ISO 25000 defines "software security" as a key pillar of product quality, performance, maintainability, and reliability. But in practice, cybersecurity is often an afterthought, deprioritized in the name of speed and innovation, resulting in a growing disconnect between quality and security. The recent case of DeepSeek is a perfect example. Despite rapid product development and cost efficiency, the company failed most of its security tests, exposing major flaws in its risk posture.
This isn't an isolated incident. Across various stakeholders and industries, "quality" means different things depending on who you ask. Developers may view it as bug-free functionality, designers may point to user experience, and executives may care most about time to market, ROI, and customer satisfaction. Meanwhile, security often sits outside those priorities—treated as a compliance box or post-release concern.
The result? A widening divide. Organizations take an average of 55 days to fix just half of critical vulnerabilities. Attackers don't need nearly that long. Exploits from CISA's Known Exploited Vulnerabilities catalog often circulate within five days of discovery. That's a 50-day exposure window, and that's if you're among the faster teams. Most aren't.
To close this gap, teams must move beyond reactive security measures and adopt a proactive, integrated approach to quality—one that treats security as a core part of the development lifecycle, not something bolted on at the end.
Data Flow Vulnerabilities: The Hidden Security RiskModern quality assurance (QA) is built around fast, repeatable feedback. Fail a test, file a bug, and fix it before it hits production. Teams are fluent in this rhythm. But when it comes to security issues, the rhythm breaks. Often, the assumption is that vulnerabilities weren't detected in time. But the real problem isn’t just detection, it’s a breakdown in how security signals flow through the development lifecycle.
Security tools generate noisy and low-quality signals, leading to false positives and negatives. And, with the rise of proactive, left-sided practices—like threat modeling, IDE plugins, pre-commit hooks, and early scans—the volume of signals has only increased. Tools like SAST, DAST, and dependency scanners flood teams with thousands of alerts. Without a structured way to prioritize, sort, and assign these issues, developers fall back to what they know, and security becomes background noise, the divide deepens, and the path to resolution blurs.
To fix this, teams need to treat vulnerabilities like they treat bugs—because that's precisely what they are. Whether it's a flaky unit test or a known SQL injection risk, both represent a failure state and require prioritization. When security signals are pulled into the same systems developers already use—issue trackers, test automation, CI/CD pipelines—they get handled like any other failure, not ignored or delayed.
The Lag Is in the Handoff, Not the DiscoveryDelayed security fixes put businesses, customers, and reputations at risk. It's tempting to think that catching vulnerabilities sooner will solve everything. But most teams already know where their weaknesses are. The current lag isn't about visibility. It's about propagation. Security alerts travel on a different track than everything else. QA teams test, triage, and file bugs as part of their day-to-day job. But AppSec alerts? They get forwarded. They live in separate tools. They sit on spreadsheets that no sprint team is ever going to open.
A single static scan can produce thousands of results; most go untouched without a structured way to sort through them. According to a Ponemon Institute survey, 61% of IT and security professionals struggle to remediate vulnerabilities effectively. Only 20% believe they can reliably detect vulnerabilities before an application is released.
Once a vulnerability is known to the public, the clock is ticking. Exploits circulate quickly. By the time a team triages the alert, assigns it, and discusses a fix, the damage may already be done. And the fallout can be painful.
Victims of data breaches underperform the NASDAQ by 8.6% after a year—and more than 11% after two years. Customers don't easily forget, either. More than half (66%) of U.S. consumers say they wouldn't trust a company again after a breach, and 44% believe cyber incidents directly result from poor security measures. That trust is hard to rebuild, and the "patch later" mindset won't cut it anymore. Businesses can't afford to wait until the next release cycle to address known issues. So, what's the better approach?
Everything changes if you reframe those alerts as just another signal source—equivalent to a failed unit test. Developers already know how to act on that kind of data. They know how to prioritize based on severity and reproducibility, when to flag issues for later, and when to fix them immediately. Security can fit that mold. It just hasn't been given a seat at the table.
Align Security with Agile and Continuous DeploymentPerfect software doesn't exist. Teams deploy with known bugs all the time because getting the product out the door matters more than perfecting every edge case. Security should be viewed similarly: not every vulnerability must be fixed before release, but every risk should be known, tracked, and managed. That's how mature teams work—not by pretending every build must be flawless but by making tradeoffs with their eyes open.
This doesn't mean every security issue needs to block deployment. Just like teams go to market with known minor bugs, they can also do it with low-priority vulnerabilities—so long as there's visibility and a plan.
Deploying with a known issue is one thing. Deploying with a critical vulnerability no one's aware of is something else entirely. When teams pull security data into the same locations they manage tests and bugs, those tradeoffs become more intentional. The product team knows what's at stake, the security team has visibility, and teams can jump on it fast if something changes.
Embed Security Testing Throughout the Development LifecycleSecurity is a lifecycle, not a checklist. It should be embedded into planning, implementation, testing, and monitoring. Address risks early in planning to prevent coding vulnerabilities, integrate testing findings into sprint cycles for timely remediation, and implement post-deployment scans to defend against new threats. This proactive, lifecycle-wide approach shifts security from a daunting challenge to a manageable process, prioritizing strategic risk mitigation over chasing perfection.
Additionally, all teams, regardless of size or resources, stand to gain from leveraging a comprehensive suite of tools that bring security, quality, and testing together under one roof. When signal sources are fragmented across disconnected systems, teams lose time chasing context and resolving conflicts between tools. But with a unified platform, organizations can centralize insights, reduce noise, and make faster, more informed decisions.
This integrated approach helps security shift from a bottleneck to a core enabler of speed and resilience. Instead of reacting to siloed alerts, teams can respond to prioritized, correlated findings within the workflows they already use—accelerating resolution without compromising risk management.
The Stakes Are Already Too High to WaitThe fastest, most effective teams don't just build quickly. They build securely by embedding security into the systems they already trust. They treat security bugs like any other failure and make tradeoffs based on visibility, not guesswork.
Teams that close the gap between security and quality will be better equipped to deliver resilient, high-performing software at speed. By integrating security throughout the development lifecycle—with structured prioritization, continuous feedback loops, and tools that unify signals across teams—organizations can reduce risk, protect their reputation, and earn lasting customer trust.
When done right, security becomes part of the rhythm of development, not a disruption.
We've made a list of the best patch management software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
The ability to seamlessly upload all types of files from Android to the cloud has become a baseline expectation for modern users, especially those who rely on services like Nextcloud to manage their data.
In a move that has sparked a backlash, Google has blocked full file upload capabilities in the Nextcloud Files Android app, citing “security concerns.”
This single policy change has significantly affected how users interact with one of the leading cloud storage services available today, raising broader questions about fairness, power, and competition in the digital ecosystem.
Nextcloud claims unfair treatment under the guise of securityWhile users can still upload media files such as photos and videos, a core feature for anyone seeking the best cloud storage for photos, Nextcloud has been forced to disable uploads for all other file types on Android.
According to Nextcloud, the issue stems from Google’s refusal to grant an essential file permission that the app has used since 2011. This is the “All files access” permission, which allows an app to read and write all files on a device’s shared storage, not just media files.
“To make it crystal clear: All of you as users have a worse Nextcloud Files client because Google wanted that. We understand and share your frustration, but there is nothing we can do,” the company said in a press release.
Nextcloud argues that this is not merely a technical issue but a strategic one. The company claims it is being boxed out, not for security reasons, but because it poses a competitive threat to Google’s own cloud ecosystem.
