Error message

  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

TechRadar News

New forum topics

Subscribe to TechRadar News feed
Updated: 1 hour 6 min ago

Windows 11 migration shows surprising surge for some businesses - but for once, desktop is leading the way

Mon, 06/23/2025 - 11:02
  • Desktop shipments to enterprises are up 22%, accounting for 17% of enterprise PC sales, report claims
  • Consumers on the whole are less keen to upgrade, with just a 9% rise
  • The market could slow down or even contract again next year

With the official Windows 10 end of life set for just a few months away, businesses are ramping up their purchasing of new devices in anticipation of boosting support not just for Windows 11, but for future OSs as well.

The latest figures from industry analyst at Context (via The Register) illustrate a 22% year-over-year rise in desktop shipments to enterprise customers during April and May 2025, largely driven by refresh cycles and the looming end of support for Windows 10.

Interestingly, it found companies have been buying many more desktops than portable devices, which ties in with industry trends across the tech sector of widespread return-to-office mandates.

PC shipments rising as Windows 10 end of life nears

"Their share of total PC revenues in early Q2 reached nearly 17%, the highest level in Context's two-year reporting period," Context senior analyst Marie Christine Pygott explained.

"This reflects both a long-overdue refresh cycle in commercial environments and the typical spike in demand ahead of major OS support deadlines."

The trends broadly reflect similar changes seen by Canalys, another firm that tasks itself with monitoring device shipments, among other metrics.

During the first four months of 2025, overall PC shipments were up 9% on average, with desktops up 8% compared with 10% for notebooks. Those metrics account for all PC shipments, though – not just enterprise customers.

Principal Analyst Ishan Dutt explained Microsoft's decision to pull the plug from Windows 10 isn't the only influencing factor over increased sales – ongoing trade war-induced tariffs and widespread economic uncertainty has seen both customers and suppliers aim to acquire new tech before prices increase.

"This preemptive strategy allowed manufacturers and the channel to stock up ahead of potential cost increases, boosting sell-in shipments despite otherwise stable end-user demand," Dutt added.

Windows 10 had remained highly popular for months, with many customers happy with their existing hardware and others limited from upgrading due to software and licensing restrictions. Windows 11 (43%) adoption still hasn't overtaken the number of Windows 10 installs (53%), but the gap has closed considerably in the space of a year (via Statcounter).

However, looking ahead, IDC predicts contraction in the global PC market due to the stabilization brought on by widespread Windows 11 migration.

"Expectations of worsening macroeconomic conditions around the world and in the US characterized by upward pressures on prices and degrading consumer sentiment," IDC Worldwide PC Trackers Research VP Jean Philippe Bouchard added.

You might also like
Categories: Technology

A popular WordPress theme has been hijacked by malware - here's what we know

Mon, 06/23/2025 - 10:27
  • 'Motors' WordPress theme vulnerability leaves accounts open to takeover attacks
  • Widespread attacks were observed from June 7 onwards
  • A patch is available in version 5.6.68, so update now

A popular premium WordPress theme, has been exploited by hackers thanks to a critical privilege escalation flaw tracked as CVE-2025-4322.

Attackers are able to exploit the vulnerability in the 'Motors' theme to hijack administrator accounts, taking full control of sites to change details, inject false details and spread malicious payloads.

Developed by StylemixThemes and a popular pick among automotive websites, nearly 22,500 sales of the theme have been logged on EnvatoMarket.

'Motors' WordPress theme has been hijacked

The vulnerability had first been discovered on May 2, 2025, with a patch later released with version 5.6.68 on May 14, meaning that up-to-date accounts should be protected from potential account takeovers. Versions up to 5.6.67 are affected by the CVE, with Wordfence reporting on the details on May 19.

"This is due to the theme not properly validating a user's identity prior to updating their password," Wordfence explained.

"This makes it possible for unauthenticated attackers to change arbitrary user passwords, including those of administrators, and leverage that to gain access to their account."

Although the patch has already been released, accounts that are still running older versions are at risk of takeover, with attacks seen to have started on May 20. By June 7, researchers were observing wide-scale attacks – Wordfence has now blocked more than 23,000 attack attempts.

Wordfence also disclosed a number of key IP addresses seen to be attacking sites – many making thousands of attempts each.

"One obvious sign of infection is if a site’s administrator is unable to log in with the correct password as it may have been changed as a result of this vulnerability," the researchers explained.

The biggest change users of the 'Motors' theme can do is to update to version 5.6.68, closing the vulnerability to attackers and securing their accounts from takeovers.

Via BleepingComputer

You might also like
Categories: Technology

I swapped my soundbar and sub combo for an all-in-one alternative – here's why I'm never going back

Mon, 06/23/2025 - 10:00

As a resident Reviews Writer here at TechRadar, I’ve tested some truly phenomenal gadgets and gizmos, ranging from the best headphones on the planet through to the best Bluetooth speakers. But despite how many impressive products I see, there’s the occasional stand-out release, and the Samsung HW-Q800D soundbar was certainly one of them.

With roaring bass output, awesome Dolby Atmos effects and an abundance of smart features, I was delighted with the soundbar’s talents, awarding it four-and-a-half stars in my Samsung HW-Q800D review.

But recently, I decided it was time for a change and traded my multi-box Samsung set-up for an all-in-one alternative. Why? Well… I’ll reveal that in a moment. But the soundbar in question is the Marshall Heston 120, which packs room-swallowing bass, stellar spatial audio effects and jaw-dropping beauty into one standalone bar.

