you will be taking a performance hit compared with traditional phones.
Categories: Technology

Motorola Razr (2025) Is a Fashion-Forward $700 Flip Phone

CNET News - Thu, 05/15/2025 - 08:00
The lower-cost member of Motorola's 2025 Razr phone family is still quite the looker.
Categories: Technology

What to Stream on TV This Weekend: 'The Brutalist,' 'Welcome To Wrexham' and More

CNET News - Thu, 05/15/2025 - 08:00
Don't miss the latest on Max, Hulu and other streaming services. Here's what you should binge this weekend.
Categories: Technology

Motorola Razr Ultra Is a Retro Icon Reborn With a Design for the Future

CNET News - Thu, 05/15/2025 - 08:00
The new Razr Ultra mixes retro cool vibes with modern power. Here's how it looks up close.
Categories: Technology

I Tested the Motorola Razr Ultra. It's Good, but Flipping Expensive

CNET News - Thu, 05/15/2025 - 08:00
Review: Motorola pulled out all the stops for the newest Razr. It has high-end features, tons of AI and more durability. But it also comes with a $1,300 price tag.
Categories: Technology

SAP NetWeaver woes worsen as ransomware gangs join the attack

TechRadar News - Thu, 05/15/2025 - 08:00
  • BianLian, RansomEXX, and others, are jumping the NetWeaver bandwagon
  • In late April, SAP fixed a 10/10 bug in NetWeaver Visual Composer Metadata Uploader
  • Researchers claim there are 1,200 vulnerable instances

Multiple ransomware operators are trying to take advantage of the recently discovered, maximum severity flaw, affecting SAP NetWeaver Visual Composer. This is according to, among others, ReliaQuest, a cybersecurity company that also reported on the initial flaw.

In late April, security researchers reported that more than 1,200 SAP instances were at risk of being hijacked, due to a maximum severity vulnerability found in NetWeaver Visual Composer’s Metadata Uploader component.

The bug stems from the fact that the uploader was not protected with proper authorization, allowing unauthenticated actors to upload malicious executables.

Save up to 68% on identity theft protection for Techradar readers

TechRadar editors praise Aura's upfront pricing and simplicity. Aura also includes a password manager, VPN, and antivirus to make its security solution an even more compelling deal.

Preferred partner (What does this mean?)View Deal

Multiple critical flaws

The bug is tracked as CVE-2025-31324, and despite SAP releasing a patch rather fast, multiple in-the-wild attacks were spotted.

Now, ReliaQuest said it saw evidence suggesting involvement from BianLian and RansomEXX, two known ransomware families. Other researchers also claim Chinese state-sponsored actors were in on the action, as well. “We assess with moderate confidence that BianLian was involved in at least one incident,” ReliaQuest said. “In a separate incident, we observed the deployment of “PipeMagic,” a modular backdoor linked to RansomEXX.”

The researchers also said that the miscreants moved fast, with the malware being deployed “just hours after global exploitation”.

Earlier this week, SAP patched a separate, also critical, zero-day vulnerability in NetWeaver server. This one, it said, was being chained in attacks targeting some of the world’s biggest enterprises. It is tracked as CVE-2025-42999, and carries a severity score of 9.1/10 (critical). Also discovered in the NetWeaver Visual Composer Metadata Uploader, the bug allows a privileged user to upload untrusted or malicious content which, “when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.”

SAP said it found this bug when analyzing the maximum severity one. Both were allegedly being abused in attacks since January 2025.

Via BleepingComputer

You might also like
Categories: Technology

Pages

Subscribe to The Vortex aggregator - Technology