“Google owning the platform means they can - and are - giving themselves preferential treatment,” the company states, noting that Google’s own apps, as well as those from other Big Tech players, continue to enjoy the same permissions that Nextcloud has now been denied.
Google’s recommendation to use alternative frameworks like the MediaStore API or SAF has not solved the issue. Nextcloud explains that these options don’t meet its requirements, and reviewers have misunderstood their functionality.
The situation echoes Microsoft’s past tactics in limiting WordPerfect’s access to Windows APIs, a historical parallel that Nextcloud readily invokes.
Under the guise of user safety, Nextcloud claims, Google is making it harder to compete, particularly for smaller developers offering privacy-focused cloud backup solutions.
While regulators are tasked with addressing such concerns, Nextcloud notes that progress is slow. A collective complaint filed in 2021 alongside 40 other organizations for a similar issue has yet to receive a response.
You might also likeiFi's new UP Travel solves two common issues for travellers: using your wireless headphones with in-flight entertainment that was made for cabled connections, and streaming music to in-car entertainment and other audio systems that don't do Bluetooth audio.
The UP Travel is a two-way Bluetooth adapter that you can use to stream from in-flight systems to your headphones, or from your phone to a vehicle or audio product's aux-in port.
The device enables you to pair and listen on two sets of headphones at once, though its battery is good for 10 hours, so it might not make it through the longest of flights.
It's got a mic with noise and echo suppression for clear calls when you're back on the ground, because why not.
iFi the friendly skiesThe UP Travel isn't just a wireless dongle. It's a proper DAC too. Instead of having the Bluetooth chipset handle the wireless and the audio too, the Bluetooth module focuses purely on transmission and reception while the audio conversion is handled by a Cirrus Logic MasterHIFI DAC and iFi's bespoke clocking circuitry, just like in iFi's larger portable DACs.
The supported codecs cover all the essentials (although availability depends on your device and what it supports) including aptX Adaptive, aptX HD, aptX Low Latency, LDAC, SBC, AAC and LHDC/HWA. And in a nice touch you can change codecs, so for example you might want the highest possible quality for listening to music but switch to something with lower latency to stay in sync with the in-flight movie.
The iFi UP Travel is $99 / £99 / €99 (about AU$205).
The iFi GO Pod Air add wireless streaming to your wired IEMs. (Image credit: iFi Audio)iFi has also launched a second travel-focused product, the iFi GO Pod Air. It's designed for audiophiles who don't want to give up their wired IEMs but who do need the convenience of cable-free listening. It transmits at up to 24-bit/96kHz and supports all the key high quality codecs.
It has built-in mics too, for calls. The GO Pod Air costs $249 / £249 / €249 (about AU$515).
You might also likeTechnology is constantly changing the world and how we live in it. It’s become a critical part for every organization; most wouldn’t be able to operate without it. Some recent technology innovations are exciting — like AI. With all the buzz around AI, many organizations quickly jumped at the opportunity to implement it, while others were wary. Many feel like they “should” be using it and worry about losing their competitive edge without it.
While AI offers some great benefits, it's not necessary for every organization and use case. For some, it can be detrimental, causing a negative return on investment (ROI). If you’re considering adopting AI tools, there may be an alternative better suited to your needs: automation. Let’s discuss determining ROI and if AI is a worthwhile investment.
AI, automation, and weighing their valueShould you incorporate AI into your processes? Would AI bring good value or require too much work to set up? Does AI deliver a good ROI, or are there better options? These are likely all questions that arise as you consider whether or not you want to incorporate AI into your operational processes. Or maybe you’ve already started using AI and have realized it’s not all that you expected it to be.
AI and ROI potentialAI promises to improve efficiency, simplify manual tasks, and generally make our jobs (and lives) easier. However, about 75% of companies struggle to demonstrate a clear return on investment (ROI) for the AI tools they adopt.
ROI is a critical metric to measure; you want to ensure you have enough data to back the investment decision. In my opinion, it’s too early to tell AI’s ROI. We need more time to create a solid measurement framework. Despite this, you can get an idea of AI’s ROI potential for your business with specific indicators:
Leading indicators offer quick, apparent returns. For instance, AI can help put specific tasks, like troubleshooting customer issues, on autopilot. This can save time that your team can put toward revenue-generating tasks.
Lagging indicators take time to show their benefits. For example, customer satisfaction improves because AI enhances the self-service experience.
Consider the leading and lagging indicators specific to your organization and what success would look like for you in these terms.
Before investing in AI, the most important thing to consider is: does this use case need human-like intelligence, or does it fall into a more structured logic category? AI is complex, autonomous, and flexible. It excels in situations that require open-ended problem-solving. AI can adapt, reason, and evolve through interactions. It is great for tasks that require human reasoning, like helping a customer troubleshoot a problem in real time.
There are a few downsides to consider with AI. It comes with significant data and privacy risks and can be unpredictable. It may also require significant training to avoid undesirable outcomes and “hallucinations.”
Automation and ROI potentialMany use automation and AI interchangeably. While both can enhance productivity, efficiency, and ROI, they differ and offer distinct benefits.
Automation has been shown to improve ROI significantly. Automation differs from AI in that it executes pre-defined, rule-based tasks automatically. It’s ideal for situations where fast, reliable outcomes are necessary to achieve business goals. Automation is great for functions that don’t require human reasoning.
I like to call these "if this, then that" scenarios. For example, if a customer fills out a lead form on your website, you can have automation set to send a pre-written confirmation email automatically. Automation doesn’t require complex, human-like reasoning to execute a task. It saves time, maintains compliance, ensures data quality, and boosts employee productivity and satisfaction. It’s an excellent solution for repetitive tasks with clear, predefined outcomes.
Automation has a couple of downsides if you need help accomplishing more complicated tasks. Automation tools are limited — they can only achieve the tasks they are programmed to perform. They are not adaptable and can’t handle complex tasks. For example, automation can send a new lead a confirmation email, but it cannot interact with them independently. However, it can be argued that automation is still beneficial because it frees up valuable time that your team can use toward more complicated tasks.
Good ROI is critical — the right technology can helpBetter productivity means better profit, no matter which way you slice it. Technology today can help you achieve both — but with so many options, it’s hard to know which tools are worthwhile. Before investing, you must carefully consider what use cases are better for AI versus automation and how these technologies will impact your organization and customers.
For many businesses, the need for technology is simply about increasing efficiency and saving time. Automation is an excellent solution for specific manual tasks that are a necessity to daily operations — such as document generation, contract management, or eSign software. If your team’s main bottleneck is administrative overhead, automation can provide immediate ROI, without the need for an AI solution.
We've compiled a list of the best document management software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
SanDisk, now operating independently as an SSD and NAND flash manufacturer following its split from Western Digital last year, has teased a new SSD controller called “Stargate,” designed to support extremely high-capacity enterprise drives.
Stargate, which confusingly shares its name with OpenAI’s Stargate project but obviously has nothing whatsoever to do with it, is part of SanDisk’s “Ultra QLC” platform, which aims to scale SSD capacities in the coming years.
During its earnings call, SanDisk CEO David Goeckeler said: “We have a new architecture coming out in the next couple of quarters that we call Stargate, new ASIC, clean sheet design, and then with BiCS 8 QLC… we just think that’s going to be a dynamite project.”
1PB SSD incomingGoeckeler didn’t share further technical details, but Stargate is expected to debut in enterprise drives such as the DC SN670 series.
