American lingerie and beauty retailer Victoria’s Secret has suffered a cyberattack which forced the company to shut down its websites and “some in-store services”.
In a short announcement posted on the company’s main website (as well as national websites), it was said a “security incident” had been identified, and “as a precaution”, the website and some in-store services were taken down.
“We appreciate your patience during this process. In the meantime, our Victoria’s Secret and PINK stores remain open and we look forward to serving you,” the announcement reads.
Was it ransomware?So far, specific details on the incident remain scarce, as the company did not detail the nature of the attack, the identity of the attackers, or the methods used to compromise the systems.
A Victoria's Secret spokesperson told FOX Business the company triggered its incident response protocols following the incident.
"Third-party experts are engaged, and we took down our website and some in store services as a precaution," the statement read. "We are working to quickly and securely restore operations."
Usually, when a company is forced to shut down its IT network, either partially or completely, it is to contain a ransomware attack, and prevent threat actors from moving laterally and exfiltrating sensitive customer data.
Since no threat actors have yet claimed responsibility for the attack, this is pure speculation at this point. We do know that the company’s systems have been offline for at least three days, at press time.
Victoria’s Secret is a leading global lingerie and beauty retailer, so it’s no wonder it was a target. As of February 1, 2025, the company had 31,000 total employees, including 13,000 full-time and 18,000 part-time employees, according to Stock Analysis.
It has more than 1,300 stores around the world and in 2024, it reported annual revenue of $6.23 billion.
Via TechCrunch
You might also likeIf you want to back up tens of petabytes of data or even more, here’s some good news for you. Without much fanfare, IBM, Symply and Spectral Logic have separately made LTO-10 announcements in the past 48 hours.
Announced in 2014, LTO-10 is the 10th iteration of Linear Tape Open technology. This tape media can now reach 30TB native capacity and a staggering 75TB compressed (using the industry standard of 2.5:1 ratio).
Even more surprising is that the transfer rate remained at 400MB/s whereby incremental speed improvements were the norm in the previous nine generations. In theory, filling up an entire tape would take a bit less than a day.
LTO’s taking its timeEven if 30TB sounds fantastic, it is significantly smaller than what was originally proposed. Eight years ago when the LTO organization published their Ultrium roadmap, it listed the LTO-10 as being a 48TB model, that dropped to 36TB in the most recent one, from 2022, and now the actual product launched with ‘only’ 30TB.
That is 67% higher than the capacity of the new LTO-9 tape (18TB) but only 25% higher than that of the old LTO-9 purported tape capacity (24TB). In other words, six LTO-10 tapes can replace 10 LTO-9 tapes.
Back then, the LTO consortium told us, “Doubling capacity approximately every two years is still technically feasible for LTO tape technology and the LTO Program anticipates being able to return to that pattern in future generations”.
Why? Perhaps because the legacy (hard drives) and exotic competitions (ceramic, DNA, silica) aren’t as compelling as originally planned. The first 30TB hard drive launched in January 2024 with 100TB hard drives expected to debut by 2030. LTO-9 hit the market in September 2021 and was delayed by a series of setbacks.
What’s next for LTO?So one can expect LTO-11 to launch sometime in 2029. LTO’s latest roadmap goes up to LTO-14 with a native capacity of 576TB but this document will almost certainly be changed because of LTO-10’s unexpected (and disappointing) capacity change.
Symply, a storage hardware expert that launched the first LTO-9 tape drive, will start shipping LTO-10 products as early as mid-June 2025 from $11,995 (SAS) with devices equiped with other interfaces (Ethernet and Thunderbolt) costing more.
Symply told TechRadar Pro that they will provide pricing details for LTO-10 media soon. They also told us “the LTO-10 media is 1035m in length which is the same as LTO-9. It is a high density on the media that enable the higher capacity.”
LTO-9 is currently the cheapest of the LTO family, costing around $5 per TB; a 30TB tape would likely sell for more than $150. IBM, one of the founders of LTO, has also announced an LTO 10 tape drive, while Spectra Logic announced support for the new media.
25 years and still going strongIt’s been a quarter of a century already since LTO-1 hit the market and while it has many critics (including within the US government), its resilience, value for money and ability to adapt to countless storage demands makes it a reliable partner regardless of the use case.
We witnessed the demise of competitors (like Sony’s ODA) and while alternative forms of storage (most notably Cerabyte) show exciting potential, they are still very far from reaching the same status as tape.
You might also likeMedia
Capacity (TB)
Price
Price per TB
12
$57.74
$4.81
18
$88.64
$4.92
Seagate Expansion 20TB external HDD
20
$230.00
$11.50
16
$255.00
$15.94
50 Pack Myeco Bd-r BDR Blu-ray
1.25
$19.99
$15.99
2
$82.99
$41.50
Patriot Transporter 2TB Type-C External Portable SSD
2
$89.99
$45.00
TEAMGROUP A2 Pro Plus Card microSD
1
$52.99
$52.99
Microsoft's Windows 11 has been controversial for PC gamers recently, specifically with its 24H2 update. And Valve's SteamOS looks set to be the most suitable alternative for handheld users, with its focus moving away from the Steam Deck for the first time.
As reported by GamingOnLinux, Valve released SteamOS 3.7.9 beta, which comes after its recent SteamOS 3.7 stable update. The update provided support for the Lenovo Legion Go S and other AMD-powered handhelds, and this new beta contains fixes for the devices; it addresses controller input and frame-pacing issues, and other tweaks you can read in its patch notes.
