Taiwanese NAS-maker Synology has confirmed a new policy that requires Synology-branded hard drives to be used for full compatibility within its 2025 Plus series of network-attached storage (NAS) devices.
From launch, the policy states Synology-branded hard drives will need to be used, but the company promises to “update the Product Compatibility List as additional drives can be thoroughly vetted in Synology systems,” a company spokesperson said(via Ars Technica).
In the meantime, this could spell out reduced choice and increased cost for customers, with potential sustainability issues stemming from users’ inability to use hard drives they might already have, rendering them unusable.
Synology NAS devices hard drivesSynology has nine products in its Plus range, supporting all the way up to 24 hard drives, however users will be required to use approved storage drives only.
The company said that “Synology systems are at less risk of drive failure and ongoing compatibility issues.”
Chad Chiang, the Managing Director of Synology’s Germany and UK businesses, noted: “With our proprietary hard disk solution, we have already seen significant benefits for our customers in various deployment scenarios.”
Despite the change for 2025-onward models, the company confirmed that older models sold up to and including 2024 (excluding XS Plus series and rack models) remain unchanged.
Interestingly, Synology doesn’t manufacture its own hard drives, instead choosing to rebrand models from popular brands like Toshiba and Seagate.
This could be good news, indicating the possibility that further Toshiba and Seagate models might appear on the approved list of third-party drives at a later date, however it could also mean that drives from other brands might be less likely to appear on the list.
Of course, this is speculation only, but we’ve contacted Synology for further details in the hope that we can get access to a list of pre-approved third-party drives.
You might also likeBluesky, the upstart, decentralized social network that's offered an island of blue calm for those departing the tumultuous, dark waters of X (formerly Twitter), is finally introducing an official form of account verification. It will look familiar to those who spent time on old-school Twitter, but it does feature a few notable caveats.
Up until today (April 21, 2025), there was no Bluesky-supported system for verifying an account or visual indication of verified status, and the microblogging social media platform was suffering from an imposter problem. Bluesky addressed this, in a way, by encouraging people to set up and use their own domain names to establish the veracity of an account.
My account, for instance, is attached to lanceulanoff.com, a domain I've owned for years. Bluesky reports that some 270,000 accounts have linked their accounts to domains.
Still, setting up a domain and connecting it to your Bluesky account is not a trivial matter. This new feature significantly simplifies the process.
A new check (Image credit: Future)According to a new Bluesky blog post, there are now three levels of identity on the platform: the basic Bluesky account, a Trusted Verifier, and a Verified Account.
The Trusted Verifier is interesting because it's a verified account that, with Bluesky's review, can verify other accounts. The example given is The New York Times' Bluesky account, which can then verify its journalists' accounts.
Years ago, Twitter had something similar, where an entity like TechRadar could ask Twitter directly to verify some of its journalist employee accounts.
It was not a popular feature among, for instance, celebrities and officials, who wondered (often on Twitter) why journalists needed verification. The topic of Blue Checks and verification on Twitter became so fraught that, for a time, Twitter's then-CEO Jack Dorsey stopped verifying accounts. When Elon Musk took over, he removed verifications from millions of accounts, only to return them some months later.
Who verifies whoBluesky wrote that it is proactively verifying some "authentic and notable accounts," which will now have a white check in a blue circle.
Trusted Verifiers will have a scalloped blue check to indicate their vaunted status. A tap on someone's verified status can show you which Trusted Verifier granted verification.
It's not necessarily a foolproof system, as I think media companies might seek to verify all journalists in their camp, and Bluesky could push back against that. Or maybe Bluesky says yes, but at some point, "the notables" grow irritated because there are suddenly so many non-famous people with checks.
One thing Bluesky is not supporting is "requests for verification." However, the social media platform is not ruling it out and has promised that as this system settles in and stabilizes, it will "launch a request form for notable and authentic accounts interested in becoming verified or becoming trusted verifiers."
If you're wondering about the other decentralized social media platform, Threads, it adopts verifications directly from Instagram, another Meta property.
It'll be interesting to see what Bluesky asks for in its future verification process and if any part of it will involve some form of ID.
You might also likeCybercriminals are preying on victims of online fraud, using their state of emotional distress to cause even more harm, the FBI has said, revealing it received more than a hundred reports of such attacks in the last two years.
In the campaign, cybercriminals would create fake social media profiles and join groups with other victims of online fraud. They would then claim to have recovered their money with the help of the FBI's Internet Complaint Center (IC3). This makes the ruse credible, since IC3 is an actual division of the FBI and serves as a central hub for reporting cybercrime.
Those who believe the claim are then advised to contact a person named Jaime Quin on Telegram. This person, claiming to be the Chief Director of IC3, is actually just part of the scheme. Quin will tell people who reach out that he recovered their funds and would then ask for access to their financial information, to steal even more money.
Keeper is a cybersecurity platform primarily known for its password manager and digital vault, designed to help individuals, families, and businesses securely store and manage passwords, sensitive files, and other private data.
It uses zero-knowledge encryption and offers features like two-factor authentication, dark web monitoring, secure file storage, and breach alerts to protect against cyber threats.
Preferred partner (What does this mean?)View Deal
Getting in touchThis is just one example of how the scam works. The FBI says that initial contact from the scammers can vary.
“Some individuals received an email or a phone call, while others were approached via social media or forums," it said. "Almost all complainants indicated the scammers claimed to have recovered the victim's lost funds or offered to assist in recovering funds. However, the claim is a ruse to revictimize those who have already lost money to scams."
To minimize the risk of falling victim to these scams, you should only reach out to law enforcement through official channels. Furthermore, you should keep in mind that law enforcement (especially those in executive positions) will never reach out to you this way, especially not to initiate contact.
Finally, the police will never ask for your password, financial information, or access to private services.
Via BleepingComputer
You might also likeCybercriminals are using fake PDF converters to install powerful malware on victims' systems, experts have warned.
Research from CloudSEK found attackers are cloning popular file conversion websites like pdfcandy.com - replicating its logo and brand elements - in order to trick users into downloading malicious software.