That line is scheduled for release in the third quarter of 2025 with 64TB and 128TB capacities, BiCS8 QLC (2Tbit/256GB per die), and PCIe 5.0 support.
Future versions may include PCIe 6.0 as capacity targets rise. SanDisk’s roadmap shows 256TB for 2026, followed by 512TB in 2027, with a 1PB target further out. Stargate is likely to play a central role in enabling those jumps.
The third quarter of SanDisk’s 2025 fiscal year was also its first as a standalone company. It reported $1.695 billion in revenue, a 10 percent decline from the prior quarter, and a $1.881 billion net loss, largely due to a $1.83 billion goodwill impairment.
SanDisk’s strongest segment was client SSDs, bringing in $927 million, followed by $571 million from consumer products and $197 million from the cloud division.
Source: ComputerBase.de
(Image credit: Sandisk) You might also likeResearchers from Empa, the Swiss Federal Laboratories for Materials Science and Technology, are exploring the potential of fungal mycelium to create a compact, biodegradable battery.
Their goal is to use mycelium to produce “fungal paper” for battery electrodes - a concept that, according to researcher Ashutosh Sinha, remains in the experimental phase.
“We want to produce a compact, biodegradable battery whose electrodes consist of a living 'fungal paper,’” Sinha states, emphasizing that this vision is still a dream for now.
The dream of biodegradable batteriesThe idea of a biodegradable battery made from living materials is ambitious. The team is working with the mycelium of the split-gill mushroom, a fungus known for its unique mechanical and biological properties.
This fungus is naturally biodegradable and, when combined with its extracellular matrix, produces a material with promising potential for sustainable applications in technology.
The aim is to develop a system that decomposes without releasing harmful waste - unlike conventional electronic devices - by using the natural properties of the material.
Empa researchers are now examining how the tensile strength of mycelium and its sensitivity to moisture can be applied in components like biodegradable sensors and batteries.
Working with living materials brings notable challenges. Mycelium’s biodegradable nature is both an advantage and a limitation.
On one hand, it could significantly reduce the environmental impact of batteries. On the other, its tendency to degrade raises concerns about its longevity and reliability in electronic devices.
Living materials also respond to their environments, making it difficult to predict or control their behavior consistently.
“Biodegradable materials always react to their environment. We want to find applications where this interaction is not a hindrance but maybe even an advantage,” said Empa’s Gustav Nyström.
The idea of a compact, biodegradable battery with fungal paper electrodes remains conceptual, and one of the biggest challenges will be refining the material to meet performance standards required in modern electronics.
Nevertheless, it represents a promising step toward more sustainable and environmentally conscious electronics.
You might also likeA woman in Greece is divorcing her husband after ChatGPT played fortune teller and claimed her husband was cheating on her. According to a Greek City Times report, the couple asked the AI chatbot to look at a photo of the grounds left behind in her husband's cup of Greek coffee and practice tasseography, the ancient art of divining present secrets or future fates based on patterns left behind in tea leaves or coffee.
After looking at the residue at the bottom of their cups, ChatGPT had some shockingly specific things to say. According to the report, the AI claimed to see that the husband was secretly fantasizing about a woman whose name started with an “E” and was fated to begin an affair with her. In case that wasn't enough, ChatGPT's response to the woman’s own cup was to claim that the affair had already started.
Some people take fortune-telling seriously, but usually only from humans practicing divination. But what the husband saw as a quirky, funny moment, his wife saw as a serious and accurate description of reality. She told her husband to leave, announced to her children that she was ending her marriage, and served him with legal papers three days later.
Oracular AIAs a legal matter, it's hard to say how a judge will view this. There's no real precedent for citing a “robot oracle” as evidence of infidelity in a court of law anywhere (though there is one about declaring a house is haunted before you sell it in New York State). But what’s fascinating isn’t the legalities so much as what it says about culture.
Tasseography isn’t some novelty party trick; it's thousands of years old and practiced across coffee and tea-drinking cultures from Turkey to China and beyond. The idea that symbols and swirls in a cup could reveal your fate is a perfect example of how people see stories in randomness, whether a constellation or coffee residue.
That some people want to outsource mystic rituals to AI feels almost predetermined. This reported Greek marital strife is arguably a good reason not to do so, or at least not to call it wisdom. And it's not like ChatGPT actually knows how to read coffee grounds. It wasn’t trained on tasseography. What it can do is make educated guesses based on the patterns it sees in an image and what people have said about similar shapes or symbols on the internet. In other words, making stuff up in a convincing tone, just like a human would.
It turns out that a convincing tone is all it takes for some people. And it's not like this is the first instance. Tarot card reading with ChatGPT was an early demonstration of how flexible the AI could be in its activities. The same goes for making astrology charts and palm reading. But if you stop treating it like entertainment and like a real psychic answer, it can cause real emotional damage.
Then again, if your spouse is willing to believe an AI chatbot claiming psychic powers over your own contradictions, the issue might not be about the technology. So go ahead and ask ChatGPT to read your coffee grounds if you want a laugh. But maybe don't act like you're in a mashup of Black Mirror meets My Big Fat Greek Wedding and run out the door. Sometimes, your coffee is just coffee. And the swirl at the bottom of the cup is not the ghost of a digital Cassandra.
You might also likeThe Nintendo Switch 2 launch games are looking like a very good lineup indeed. With the console now just hours away from release, it's a good idea to start planning what you'll be playing once you've unboxed your shiny new toy.
Whether you've managed to snag a Nintendo Switch 2 pre-order or not, you'll want to know which games will be playable on Nintendo Switch 2 come launch day. There's a handful of Switch 2 exclusives, new releases like Undertale follow-up Deltarune, and even new versions of the best Nintendo Switch games like Tears of the Kingdom. All in all, Nintendo Switch 2's launch should have plenty to keep you ticking over until new Switch 2 games arrive later this year.
Here's all of the confirmed Nintendo Switch 2 launch games, as well as some info on each. Thanks to preview events that've run in the lead up to the new console's launch, we've actually played a lot of these games already. You'll find TechRadar Gaming's expert opinions on what we played for some of the games listed below. Stay tuned for future updates to this page if additional launch games are revealed over the next 24 hours.
Nintendo Switch 2 launch games(Image credit: Nintendo)Here's the full list of confirmed Nintendo Switch launch games. These all launch alongside the console on June 5, 2025.
It's likely that we'll hear more from Nintendo regarding upcoming Switch 2 games in the lead up to launch. We'll keep up to date, and add to the list above as the news comes in.
(Image credit: CD Projekt Red)Cyberpunk 2077: Ultimate EditionWake up, Samurai
Peerless quest designRemarkable ray-traced realismSuperb immersive sim gameplaySome half-baked mechanicsLots of unfortunate glitchesThe narrative feels compromisedCyberpunk 2077: Ultimate Edition makes its way to Nintendo Switch 2 on launch day. It's a massively updated version of the last-gen builds of the game, and it'll feature the excellent Phantom Liberty DLC as well.
(Image credit: Epic Games)FortniteThe best value in gaming
Vibrant worldFun combatUnique building mechanicExcellent monetizationStill only one mapConstantly shifting world can make it hard to keep upFortnite will be playable on Nintendo Switch 2, meaning you'll be able to earn a Victory Royale wherever you are. The game is currently in its sixth Chapter, and what we've heard about the next Season of Fortnite sounds very exciting indeed.
(Image credit: Nintendo)Mario Kart WorldSeemless kart racing
Perhaps the most anticipated Switch 2 launch game is Mario Kart World. For good reason, too, as we certainly came away impressed after spending some time with the game. In TechRadar's Mario Kart World preview, Hardware Editor Rhys Wood praised the game's seamless open world and the new Knockout Tour mode.