Valve recently stated that it would be continuously working on support for handheld devices that aren't officially SteamOS licensed, and it appears that it's kept true to its word. Users also have other SteamOS clones like Bazzite, which has been available and supported much longer than Valve's recent efforts for other handhelds.
It's an example of Valve supporting these portable systems within a short period of time, exactly one week after the SteamOS 3.7 stable release. Since Microsoft's Windows 11 is focused on desktop PCs and laptops, and less on handhelds, the difference between the two operating systems is evident.
Handheld vendors like Asus and Lenovo provide software like Armoury Crate to help streamline the experience with menus and hubs built for gaming. However, performance in games on SteamOS has been showcased as much better than games running on Windows 11 – and without bloatware and non-gaming software running in the background, it's not too much of a surprise.
Analysis: Leaving Windows 11 for SteamOS on handhelds for SteamOS is a no-brainer at this point...(Image credit: T. Schneider / Shutterstock)With features like sleep mode and quick resume on SteamOS (or Bazzite, which is what I'm using), and most importantly better performance, leaving Windows 11 behind was an easy choice for me – and I anticipate more Asus ROG Ally X, MSI Claw 8 AI+, and Lenovo Legion Go users will be making the switch sooner.
Using sleep mode on Windows 11 via the power button is a complete mess. Either the screen will constantly switch itself back on (especially while running a game), or resuming and getting back into your game will make it crash or freeze the device altogether.
Combined with the issues of constant micro-stutters in games, the lack of graphics drivers provided by vendors, AMD's AFMF (frame generation software) not working efficiently, and bloatware, it would be a literal downgrade to return to Windows.
It's also promising to see that game developers of games using anti-cheat software work towards support for the Linux-based OS – and Splitgate 2 is a prime example of this with its recent update, highlighted by GamingOnLinux. I'm just hoping the trend can continue sooner rather than later...
You may also like...HP Inc has revealed it is nearly done with its exit from China as the Trump administration tariffs continue to affect even the biggest companies.
Speaking on its latest Q2 2025 earnings call, company president and CEO Enrique Lores said it has "accelerated" its move to have zero products heading to the US, made in China.
HP Inc had said it would make such a move last quarter, and now seems close to ensuring it fully complies with the increasing punitive tariffs.
HP exiting China“A quarter ago, we shared that our goal was to have less than ten percent of the products in North America being shipped from China by September,” Lores said on the call.
“We have accelerated that and we share that now almost no products will be coming from China sold in the US by June. It’s a very significant acceleration of the plan that we have."
“We accelerated the shift of factories out from China into Southeast Asia, into Mexico to a certain extent in the US to mitigate the impact of the change,” he added.
Lores also revealed that in order to avoid further tariffs, HP will also no longer use the US as a distribution hub for products sold in Canada or to Latin America.
The company revealed $13.2 billion net revenue for Q2 2025, up 3.3% year on year, however EPS (earnings per share) fell from $061 to $042 - below the company's outlook.
Lores noted the company was in, "a very different economic situation from where we were a few months ago in terms of both consumer and business confidence," forcing it to take what he called "price actions", effectively increases across PC and printing hardware.
“In light of the increased macroeconomic uncertainty, we have adjusted our outlook to reflect moderated demand and the net impact of trade-related costs,” Karen Parkhill, CFO, HP Inc, said, adding the company was, "executing targeted mitigation strategies, and assuming current conditions remain, we expect to fully offset these costs by Q4.”
She noted HP had, “worked aggressively to respond to changes in the regulatory trade environment” however, “tariff increases announced in April were higher than expected."
“The full benefit of these mitigating actions can take a few months lead time depending on the scope,” Parkhill added.
You might also likeUnlike the Nintendo Switch, the Nintendo Switch 2 will have a feature that will allow players to easily save their screenshots and videos.
According to dataminer 'OatmealDome', the Switch 2 can automatically upload new screenshots and videos to the official Nintendo Switch app's new Album feature, offering a faster and more efficient way of saving files to users' phones or tablets.
The Switch app will store up to 100 files for up to 30 days at a time, and old files will be automatically deleted once the limit is reached, so users will need to save any photos and videos they want to keep before they're gone for good.
As per the attached screenshot, if players' uploads are taking a long time to appear, they can check the file's status by navigating to the console's Album, Upload Settings, and then Upload Status.
This system works quite similarly to the PlayStation app, which will also automatically store screenshots and game capture footage from the PlayStation 5.
[Switch app]The Switch 2 can automatically upload new screenshots and videos to the Switch app on your tablet or phone.Up to 100 files can be stored for up to 30 days. Old files will be automatically deleted once a limit is reached.[image or embed]@oatmealdome.bsky.social
This new feature is a welcome one and something that Switch users have been wanting for years. Previously, players were required to scan a QR code on their console to link their device to their mobile to save their files.
Before it was removed, there was also an option to upload images and videos to social media accounts like X / Twitter, and some players, including myself, would use this as a way of saving files.
The Nintendo Switch 2 launches next week on June 5 for $449.99 / £395.99, and $499.99 / £429.99 for the official Mario Kart World bundle, which comes with a digital copy of the game.
UK pre-orders and US pre-orders are now live. For those who missed out on a pre-order, retailers like GameStop and Best Buy have announced that they will be restocking Switch 2 units in-store and online during the console's launch.
You might also like...Windows 11 version 24H2 is set to receive a towering pile of new features soon, and they’re already out in an optional patch for those who want to test the waters early.
The preview update for May (picked up by Neowin) will become the full June patch next month, and it comes with some changes for Copilot+ PCs only, as well as plenty of goodies for those with a traditional Windows 11 PC.