Still, was it really worth dropping my 360W setup with a rumbling sub for a 150W one-box rival? Yes, yes it was. So, let’s uncover why that’s the case…

The Marshall Heston 120 is a true work of art (Image credit: Future)The noisy neighbor… was me all along

I live in an apartment, and not one that's on the ground floor. And look, I love booming bass as much as anyone… more than most, in fact – but the raw might of the HW-Q800D sometimes felt like overkill for my neighbors.

When watching movies at night – especially those with imposing, bass-heavy scores – I would be hurrying to switch Night mode on through the Samsung Smart Things app. And even then, I sometimes would have to dial down the sub manually, to ensure I wasn’t rousing my lower-floor neighbors from deep slumber.

So, if like me, you live in an apartment complex, especially if you’re in a smaller-sized room and not on the ground floor – a big sub might not be the best move for you.

Since switching to the Marshall Heston 120, I’ve found that night-time viewing is a lot more seamless and worry-free. Yes, the Heston 120 produces incredibly impressive low-frequency audio for an all-in-one bar, but I’m not getting the same floor-shaking rumble that the Q800D dished out.

And if bass power is still a little much, I can still simply switch on Night Mode and adjust the level to ‘high’ in the revamped Marshall app. Easy as you like.

Even if you live in a detached property or don’t have to worry about neighbors for whatever reason, I’d still highly recommend the Marshall Heston 120, though. For most, it will already have enough power to make movie nights that bit more memorable.

But it also has an RCA port, enabling you to connect the soundbar up to any external wired sub. I tried hooking the Heston 120 up to a mega sub from Q Acoustics recently, and the results were mindblowing.

There’ll also be a compatible subwoofer arriving directly from Marshall in the future, dubbed the Heston Sub 200. So if you have the capacity for a multi-box setup, I’m sure this will make your viewing experiences incredibly immersive too.

Here's the Marshall Heston 120 hooked up to the mammoth Q Acoustics Q Sub120, a 600W, 50lbs (22.7kg), 12-inch (30.5cm) beast of a subwoofer! (Image credit: Future)If looks could kill…

OK, so I’m a lot less worried about noise complaints now, but there was something else that really drew me to the Marshall Heston 120. And that’s its incredibly charming retro design, which hooked me from the second I laid eyes on it.

I attended the unveiling of the Heston 120 at Marshall’s Stockholm HQ and I was told that the team was incredibly keen to make its first ever soundbar stand out among a homogenous market filled with hulking black bars. And this is exactly what they did.

The Heston 120 is, to be fair, a hulking black bar. But it's not just that – it has Marshall’s amp-making heritage in its DNA, rocking a wraparound speaker grille, three knurled metal control dials, and a golden Marshall logo positioned right in the center. Golden details and classy red LEDs top off a beautifully crafted product that’s eye-catching, yet classy.

I don’t mind the look of the Samsung HW-Q800D at all. It's got a solid, angular build that screams durability. But in all honesty, it's slightly chunky and lacks the finesse of the Heston 120. If you want your soundbar to be a statement piece as well as a source of sensational cinematic sound, Marshall’s one and only soundbar is a cut above.

I love the gold details on the Marshall Heston 120, they really radiate a sense of luxury (Image credit: Future)A musical maestro, right at the heart of my living room

I’ve spoken a lot about design elements that make the Heston 120 a better fit for my living space, but something I wanted to touch on is performance – specifically, musical performance.

When I tested the Samsung HW-Q800D, I was impressed, overall, with its handling of music. I was treated to excellent depth for dark bass hits, solid instrument separation, and rich mids to boot. But the Heston 120 took things to a new level.

Marshall's soundbar whipped up an incredibly expansive, wide impression when I listened to tunes via Tidal Connect. With Atmos music, guitars sounded as if they were coming from the corners of my room, vocals were pushed forward and percussion danced across the width of the bar.

But stereo music really wowed me, with the Heston 120 offering trouble-free channel separation, subtle detailing and plenty of breathing room for each instrument to express itself as intended.

If want to open yourself up to the best musical experience a soundbar can supply, the Heston 120 is a no-brainer pick. A sidenote to that is you’re even able to connect one of the best record players up to the soundbar via RCA (as long as it has a phono stage built-in) – pretty cool!

Real footage of me switching to Wi-Fi mode before experiencing the Heston 120's mesmerizing musical talents (Image credit: Future)A final note

So, there you have it, the Marshall Heston 120 is the soundbar for me. It suits my living space, it's a real work of art and it has the performance – especially music-wise – to keep me more than satisfied.

But I want to hammer one thing home – the Samsung HW-Q800D is still an excellent multi-box soundbar. I mean, it’s our overall pick for best Dolby Atmos soundbar for good reason!

It might not be optimal for my small apartment, but if you’ve got the right setup, I highly recommend it. Especially as it can be found on sale quite regularly now – as low as £549 in the UK. That’s a considerable chunk less than the Marshall Heston 120, which has a list price of $999 / £899 / AU$1,799.

So, will you be grabbing the Marshall Heston 120? What’s your setup like? I’d love to hear your thoughts and insights in the comments, so please let me know!

You might also like
Categories: Technology

Microsoft says “Responsible AI” is now its biggest priority - but what does this look like?