CloudSEK says these fake sites look almost identical to the real ones. When someone tries to convert a file, the page shows a fake loading screen and then prompts for a CAPTCHA verification. Instead of just confirming the user is human, this step leads to an instruction to run a PowerShell command. Following the command downloads a zip file containing malware known as ArechClient2, part of the SectopRAT family of information stealers.
Collecting personal data, and worseThe malware uses a number of hidden methods to infect the system. It spawns normal Windows processes to hide its activity and begins collecting browser passwords, crypto wallet information, and other sensitive data. Once the malware is active, it can quietly send stolen information back to the attackers, CloudSEK reports.
The FBI has already warned that online file converters are becoming a popular way for criminals to spread their malware. CloudSEK’s research shows that attackers are improving their methods, cleverly blending realistic website designs with social engineering tricks in order to lower users' defenses.
With online tools becoming part of everyday work and personal life, it’s important to know how to avoid these threats.
How to stay safe (Image credit: Amazon India)The best way to protect yourself is to avoid clicking random search results for online file converters. Always visit known official websites directly.
In addition to that, always double-check the website address for small spelling changes that might be easy to miss.
For a good starting point, check out our round up of the best PDF editors, and the best free PDF editors. We also recommend the best Adobe Acrobat alternatives.
Staying cautious when uploading documents online can stop many of these attacks before they start.
Keep your antivirus software up to date (you’re doing this anyway, right?) and scan any downloaded files before you open them. Installing browser extensions that block suspicious or dangerous sites can also help.
If a website asks you to run PowerShell commands or download extra files after uploading a document, close the page immediately.
Finally, if you think you’ve been tricked, disconnect the device from the internet right away, change all important passwords from a safe device, and let your bank or service providers know as soon as possible.
You might also likeThe best AI generation trends are the cute ones, especially those that transform us into our favorite characters or at least facsimiles of them. ChatGPT 4o's ability to generate realistic-looking memes and figures is now almost unmatched, and it's hard to ignore fresh trends and miss out on all the fun. The latest one is based on a popular set of Anime-style toys called Chibi figures.
Chibi, which is Japanese slang for small or short, describes tiny, pocketable figures with exaggerated features like compact bodies, big heads, and large eyes. They are adorable and quite popular online. Think of them as tiny cousins of Funko Pop!.
Real Chibi figures can run you anywhere from $9.99 to well over $100. Or, you can create one in ChatGPT.
What's interesting about this prompt is that it relies heavily on the source image and doesn't force you to provide additional context. The goal is a realistic Chibi character that resembles the original photo, and to have it appear inside a plastic capsule.
The prompt describes that container as a "Gashapon," which is what they're called when they come from a Bandai vending machine. Bandai did not invent this kind of capsule, of course. Tiny toys in little plastic containers that open up into two halves have been on sale in coin-operated vending machines for over 50 years.
If you want to create a Chibi figure, you just need a decent photo of yourself or someone else. It should be clear, sharp, in color, and at least show their whole face. The effect will be better if it also shows part of their outfit.
Here's the prompt I used in ChatGPT Plus 4o:
Generate a portrait-oriented image of a realistic, full-glass gashapon capsule being held between two fingers.
Inside the capsule is a Chibi-style, full-figure miniature version of the person in the uploaded photo.
The Chibi figure should:
Since there's no recognizable background or accessories in the final ChatGPT Chibi figure image, the final result is all about how the character looks and dresses.
I made a few characters. One based on a photo of me, another based on an image of Brad Pitt, and, finally, one based on one of my heroes, Mr. Rogers.
These Chibi figures would do well on the Crunchyroll Mini and Chibi store, but I must admit that they lean heavily on cuteness and not so much on verisimilitude.
Even though none of them look quite like the source, the Mr. Rogers one is my favorite.
Remember that AI image generation is not without cost. First, you are uploading your photo to OpenAI's server, and there's no guarantee that the system is not learning from it and using it to train future models.
AI image generation also consumes electricity on the server side to build models and to resolve prompts. Perhaps you can commit to planting a tree or two after you've generated a half dozen or more Chibi AI figures.
You might also likeResearchers have discovered a clever and elaborate phishing scheme that abused Google’s services to trick people into giving away their credentials for the platform.
Lead developer of the Ethereum Name Service, Nick Johnson, recently received an email that seemed to have come from no-reply@google.com. The email said that law enforcement subpoenaed Google for content found in his Google Account.
He said that the email looked legitimate, and that it was very difficult to spot that it’s actually fake. He believes less technical users might very easily fall for the trick.
Keeper is a cybersecurity platform primarily known for its password manager and digital vault, designed to help individuals, families, and businesses securely store and manage passwords, sensitive files, and other private data.
It uses zero-knowledge encryption and offers features like two-factor authentication, dark web monitoring, secure file storage, and breach alerts to protect against cyber threats.
Preferred partner (What does this mean?)View Deal
DKIM signedApparently, the crooks would first create a Google account for me@domain. Then, they would create a Google OAuth app, and put the entire phishing message (about the fake subpoena) in the name field.
Then, they would grant themselves access to the email address in Google Workspace.
Google would then send a notification email to the me@domain account, but since the phishing message was in the name field, it would cover the entire screen.
Scrolling to the bottom of the email message would show clear signs that something was amiss, since at the bottom one could read about getting access to the me@domain email address.
The final step is to forward the email to the victim. “Since Google generated the email, it's signed with a valid DKIM key and passes all the checks,” Johnson explained how the emails landed in people’s inbox and not in spam.
The attack is called a “DKIM replay phishing attack,” since it leans on the fact that in Google’s systems, DKIM checks only the message and the headers, not the envelope. Since the crooks first registered the me@domain address, Google will show it as if it was delivered to their email address.
To hide their intentions even further, the crooks used sites.google.com to create the credential-harvesting landing page. This is Google’s free web-building platform and should always raise red flags when spotted.
Via BleepingComputer
You might also likeWindows administrators have been reporting mass account lockouts across various organizations following a Microsoft Entra ID update.