We’ll start with the latter, given that most folks still have a standard Windows 11 device, and an interesting addition for everyone with update KB5058499 is a new Cross Device Resume feature.
As Microsoft explains, you can now resume working on a OneDrive file on your PC if you were previously playing about with it on your smartphone (Android or iOS). Windows 11 will prompt you with a notification to check if you want to resume working on a file you were just using on your phone within the past five minutes, which is a nifty touch.
There are improvements for those with an HDR display, too, with new options in Settings, including a better explanation of what enabling ‘Use HDR’ means, and a toggle to turn on Dolby Vision (or turn it off) independently of HDR. Windows 11 will also now stream HDR video in all its glory even if you have HDR turned off (for the OS environment, games and so forth).
New share options (as previously seen in testing) now pop up when you drag a file out of a folder (in File Explorer), with suggested apps appearing in a tray at the top of the screen, so you can drop the file there to conveniently share it directly to any of those applications.
Furthermore, when typing with Voice Access, you can now turn off the profanity filter, and in the Settings app, a FAQ has been implemented which tells you more about the spec of your PC and what it really means. (Putting some perspective on how good your graphics card is, or how the amount of system RAM you have might affect the performance of Windows 11).
Also worth noting is that Microsoft has reintroduced the ability to open Copilot with the Windows key + C shortcut as an alternative for those who don’t have a dedicated Copilot button. Also, if you hold that shortcut (or the Copilot button), you’ll invoke ‘Press to talk’ with the AI assistant, whereby you can use voice commands (if you have a mic).
Copilot+ PC exclusives(Image credit: Microsoft)In the case of Copilot+ PCs, the May optional update goes to town with fresh features for Click to Do, the companion feature introduced with Recall that provides context-sensitive AI-related actions.
That includes a new Ask Copilot option within the Click to Do menu that appears when an image or a block of text is selected, which opens the AI assistant with the highlighted content ready to go as a query.
Also, the intelligent text actions which were previously only available with Snapdragon (Arm) Copilot+ PCs are now out for devices with AMD or Intel processors. This gives you options within Click to Do to quickly summarize or rewrite text (or turn it into a list), all of which is achieved using the AI powers built into Windows 11. (Specifically, this is the ‘Phi Silica’ Small Language Model, and it means that the work is done right on the device, not in the cloud).
Microsoft has also made it so that those with a stylus can have the shortcut button on the pen open Click to Do (with either a single or double click), and it’s now possible to make the feature one of the four specified apps in the pen menu.
Furthermore, Click to Do is now being made available in the European Economic Area, with all these fresh moves in tow.
Finally, there’s a big move with Copilot+ PCs in the introduction of a supercharged search leveraging AI for the Settings app. You can type a natural language query in the Windows 11 search box on the taskbar to find any setting you want, such as ‘change my desktop wallpaper’ which will bring up the relevant part of the Settings app.
Also with Narrator, the screen-reading tool built into Windows 11, AI now produces descriptions for images on web pages (or other content) where that alternative (alt) text hasn’t been provided.
Analysis: A gradual rollout of nifty powers(Image credit: Future / Jasmine Mannan)Bear in mind that this is an optional update as noted, so if you grab this now, you may encounter bugs. Given that, the generally perceived wisdom is that most users will be better off waiting until the preview update becomes a full release, which will happen next month (on June 10 to be precise).
If you can’t wait to test out some of these features, then jump on this upgrade by all means – you’ll find it by checking in Windows Update as usual. However, remember that these features are all labelled as having a gradual rollout, so it may take a bit of time for some of this functionality to filter through to your PC. In this case, that’s another reason to be patient and wait until June.
There are some nifty powers here, certainly, and the changes to HDR, the hardware FAQ in Settings, and extra file-sharing options are all welcome. The supercharged search is a definite highlight, but that’s only for Copilot+ PCs, so most people won’t get that.
Another noteworthy move is Cross Device Resume, which looks smartly implemented, and this is a space to watch because Microsoft is set to expand this ability in the future. We should see this become a much broader piece of work, allowing for all apps to be resumed in this way across your phone and PC eventually, not just OneDrive files.
In short, this should be Microsoft’s equivalent to Apple’s Handoff feature, or at least that’s the theory based on weighty clues the company recently dropped (and swiftly retracted).
You might also like...Developer CD Projekt has confirmed that a sequel to Cyberpunk 2077, which it is now calling Cyberpunk 2, is now in pre-production.
The news comes from the studio's latest earnings report, which stated that sales of the Cyberpunk 2077 expansion Phantom Liberty have now surpassed ten million copies in less than two years.
This major milestone, according to the developer, "confirms sustained interested in the Cyberpunk universe on the part of the gaming community."
It goes on to reveal that the Cyberpunk 2077 sequel, previously referred to as Project Orion, has now "wrapped up its conceptual phase and entered pre-production".
Pre-production is an important step in game development, largely focused on nailing down the core concepts of the game that you're developing and drafting out key design documents.
As the name would suggest, however, it does mean that the game is still in its very early stages. I wouldn't expect a Cyberpunk 2 release any time soon, especially when you consider that it took almost eight years to complete its predecessor.
Cyberpunk 2 is being developed alongside The Witcher 4, a fantasy role-playing game (RPG) and sequel to the highly popular The Witcher 3: Wild Hunt.
The Witcher 4 was officially revealed in a cinematic trailer at The Game Awards 2024, following an initial tease all the way back in 2022. Given the release of its reveal trailer, The Witcher 4 is likely much further along in development than Cyberpunk 2, and will almost undoubtedly release sooner.