(Image credit: Nintendo)Tears of the Kingdom (Nintendo Switch 2 Edition)Through the dragon's eye
Powerful new abilitiesMassive, rich open worldStuffed with puzzlesComplex battles cause low frameratesA Nintendo Switch 2 version of Tears of the Kingdom arrives on June 5, promising upgraded visuals and performance. In TechRadar's Nintendo Switch 2 preview, hardware editor Rhys Wood had this to say about the new versions:
"Playing it (Breath of the Wild) and Tears of the Kingdom at a rock-solid 4K 60fps on console feels like it’s not real. But it is on Switch 2. Both games also have drastically sharper image quality, meaning they’re absolutely the definitive version of each release."
(Image credit: Capcom)Street Fighter 6A new contender
Broad, accessible control schemesWorld Tour mode rulesSeamless online functionalityExcellent, diverse base rosterDifficulty spikes in World TourMicrotransaction supportWe absolutely adored Street Fighter 6 on PS5, and it looks like we're in for a similar experience on Switch 2. TechRadar even previewed it during our Switch 2 hands-on finding that "It maintained a solid 60fps throughout gameplay and felt as responsive (and loaded just as quickly) as versions on those other systems."
(Image credit: Toby Fox)DeltaruneA new tale
Deltarune will release its next two chapters alongside a full release on Nintendo Switch 2. This one is from the creator of Undertale and features a story that runs in parallel to 2015's beloved cult RPG.
(Image credit: Hazelight Studios)Split FictionEnter the mirror
Seemingly endless array of varying game mechanicsStunning art direction, level, and world designAn epic crescendo that seamlessly mixes cinematics and gameplayPuzzles could be more challengingChanging perspectives can be jarringSplit Fiction is one of our favorite games of 2025 so far, building on team Hazellight's previous titles to deliver a truly explosive co-op experience. In TechRadar Gaming's Split Fiction review, we said that "It packs an array of captivating mini-games into a linear, yet highly rewarding platformer, laced with Hazelight’s trademark storytelling to keep you on your moral toes."
(Image credit: Nintendo)Nintendo Switch 2 Welcome TourTake a guided tour
Nintendo Switch 2 Welcome Tour is essentially an interactive demo for the new console. It's a good choice for the first game to play once your Nintendo Switch 2 has arrived, though be aware that Nintendo is charging for Nintendo Switch 2 Welcome Tour. A strange decision indeed.
(Image credit: 2K)Civilization 7Making history
Visually impressiveMatches have a more consistent paceSwapping Civs is smartly implementedFantastic roster of leaders to choose from at launchLegacy Path system ultimately leads to samey gamesDiplomacy feels half-bakedCivilization 7 makes some bold changes to the tried and tested formula, changes that we praised in our Civilization 7 review. It'll make use of the Switch 2's Joy-Con mouse mode as well, which will surely make playing even easier for fans of 4X strategy games.
(Image credit: IO Interactive)Hitman World of Assassination - Signature EditionStone-cold killer
Great living and breathing locationsLooks fantastic on next-genTweaks to the expected formulaCutscenes don’t look the bestCould be more replayableNew camera tool doesn’t add muchHitman World of Assassination bundles the three main Hitman games, their DLCs, as well as a whole heap of extra content. The Nintendo Switch 2 is getting a Signature Edition, which features some Mario-themed cosmetics for those who pre-order the game.
Personally, I'm extremely excited to take Hitman on the go in portable mode. Being able to chip away at Freelancer Mode while commuting sounds like a dream, as does trying out time trial challenges for levels like Sapienza and the Berlin techno club-set "Apex Predator" mission.
You Might Also Like...Nintendo has revealed a new way for players to customize the Switch 2's GL/GR buttons.
In a new post shared on the Nintendo Today app, the company offered an instructional overview video showing how the Switch 2's GL/GR buttons work and can be easily remapped for any game (via GameSpot).
Using Mario Kart World, Nintendo demonstrated that after launching the game to the start menu, players can bring up the Quick Settings menu, scroll down, and map the GL and GR buttons to whatever button they want, like A or B.
After assigning buttons, players can exit the menu and return to the game, making the process fast and simple.
[Switch 2]Use the Quick Settings menu to map the GL and GR buttons to whatever you want.These buttons are available on the Joy-Con 2 Charging Grip and the Pro Controller 2.(Also, day 1 patch confirmed for Mario Kart World. The title screen says it is on version 1.1.0.)[image or embed]@oatmealdome.bsky.social
In case you missed it, the GL and GR buttons are available only on the Joy-Con 2 Charging Grip and the Pro Controller 2, both of which are sold separately from the Switch 2.
The handheld's magnetically attached Joy-Con 2 controllers don't offer the feature.
The Nintendo Switch 2 launches globally on June 5, 2025, for $449.99 / £395.99. UK pre-orders and US pre-orders are now live.
The Pro Controller 2 will cost $79.99 / £74.99, and the Joy-Con Charging Grip will be priced at $40 / £30.
You might also like...Garmin has announced the release of two new watches, the Garmin Forerunner 570 and Garmin Forerunner 970, along with a new Garmin HRM 600 heart rate monitor. The two watches boast Garmin's 'brightest AMOLED screen yet' and other features new to the Forerunner series such as a speaker and microphone, allowing you to take calls during a run without touching your phone, along with an Evening Report to add to Garmin's existing Morning Report functionality.
Read on to see our initial impressions, and whether they'll be worthy of a place in our best Garmin watches list.
Garmin Forerunner 570 (Image credit: Garmin)The Gamrin Forerunner 570 is priced at $549.99 / £459.99 / AU$999 for the 42mm, and $549.99 / £459.99 / AU$999 for the larger 47mm watch as well. With 11 days of battery life in smartwatch mode (the shortest of any watch in the last several generations of Forerunners) it sports a selection of jazzy new colorways including Slate Grey Aluminum, Raspberry Aluminum and Cloud Blue Aluminum, all with new translucent silicone bands.
Apart from the brightest screen yet, Evening Report and speaker/microphone combo, the watch seems to share a great deal of DNA with the rest of the Forerunner line. This includes access to Garmin Coach training programs, health metrics such as a skin temperature and Pulse Oximeter sensor, and Garmin's usual five-button design.
Unlike many of the other best Garmin watches, there is no solar-powered option with a duller, memory-in-pixel display to conserve battery life. You're stuck with a maximum of 11 days, which is likely to realistically top out at just over a week with repeated GPS workouts.
Garmin Forerunner 970 (Image credit: Garmin)The Garmin Forerunner 970 comes in a single size, 47mm, priced at $749.99 / £629.99 / AU$1,399, with a 1.4-inch AMOLED screen that retains that 'brightest ever' distinction. It lasts up to 15 days in smartwatch mode: an improvement over the 570, but it seems that screen technology does suck more battery life than other Forerunners before it.
The 970 packs in all the features of the 570, with additions, including the LED light seen on the Garmin Epix Pro and Garmin Instinct 3 watches. New metrics include Eunning Economy, Step Speed Loss (both of which require the new Garmin HRM 600 to work) and Running Tolerance, which tells you about your body's limits and recommends a weekly mileage. It sounds like a useful feature worthy of one of the best running watches.
It also sports ECG functionality, more premium materials such as Sapphire Glass on the lens, and comes in different colorways, including Soft Gold Titanium and Carbon Grey DLC Titanium. Clearly Garmin wanted to evoke a little more luxury here.