Many believe these were false positives triggered in Entra ID's new leaked credentials detection app (a new feature called MACE Credential Revocation), as affected accounts had unique and unused passwords.
One user posted to a Reddit thread that around half a dozen accounts had been blocked after credentials were supposedly found on the dark web, however those users didn’t have much in common, suggesting that it wasn’t a targeted attack.
Entra ID might be flagging false positives“There are no risky signins, no other risk detections, everyone is MFA, it's literally the only thing that's appeared today, raising the risk on these people from zero to high,” the Reddit user explained.
Beneath the original post is a series of comments from other system admins who also experienced similar issues, with one user sharing a response from Microsoft suggesting that the accounts had been erroneously flagged:
“On Friday 4/18/25, Microsoft identified that it was internally logging a subset of short-lived user refresh tokens for a small percentage of users, whereas our standard logging process is to only log metadata about such tokens. The internal logging issue was immediately corrected, and the team performed a procedure to invalidate these tokens to protect customers.”
The notice sees Microsoft admit to “inadvertently generat[ing] alerts in Entra ID Protection” of supposed compromised credentials between 4AM UTC and 9AM UTC on April 20.
Another user said they were quoted “Error Code: 53003” for conditional access policy, while another was told that it was to do with an outage in their region – even though no outage had been reported or logged.
TechRadar Pro has asked Microsoft to clarify what happened over the weekend and why users appear to have received different explanations. Any update will be posted here.
You might also likeA new NYT Connections puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Monday's puzzle instead then click here: NYT Connections hints and answers for Monday, April 21 (game #680).
Good morning! Let's play Connections, the NYT's clever word game that challenges you to group answers in various categories. It can be tough, so read on if you need Connections hints.
What should you do once you've finished? Why, play some more word games of course. I've also got daily Strands hints and answers and Quordle hints and answers articles if you need help for those too, while Marc's Wordle today page covers the original viral word game.
SPOILER WARNING: Information about NYT Connections today is below, so don't read on if you don't want to know the answers.
NYT Connections today (game #681) - today's words (Image credit: New York Times)Today's NYT Connections words are…
What are some clues for today's NYT Connections groups?
Need more clues?
We're firmly in spoiler territory now, but read on if you want to know what the four theme answers are for today's NYT Connections puzzles…
NYT Connections today (game #681) - hint #2 - group answersWhat are the answers for today's NYT Connections groups?
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
NYT Connections today (game #681) - the answers (Image credit: New York Times)The answers to today's Connections, game #681, are…
Today’s joke was, of course, GREASE and LIGHTNING. Although I’m sure I wasn’t alone in the words ICE and FIRE triggering a quick search for a Game of Thrones group (A Song of Ice and Fire being the title of the unfinished collection of books it is based on).
My mistake today came as I was soaring towards a faultless round. Thinking there was a group that was about natural electricity creation I had EEL instead of VOLCANO in what became the purple quartet, NATURAL PRODUCERS OF HEAT.
That they produce electricity is one of three things people know about eels, the others being they are slippery and some brave souls enjoy eating them boiled and served in jelly (I am not one of those people, the idea of eating something that is slimy, boney and stringy does not whet my appetite).
How did you do today? Let me know in the comments below.
Yesterday's NYT Connections answers (Monday, 21 April, game #680)NYT Connections is one of several increasingly popular word games made by the New York Times. It challenges you to find groups of four items that share something in common, and each group has a different difficulty level: green is easy, yellow a little harder, blue often quite tough and purple usually very difficult.
On the plus side, you don't technically need to solve the final one, as you'll be able to answer that one by a process of elimination. What's more, you can make up to four mistakes, which gives you a little bit of breathing room.
It's a little more involved than something like Wordle, however, and there are plenty of opportunities for the game to trip you up with tricks. For instance, watch out for homophones and other word games that could disguise the answers.
It's playable for free via the NYT Games site on desktop or mobile.
A new NYT Strands puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Monday's puzzle instead then click here: NYT Strands hints and answers for Monday, April 21 (game #414).
Strands is the NYT's latest word game after the likes of Wordle, Spelling Bee and Connections – and it's great fun. It can be difficult, though, so read on for my Strands hints.
Want more word-based fun? Then check out my NYT Connections today and Quordle today pages for hints and answers for those games, and Marc's Wordle today page for the original viral word game.
SPOILER WARNING: Information about NYT Strands today is below, so don't read on if you don't want to know the answers.
NYT Strands today (game #415) - hint #1 - today's theme What is the theme of today's NYT Strands?• Today's NYT Strands theme is… Counter offers
NYT Strands today (game #415) - hint #2 - clue wordsPlay any of these words to unlock the in-game hints system.
• Spangram has 8 letters
NYT Strands today (game #415) - hint #4 - spangram position What are two sides of the board that today's spangram touches?First side: left, 4th row
Last side: right, 4th row
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
NYT Strands today (game #415) - the answers (Image credit: New York Times)The answers to today's Strands, game #415, are…
It never ceases to amaze me how well the NYT hides the answers in Strands, but today was a rare day where I saw one word – JUICES – immediately.
Then, after getting SOUP, the letters for PASTRIES were easy to spot and I was three words in, before I'd barely started.
SANDWICHES aside it was also a very left to right day, too, which made the search easier than when it goes right to left, down and up or all over the place.
In fact, the biggest challenge, for me at least, was to resist the temptation of stopping the word search and going out to a CAFE.
How did you do today? Let me know in the comments below.
Yesterday's NYT Strands answers (Monday, 21 April, game #414)Strands is the NYT's not-so-new-any-more word game, following Wordle and Connections. It's now a fully fledged member of the NYT's games stable that has been running for a year and which can be played on the NYT Games site on desktop or mobile.
I've got a full guide to how to play NYT Strands, complete with tips for solving it, so check that out if you're struggling to beat it each day.
A new Quordle puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Monday's puzzle instead then click here: Quordle hints and answers for Monday, April 21 (game #1183).