Hopefully we'll see more of it, potentially in the form of a new trailer, soon.
You might also like...It appears that the rumored DJI Romo, a robot vacuum with integrated mop, is not only real but moving closer to launch.
A photograph tweeted by China-based drone leaker OsitaLV shows what appears to be a shipment of six boxed Romo vacuum cleaners on a pallet and ready for shipping, which suggests that the product could be poised to go on sale very soon.
I'm sure this thing has no NFZ! pic.twitter.com/TRkv9G80iuMay 29, 2025
We first heard rumblings about the Romo back in November 2024, where a leaked image purported to show the robot’s design. However, even if this picture was real, it wasn’t clear at the time whether or not the product was merely in prototype form or destined for a real-world release. It now seems likely that it’s very much a real product, coming to stores imminently.
DJI has never confirmed the existence of the Romo. However, initial speculation suggested that the Romo would combine vacuum and mop functions, and include features like individual room controls and pet detection.
More recently, other leaked imagesof what appears to be Romo's companion app, suggest it'll match the best robot vacuums with features like automatic self-emptying and powerful obstacle avoidance (which is something DJI's drones are known for).
While the Romo's release would represent DJI’s first foray into the robot vacuum market, we think it's highly plausible that the Chinese company would make a move into this market sector.
Why a robot vacuum?The DJI RomoMaster S1, the company's educational robot, was released in 2019. (Image credit: DJI)DJI is best known for its aerial photography drones (like the new Mavic 4 Pro), action cameras and smartphone gimbals. But its proficiency in automated motion, obstacle avoidance and battery technology make it well-positioned to produce a self-guiding domestic robot. It’s even made a ground-based educational robot in the past: the 2019-released RoboMaster S1.
Diversifying its product line-up could prove a canny strategy for DJI, given that its drone business seems to be under threat – in the US, at least – on account of the Trump administration’s chaotic tariffs plans and general US regulatory hostility towards Chinese-made drones. The Mavic 4 Pro hasn't even been launched in the US, for instance, despite it being DJI's new flagship camera drone.
The robot vacuum market could also be ripe for disruption, with no clear dominant manufacturer in place. Check out our best robot vacuums guide, for instance, and you’ll find it contains a wide mix of brands, each with varying strengths.
If we hear any more on the DJI Romo, we’ll bring you further updates.
You might also likeWhen choosing the best antivirus software for your device, its important to know how to use it - otherwise you could be paying for a service that isn't actually protecting anything.
Running a virus scan is actually quite easy. You open an antivirus of your choice, click the usually prominent ‘Scan’ button, wait for the program to do its thing, and take care of anything that gets flagged. Or at least, that’s the gist of it and the bare minimum a user can do.
In reality, the process can have a bit more to it than. So, we decided to write a detailed guide for conducting virus scans and everything else that comes with it, such as protecting all of your devices.
Select the right security softwareBefore we get to the matter at hand, picking the right software for the job is the first step in doing a proper virus scan. Personal antivirus tools are a dime a dozen, with a lot of features and additional security options that go beyond just running a virus scan.
With no shortage of options on the market sporting different features, the key is to discern between the stuff you need and what you can do without. That said, it’s always a good idea to pick an antivirus that has these features:
Bonus points if the software is lightweight so that it doesn’t slow down your system. That said, you want to avoid any free tools with excessive ads, poor reviews, or that come bundled with bloatware.
Keep your antivirus up to dateIt’s prudent to do some preparation work prior to the scan, as keeping antivirus software up-to-date is something you don’t want to forget. This includes doing (boring but important) stuff like updating antivirus definitions and signatures, applying the latest software patches, and similar, either automatically or manually.
The main reason you need to do this is that malware evolves rapidly, no thanks to the increasing use of AI. As a result, users face all kinds of attacks, such as advanced persistent threats, ransomware-as-a-service, or targeted attacks. Granted, it’s more likely that businesses (big and small) will be attacked by more advanced threats, though individual users aren’t exempt from it either, especially if they have valuable data on their devices.
Hence, outdated software can easily miss these threats or just fail to protect you altogether, and then you’ll be in quite a pickle. In the best-case scenario, your device will now be very slow with subpar performance, prompting a big clean-up, and that’s always a hassle.
Also, if you’re using a subscription-based software, it might be an idea to keep the renewal option on, so you don’t end up without any protection.
If you’re unaware that your device has been infected, do note that there are always signs. These include, but are not limited to, sudden slow performance, excessive ads, new browser toolbars or search engines, apps opening or crashing on their own, unknown files or shortcuts on the desktop, and more. In case any of these happen, run a full scan immediately.
Choose an appropriate scan typeWhen it comes to actual scans, there are several types available, with some more suitable than others depending on the needs. A quick scan can be a good choice for routine operations and daily or continuous monitoring of high-risk areas like memory or system files.
A full or deep scan takes time and is more fitting for weekly or monthly checkups across all files, especially after patch cycles or any security incidents. It checks every file, app, folder, and system component on your device, but it takes a long time.
In the event of newly introduced devices, a custom scan will do the trick, more so if a targeted scan on high-value assets and suspicious directories is required. USB drives are a good example.
In some instances, a boot-time scan might be the best option if malware is deeply embedded. This type of scan runs before an operating system starts, catching hidden or rootkit malware.
Whatever the occasion, automated and policy-driven scan schedules are essential as they minimize manual work and guarantee consistency.
Executing scansWith all the preparation in place, we’ve reached the crux of this guide - actually running a scan. There shouldn’t be any complications here, as with the right tool, performing a scan is straightforward and easy. However, there are a few things to keep in mind.