Mon, 06/23/2025 - 09:28
  • Microsoft has released its 2025 Repsonsible AI Transparency Report
  • It outlines its plans to build and maintain responsible AI models
  • New regulations are coming in regarding the use of AI, and Microsoft wants to be ready

With AI and Large Language Models (LLMs) increasingly used in many parts of modern life, the trustworthiness and security of these models has become an important consideration for businesses such as Microsoft.

The company has moved to outline its approach to the future of AI in its 2025 Responsible AI Transparency Report, laying out how it sees the future of the technology evolving in years to come.

Just as we have seen AI more broadly adopted by businesses, we have also seen a wave of regulations around the world that aim to establish the safe and responsible use of AI tools and the implementation of AI governance policies that help companies manage the risks associated with AI use.

A hands on approach

In the report, the second following an initial launch in May 2024, Microsoft lays out how it has made significant investments into responsible AI tools, policies, and practices.

These include expanded risk management and mitigation for, "modalities beyond text—like images, audio, and video—and additional support for agentic systems," as well as taking a "proactive, layered approach" to new regulations such as the EU’s AI Act, supplying customers with materials and resources to empower them to be ready and compliant with incoming requirements.

Consistent risk management, oversight, reviewing, and red-teaming of AI and generative AI releases come alongside continued research and development to ‘inform our understanding of sociotechnical issues related to the latest advancements in AI’, with the company's AI Frontiers Lab helping Microsoft, "push the frontier of what AI systems can do in terms of capability, efficiency, and safety."

As AI advances, Microsoft says plans to build more adaptable tools and practices and invest into systems of risk management in order to, "provide tools and practices for the most common risks across deployment scenarios".

That’s not all though, as Microsoft also plans to deepen its work regarding incoming regulations by supporting effective governance across the AI supply chain.

It says it is also working internally and externally to, "clarify roles and expectations", as well as continuing with research into, "AI risk measurement and evaluation and the tooling to operationalize it at scale", sharing advancements with its wider ecosystem to support safer norms and standards.

"Our report highlights new developments related to how we build and deploy AI systems responsibly, how we support our customers and the broader ecosystem, and how we learn and evolve," noted Teresa Hutson, CVP, Trusted Technology Group and Natasha Crampton, Chief Responsible AI Officer.

"We look forward to hearing your feedback on the progress we have made and opportunities to collaborate on all that is still left to do. Together, we can advance AI governance efficiently and effectively, fostering trust in AI systems at a pace that matches the opportunities ahead."

You might also like
Categories: Technology

Company owned smartphones or BYOD? What you need to know

Mon, 06/23/2025 - 09:09

Now more than ever, employers are turning to BYOD (Bring Your Own Device) policies in the workplace, largely due to employees showing interest in saying goodbye to their company-issued phones and leadership looking to increase security measures and cut costs. BYOD adoption rates are increasing year-over-year, with a recent survey finding 67 percent of companies had implemented BYOD policies, up from 51 percent the year prior.

Given the growing interest from organizations and employees looking to transition to the BYOD model, it is critical to understand why this switch is beneficial and the steps companies can take to set them up for success and ensure proper security and privacy measures are implemented.

Making the switch to BYOD: start with “why” & build A plan

Just like any other planning facet of a business, setting up a mobile communications strategy should be based on the company’s “why.” What are the primary reasons this workforce should (or shouldn’t) utilize a BYOD model? Is it productivity, security, better client interactions - or all of the above? Depending on, industry, category, and the size of the company, this “why” can take on many forms.

For instance, a company operating in a highly regulated industry, such as financial services or healthcare, will find it imperative to be able to capture calls and texts for compliance purposes. Another company may instead prioritize data privacy in its phone policy both for the company, itself, and its customers. Either way, having a strong mobile communications strategy, with a BYOD policy in place, is critical.

Companies on the other end of the BYOD spectrum, such as those that rely on a transient, 1099 workforce, will need a solution that allows them to assign business numbers to freelance or contract workers. For organizations looking to cut costs while increasing productivity, companies can look into options such as putting a second, dedicated business identity on employees’ phones to provide a distinct separation of work and personal communications.

No matter which of these examples might fit an organization's business model, it is important to determine the “why” upfront before making a decision on whether or not to utilize a BYOD model.

From there, before putting a BYOD policy into practice, companies should develop an implementation plan, starting with legal and human resources teams collaborating on a phone use policy. Among the many issues to be considered is whether employees will be compensated for the use of their personal phones, typically done in the form of a monthly stipend.

Encouraging employee adoption

While many employees have expressed interest in having a BYOD policy in place, some businesses are still facing difficulties getting their workforce to embrace employee adoption due to employee concerns surrounding data privacy, IT complexities, and execution roadblocks.

Implementing third-party software applications can address many of these concerns, but companies should be cautious of applications that enable secure communications on employee-owned devices. Rather, companies should try utilizing apps that make a distinct separation of work and personal communications. Employees are more likely to engage with a BYOD model if they know their personal data isn’t being monitored or recorded by their employer.

Other strategies for encouraging quick and compliant BYOD adoption:
  • Emphasize the benefits of BYOD to employees in rollout communications. Nobody likes to carry a second phone and that alone can often be the driving force for staff engagement.
  • If the BYOD policy leverages specific apps, make sure there is adequate training from the start. Additional follow-up training is also useful to assure continued use.
  • Implement from the top down. When employees see that leadership is compliant with the new policy, it will encourage other employees to follow suit.
Laying the groundwork for real results

Understanding the “why” for implementing a BYOD policy, selecting an option that works for an organization’s specific needs, and properly encouraging employee adoption, will ultimately result in tangible benefits for both the employer and its employees.