Quordle was one of the original Wordle alternatives and is still going strong now more than 1,100 games later. It offers a genuine challenge, though, so read on if you need some Quordle hints today – or scroll down further for the answers.
Enjoy playing word games? You can also check out my NYT Connections today and NYT Strands today pages for hints and answers for those puzzles, while Marc's Wordle today column covers the original viral word game.
SPOILER WARNING: Information about Quordle today is below, so don't read on if you don't want to know the answers.
Quordle today (game #1184) - hint #1 - Vowels How many different vowels are in Quordle today?• The number of different vowels in Quordle today is 3*.
* Note that by vowel we mean the five standard vowels (A, E, I, O, U), not Y (which is sometimes counted as a vowel too).
Quordle today (game #1184) - hint #2 - repeated letters Do any of today's Quordle answers contain repeated letters?• The number of Quordle answers containing a repeated letter today is 2.
Quordle today (game #1184) - hint #3 - uncommon letters Do the letters Q, Z, X or J appear in Quordle today?• No. None of Q, Z, X or J appear among today's Quordle answers.
Quordle today (game #1184) - hint #4 - starting letters (1) Do any of today's Quordle puzzles start with the same letter?• The number of today's Quordle answers starting with the same letter is 0.
If you just want to know the answers at this stage, simply scroll down. If you're not ready yet then here's one more clue to make things a lot easier:
Quordle today (game #1184) - hint #5 - starting letters (2) What letters do today's Quordle answers start with?• P
• C
• B
• T
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
Quordle today (game #1184) - the answers (Image credit: Merriam-Webster)The answers to today's Quordle, game #1184, are…
Well, that was taxing! Despite having three letters (including two in the correct position) I don't think I've ever been as stumped as I was by the word that became POUTY.
Fortunately, I had better options elsewhere – and by my seventh guess the final word solved itself. This is just one reason why I prefer Quordle over Wordle.
How did you do today? Let me know in the comments below.
Daily Sequence today (game #1184) - the answers (Image credit: Merriam-Webster)The answers to today's Quordle Daily Sequence, game #1184, are…
Cisco has patched a high-severity vulnerability in its Webex video conferencing platform which allowed threat actors to mount remote code execution (RCE) attacks against exposed endpoints.
The bug was discovered in the custom URL parser of a Cisco Webex app and is described as an “insufficient input validation” vulnerability.
“An attacker could exploit this vulnerability by persuading a user to click a crafted meeting invite link and download arbitrary files,” the bug’s NVD page reads. “A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the targeted user.”
Keeper is a cybersecurity platform primarily known for its password manager and digital vault, designed to help individuals, families, and businesses securely store and manage passwords, sensitive files, and other private data.
It uses zero-knowledge encryption and offers features like two-factor authentication, dark web monitoring, secure file storage, and breach alerts to protect against cyber threats.
Preferred partner (What does this mean?)View Deal
No revolutionThe vulnerability is tracked as CVE-2024-20236, and was assigned a severity score of 8.8/10 (high).
Cisco further explained that the vulnerability is present in all older versions of the product, regardless of the OS it’s running on, or system configurations.
The networking giant also said there were no workarounds for the bug, so installing the update is the only way to mitigate the risk.
While the most severe, it’s not the only vulnerability Cisco recently addressed. The company also fixed two more flaws, CVE-2025-20178 (6.0/10), and CVE-2025-20150 (5.3/10).
The former is a privilege escalation flaw in Secure Networks Analytics’ web-based management interface, and allows threat actors to run arbitrary controls as root, with admin credentials.
The latter was found in a Nexus Dashboard, and allows threat actors to enumerate LDAP user accounts remotely, separating valid accounts from the invalid ones.
The good news is that the vulnerabilities are not yet being exploited in the wild, BleepingComputer reports, citing analysis from the company’s Product Security Incident Response Team (PSIRT).
Cisco’s equipment, both software and hardware, are popular in both the enterprise and in consumer households. That makes them a prime target for threat actors, both state-sponsored and profit-oriented.
Via BleepingComputer
You might also likeWe're now well into 2025, and two of the biggest flagship phone launches are still to come. I am of course talking about the Pixel 10 (due in August) and the iPhone 17 (due in September) and as someone with extensive experience of handsets from both Google and Apple (blame the tech journalism), I've got some thoughts about how the Pixel can get the upper hand this year.
When I say the upper hand, I'm not really talking about sales numbers: iPhones and Samsung Galaxy phones are going to win that battle for a good few years yet, at least as far as the US is concerned (globally, the market is a bit more competitive). Instead, I'm going to focus on what would resonate with me, and I suspect a lot of other consumers, too.
You'll see we awarded 4 stars out of 5 to the Pixel 9 in our Google Pixel 9 review, while in our Apple iPhone 16 review, we gave Apple's handset 4.5 stars out of 5. That means Apple currently has a slight edge when it comes to these flagship phones, so how can Google catch up this year?
1. Keep the camera barThe Google Pixel 9a might be easier to lie down on a flat surface, but at what cost? The removal of the iconic Pixel camera bar from the design means the mid-ranger looks rather ordinary and nondescript, lost in a crowd of similar smartphone slabs.
In our Google Pixel 9a review, we described it as "dang ugly", and so I'm hoping that the big camera bump makes a triumphant return with the Pixel 10. It provides more room for additional camera technology, on top of everything else.
The iPhone 17, meanwhile, seems to be having something of an identity crisis – or at least the Pro models are, based on the leaks we've seen so far. It seems like Apple isn't sure where to go next with the design, so Google could score a win here in terms of aesthetics.
The Google Pixel 9 Pro (Image credit: Blue Pixl Media) 2. Focus on Google GeminiIt's no secret that the rollout of Apple Intelligence has been badly bungled so far, so much so that Apple has had to go on record to say it over-promised and under-delivered, which you can be sure was acutely embarrassing for a company of Apple's stature.
Google Gemini, meanwhile, is rapidly improving – in the last month or so we've seen new AI models that are smarter than ever, as well as Gemini Live screen and camera sharing roll out for all users – even those who are using Gemini for free.