For instance, don’t use heavy apps while scanning because they may slow down the scan and your system. Antivirus software has the ability to pause the scan, so use that if the device is busy or if you ever need to take a break for other reasons.
If you’re using a laptop, keep it charged and plugged in. This might sound silly, but people sometimes forget the simplest things.
During the scan, your antivirus may detect potentially unwanted programs called PUPs. It’s usually adware, but don’t ignore them since they can very easily be malicious.
Remember, the goal here is to minimize operational disruption while still maintaining a thorough security coverage.
Analyzing scan results and taking actionAfter the scan is done, it’s time to go over the results. Simply detecting malware isn’t enough. Detailed reporting is a must, and the reports should include threat names, severity ratings, affected files, and recommended actions. This is obviously under the assumption that something harmful was found.
In that case, you should try to correlate detections with known vulnerabilities if there are any. Otherwise, make sure you thoroughly read the report so you’re aware of what you’re dealing with.
If the threat is detected, there should be a structured response to it (preferably a fast one) before the damage is done. At a minimum, you want to reduce its impact.
Get to know what kind it is, and either quarantine or delete it. Normally, malware or suspicious files are auto-quarantined or erased from the system, but it never hurts to check.
In some situations, you’ll have to perform a device restart since some malware can't be removed while the operating system is running. For particularly pesky threats that keep returning, try boot-time scanning and reinstalling the antivirus.
You can always manually remove the infected file by following the antivirus instructions. This shouldn’t be an issue, as most top-rated AVs are capable of dealing with problems like these. If all else fails, perhaps pick a different antivirus - you might have more luck with it.
What’s more, it’s not a bad idea to maintain exportable logs in case you need to learn more about the threat or Google it.
Afterward, its a good idea to analyze how the malware entered. For example, malicious files often enter your system through phishing, unpatched vulnerabilities, or some other method. It’s essential to know so it doesn’t happen again.
Post-scan security measuresOnce the immediate threat is neutralized, there is still some work left. Namely:
Most antivirus programs allow you to automate scans and enable real-time protection, so absolutely make sure you do that. You can schedule weekly quick scans, run full scans monthly, get notified if definitions are out of date, and so on.
Generally speaking, antivirus works best when set and forgotten - that is, after you’ve configured it correctly and thoroughly. Make sure to always check the reports, though.
There is a human element to keeping your device free of viruses, namely:
In today’s technology-led world, cybersecurity plays a huge role that only grows with every new attack and data breach. So, regular virus scans go a long way in helping you stay secure online. They will protect intellectual property, financial data, and personal information, as well as avert downtime, performance and time loss, and numerous other things that can hurt an everyday user.
As such, consumers ought to consider integrating virus scanning into their daily online activities and device use. After all, prevention is the best medicine.
Spotify has introduced a small slurry of new podcast features, all designed to boost the presence of its library of audio and video podcasts to the same level as its music catalog - the most notable new addition being a new Following feed.
Yesterday the platform announced the new functions in a blog post and although they’re minor additions to Spotify’s interface, they play their part in bringing you closer to the podcasts you love while helping you discover your next favorite show. They also give creators an upper-hand, with Spotify adding ‘it gives them new ways to reach even more audiences around the globe’.
The new features are already starting to roll out to users and are widely available, with the exception of one which Spotify says will be ‘rolling out globally in the coming weeks’. So if you’re a keen podcast fan, or you’re at least trying to be, these are the three new tools to test out.
1. New podcasts Following feed (Image credit: Spotify)The main podcast feature of the three is the new Following feed, a dedicated space for shows you already follow. It puts them all into one place in the Spotify Home page, allowing you to stay on top of new episodes and releases from the creators you listen to the most.
When you go to the Spotify Home page and use the Podcasts filter at the top of the screen, it now displays an extended Following tab that you can enable. From there, all of the latest episodes from the podcast you follow will appear. It’s simple, and easily accessible.
2. Podcast recommendations in your Home feed(Image credit: Spotify)As well as bringing you closer to your favorite creators Spotify is doubling down on its podcast discovery features. The second new feature is a recommendation-focused function in your Home page.
Just under your Home page shortcuts, Spotify has started displaying recommendations for new audio and video podcasts, ready for you to play or save. This new addition is designed to save you time when scrolling through Spotify’s podcasts categories in search of a new show, while adhering to its own ethos of optimizing exposure for creators.
3. New ‘In this episode’ sectionSpotify recently launched its ‘Follow-Along’ feature for audiobooks, and it’s doing something similar with podcasts. In the coming weeks, Spotify will be rolling out a new ‘In this episode’ section for podcasts, which allows creators to link to content they mention in episodes that’s also available on Spotify.
For example, if a creator mentions a specific album, song, or audiobook in a podcast episode, the ‘In this episode’ section will show those titles and give you the option to explore the referenced content.
(Image credit: Spotify)For the past few years, Spotify has given much attention to bringing new features allowing users to optimize music discovery, however it has received criticism for not applying the same to podcasts. But these features mark a step towards Spotify’s new strategy for podcast discovery.
The battle for the best podcast platform continues, and Spotify is putting up a fight to compete with the likes of Apple Music and YouTube, the latter of which is the current reigning champion for podcast fans in the US.
You might also likeVirtual Private Networks (VPNs) are supposed to be the internet’s cloak of invisibility. Long embraced by corporations to secure remote access and by individuals to shield their browsing activity, VPNs have built a reputation as tools of privacy, security, and digital freedom. But that reputation is now under threat.