Garmin HRM 600 (Image credit: Garmin)The HRM 600 is Garmin's latest and best heart rate monitor, priced at $169.99 / £149.99 / AU$299. It's compatible with the two new Forerunners above to enable their expanded running dynamics measurement, as well as other smartwatches, Garmin cycling computers, or can be worn on its own.
It's capable of sending pace and distance data (indoor workouts only), steps, time and calories burned to Garmin Connect, allowing you to sync your workouts with your smartwatch. This can be done for greater accuracy, or during workouts where it's not appropriate to wear a smartwatch, such as boxing or climbing.
Scattered Spider, a known ransomware collective, is widening its target scope, no longer focusing exclusively on UK firms. This is according to Google’s Threat Intelligence Group (TIG), who told BleepingComputer that US retailers “should take note.”
"The US retail sector is currently being targeted in ransomware and extortion operations that we suspect are linked to UNC3944, also known as Scattered Spider," John Hultquist, Chief Analyst at Google Threat Intelligence Group, told the publication. Hultquist added that Scattered Spider has returned after a “long hiatus” to target multiple firms.
The group is not as tightly-knit as organizations such as LockBit or Cl0p. It is relatively loose, and operates within a larger hacking community known as “the Com”. Its members engage in all kinds of attacks, from social engineering and SIM swapping, to ransomware. Scattered Spider’s usual targets are financial institutions, technology firms, and entertainment/gambling organizations.
TechRadar Pro readers can get 60% off Premium Plans at RoboForm now!
New users can take advantage of RoboForm’s exclusive deal and get 60% off the Premium Plan. With this deal, you can get unlimited password storage, one-click login & autofill, password sharing, two-factor authentication for added protection, cloud backup, and emergency access for trusted contacts. To claim this deal, visit this link and sign up for the Premium Plan to lock in this huge discount.
Preferred partner (What does this mean?)View Deal
Names and addressesGoogle is warning retailers to take note, however, Silent Push reported that in 2025 some of Scattered Spider’s victims included Chick-fil-A, Forbes, Instacart, New York Digital Investment Group, News Corporation, Nike, Twitter/X, Tinder, T-Mobile, and Vodafone.
Among the retailers targeted this year, BleepingComputer singled out Marks & Spencer, Co-op, and Harrods. In all of these attacks, the threat actors used DragonForce - a ransomware operation that emerged in December 2023 and gained some notoriety since then.
In April 2025, the UK National Cyber Security Centre (NCSC) published new guidance, helping UK firms defend against Scattered Spider better. The organizations urged the retail sector to “wake up” and tighten up on security.
"Whilst we have insights, we are not yet in a position to say if these attacks are linked, if this is a concerted campaign by a single actor, or whether there is no link between them at all," the NCSC said. "We are working with the victims and law enforcement colleagues to ascertain that."
You might also likeThe Allianz Risk Barometer, an annual report detailing the risks businesses are most concerned about for the year ahead, has seen companies rank political risks and violence as a top 10 global risk for the past three years. Businesses’ concerns have been exacerbated by 2024’s record-breaking number of elections, the developing conflict in the Middle East, and ongoing war in Ukraine.
The negative impact of political violence on companies can manifest in many ways, from endangering employee and customer safety to operational disruptions caused by material damage to premises or assets. As technology advances, uncertainty grows, and political tensions remain high around the world, businesses must consider their vulnerabilities, particularly in the cyber realm.
According to Allianz Commercial’s new Political Violence and Civil Unrest Trends 2025 report, cyber breaches represent one important way that political violence activity can impact businesses. This year’s report identified a key trend: that “new tech versus old tech” has increased the threat of rogue state-triggered damage and disruption, alongside increased reliance on technology around the world and ongoing instability in the geopolitical landscape. Addressing areas of vulnerability will be essential as companies grow operations in an increasingly volatile cyber environment.
New tech, new threatsAdvances in technology and global connectivity have increased production and dissemination of misinformation and disinformation. To sow discord, Advanced Persistent Threat (APT) actors, which are usually sponsored by rogue nations or organizations, leverage cyber-attacks to disseminate false information, using techniques such as manipulated online news platforms and compromised social media accounts to instigate real-world events such as aggravating political polarization, promoting social unrest and riots and undermining democratic elections.
APT groups often engage in sophisticated cyber espionage, such as in the case of the Southport attacks and subsequent far-right riots during 2024 in the UK, which spread disinformation and caused social disruption.
Increased digital reliance and geopolitical instability are also heightening the risk of cyber-attacks that inflict physical harm at the same time.
Exposures in critical infrastructureCritical infrastructure, including energy, transportation, and manufacturing, faces growing vulnerability to disruptions, equipment damage, and threats to human safety via cyber means.
To manage physical processes at these large installations, complex Industrial Control Systems (ICS) or operational technology (OT) systems are used for control and monitor purpose. Typically, these systems are legacy in nature and have obsolescence issues. That means they are vulnerable to attacks that can disrupt physical processes which can lead to potentially hazardous scenarios. For example, in refinery operations manipulation of ICS and safety systems can lead to catastrophic fire, explosions and can cause major environmental damage due to hydrocarbon releases.
Utility companies, too, depend extensively on OT systems. The prevalence of outdated, internet-unsecured devices within such networks poses a major security challenge due to infrequent updates. The utility sector’s cyber security weaknesses render it highly vulnerable. Exploiting internet-accessible OT and ICS devices, including those in the wastewater and water sectors could affect millions of people, with potentially severe consequences for public health and safety.
The vulnerability of transportation systems to cyber threats also raises critical concerns regarding the potential for cyber-physical attacks to cause tangible damage. While modern aircraft possess strong security protocols, vulnerabilities within airport infrastructure, including baggage handling and air traffic control, present a tangible risk of physical damage stemming from cyberattacks. Cyber-attacks targeting other transportation infrastructure also pose a significant risk of physical damage, with disruptions to signaling systems capable of triggering collisions or derailments. In August 2023, a cyber-attack on Poland’s railway system, where hackers manipulated unsecured radio signals to activate emergency train stops, demonstrates the susceptibility of outdated infrastructure to digital threats.
Addressing cyber vulnerabilitiesAssessing the robustness of cybersecurity for key infrastructure demands a multi-faceted approach. Companies should engage with their insurance providers through cyber risk dialogue to discuss potential threats to the industry, as well as the insured’s weaknesses in people, technology and processes. Beyond traditional IT defenses, evaluations also include scrutinizing vulnerabilities, including legacy systems which are often ill-equipped for modern cyber threats, as well as an end-to-end assessment of the insured’s value chain.
Key weaknesses often reside in unpatched, poorly secured legacy systems, and the convergence of IT and OT networks. Supply chain vulnerabilities, inadequate incident response plans, and a lack of robust security awareness training further exacerbate these risks. Human error, particularly in access management and patching protocols, remains a significant entry point for malicious actors.
The convergence of Artificial Intelligence, social media, phishing, and Business Email Compromise attacks creates a potent and evolving threat landscape. These technologies are being weaponized to create more convincing and effective cyber-attacks.
How an organization will recover and maintain critical functions during and after a disruption is key. A robust business continuity plan encompasses a business impact analysis to pinpoint critical functions, defined recovery strategies and procedures, clear communication protocols, reliable data backup and recovery systems, flexible alternative work arrangements, and regularly conducted testing and exercises. Comprehensive audits encompass physical security, incident response protocols, and supply chain resilience. Regular penetration testing and threat intelligence integration are also crucial for identifying and mitigating emerging risks, ensuring the continuous protection of essential services.