There's a clear winner here already, but Google can't be complacent. Apple engineers will be busy behind the scenes trying to get Siri up to the level of Gemini and ChatGPT, and so it makes sense for the Pixel 10 to have yet more AI features baked right into it.
3. Improve performanceApple's lead in terms of raw processor performance is as clear as its failings in AI: if we're talking solely about CPU speed, the A18 and A18 Pro chips inside the iPhone 16 series beat the Tensor G4 chip you'll find inside the Pixel 9 phones.
That doesn't mean the Pixel 9 is in any way slow or laggy, but it's something that Google needs to address if it wants to fully catch up with Apple. When it comes to gaming, video editing, or just jumping between apps, performance matters.
Unfortunately for mobile enthusiasts, the leaks to date suggest the Tensor G5 isn't going to be a huge leap forward from the Tensor G4 in terms of performance. I'm hoping that as Google gets better at designing its own chips, we'll see a bigger upgrade here.
4. Offer value for moneyIf you're of a certain age, you may remember handsets like the Google Nexus 5 and Google Nexus 6, which managed to combine flagship specs with mid-range pricing. Google was essentially doing the OnePlus trick before OnePlus got started.
As the Nexus series has given way to the Pixel series, that value-for-money aspect has disappeared – although the 'a' phones have taken up some of the slack. The Pixel 9 starts at $799 / £799 / AU$1,349, while the iPhone 16 starts at $799 / £799 / AU$1,399.
You'll notice those prices for the 128GB models are identical, except for Australia, and if Google was able to shave off a little from the cost of the Pixel 10, it would help it stand up better against the iPhone 17 – and bring back memories of the Nexus phones.
The iPhone 16 Pro (Image credit: Future / Lance Ulanoff) 5. Improve battery lifeSmartphones seem stuck as far as battery life goes, with most handsets on the market lasting a full day of general use, so an overnight charge is always required to get through a substantial amount of a second day.
Could Google change this with the Pixel 10? It depends on the efficiency improvements it manages with the Tensor G5 chip, and also on any power-saving features that arrive with Android 16 (which should be out before the Pixel 10 phones).
Comfortably managing two days of battery life between charges would set the Pixel 10 apart from the iPhone 17 and just about every other phone available right now. It's a tough ask, but it's something all users want to see.
You might also likeASUS has released a fix for a critical-severity vulnerability affecting routers with AiCloud enabled which could allow threat actors to execute functions on the exposed devices remotely and without authorization.
It is tracked as CVE-2025-2492, and was given a severity score of 9.2/10 (critical). It can be exploited via a custom-tailored request.
“This vulnerability can be triggered by a crafted request, potentially leading to unauthorized execution of functions,” the NVD page reads.
Keeper is a cybersecurity platform primarily known for its password manager and digital vault, designed to help individuals, families, and businesses securely store and manage passwords, sensitive files, and other private data.
It uses zero-knowledge encryption and offers features like two-factor authentication, dark web monitoring, secure file storage, and breach alerts to protect against cyber threats.
Preferred partner (What does this mean?)View Deal
Safeguarding the deviceAiCloud is a feature integrated into many ASUS routers that transforms the home network into a personal cloud server.
Users can then access, stream, sync, and share files stored on USB drives connected to the router from anywhere with an internet connection.
The flaw was found in firmware versions released after February 2025, meaning: 3.0.0.4_382, 3.0.0.4_386, 3.0.0.4_388, and 3.0.0.6_102.
According to CyberInsider, such features “often become attractive targets” for threat actors, since they are exposing sensitive data to the internet.
Therefore, it would be wise not to delay deploying the patch. Depending on the model, there are different firmware versions that can be downloaded directly from the ASUS website.
The flaw also affects a few devices that reached end-of-life, which should now have AiCloud entirely disabled. Internet access for WAN should also be disabled, as well as port forwarding, DDNS, VPN server, DMZ, port triggering, and FTP services.
The company did not say if the flaw is being abused in the wild or not, but at press time, it was not added to CISA’s KEV, which is usually a good litmus paper for actively exploited flaws.
According to BleepingComputer, the critical CVSS rating “implies the exploitation could have a significant impact.” ASUS also told its users to use unique, strong passwords to secure their wireless networks and router administration pages.
That means making passwords at least 10 characters long, and making them a mix of lowercase and uppercase letters, numbers, and special symbols.
You might also likeWe’re just a couple of days away from the OnePlus 13T launch, which will fall on April 24. Yet that hasn’t stopped OnePlus from teasing a few choice specs and details of the upcoming phone ahead of schedule, with the latest info concerning the device’s battery capabilities.
According to a OnePlus post on Chinese social media site Weibo, the 13T will come with a 6,260mAh battery. That’s in line with the company’s previous claims that the battery would offer a capacity of no less than 6,000mAh.
As well as that, OnePlus has revealed that the 13T’s battery will feature bypass charging. This allows your Android phone to draw power directly from a power source (like a power bank) rather than from its internal battery when charging. This helps to prolong the phone’s battery and slow down its degradation.
The data drop didn’t end there, as OnePlus has confirmed that the 13T will weigh 185g. Compare that to the OnePlus 13 and OnePlus 13R, which both come with less capacious 6,000mAh batteries yet weigh 200g each. Packing a larger battery into a smaller frame is a surprising move from OnePlus, but it’s certainly a welcome one.
Few secrets left to unveil (Image credit: OnePlus)OnePlus has been very forthcoming about the 13T, disclosing all manner of images and details on social media. Previously posted photos have shown the device’s range of colors – including gray, pink and black shades – as well as the fact that it will come with a new button.
Leaks have also played their part. For example, it’s been suggested that the OnePlus 13T will come with a Snapdragon 8 Elite chip, a 6.32-inch display, an IP65 rating, and two 50-megapixel rear cameras. Of those two lenses (primary and telephoto), the telephoto one could offer 2x optical zoom and 4x lossless zoom.