Here are just some of the benefits businesses can realize by switching to a BYOD model:

  1. Cost savings: Without the need to buy extra phones or manage another device plan, companies can greatly reduce their hardware and mobile service costs.
  2. Convenience: Employees no longer have to carry two devices instead of one. Rather, they can keep work and personal communications separate on the same phone.
  3. Security & compliance: Third party applications can offer enterprise-grade security features that support communication compliance (e.g., for financial or legal sectors) with automatic call and text recording, archiving, and monitoring.

In short, a BYOD model, combined with a third party application can give you the benefits of a second phone without the hassle or cost—especially appealing for professionals who need to stay compliant or businesses managing mobile fleets.

We've featured the best business tablet.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Quordle hints and answers for Tuesday, June 24 (game #1247)

Mon, 06/23/2025 - 09:00
Looking for a different day?

A new Quordle puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Monday's puzzle instead then click here: Quordle hints and answers for Monday, June 23 (game #1246).

Quordle was one of the original Wordle alternatives and is still going strong now more than 1,100 games later. It offers a genuine challenge, though, so read on if you need some Quordle hints today – or scroll down further for the answers.

Enjoy playing word games? You can also check out my NYT Connections today and NYT Strands today pages for hints and answers for those puzzles, while Marc's Wordle today column covers the original viral word game.

SPOILER WARNING: Information about Quordle today is below, so don't read on if you don't want to know the answers.

Quordle today (game #1247) - hint #1 - VowelsHow many different vowels are in Quordle today?

The number of different vowels in Quordle today is 3*.

* Note that by vowel we mean the five standard vowels (A, E, I, O, U), not Y (which is sometimes counted as a vowel too).

Quordle today (game #1247) - hint #2 - repeated lettersDo any of today's Quordle answers contain repeated letters?

The number of Quordle answers containing a repeated letter today is 1.

Quordle today (game #1247) - hint #3 - uncommon lettersDo the letters Q, Z, X or J appear in Quordle today?

• Yes. Two of Q, Z, X or J appear among today's Quordle answers.

Quordle today (game #1247) - hint #4 - starting letters (1)Do any of today's Quordle puzzles start with the same letter?

The number of today's Quordle answers starting with the same letter is 0.

If you just want to know the answers at this stage, simply scroll down. If you're not ready yet then here's one more clue to make things a lot easier:

Quordle today (game #1247) - hint #5 - starting letters (2)What letters do today's Quordle answers start with?

• Q

• S

• A

• F

Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.

Quordle today (game #1247) - the answers

(Image credit: Merriam-Webster)

The answers to today's Quordle, game #1247, are…

  • QUALM
  • SQUIB
  • AXIAL
  • FLACK

Today's Quordle was a slightly trickier one for me, with my opening three guesses giving me only three letters for each part of the board.

I started with the top left, where I had three greens to go on in the format -AUL-; BAULK seemed a good option.

That was wrong, but it gave me a B for the top right and K for the bottom right, and that was enough for me to find FLACK and then SQUIB.

The Q in SQUIB then led to QUALM in top left, leaving just the bottom left – which by this stage could only be AXIAL. A tough bunch of words today, for sure.

How did you do today? Let me know in the comments below.

Daily Sequence today (game #1247) - the answers

(Image credit: Merriam-Webster)

The answers to today's Quordle Daily Sequence, game #1247, are…

  • FRESH
  • CLOVE
  • USURP
  • REIGN
Quordle answers: The past 20
  • Quordle #1246, Monday, 23 June: PIXEL, FJORD, STEAL, EXIST
  • Quordle #1245, Sunday, 22 June: WREST, CRAZE, PAPAL, SCION
  • Quordle #1244, Saturday, 21 June: BUDDY, GROUT, BEGIN, MADAM
  • Quordle #1243, Friday, 20 June: BRAID, DULLY, HASTE, LURID
  • Quordle #1242, Thursday, 19 June: BRUSH, ISLET, FRUIT, PRIVY
  • Quordle #1241, Wednesday, 18 June: MEDIA, SHARK, GUPPY, MOURN
  • Quordle #1240, Tuesday, 17 June: LEAPT, PRISM, ADMIN, WHINE
  • Quordle #1239, Monday, 16 June: RETRY, SCALD, DINGO, FEIGN
  • Quordle #1238, Sunday, 15 June: SHOCK, STEIN, BROIL, COVEN
  • Quordle #1237, Saturday, 14 June: STICK, FERRY, THESE, IONIC
  • Quordle #1236, Friday, 13 June: REPEL, LARGE, SNIDE, CARRY
  • Quordle #1235, Thursday, 12 June: SCANT, BATCH, UNDER, PARSE
  • Quordle #1234, Wednesday, 11 June: CRAVE, ROOST, ANGLE, FLOOD
  • Quordle #1233, Tuesday, 10 June: DECRY, CHEEK, FILET, EASEL
  • Quordle #1232, Monday, 9 June: DERBY, LEMON, WRITE, HOVEL
  • Quordle #1231, Sunday, 8 June: REBAR, ALERT, PAYEE, FLUME
  • Quordle #1230, Saturday, 7 June: FLUNK, ESTER, SPITE, CHEAP
  • Quordle #1229, Friday, 6 June: ELUDE, KHAKI, VISTA, SMOKY
  • Quordle #1228, Thursday, 5 June: CHIDE, RABBI, GUSTY, LANCE
  • Quordle #1227, Wednesday, 4 June: BANAL, STOUT, SEDAN, HIPPO
Categories: Technology

NYT Connections hints and answers for Tuesday, June 24 (game #744)

Mon, 06/23/2025 - 09:00
Looking for a different day?