A growing number of criminal groups are repackaging open source VPN frameworks into malware-laced products, disguising their intent behind familiar language, friendly branding, and fake reviews. What looks like a quick fix for accessing overseas content or bypassing geo-restrictions is, in many cases, an entry point for data theft, surveillance, and fraud.
It’s ironic in many ways. The promise of privacy has become the perfect lure for privacy-hacking criminals. Users who download these malicious VPNs often think they’re outsmarting content restrictions – watching football matches from abroad, placing bets where they legally shouldn’t, or cashing in on digital deals restricted by region.
At the very least, they might think that having a VPN shields them from the prying eyes of online snoopers. In reality, they’re likely handing over control of their device to a shadow network. These fake VPNs quietly turn home networks into residential proxies, harvest personal and financial data, and open the door for broader criminal operations – all while maintaining the illusion of security.
This isn’t to say that VPNs are bad. Far from it. But a user's choice of VPN matters today more than ever before. With so many affordable, easy options flooding the market, latching onto a cheap VPN to cloak your device or access geo-restricted content is a gamble – and the cost of losing that gamble simply isn’t worth the risk.
Behind the mask: How VPNs are being weaponizedWhat makes these VPNs so effective as attack vectors is how seamlessly they blend into the digital noise. Many operate through traffic distribution systems (TDSs) like Vextrio, which funnel users toward seemingly legitimate downloads. These platforms don’t just advertise VPNs – they create an entire illusion of trust, complete with sponsored search results, polished websites, and glowing reviews on platforms like Trustpilot.
Some VPNs are free, others charge modest monthly fees, but the business model is the same: install the software and you unwittingly join a network of compromised machines. These apps often double as information stealers – scraping keystrokes, intercepting browser activity, and quietly logging banking credentials.
Worse still, the infected device becomes part of a much larger infrastructure. Malicious VPNs routinely convert users’ home internet connections into residential proxies, effectively turning everyday consumers into unknowing enablers of criminal activity.
This allows attackers to route their own traffic through compromised systems, making it harder for authorities to trace or block malicious behavior. It’s like a parasite worming its way in unnoticed – users pay for access to content they’re not legally allowed to watch, while criminals profit by harvesting their data and hijacking their connections. Users think they’ve found a clever workaround, but in reality they’re simply being exploited.
DNS, RDGAs, and the art of evasionThe success of these criminals depends on their ability to hide and deceive. To maintain the illusion of legitimacy and avoid detection, malicious VPN operators rely heavily on rapidly generated domain aliases (RDGAs) and DNS tunneling. These tactics allow them to constantly shift the endpoints used by their software, cycling through thousands of domains so that if one is flagged or taken down, the service continues uninterrupted.
Take “Reckless Rabbit” and “Ruthless Rabbit” for instance – two recently discovered investment scam actors that use RDGAs to scale their advertising campaigns and lure victims using well-known names to appear trustworthy. Unlike legitimate providers, whose infrastructure remains relatively stable, these actors thrive on churn.
The fast rotation of domains not only obscures the true nature of the traffic but also makes it nearly impossible for traditional blocklists or IP reputation tools to keep up. From the outside, it simply looks like a user is accessing routine web services, when in fact, DNS is being manipulated to mask criminal infrastructure.
This constant domain hopping is part of a broader evasion strategy. DNS tunneling, in particular, allows attackers to disguise command-and-control traffic as benign DNS requests. It’s a method often used to sneak malware past firewalls or send data out of restricted environments without detection.
When embedded within VPN software, this technique becomes even more insidious: not only is the app encrypting the user's traffic, but it’s also silently exfiltrating information and receiving instructions from remote servers, all under the cover of what appears to be a legitimate privacy tool. This is how VPNs, when co-opted, transform from protective wrappers into full-fledged vehicles for criminal communication.
Snakes and Ladders: Why do people fall for it?Contempt for the conners, compassion for the conned. That’s how this particular form of cyber-abuse should be viewed. Because the appeal of these rogue VPNs isn’t just technical – it’s psychological. Users are drawn in by the promise of unrestricted access: the ability to stream content blocked in their country, gamble on overseas platforms, or use region-specific services with no questions asked. For many, it feels like a harmless workaround.
But that desire to outsmart the system is precisely what these criminal operators rely on. They know users will trade caution for convenience. They know a free or cheap download that promises to “just work” will attract attention. But once it’s installed, the cost is no longer just a few dollars a month – it’s your identity, your credentials, and even your bandwidth.
Unwitting participants in criminal schemesIt’s not just about personal risk either. By participating in these networks, even unknowingly, users help power a much larger criminal economy. Their machines become part of an invisible infrastructure used to launder traffic, evade detection, and launch further attacks. In some cases, VPN clients are bundled with gambling or scam platforms, creating a double-loss scenario: victims hand over their data and their money.
It’s not just that the VPN didn’t protect them – bad enough though that is – it was that the VPN was the bait all along. The irony stings: in trying to gain more freedom, users end up more surveilled, more exploited, and more vulnerable than they were before.
Can app stores and search engines be trusted?When we need a service, we Google it. Or perhaps we scan our app store of choice to find a suitable candidate. We might look at a few reviews, but by and large we’re programmed to trust what we find in these places. But in the case of malicious VPNs, that trust is being actively abused. Traffic distribution systems like Vextrio are skilled at manipulating search rankings – pushing sponsored ads and SEO-optimized domains to the top of results pages within days.
A quick search for “free VPN” or “VPN for Netflix” often leads users straight into their funnel. From there, everything is choreographed: the convincing website, the high user ratings, the false claims of speed and security. Even cautious users, seeing a top result or an official-looking listing in an app store, may assume legitimacy – especially when the app promises what they want to hear.