That said, we don’t yet know the full spec sheet for the OnePlus 13T, and it’s possible that OnePlus is saving some intriguing new features for the launch event itself. But with so much already in the public domain, it will be interesting to see what the company might possibly have held back. We’ll find out for sure on April 24, when the 13T finally launches.
You might also likeProton66, a Russian bulletproof hosting service provider, is being used to spread malware, ransomware, mount phishing attacks, and more, experts have warned. This is according to
Researchers from Trustwave warned the malicious activity has picked up in recent weeks, stating how, “Starting from January 8, 2025, SpiderLabs observed an increase in mass scanning, credential brute forcing, and exploitation attempts originating from Proton66 ASN targeting organizations worldwide.
“Although malicious activity was seen in the past, the spike and sudden decline observed later in February 2025 were notable, and offending IP addresses were investigated.”
Keeper is a cybersecurity platform primarily known for its password manager and digital vault, designed to help individuals, families, and businesses securely store and manage passwords, sensitive files, and other private data.
It uses zero-knowledge encryption and offers features like two-factor authentication, dark web monitoring, secure file storage, and breach alerts to protect against cyber threats.
Preferred partner (What does this mean?)View Deal
Getting in touchWhoever is behind these activities is looking to exploit a number of vulnerabilities, including an authentication bypass flaw in Palo Alto Networks’ PAN-OS (CVE-2025-0108(, an insufficient input validation flaw in the NuPoint Unified Messaging (NPM) component of Mitel MiCollab (CVE-2024-41713), a command injection vulnerability in D-LINK’s NAS (CVE-2024-10914), and an authentication bypass in Fortinet’s FortiOS (CVE-2024-55591 and CVE-2025-24472).
The two FortiOS flaws were previously exploited by the initial access broker Mora_001, which has also been seen dropping a new ransomware variant called SuperBlack.
The same publication also said that several malware families hosted their C2 servers on Proton66, including GootLoader and SpyNote.
Furthermore, Trustwave said XWorm, StrelaStealer, and a ransomware named WeaXor were all being distributed through Proton66.
Finally, crooks are allegedly using compromised WordPress sites related to a Proton66-linked IP address to redirect Android users to phishing pages that spoof Google Play app listings and try to trick users into downloading malware.
To mitigate the risk against Proton66-linked threats, users should block all the Classless Inter-Domain Routing (CIDR) rangers associated with the company and Chang Way Technologies. The latter is a Hong Kong-based provider that is “likely” related to Proton66.
So-called “bulletproof” hosting is a type of hosting service that is advertised as being immune to takedowns and legal action, but there have been examples in the past when bulletproof hosting ends up yielding in the end.
At this time, the fact that Proton66 is a Russian service probably makes it somewhat bulletproof for Western users. However, politics change as the wind, and what Russia protected yesterday could be traded tomorrow.
Via The Hacker News
You might also likeGlobal businesses are prioritizing sustainability in their supply chains more than ever before. Across sectors, we’re increasingly seeing businesses develop sustainable procurement policies, putting carbon reduction strategies and environmental commitments to the top of their priorities list when evaluating new supplier engagements.
According to a 2023 survey from Stanford Business School, over half (51%) of global business currently have sustainable procurement policies in place to strengthen their supply chains. The need to reduce scope 3 emissions has brought procurement to the forefront of business strategy today, and driven increasing collaboration with sustainability and other departments.
But what internal, and external, pressures have sparked this need? And what can businesses do today to decarbonize their supply chains and forge a greener future?
Strict regulatory landscapeThe regulatory landscape for businesses surrounding sustainability is evolving, and becoming stricter, which has created mounting pressures for organizations to manage and report on their carbon footprints.
In Europe, for example, the EU’s Corporate Sustainability Reporting Directive (CSRD) and Corporate Sustainability Due Diligence Directive (CSDDD), despite recent European Commission's Omnibus Package’s update, continue to require large and listed companies to disclose the environmental impact of their activity.
Over in North America, the Securities and Exchange Commission (SEC)’s disclosure rules took effect in March 2024, requiring registered organizations to disclose comprehensive climate impact information in annual reports and registration statements.
And in Asia, similar regulatory push is also on the rise with new ESG reporting standards being introduced. China, for example, is aiming for mandatory ESG reporting by 2026, aligned with the International Sustainability Standards Board.
Increasing regulation and government enforced net zero targets, of course, creates significant external pressure to act on decarbonization supply chains. However, there are some commercial drivers, too.
Today, buyers are on the lookout for their own sustainable suppliers, and companies with sustainable policies and practices will not only comply with regulations but will also gain a competitive edge in the market. In fact, research from the Greenly Institute claims that companies with sustainable procurement can gain anywhere between a 15 to 30% increase in brand value.
Not a level playing fieldDespite knowing that decarbonization is a must, certain industries face more challenges in achieving this. Companies in the shipping sector, for example, have had to reroute vessels due to various geopolitical conflicts, which has increased carbon-intensive journeys.
Major container shipping lines have been forced to divert away from the Red Sea and Suez Canal, around the Cape of Good Hope, due to Houthi attacks on commercial ships. This diversion alone adds around 3,000 nautical miles and 10 days to the journey, which significantly hikes up carbon emissions.
High energy, fuel and labor costs have made it difficult for road haulage operators to get by financially, let alone invest in cleaner tech. And even for those transport and logistics operators that can afford to invest in decarbonizing their fleets, additional challenges are met further down the line when they encounter limited supplies of electric charging points.
Tech, innovation, and thinking outside the box can support in overcoming some of these challenges. For instance, fleet tracking software can help to optimize routes and reduce vehicle emissions, also aiding in guiding investment decisions by mapping out which routes are suited to electrical fleets, further reducing emissions.
Data can also be used in many other ways to assess the state of your current carbon footprint, informing strategies for decarbonization. Carbon accounting platforms, for example, can enable businesses to calculate a baseline for their annual carbon footprint, helping to strategically reduce emissions and set net-zero targets across operations.
Action needed from all sidesDespite all of this, the overall pace of decarbonization is not yet sufficient to meet current climate targets around the world.