We've featured the best antivirus software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Steve Jobs was a design and materials guy. He grew up around homes built by legendary architect Joseph Eichler. Even if you don't know the name, you're likely familiar with their signature feature: floor-to-ceiling glass exterior walls. Eichler's influence on Jobs can be seen to this day in dozens of iconic Apple Stores around the world and at Apple Park, where the Steve Jobs Theater is, above ground, wrapped in 22-foot-tall glass panes.
Job's love of glass is the reason your iPhone 16 screen is covered in Corning's Gorilla Glass. As recounted in Walter Isaacson's biography of the late Apple CEO and founder, Steve Jobs hopped on the phone with Corning execs and convinced them to start making Gorilla Glass again, specifically for the first iPhone.
The rest, as they say, is history. How, though, might Apple celebrate this history when the iPhone turns 20 in 2027? According to multiple rumors, the iOS-running device is due for a major makeover, one that might include a significant increase in the use of glass.
GlasserversaryAccording to GSM Arena, for this anniversary handset Apple might do away with the bezel, the thin black bar that currently runs around your Super Retina XDR display, completely. With the glass running not only to the edges of the phone but seemingly spilling over them to the sides, the effect would be as if the handset were made entirely of glass.
This rumored design decision might have pleased Jobs. His love of glass never diminished, and most of his designs were built around the concept of mass-produced beauty. Jobs, according to his biography, once took his team to a Tiffany Glass exhibit at the Metropolitan Museum in New York to show them how to build repeatable beauty at scale.
What made Apple special almost 20 years ago is no longer unique among smartphone manufacturers.
Like Jobs, I appreciate beautiful design and exquisite materials. Job's decision to build the first iPhone chassis out of glass and aluminum is why I had such a strong emotional reaction when I first held the phone in 2007.
What made Apple special almost 20 years ago is no longer unique among smartphone manufacturers. They all use Gorilla Glass and some form of steel, aluminum, or even titanium. The battle for smartphone supremacy is now less about aesthetics and more about features, performance, and photography.
That alone might justify Apple completely overhauling the design for the iPhone 19. But making it virtually all glass is not the right way to go.
Never scratchproofFor as good as Gorilla Glass is (most phones now use the Victus 2 formula, and some add a Ceramic covering for more strength), it's still not as strong as metal, or even as resilient as plastic.
Every phone I've tested and owned has scratches, sometimes significant ones, on the screen. I haven't dropped these phones from a great height or dragged them across concrete, and yet they still have these blemishes.
Most people carry their iPhones in thick shock-proof cases to protect the comparatively fragile front and back glass. Like most smartphones, iPhones remain especially vulnerable at the corners; drop your iPhone just right on the pavement and it could shatter.
Broken glassNow imagine what it would be like owning a phone that's all but dipped in glass. Glass along the edges, even if they're curved, will be far too exposed. No one would ever dare carry such a phone unprotected, would they?
So why would Apple do this? As I said, they want to celebrate 20 years of the iPhone, and what better way to do it than with a design that's too precious to hold or use. I could see a 'Special Edition iPhone 19', one that's covered in glass and which costs twice as much as the most expensive flagship. Few will buy it, but some will end up in museums and behind more glass inside glass-encased Apple Stores.
Those will be the perfect home for those iPhones, if Apple does insist on building them.
You might also likeStaying ahead of potential cyber threats is a constant challenge with ransomware, phishing and AI just a few risks organizations must guard against. But what about quantum computing?
While not an immediate threat, quantum computing is one of the most complex and far-reaching challenges on the horizon. Thanks to its ability to perform complex calculations exponentially faster than classical computers, quantum will revolutionize numerous scientific fields – including chemistry, physics, and materials science. It also poses a significant cybersecurity risk due to its ability to break modern encryption methods and expose sensitive data – with ‘collect now, decrypt later’ attacks underscoring the urgency of preparing for a future where current cryptographic standards may be rendered obsolete.
So how can we protect against the cybersecurity threat this technology poses, both now and in the future?
The cybersecurity risks posedCurrent encryption protocols, such as ECC (Elliptic Curve Cryptography) and RSA (Rivest-Shamir-Adleman), either rely on the difficulty of factoring large numbers or solving discrete logarithm problems for security. However, quantum computers using advanced methods like Shor’s algorithm – which can factor large numbers faster than any other algorithm – could efficiently solve these problems, leaving traditional encryption methods vulnerable to attack.
While a sufficiently powerful quantum computer capable of breaking modern encryption is unlikely to be available within the next decade, this window is narrowing with each quantum-led innovation. The issue is, threat actors are already collecting and storing sensitive data for future decryption, highlighting the need for proactive measures to safeguard information against post-quantum threats now.
To address this demand, the global cybersecurity community is actively developing quantum-safe encryption standards. This includes The National Institute of Standards and Technology (NIST), which has spearheaded the Post-Quantum Cryptography Standardisation project. This aims to evaluate and standardize quantum-resistant algorithms, helping to pave the way for the widespread adoption of quantum-safe encryption.
Organizations in the UK are also being urged to prepare for the cybersecurity risks posed by quantum computing, with a recent report by the Information Commissioner’s Office (ICO) identifying data privacy concerns posed by the technology. The government has also established a Quantum Regulatory Forum to promote safe and responsible development. While significant progress is being made in the development of safe and secure quantum computing, specifically mitigating the cybersecurity threats is crucial. But how can this be done?
Addressing these threatsAdopting quantum-safe encryption strategies is one mitigation technique. This refers to cryptographic protocols designed to resist quantum attacks. Unlike traditional encryption, which depends on computational complexity, quantum-safe encryption is rooted in mathematical problems believed to be insurmountable even for quantum computers.
Three major approaches are already being explored, with the first being Quantum Key Distribution (QKD) – a secure way of sharing encryption keys using the principles of quantum mechanics, ensuring only the intended recipient can access the key. In cryptography terms, these entangled quantum particles or ‘qubits’ are encoded with cryptographic keys and transmitted between a sender and a receiver. If an eavesdropper attempts to intercept these particles, their quantum states will be disturbed, alerting the sender and receiver to an intruder. This ensures any attempt at unauthorized interception is immediately detected.
Despite facing challenges related to scalability, transmission distance and integration with existing infrastructure, this encryption method is already being put into practice. One example is JPMorgan Chase (JPMC), which used QKD to secure multiple high-speed virtual private networks traversing a single 100 Gbps fiber connecting data centers.
Other quantum-safe solutions include Quantum-Safe Encryption, which ensures a secure key exchange resistant to quantum attacks, and Post-Quantum Cryptography (PQC). This implements cryptographic algorithms believed to be difficult for quantum computers to solve, such as lattice-based encryption.
While these approaches offer a means of securing data against quantum computing, we must remember that adopting quantum-safe solutions and protecting data poses several challenges. Interoperability, performance impact, and backward compatibility must be considered and leaders need to carefully assess existing infrastructure and devise a roadmap for migration to quantum-resistant encryption.
The future quantum landscapeAs cyber threats continue to evolve, ensuring the long-term security of sensitive information is paramount. This includes for quantum computing. While no single technology will solve this challenge alone, harnessing the power of quantum-resistant cryptographic algorithms and QKD technologies can help protect data while allowing organizations to stay resilient in the face of continued technological advancements.