Apple’s App Store and Google Play are not immune. Despite vetting processes, threat actors have found ways to sneak past these controls by rebranding malware over and over again – changing logos, names, domains, and shell companies with each iteration. Dozens of malicious VPNs have slipped through, some remaining live in the stores long after being flagged.
Even the reviews can’t be trusted – so many of them are fabricated or bot-generated, designed to drown out real complaints and boost visibility. The emergence of tools like ChatGPT have made these bogus reviews all the more convincing and harder to spot. The result is a distorted marketplace where bad actors operate in plain sight, shielded by the very platforms users rely on for safety.
How to choose a VPN without compromising yourselfSo how can users protect themselves without sacrificing privacy? The first step is a healthy dose of good old skepticism, particularly toward any VPN app that’s unfamiliar, heavily discounted, or promises unlimited access for free. If it sounds too good to be true, it usually is. Instead of trusting search engine rankings or user reviews, consumers should rely on well-established providers with transparent business models and a long-standing track record.
Brands like NordVPN, ProtonVPN, and Malwarebytes are trusted not because they’re perfect, but because they’re accountable. They don’t need to hide behind a fresh logo or fake domain every time scrutiny increases. Reputation in this space isn’t just branding – it’s a proxy for security, support, and scrutiny.
Equally important is understanding what a VPN can and can’t do. A VPN won’t make a user anonymous, and it doesn’t guarantee safety if the software itself is compromised. In many cases, Protective DNS offers a more targeted layer of defense, alerting users to suspicious activity, blocking access to malicious domains, and providing visibility into where traffic is really going. Whether on a personal device or in an enterprise setting, layered protection matters.
VPNs were built to protect. But in the wrong hands, they become a perfect disguise for exploitation. Criminals are counting on users to trade caution for convenience, wrapping malware in the language of privacy and selling it as freedom. The safest path isn’t the fastest download or the highest-ranked result – it’s a trusted name, a transparent provider, and a double-dose of skepticism. Because when privacy tools are weaponized, the price of easy access can be far greater than it first appears.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Gemini is taking over from Google Assistant across all of Google's apps and devices, and Android Auto will be making the switch soon – as shown by a new demo video that gives us an idea of how the AI assistant is going to work on your car's dashboard.
The video was captured at Google I/O 2025 and posted by 9to5Google, and you can see how Gemini slots in on the right-hand of the screen (or perhaps the left-hand, depending on the rules of the road in your country).
If you've used Gemini on your phone, the interface will be familiar, with the glowing blue-ish ripples showing that Gemini is active. You're then free to ask whatever questions you have on the road, using natural language.
You might want to see nearby gas stations for example, or have Gemini pull up the location of an event you're heading to from your Google Calendar. Anything you can do on your phone you can do through Gemini on Android Auto.
More flexibilityOne demo Google showed off was using Gemini to compile a list of ingredients for a particular meal in Google Keep, then asking for directions to the local grocery store to pick up the necessary supplies – all very impressive.
Generally, it's much more flexible and more intelligent than Google Assistant. All of your in-car chats will be synced back to Gemini on the web and on your phone, so you can pick up where you left off on other devices and carry on the conversation.
With Android Automotive (so the version built right into cars), the interface is a little more subtle, with a small pop-up bar showing Gemini. However, the exact look can vary depending on your vehicle and the dashboard screen configuration.
It's not clear exactly when Gemini will show up on Android Auto, but Google has said it's coming soon, and we've seen numerous signs that it's on the way. Gemini is already the default AI assistant on new Android phones.
You might also likeThe Pokémon Company has announced that Pokémon Legends: Z-A will officially launch on October 16 for Nintendo Switch and Nintendo Switch 2.
Pre-orders for the next major Pokémon game begin on June 5, and it's been confirmed that players who purchase either a digital or physical version on the Switch can upgrade their copy to the Nintendo Switch 2 Edition via a $10 upgrade pack on the Nintendo eShop and My Nintendo Store.
It might be worth investing in the Switch 2 Edition as The Pokémon Company has also revealed in a social media post that the version will "offer improved graphics and frame rates", but there's no new trailer for us to compare to the Switch version just yet.
In addition, players who pre-order Legends: Z-A through the Pokémon Center in the US, UK, and Canada will receive a random, exclusive Pokémon Sitting Cuties plush featuring Chikorita, Tepig, or Totodile.
According to Nintendo, those who pre-order a version of the game from My Nintendo Store will receive a Partner Pokémon figurine as a bonus item, and Mega Evolution, Trainer, and Champion's Choice bundles will also be available."
#PokemonLegendsZA arrives October 16, 2025!In addition to the #NintendoSwitch title, a #NintendoSwitch2 Edition will offer improved graphics and frame rates! The digital and physical versions of #PokemonLegendsZA can be upgraded to the #NintendoSwitch2 Edition via upgrade pack pic.twitter.com/DqAcfYPxiKMay 28, 2025
We've also received brand new cover art for the game, along with an official blurb, which reads: "Pokémon Legends: Z-A is a new frontier for the Pokémon video game series, blending an RPG story unfolding in a single city with action elements and a real-time battle system unlike anything seen before in the franchise.
"Trainers can look forward to the beginning of a new adventure in Lumiose City — one woven by people and Pokémon together!"
Pokémon fans won't have to wait long for another look at the game because the next Pokémon Presents livestream will air this summer on July 22.