A new NYT Connections puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Monday's puzzle instead then click here: NYT Connections hints and answers for Monday, June 23 (game #743).

Good morning! Let's play Connections, the NYT's clever word game that challenges you to group answers in various categories. It can be tough, so read on if you need Connections hints.

What should you do once you've finished? Why, play some more word games of course. I've also got daily Strands hints and answers and Quordle hints and answers articles if you need help for those too, while Marc's Wordle today page covers the original viral word game.

SPOILER WARNING: Information about NYT Connections today is below, so don't read on if you don't want to know the answers.

NYT Connections today (game #744) - today's words

(Image credit: New York Times)

Today's NYT Connections words are…

  • SOLID
  • POD
  • CAST
  • STUDIO
  • PLANE
  • STERN
  • HULL
  • FIRM
  • TITLE
  • LINE
  • TOUGH
  • SHELL
  • HUSK
  • DIRECTOR
  • POINT
  • RIGID
NYT Connections today (game #744) - hint #1 - group hints

What are some clues for today's NYT Connections groups?

  • YELLOW: Severe, behaviourally
  • GREEN: Outer layer
  • BLUE: Screen listings
  • PURPLE: Geometric stages of being

Need more clues?

We're firmly in spoiler territory now, but read on if you want to know what the four theme answers are for today's NYT Connections puzzles…

NYT Connections today (game #744) - hint #2 - group answers

What are the answers for today's NYT Connections groups?

  • YELLOW: STRICT
  • GREEN: BOTANICAL COVERINGS
  • BLUE: SEEN IN OPENING CREDITS
  • PURPLE: OBJECTS IN 0-, 1-, 2- AND 3-DIMENSIONAL SPACE

Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.

NYT Connections today (game #744) - the answers

(Image credit: New York Times)

The answers to today's Connections, game #744, are…

  • YELLOW: STRICT FIRM, RIGID, STERN, TOUGH
  • GREEN: BOTANICAL COVERINGS HULL, HUSK, POD, SHELL
  • BLUE: SEEN IN OPENING CREDITS CAST, DIRECTOR, STUDIO, TITLE
  • PURPLE: OBJECTS IN 0-, 1-, 2- AND 3-DIMENSIONAL SPACE LINE, PLANE, POINT, SOLID
  • My rating: Easy
  • My score: 2 mistakes

Although I made a couple of mistakes here, this wasn't a particularly difficult Connections puzzle compared to some.

If you didn't know which color each group was in, you wouldn't necessarily be able to predict which would be yellow and which purple – none were really difficult.

So, how did I make two errors? Simply because the answers for yellow, STRICT, overlapped with a few words from other groups. The eventual solutions were FIRM, RIGID, STERN and TOUGH – but SOLID seemed like it could go with the first couple of those, while STERN and HULL could also have been part of a boat-based grouping.

Anyway, I got there in the end.

How did you do today? Let me know in the comments below.

Yesterday's NYT Connections answers (Monday, June 23, game #743)
  • YELLOW: KINDS OF JEANS BOYFRIEND, FLARE, MOM, SKINNY
  • GREEN: FICTION CATEGORIES HISTORICAL, LITERARY, SPECULATIVE, YOUNG ADULT
  • BLUE: WORDS IN HEMINGWAY TITLES BELL, FAREWELL, OLD MAN, SUN
  • PURPLE: ___ GLASS GLASSWARE COCKTAIL, COLLINS, OLD FASHIONED, SHOT
What is NYT Connections?

NYT Connections is one of several increasingly popular word games made by the New York Times. It challenges you to find groups of four items that share something in common, and each group has a different difficulty level: green is easy, yellow a little harder, blue often quite tough and purple usually very difficult.

On the plus side, you don't technically need to solve the final one, as you'll be able to answer that one by a process of elimination. What's more, you can make up to four mistakes, which gives you a little bit of breathing room.

It's a little more involved than something like Wordle, however, and there are plenty of opportunities for the game to trip you up with tricks. For instance, watch out for homophones and other word games that could disguise the answers.

It's playable for free via the NYT Games site on desktop or mobile.

Categories: Technology

NYT Strands hints and answers for Tuesday, June 24 (game #478)

Mon, 06/23/2025 - 09:00
Looking for a different day?

A new NYT Strands puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Monday's puzzle instead then click here: NYT Strands hints and answers for Monday, June 23 (game #477).

Strands is the NYT's latest word game after the likes of Wordle, Spelling Bee and Connections – and it's great fun. It can be difficult, though, so read on for my Strands hints.

Want more word-based fun? Then check out my NYT Connections today and Quordle today pages for hints and answers for those games, and Marc's Wordle today page for the original viral word game.

SPOILER WARNING: Information about NYT Strands today is below, so don't read on if you don't want to know the answers.

NYT Strands today (game #478) - hint #1 - today's themeWhat is the theme of today's NYT Strands?

Today's NYT Strands theme is… Healthful helpers

NYT Strands today (game #478) - hint #2 - clue words

Play any of these words to unlock the in-game hints system.