We've featured the best malware removal.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Nucor, one of the biggest steel manufacturers in the United States, was forced to shut down parts of its operations to address an ongoing cyberattack. The company confirmed the news in a new 8-K form filed with the US Securities and Exchange Commission (SEC).
In the filing, Nucor said it recently observed an “unauthorized third party” accessing “certain information technology systems.” When it spotted the intrusion, it activated its incident response plan, brought in a third-party cybersecurity company to assist, and notified relevant law enforcement agencies.
However, it also took “potentially affected systems offline” to implement “other containment, remediation, or recovery measures”.
TechRadar Pro readers can get 60% off Premium Plans at RoboForm now!
New users can take advantage of RoboForm’s exclusive deal and get 60% off the Premium Plan. With this deal, you can get unlimited password storage, one-click login & autofill, password sharing, two-factor authentication for added protection, cloud backup, and emergency access for trusted contacts. To claim this deal, visit this link and sign up for the Premium Plan to lock in this huge discount.
Preferred partner (What does this mean?)View Deal
Was it ransomware?Nucor told the SEC that it “temporarily and proactively” stopped certain production operations at various locations “in an abundance of caution”. It is now restarting those operations, it added.
Usually, when a company shuts down its operations to contain a cyberattack, it usually ends up being a ransomware attack. While the company did not explicitly say so, the fact that it halted operations could suggest this is the case.
Furthermore, The Register tried reaching out to the company’s facilities around the US, but found many phone numbers “either shut down or unobtainable.” Sometimes, a ransomware attack also results in inaccessible phone lines.
The importance Nucor plays in supporting the US critical infrastructure would also make it a prime target for ransomware attackers. No threat actors have claimed responsibility just yet, and we don’t know if any sensitive data was taken in the breach.
Nucor is headquartered in Charlotte, North Carolina, and is widely considered as the largest US steel producer, and one of the top recyclers. It operates more than 300 facilities across the US, Canada, and Mexico, and manufactures a wide range of steel products. Last year, it reported annual net sales of $30.73 billion.
Via The Register
You might also likeA new Quordle puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Thursday's puzzle instead then click here: Quordle hints and answers for Thursday, May 15 (game #1207).
Quordle was one of the original Wordle alternatives and is still going strong now more than 1,100 games later. It offers a genuine challenge, though, so read on if you need some Quordle hints today – or scroll down further for the answers.
Enjoy playing word games? You can also check out my NYT Connections today and NYT Strands today pages for hints and answers for those puzzles, while Marc's Wordle today column covers the original viral word game.
SPOILER WARNING: Information about Quordle today is below, so don't read on if you don't want to know the answers.
Quordle today (game #1208) - hint #1 - Vowels How many different vowels are in Quordle today?• The number of different vowels in Quordle today is 4*.
* Note that by vowel we mean the five standard vowels (A, E, I, O, U), not Y (which is sometimes counted as a vowel too).
Quordle today (game #1208) - hint #2 - repeated letters Do any of today's Quordle answers contain repeated letters?• The number of Quordle answers containing a repeated letter today is 1.
Quordle today (game #1208) - hint #3 - uncommon letters Do the letters Q, Z, X or J appear in Quordle today?• No. None of Q, Z, X or J appear among today's Quordle answers.
Quordle today (game #1208 - hint #4 - starting letters (1) Do any of today's Quordle puzzles start with the same letter?• The number of today's Quordle answers starting with the same letter is 2.
If you just want to know the answers at this stage, simply scroll down. If you're not ready yet then here's one more clue to make things a lot easier:
Quordle today (game #1208) - hint #5 - starting letters (2) What letters do today's Quordle answers start with?• S
• S
• D
• B
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
Quordle today (game #1208) - the answers (Image credit: Merriam-Webster)The answers to today's Quordle, game #1208, are…
Ramen, which was one of my old start words, featured in yesterday’s Sequence game so I thought I’d re-introduce it into my starting trio.
I’m not sure whether this brought a change of fortune or if today’s round was easier than usual, but I breezed through.
Guessing SNUCK was a gamble, but that aside I had no other options for the other three words.
How did you do today? Let me know in the comments below.
Daily Sequence today (game #1208) - the answers (Image credit: Merriam-Webster)The answers to today's Quordle Daily Sequence, game #1208, are…
A new NYT Strands puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Thursday's puzzle instead then click here: NYT Strands hints and answers for Thursday, May 15 (game #438).
Strands is the NYT's latest word game after the likes of Wordle, Spelling Bee and Connections – and it's great fun. It can be difficult, though, so read on for my Strands hints.
Want more word-based fun? Then check out my NYT Connections today and Quordle today pages for hints and answers for those games, and Marc's Wordle today page for the original viral word game.
SPOILER WARNING: Information about NYT Strands today is below, so don't read on if you don't want to know the answers.
NYT Strands today (game #439) - hint #1 - today's theme What is the theme of today's NYT Strands?• Today's NYT Strands theme is… To a degree
NYT Strands today (game #439) - hint #2 - clue wordsPlay any of these words to unlock the in-game hints system.
• Spangram has 10 letters
NYT Strands today (game #439) - hint #4 - spangram position What are two sides of the board that today's spangram touches?First side: left, 8th row
Last side: right, 1st row
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
NYT Strands today (game #439) - the answers (Image credit: New York Times)The answers to today's Strands, game #439, are…
There are many universal traditions associated with GRADUATION ceremonies, from paying far too much to hire a GOWN to posing for a PHOTO that will be given pride of place in your parents' house until the zombie apocalypse – and even then it’ll still be there, just with added cobwebs and a splatter of green blood.
There is also a whole legend surrounding the tassels on the mortarboard hat. Traditionally, tassels are worn on the right side and moved to the left during a special portion of the ceremony for high-school graduates. For college graduates, Bachelors again wear tassels on the right side until their degrees are conferred, then move to left.
Goodness knows what might happen to you if you move your tassel from the left to the right – maybe you get burdened with a lifetime of debt or something awful like that. Erm, hang on a sec…
How did you do today? Let me know in the comments below.
Yesterday's NYT Strands answers (Thursday, May 15, game #438)Strands is the NYT's not-so-new-any-more word game, following Wordle and Connections. It's now a fully fledged member of the NYT's games stable that has been running for a year and which can be played on the NYT Games site on desktop or mobile.
I've got a full guide to how to play NYT Strands, complete with tips for solving it, so check that out if you're struggling to beat it each day.
A new NYT Connections puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Thursday's puzzle instead then click here: NYT Connections hints and answers for Thursday, May 15 (game #704).
Good morning! Let's play Connections, the NYT's clever word game that challenges you to group answers in various categories. It can be tough, so read on if you need Connections hints.
What should you do once you've finished? Why, play some more word games of course. I've also got daily Strands hints and answers and Quordle hints and answers articles if you need help for those too, while Marc's Wordle today page covers the original viral word game.
SPOILER WARNING: Information about NYT Connections today is below, so don't read on if you don't want to know the answers.
NYT Connections today (game #705) - today's words (Image credit: New York Times)Today's NYT Connections words are…
What are some clues for today's NYT Connections groups?
Need more clues?
We're firmly in spoiler territory now, but read on if you want to know what the four theme answers are for today's NYT Connections puzzles…
NYT Connections today (game #705) - hint #2 - group answersWhat are the answers for today's NYT Connections groups?
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
NYT Connections today (game #705) - the answers (Image credit: New York Times)The answers to today's Connections, game #705, are…
Seeing HOLLYWOOD and VINE beside each other along with SUNSET convinced me we were looking for famous Los Angeles streets.