The Nintendo Switch 2 launches next week on June 5 for $449.99 / £395.99, and $499.99 / £429.99 for the official Mario Kart World bundle, which comes with a digital copy of the game.
UK pre-orders and US pre-orders are now live. If you missed out on securing a pre-order, GameStop and Best Buy have announced that they will be restocking Switch 2 units in-store and online during the console's launch.
You might also like...Apple releases a new version of its Mac operating system every year, and when that happens, there are inevitably older Macs that are no longer supported.
We’re just a week or two away from Apple unveiling its latest iOS and macOS updates at its WWDC 2025 event, and we’ve just found out exactly which Macs might be left behind.
That information comes from AppleInsider, which cites “people familiar with the matter.” These sources have revealed that a slate of Intel-based Macs will be incompatible with the forthcoming software update, meaning they’ll be stuck on older versions of Apple’s operating systems.
Specifically, AppleInsider says the following Macs will be compatible with the next version of macOS:
That means there are some notable omissions. The 2018 MacBook Pro, 2020 Intel-based MacBook Air, 2017 iMac Pro, and 2018 Mac mini all work with the current version of macOS (macOS Sequoia) but are left off AppleInsider’s list. That suggests that they won’t be able to upgrade beyond macOS Sequoia.
What’s in a name?(Image credit: Future / Apple)Interestingly, Bloomberg reporter Mark Gurman has also claimed that Apple is set to switch up its operating system naming conventions. Instead of the previously expected iOS 19 and macOS 16, Apple could name its platforms after the calendar year. So that means we’ll have iOS 26 and macOS 26, Gurman believes.
Alongside the name change, these operating systems are expected to come with sweeping changes to their visual styles and user interfaces, something that AppleInsider’s sources also confirmed. Unfortunately, that means that the aforementioned Macs will miss out on this new look as well.
If you have one of the Macs that are set to miss out on macOS 26, you might want to think about upgrading. Not only will that ensure you get all the latest macOS features, but you’ll likely get hardware improvements and better battery life too.
If you’re thinking about it, our guide to the best Macs and MacBooks should help you decide which one to get.
You might also likeAvengers: Doomsday is 18 months away from landing in theaters, but Marvel fans are already fearing the worst about one of the Marvel Cinematic Universe's (MCU) longest-serving heroes.
Yesterday (May 28), a new video was uploaded to the personal YouTube channel of Chris Hemsworth, who's played Thor since 2011 and is one of the MCU's six original Avengers.
Ordinarily, this wouldn't be a big deal. Hemsworth and/or his social media team regularly post videos on the A-lister's account, so the arrival of a new video shouldn't come as a shock.
This video is different to the usual ones that get posted, though. Titled 'Thank You! The Legacy of Thor', the two-minute-long video comprises footage of Hemsworth's various appearances as the God of Thunder over the past 14 years. The clips are interspersed with behind-the-scenes footage, plus interviews with Hemsworth and other creatives who have worked on the Thor films, too.
Taken at face value, there's an air of finality to the video's title and the footage contained within. That's before you read the earnest video description accompanying said footage, which has seemingly been written by Hemsworth and reads: "Playing Thor has been one of the greatest honors of my life.
"For the last 15 [sic] years I've held Mjolnir and then Stormbreaker as the God of Thunder, but what made it truly special was sharing it with all of you. Your passion, your cheers, and your love for this character have meant everything to me. Thank you for making my journey through the MCU unforgettable. Next up, Doomsday!"
Thor is one of the MCU's most iconic heroes, so his potential demise would be felt acutely among viewers (Image credit: Marvel Studios)Predictably, Hemsworth's latest YouTube upload has sparked fears among MCU fans, with many drawing the conclusion that Thor is going to be killed off in Avengers 5. After all, Hemsworth was confirmed to be part of Doomsday's initial 27-strong cast. With filming now underway on one of 2026's most anticipated new movies, why would Hemsworth, who's probably seen a script and/or starting shooting scenes, post a video like this now if there wasn't a significant reason to do so?
Fan worries aren't consigned to a single corner of the internet, either.
Indeed, threads on the r/Marvel subreddit and ResetEra, plus the comments section of Hemsworth's latest YouTube video, are full of viewers expressing concerns that the Asgardian's MCU journey will soon come to an end. Is he going to be murdered by Doctor Doom in the same way that Thanos killed Loki in Avengers: Infinity War? It would certainly prove how powerful Doom is if he kills someone like Thor who's survived so many life-threatening events in the MCU.
Comment from r/marvelstudiosThere are people who aren't convinced this is the end of the line for Hemsworth, though.
Some believe this is nothing more than a promotional video for Thor: Love and Thunder, aka the character's latest Marvel film that was released in July 2022, which has been uploaded to Hemsworth's channel three years too late.
Meanwhile, others say their fellow fans are reading too much into the video, with some pointing out that Marvel and Hemsworth have consistently talked about the possibility of making a fifth Thor solo movie. In fact, just three weeks ago, industry insider MyTimetoShineHello, whose recent track record has been patchy at best, suggested Thor 5 is still in the works. If that's the case, the God of Thunder won't perish in Doomsday.
Ultimately, it's hard to determine why this video has made its way onto Hemsworth's YouTube channel. I can see why people are scared about the possibility that Thor will die in the Marvel Phase 6 movie. However, I also understand the argument that some are putting two and two together and getting five.
If I had to get off of the proverbial fence, I'd err on the side of caution and agree that people are reading too much into this video. I don't think Hemsworth's time in the MCU is done yet, but I guess we'll know for sure when Avengers: Doomsday is released worldwide on its revised launch date of December 18, 2026.
You might also like