Companies need to act now, wherever they can, in tackling major emission sources, such as vehicle and transport emissions. They should also embrace sustainable initiatives such as the circular economy. Returning products for repair, refurbishment, reuse, or recycling – rather than just instantly replacing or disposing of them irresponsibly – can significantly reduce embodied carbon, diverting tons of otherwise valuable materials from ending up in landfills.
A long-term view is essential here, but decarbonization is a complex process, and not everything is in the hands of businesses. Government investment in areas such as green energy, electric vehicle (EV) charging infrastructure, and recycling facilities, all have a part to play.
For decarbonization to gain the right momentum, greater alignment between legislation, policy, and private investment is needed for a just transition.
Strategy for sustainable supply chainsWhen producing a decarbonization strategy, start by addressing the big-ticket items. Affordable, clean tech, such as solar panels, can contribute towards your sustainability goals while also providing a more reliable energy source than power from the grid, supporting better business continuity. Embracing digital tools for reducing vehicle emissions, in addition to circular economy practices, can also make a sizeable impact.
While the journey of decarbonizing supply chains is complex and challenging, depending on what sector you operate in, it is essential for all businesses today.
By understanding the value of data, staying up to date and aligned with regulatory demands in your region, and adopting an innovative, problem-solving approach, you can begin making significant progress towards a better carbon footprint and a greener supply chain.
We've featured the best RPA software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
The upcoming PC refresh cycle is shaping up to be one of the most pivotal tech moments in recent years. Aging PC fleets are past their prime, and the end of Windows 10 support is on the horizon. From small businesses to global enterprises, upgrading to systems that can support AI tools and the enhanced functionality of Windows 11 will be essential to maintain a competitive edge.
As such, organizations face a potential tidal wave of upgrades, and with it, potentially significant costs – both financial and environmental. The complexity of managing such an upgrade without compromising your business’s environmental responsibility can be daunting. But it can be done.
Thankfully, sustainable practices appear high on the agenda for many businesses. Customers across all verticals are implementing circular IT practices to minimize waste and costs. According to new research, Eighty-four percent of IT and business decision makers agree that circularity in AI hardware is an important consideration in their IT asset management system.
Eighty-seven percent also agree that sustainable design and energy efficiency are key factors when selecting solutions. Simultaneously, however, 81% admit needing help from a third-party partner to achieve their sustainability goals, suggesting a gap between good intention and the ability to deliver.
The High Stakes of Ignoring SustainabilityE-waste is a growing issue. According to the WHO, in 2022, an estimated 62 million tons of e-waste were produced globally and only 22.3% was documented as formally collected and recycled. Electronics discarded irresponsibly often end up in landfills, leaching toxic chemicals into the earth and water, posing a threat to health and the environment.
Beyond the environmental considerations, sustainability is also a competitive differentiator, particularly within the public sector. Customers are paying attention to how companies incorporate environmental responsibility into their operations. Choosing not to lead in this space could mean losing out to competitors who are already making strides toward more sustainable practices.
Championing Circular Design and SustainabilityThere is, however, a way forward. IT providers that adopt circular design principles like repairability, upgradability and modular components are paving the path toward a more sustainable future. PCs designed with replaceable batteries, screens and other components empower businesses to extend the lifespan of their devices, reducing waste and postponing costly replacements.
Design decisions like attaching ports with screws, rather than soldering directly to the motherboard simplifies the disassembly process. This enhances the potential for repairs or replacements without risking damage to critical hardware components.
Some vendors are now taking this one step further, making it easier for customers to purchase and replace common PC parts themselves. Customers can even access augmented reality tutorials with step-by-step instructions. Democratizing access to repairs in this way can significantly reduce e-waste and the resulting environmental impact.
At the same time, manufacturers are pushing the boundaries of material innovation by incorporating recycled aluminum, biobased plastics and other renewable materials into their designs. Carefully sourced components are emerging as sustainable alternatives, helping to reduce the environmental footprint of new devices.
Keep in mind that circularity and sustainability don’t end with the PC – it’s possible to lower the environmental impact of peripherals, too. Recycled plastic in docks, recycled cobalt in batteries and even recycled copper in adapter cables help reduce resource use and lower emissions.
Energy efficiency is another critical element of sustainable design, particularly as AI integration becomes a key driver of the PC refresh. Modern AI-optimized hardware and software are designed with power-saving features like intelligent energy management and thermal regulation. These innovations not only lower a company’s environmental footprint but also deliver tangible operational cost savings by extending battery life and optimizing processing speeds.
Many manufacturers are also doubling down on closed-loop systems to recover valuable materials from outdated devices. Robust recycling programs minimize landfill waste and contribute to a circular economy where resources are reused rather than discarded.
Partnering now for TomorrowBusinesses do not need to face this challenge alone. Partnering with IT providers and third-party experts can make the difference. In fact, 84% of IT and business decision makers agree that collaborating with a 3rd party would simplify their efforts to carry out circular IT practices.
Asset recovery solutions and recycling services enable companies to dispose of outdated equipment responsibly while extracting value from old resources. Flexible payment solutions further enhance sustainability by allowing companies to optimize asset management and reduce upfront costs, ensuring that investment in sustainable technology is also financially viable.
Practical Steps Toward SustainabilityFor organizations eager to balance AI integration with environmental responsibility, the upcoming PC refresh is an opportunity for action. Businesses should begin by choosing IT partners and providers that prioritize circular design, emphasizing products designed for longevity, repairability and efficiency, and that incorporate sustainable materials.
Exploring asset recovery solutions and recycling services to retire outdated equipment responsibly and reduce e-waste can also pay dividends. If there is still value in old equipment, asset recovery solutions can resell and transfer funds straight into a company bank account.
Investing in AI-optimized PCs drives efficiency, enhances productivity, and improves security, but also positions businesses for cost savings and reduced energy consumption. For example, just having the ability to turn off devices remotely can save up to 15% on energy usage.
By adopting sustainable IT solutions today, companies can ensure they’re equipped for tomorrow’s challenges while contributing to a more responsible and environmentally conscious tech ecosystem.