  • TIDE
  • FAXES
  • SEED
  • PLUM
  • CLAIM
  • STOP
NYT Strands today (game #478) - hint #3 - spangram lettersHow many letters are in today's spangram?

Spangram has 11 letters

NYT Strands today (game #478) - hint #4 - spangram positionWhat are two sides of the board that today's spangram touches?

First side: top, 4th column

Last side: bottom, 3rd column

Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.

NYT Strands today (game #478) - the answers

(Image credit: New York Times)

The answers to today's Strands, game #478, are…

  • FLAXSEED
  • PROBIOTIC
  • CALCIUM
  • ZINC
  • MAGNESIUM
  • SPANGRAM: SUPPLEMENTS
  • My rating: Easy
  • My score: Perfect

This was a bit of a mixed bag, with the selection of SUPPLEMENTS combining vitamins, live microorganisms and seeds into a group that could be labelled 'Things that you get in foods you buy to make you more healthy'.

I don't generally take any supplements, mostly because I seem to be incapable of actually looking after myself health-wise. I know that CALCIUM is important for bones, and PROBIOTICS can help the gut, but I don't entirely know what MAGNESIUM, ZINC and FLAXSEED do.

Still, I didn't need to know that in order to solve today's Strands, which was rather simple once I'd found FLAXSEED in the top left of the grid.

How did you do today? Let me know in the comments below.

Yesterday's NYT Strands answers (Monday, June 23, game #477)
  • CHEAP
  • TRICK
  • TALKING
  • HEADS
  • SMASHING
  • PUMPKINS
  • SPANGRAM: ROCK GROUPS
What is NYT Strands?

Strands is the NYT's not-so-new-any-more word game, following Wordle and Connections. It's now a fully fledged member of the NYT's games stable that has been running for a year and which can be played on the NYT Games site on desktop or mobile.

I've got a full guide to how to play NYT Strands, complete with tips for solving it, so check that out if you're struggling to beat it each day.

Categories: Technology

This way cheaper alternative to Samsung’s The Frame TV has great gaming features and Dolby Vision – and a really weird brand name

Mon, 06/23/2025 - 09:00
  • The iFFALCON Mural TVs are 55, 65 and 75-inch art gallery-style TVs
  • 144Hz refresh rate, FreeSync Premium and low-latency game mode
  • From $564.99 for the 55-inch model

If you're looking for an art gallery TV that's both cheaper and higher spec than Samsung's The Frame, TCL has just the thing for you. Its terribly named but attractively priced iFFALCON sub-brand includes a great deal on the Mural TV.

If you go for the 65-inch Mural, TV it's currently down to just $749; Samsung's The Frame is $1,499 for the same size. And the 55-inch is cheaper still: just $564.99.

There's also a 75-incher, and that's on sale too. The 75-inch Mural TV is currently down to just $1,129.00.

The Mural TVs aren't just cheaper than the standard The Frame TVs. They also come with specs that don't come as standard on The Frame, and which you'd need to buy the even pricier Frame Pro to get.

Like The Frame TV, the idea is that these will show artwork when you're not watching something – these include "classical masterpieces, generative art using its AI engine, or beloved personal photos".

(Image credit: iFFALCON)TCL iFFALCON Mural TVs: key features

The Mural TV range are 4K UHD QLED TVs that promise 93% DCI-P3 wide color gamut coverage, a 144Hz refresh rate for gaming, plus AMD FreeSync Premium variable refresh rate support.

There's support for all key HDR formats, including Dolby Vision IQ, HDR10+, HLG and HGIG.

On the audio side, there's support for Dolby Atmos and DTS:X decoding. The operating system is Google TV, so you'll be covered for all major streaming services.

That's a lot of spec for not a lot of money, although to get the lowest prices you'll need to combine a money off coupon and a discount code too. Here are the appropriate Amazon links and codes:

You might also like
Categories: Technology

Russian hackers target Gmail passwords to crack down on international critics

Mon, 06/23/2025 - 08:03
  • International critics of Russia and academics have received phishing emails
  • Slow rapport building with fake US State Department teams
  • Victims are tricked into sharing Google app-specific passwords

Google Threat Intelligence Group (GTIG) has shared details of a new threat actor tracked as UNC6293, believed to be a Russian state-sponsored group, targeting prominent academics and critics of the country.

Victims have reportedly been receiving phishing emails using spoofed '@state.gov' addresses in the CC field to build credibility, but instead of being hit with immediate malicious payloads, the attackers are using social engineering tactics to build rapports with their targets.

Google's researchers uncovered the slow-paced nature attackers used to build rapports with their victims, often sending them personalized emails and inviting them to private conversations or meetings.

Academics and critics are being targeted by Russia

In one screenshot shared by Google's threat intelligence team, Keir Giles, a prominent British researcher on Russia, received a fake US Department of State email believed to be part of the UNC6293 campaign.

"Several of my email accounts have been targeted with a sophisticated account takeover that involved impersonating the US State Department," Giles shared on LinkedIn.

In the attack email, victims receive a benign PDF attachment designed to look like an invitation to securely access a (fake) Department of State cloud environment. It's this website that ultimately gives the attackers, which Google believes could be linked to APT29 (aka Cozy Bear, Nobelium), access to a user's Gmail account.

Victims are guided to create an app-specific password (ASP) at account.google.com, and then share that 16-character ASP with the attackers.