Unable to think of a fourth I added KUBRICK to the group, reasoning that the great director must have a road named after him somewhere – it turns out he does, but Stanley Kubrick Avenue is in Denham just outside of London, England rather than California.
After this ding I went for the more obvious KINDS OF PLANTS and DISCONTINUE – which discontinued my search for streets.
I failed to see the very obvious connection with MICHAEL JORDAN and BULLS – a classic Connections group of four very different things with something in common – but instead saw the less obvious ENDING WITH BUILDING MATERIALS after staring at the word HOURGLASS for far too long.
How did you do today? Let me know in the comments below.
Yesterday's NYT Connections answers (Thursday, May 15, game #704)NYT Connections is one of several increasingly popular word games made by the New York Times. It challenges you to find groups of four items that share something in common, and each group has a different difficulty level: green is easy, yellow a little harder, blue often quite tough and purple usually very difficult.
On the plus side, you don't technically need to solve the final one, as you'll be able to answer that one by a process of elimination. What's more, you can make up to four mistakes, which gives you a little bit of breathing room.
It's a little more involved than something like Wordle, however, and there are plenty of opportunities for the game to trip you up with tricks. For instance, watch out for homophones and other word games that could disguise the answers.
It's playable for free via the NYT Games site on desktop or mobile.
Aston Martin has become the first automaker in the world to offer deeper integration of Apple CarPlay in its vehicle’s infotainment system with the debut of the new Apple CarPlay Ultra.
Having been in development for a number of years, both Porsche and Aston Martin revealed in 2023 that they would be among the first to offer Apple’s latest infotainment offering, but the British sports car maker has beaten all other manufacturers to it.
Apple CarPlay Ultra builds on the existing CarPlay platform by taking over both the infotainment head unit and the vehicle’s digital instrument cluster for the first time.
The new CarPlay will initially be limited to the new Aston Martin DBX on models ordered in North America and Canada, but is coming to other Aston cars and regions over the next 12 months. Apple also says it's working with Hyundai, Kia, and Genesis to bring CarPlay Ultra to more models.
Want to know what all the fuss is about? Here are four things you need to know, plus a gallery of images to show what CarPlay Ultra looks like in Aston Martin's latest drive...
1. It offers a more personal experience Image 1 of 2(Image credit: Apple / Aston Martin)Image 2 of 2(Image credit: Apple / Aston Martin)Now, drivers can select between a number of Aston Martin-designed digital options for the speedometer and tachometer dials, while the ability to toggle between live maps from a preferred navigation provider, as well as media applications, gives owners a way to "curate their own multi-screen set-up," according to James Bond's favorite brand.
What’s more, the British marque has also provided a number of different instrument cluster themes, as well as the ability to tailor wallpapers, color schemes and the general look to their personal tastes.
The key to making the tie-up work was to ensure Aston Martin had full control over design, with Apple claiming CarPlay Ultra allows automakers to "express their distinct design philosophy with the look and feel their customers expect".
2. It offers everything in one place Image 1 of 2(Image credit: Apple / Aston Martin)Image 2 of 2(Image credit: Apple / Aston Martin)One of the biggest bugbears about the current CarPlay environment is that users often have to leave it in order to interact with key vehicle functionality, such as changing driving modes or adjusting the climate control, for example.
Apple CarPlay Ultra banishes this sort of behavior to the naughty step and finally allows drivers to tweak the radio station, adjust the climate control or fire up the heated seats from within the Ultra interface via touchscreen controls, physical buttons, or by using Siri voice commands.
Better still, the British marque talks about “Punch-through UI”, which essentially means its has been able to bring very vehicle-specific menus and settings into the CarPlay environment for the first time.
So, if you wan’t to adjust the balance and fader on the swanky Bowers & Wilkins, it is possible to do so through a specific menu screen that is housed within the CarPlay Ultra environment.
3. It has a highly customizable cluster with more info Image 1 of 1(Image credit: Apple / Aston Martin)Aston says customers can also select from a number of widgets that can reside on either the 10.25-inch infotainment screen or on the digital driver display for a highly customizable cluster. This could include things like tyre pressure monitoring, weather forecasts or advanced driver assistance system settings.
Although it is not explicitly mentioned by Aston Martin or Apple, it is understood that owners will need to initially pair an iPhone 12 or later (running iOS 18.54 and later) either by plugging it in or choosing the wireless option.
The system will the automatically recognize the handset and the driver every time they enter the vehicle, even going to far as to knowing the region they are from, adjusting the units of measurement accordingly.
Of course, it opens up easy access to things like email, WhatsApp messages and the ability to hop on Zoom calls, all without having to juggle between interfaces.
4. It's coming to other car brands Image 1 of 9(Image credit: Apple)Image 2 of 9(Image credit: Apple)Image 3 of 9(Image credit: Apple)Image 4 of 9(Image credit: Apple)Image 5 of 9(Image credit: Apple)Image 6 of 9(Image credit: Apple)Image 7 of 9(Image credit: Apple)Image 8 of 9(Image credit: Apple)Image 9 of 9(Image credit: Apple)Unfortunately, Android users won’t be able to enjoy a similar sort of Android Automotive experience in the car, seeing as this is a specific Apple tie-up.
Instead, Aston Martin provides physical buttons and switches for most of its functionality and explains that its next-generation infotainment system, which debuted on the all-new DB12 in 2023, is perfectly a perfectly decent digital offering as it is.
Also, CarPlay Ultra is currently limited to the new Aston Martin DBX, and only those models ordered in North America and Canada for now. Although it will be rolled out to other Aston models and markets in the coming 12 months.
What’s more, Apple said it is working with a number of automakers to bring CarPlay Ultra into a variety of new models soon, including those from Hyundai, Kia, and Genesis.
Aston Martin's 10.25-inch Pure Black touchscreen technology is relatively modest compared to many rivals, so it will be interesting to see what other manufacturers can do with larger and more impressive screen arrays.
Apple Arcade while waiting to charge up, anyone?
You might also likeWednesday season 2 is almost upon us after a three year gap. Indeed, fans of one of the best Netflix shows don't have to wait much longer after its release dates were confirmed. As part of the Netflix Upfront presentation, the streaming service has confirmed the new season will arrive later this year.
Netflix has revealed that Wednesday season 2 will be split into two parts, with the first arriving on August 6, and the second on September 3. And yes, aptly enough, both of those are Wednesdays!
We've all been waiting patiently for the return of Jenna Ortega's child of woe, and now it's only a couple of months away. If you missed the trailer, you can watch it below.
Who's in the cast of Wednesday season 2? Gwendoline Christie has left the Wednesday cast, and the new school principal is played by Steve Buscemi. (Image credit: Vlad Cioplea/Netflix)Perhaps the better question is, who isn't? Seriously though, it's a stacked line-up and as well as returning names like Ortega, Catherine Zeta-Jones, Isaac Ordonez, Fred Armisen and Luis Guzmán, we've got plenty of great new stars joining the macabre Tim Burton series.
Joanna Lumley joins the Addams Family this season, playing the role of Morticia's mother, Hester. Following the departure of Gwendoline Christie's principal, Nevermore has a new one in the form of Steve Buscemi, and I'm so excited to see how he steps into the role.
The faculty is huge this season with Billie Piper and Christopher Lloyd joining the ranks and, of course, we have returning students such as Emma Myers and Joy Sunday, so fans will be pleased to see the cast has increased in size, with plenty of favorites coming back.
You might also like