The PC refresh cycle will inevitably define the next decade of IT strategy. Organizations that take bold steps to prioritize sustainability now could gain the operational and competitive benefits of aligning technology with responsible business values.
We list the best business computers.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
If you’ve taken a bunch of photos but wish they could be jazzed up with a little HDR magic, you’re in luck. That’s because Google has just added the ability to enhance your images with Ultra HDR effects in Google Photos. Better yet, the HDR changes can be applied to regular pictures, even if you’ve already taken and uploaded them.
As noticed by Android Authority, the feature has rolled out to a number of Google Photos users in recent days. It can’t yet be used by everyone, and it’s not clear whether it’s limited to the best Android phones or will soon be available more widely.
Google Photos’ Ultra HDR mode lets you take photos with a wider range of colors than standard pictures. That can boost image vibrancy, but you’ll usually need a device with an HDR display to fully appreciate the effect.
Yet the good thing about Google’s Ultra HDR feature is that it’s backward compatible, so your photos will revert to using standard color ranges on regular Android screens.
It also works the other way, too. Google Photos appears to have added the ability to convert normal photos into HDR equivalents, boosting their saturation and helping them pop much more than they previously did. That means There’s no need to remember to take the pictures in HDR mode in the first place.
Better photos in HDR (Image credit: Shutterstock / BigTunaOnline)Ultra HDR mode had been spotted as far back as September 2024, but it wasn’t fully functional at the time. Now with version 7.24.0.747539053 of the Google Photos app, it looks like it’s beginning to roll out to a range of Android users.
Once it becomes more widely available, you will find the feature in the Adjust section of the Google Photos editor. There, you’ll be able to change the strength of the HDR effect using a slider. It is set to replace the HDR Effect option currently in Google Photos.
You can see a preview of the Ultra HDR effect on GitHub. Make sure you’re viewing it on an HDR-compatible device to be able to observe it properly.
Still, there’s no reliable indication of when the feature might arrive for everyone. Hopefully we won’t have to wait too long before it rolls out.
You might also likeA new report from Seagate has revealed just how much of an effect artificial intelligence is having on the amount of storage required by data centers, which presents a major sustainability challenge.
It found 94.5% said AI had increased their data storage needs, with even more (97%) anticipating AI’s growth to impact storage demand even further.
However, despite widespread acknowledgement and consideration for the environment, companies are struggling to prioritize it amid rising costs, which tariffs, government objectives and the sheer scarcity of some materials have influenced
Data centers are facing a major sustainability headacheNearly 95% of respondents are concerned about environmental impact, says Seagate, but only 3.3% prioritize it in purchasing decisions with many focusing on the total cost of ownership and purchasing costs.
Among the key factors putting data centers at risk are high energy consumption (53.5%), raw material requirements (49.5%), physical space constraints (45.5%), infrastructure costs (28.5%) and acquisition costs (27%).
“Data centers are under intense scrutiny – not only because they support modern AI workloads, but because they are becoming one of the most energy-intensive sectors of the digital economy," said Seagate SVP of Cloud Marketing, Jason Feist.
Seagate envisions energy-efficient technologies playing a wider role in the decarbonization of data centers, reducing energy requirements and hitting other targets at the same time.
Although SSDs promise to be quicker and more efficient, Seagate’s HAMR-based Mozaic 3+ platform (for HDDs) can deliver up to three times more energy density while reducing embodied carbon by over 70% per terabyte and lowering cost per terabyte by 25%.
The report also embodies the ‘reduce, reuse, recycle’ motto by highlighting the importance of both extending product lifespans and then repurposing decommissioned equipment to reduce its environmental burden.
Sharing accountability through cooperation across the supply chain also helps to reduce emissions from Scopes 1, 2 and 3, enabling a wider effect.
“Sustainability cannot be solved in isolation. A holistic approach spanning infrastructure, life cycle management, and industry-wide accountability could ensure that the growth of AI and data center operations does not come at the expense of the environment,” Feist added.
You might also likeMicrosoft says it is ahead of target on its quest to become a zero-waste company – one of the key aspects of its sustainability goal – but it isn't there just yet.
In a blog post, Azure Hardware Systems and Infrastructure CVP Rani Borkar confirmed the company has now reached a 90.9% reuse and recycling rate for servers and components as of 2024, slightly surpassing its 2025 target of 90% and getting there one year earlier.
The milestone brings Microsoft, which recently celebrated its 50th anniversary, one step closer to being carbon negative, water positive and land positive by 2030.
Microsoft’s data centers are nearly waste-freeBorkar explained the company had exceeded its target by piloting the sustainable extraction of rare earth minerals and metals from HDDs at scale, reducing the need for new materials such as neodymium, gold and copper.
The extracting process involves the acid-free dissolution of shredded HDDs, said to deliver a 90% high-yield recovery rate.
The company also boasted of a 95% reduction in emissions compared with traditional mining and processing practices, highlighting the broader cross-category effects recycling can have to help Microsoft reach more than just one of its sustainability goals.
Microsoft has also continued to expand its Circular Centers globally with the goal of processing and routing decommissioned servers and hardware components onto their next useful lives – things ike academies that train data center technicians.
Its first Circular Center, located in Amsterdam, the Netherlands, opened in 2020. Five more across the US, Ireland and Singapore have followed since then, and the company has already drawn up plans for new sites in Cardiff, Wales; New South Wales, Australia and San Antonio, Texas.
The third change that has allowed Microsoft to reach that all-important 90.9% rate one year early was the introduction of recyclable packaging solutions for transporting data center hardware to enable easier curbside recycling.
Borkar claims more than 30,000 server racks have been processed through Microsoft’s global packaging recycling program, diverting more than 2,500 metric tons of waste from landfills.
That said, every step taken in the right direction is seemingly met with a step backwards. Microsoft’s 2024 Sustainability Report details how greenhouse gas emissions and electricity consumption have been climbing annually since at least 2020, indicative of the colossal impact of powerful cloud computing and artificial intelligence data centers.
You might also like