"ASPs are randomly generated 16-character passcodes that allow third-party applications to access your Google Account, intended for applications and devices that do not support features like 2-step verification (2SV)," Google explained.

Google highlights users can create or revoke ASPs at any time, and a pop-up on its site even advises users that ASPs "aren't recommended and are unnecessary in most cases."

More importantly, though, is that while attacks come in all different flavors, social engineering and phishing remain highly effective vectors – and yet they're typically comparably easy to detect, with a bit of prior understanding and training.

The standard advice, then, remains – avoid clicking on attachments from email addresses you're unfamiliar with, and certainly never share account credentials with unknown individuals.

You might also like
Categories: Technology

Ironheart release schedule: what date and time will episodes 1 to 3 of the Marvel TV show launch on Disney+?

Mon, 06/23/2025 - 08:00

Ironheart will bring down the curtain on Marvel Phase 5 in the very near future, and, with the Dominique Thorne-starring TV show set to launch on Disney+ in less than 72 hours, you'll want to know when you can watch it.

Below, I'll reveal the release date and launch time for its three-episode premiere in numerous countries (NB: if your nation isn't listed below, you can use one of the following dates and/or times to determine when you can stream it).

There's also a full release schedule at the end of this article, which confirms when its final three chapters will air. So, engage your thrusters and let's dive in.

What is the release date for Ironheart on Disney+?

Ironheart will launch with a three-episode premiere (Image credit: Marvel Studios/Disney+)

Ironheart will make its debut on one of the world's best streaming services on Tuesday, June 24 in the US, and Wednesday, June 25 in the UK and Australia.

Don't worry if you don't reside in any of those countries, though. The next Marvel TV Original will also air on Disney+ across the globe, so read on to find out what its launch date is in other nations via the list below:

  • US – Tuesday, June 24
  • Canada – Tuesday, June 24
  • Brazil – Tuesday, June 24
  • UK – Wednesday, June 25
  • India – Wednesday, June 25
  • Singapore – Wednesday, June 25
  • Japan – Wednesday, June 25
  • Australia – Wednesday, June 25
  • New Zealand – Wednesday, June 25
What is the launch time for Ironheart episodes 1 to 3?

You don't need to be a chaos-magic wielder like Parker Robbins to find out when Ironheart will premiere in your country (Image credit: Marvel Studios/Disney+)

Unlike most Marvel Cinematic Universe (MCU) TV shows, which have debuted with two-episode premieres, the first three chapters of Ironheart will be released on launch day. That unique release format was confirmed at the end of Ironheart's first trailer, and reiterated by Marvel when it revealed Ironheart's full episodic release schedule on social media.

So, what time will Ironheart's first three entries arrive on the dates outlined in the previous section? Read on for more details:

  • US – 6pm PT / 9pm ET
  • Canada – 6pm PT / 9pm ET
  • Brazil – 10pm BRT
  • UK – 2am BST
  • India – 6:30am IST
  • Singapore – 9am SGT
  • Japan – 10am JST
  • Australia – 11am AEST
  • New Zealand – 1pm NZST
What is the release date for Ironheart episodes 4 to 6?

Ironheart's final three episodes will be released on the same daye (Image credit: Marvel Studios/Disney+)

As I've outlined in my dedicated Ironheart guide, episodes 4, 5, and 6 will be released simultaneously one week after its first three chapters have premiered. Here's a full rundown of when they'll air in the nations I've included in this guide:

  • US – Tuesday, July 1
  • Canada – Tuesday, July 1
  • Brazil – Tuesday, July 1
  • UK – Wednesday, July 2
  • India – Wednesday, July 2
  • Singapore – Wednesday, July 2
  • Japan – Wednesday, July 2
  • Australia – Wednesday, July 2
  • New Zealand – Wednesday, July 2

For more information on Ironheart, check out the articles linked below. Be sure to check in with TechRadar over the next few days, too, for our review and other exclusive coverage.

You might also like
Categories: Technology

Scammers are calling us less, but the financial losses keep climbing

Mon, 06/23/2025 - 05:47

Believe it or not, there’s been a massive reduction in scam robocalls over the past few years. According to according to stats we gathered across millions of data points, scam calls are down roughly 75% since the Fall of 2021-- from more than 2 billion every month to roughly 500 million every month currently. That’s a massive decline, and it appears to be great news.

So why does it feel like we’re in more danger, not less?

Because we are.

Total losses

In 2021, the Federal Trade Commission reported the total losses from scams starting with a phone call were approximately $692 million, with a median loss of about $1,200 per victim. By 2024, those numbers had risen to $948 million, and a median loss of $1,500. Simple back-of-the-envelope math shows 25% of the calls led to 37% higher losses. In other words, the scammers have become roughly five to six times more efficient in their scamming ability from phone calls. They are making more money, with fewer calls and taking more from every victim.

That’s not great.

How do scammers do this? The answer is surprisingly simple: they became very efficient marketers.

Scammers used to simply “dial for dollars,” calling one number after another, hoping to find vulnerable targets. That approach meant making calls to a lot of people who were irrelevant to the scam. Now, they are much smarter and more strategic.

They often use curated lists of potential victims. If they want to run a banking scam, they can call everyone hoping to find customers of the bank, or scammers can obtain that bank’s customer list and launch a call campaign in which they impersonate that particular bank.

And that’s exactly what they’re doing.

Getting information

Where do scammers get this information? They can simply go to the dark web, to find the results of data breaches that have exposed the personal details of millions. Breaches provide scammers with names, phone numbers, email addresses and even account details—everything they need to convincingly impersonate a trusted entity such as a bank. If scammers want to target an enterprise, they can easily get a list of employees, and call their personal cell phones.

The sheer volume of data breaches in recent years means much of our personal information is essentially public. Phone numbers, e-mail addresses, Social Security numbers, credit card details, account numbers, medical records—the list goes on. With all that data in hand, it’s not hard to find the right targets with the right information to sound legitimate. After that, scammers can follow their script and pressure victims to transfer funds quickly or take some other problematic action.

So what to do?

Short answer

The short answer for individuals is that you must assume your identity is already out there. The genie is out of the bottle, and pretending otherwise only puts you at greater risk. The real question isn’t how to hide your identity-- it’s how to operate safely in a world where your personal and professional information is already exposed.

Assume attackers know more than they should. They’re using publicly available data to impersonate company leaders, target employees, and launch social engineering campaigns that feel alarmingly real. Add in voice cloning and A.I.-generated deepfakes, and the risk multiplies quickly.

That means you need to be skeptical, not scared. Focus less on chasing privacy and focus more on proactive protection. Assume that all unexpected inbound calls are potential fraud. Use technology like smart call blockers that can help filter out scams.

And always validate the caller by hanging up and calling their institution on a number provided to you by a legitimate source. If they say they’re a bank, call the bank directly. If a caller says they’re from your company, make a call to a number provided by your employer.

Conclusion

While individuals must take those actions to protect themselves, business also play a major role in reducing the risks of scams. That should start with programs educating employees on how to recognize suspicious calls and impersonation tactics. Encourage employees to verify any unexpected requests, especially anything related to financial transactions and sensitive data. A quick phone call to a supervisor can prevent a costly mistake.

The bad guys are only going to get better at their jobs. Your private information is only going to become more public. But if you stay vigilant and take the right precautions, you can protect yourself and avoid becoming the next victim.

We list the best identity theft protection.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Latest Battlefield 6 leak gives us our first look at the campaign – and I'm already hooked

Mon, 06/23/2025 - 05:42
  • Footage purportedly showing the campaign of the next Battlefield game has leaked
  • It shows a firefight on a massive dam and some dramatic destruction
  • The video was allegedly found in the Battlefield Labs client

A reliable dataminer has leaked footage that purportedly shows part of a mission from the upcoming Battlefield 6 campaign.

In an earnings call bac in February this year, we learned that the next Battlefield title will be released before March 31, 2026. Judging by this timeframe, a reveal is likely set for this summer, and testing is currently underway as part of the ongoing Battlefield Labs initiative.

Described by publisher Electronic Arts (EA) as the “most ambitious community development collaboration ever,” the program allows select players to try parts of the next game and influence its development through feedback.

As you might expect, this means that there has been a steady stream of leaks from those either playing these early builds or combing through them for data.

The latest snippet of info comes from X / Twitter user 'temporyal', who has a strong track record as a leaker, and concerns the game's campaign. It takes the form of a short video file, purportedly found in the Battlefield Labs client.

Here's a short clip from the Battlefield 6 singleplayer campaign in the latest BF Labs update.This work-in-progress footage shows the explosive finale of a mission to destroy a dam in Tajikistan. pic.twitter.com/n9ikBpUrmQJune 19, 2025

In it, we see what appears to be a brief segment from the campaign in which the player boards a military truck in the shadow of a huge dam. Fire is exchanged briefly with some oncoming enemies before the scene reaches a climax as the dam dramatically explodes while the player flees in the back of the truck.

It's the kind of showstopping destruction that you would want from a Battlefield and reminds me of some of the classic set-piece moments from older titles like Battlefield 4. Considering the fact that the latest entry in the series, Battlefield 2042, didn't even come with a single-player campaign component, this already seems like a massive improvement, and I can't wait to see more.

The footage is obviously from a very early build of the game, though, as textures, lighting, and character animation are clearly unfinished. Still, it's easy to imagine how the scene might look in the finished product.

Of course, you should bear in mind that there is no guarantee that anything shown in this leak will appear in the final game - or that it's even from the campaign in the first place. Games can change a lot throughout development, so we'll have to wait for some official details from EA for more concrete information.

The leaker does go on to share some interesting titbits, though, including the fact that the campaign may comprise of a prologue and eight separate missions. These will allegedly take place in a range of global locations, including Egypt, Tajikistan, the US, and Gibraltar.

You might also like...
Categories: Technology

Microsoft Teams is finally fixing one of its most annoying pop-ups - so I might be more productive at work at last

Mon, 06/23/2025 - 05:24
  • Microsoft Teams is working on variable notification sizes
  • The new addition should hopefully minimize disruption while working
  • All Microsoft Teams users should benefit upon launch

Being distracted by unruly Microsoft Teams pop-ups could soon be a thing of the past, thanks to a new update coming to the service soon.

The video conferencing platform has revealed it is working on adding a feature which will allow users to tweak the size of Teams notifications.

Once released, this tool should mean users are safe from having distracting pop-ups catch the corner of their eye when working - something I know I've definitely fallen victim to in the past.

Microsoft Teams notification sizes

In a Microsoft 365 roadmap post, the company explained the feature will, quite simply, give users the chance to "change the size of Teams notifications".

This includes a new "compact" size, which the company says, "takes up less space on the user's screen and offers a clean, minimalist design."

That's all the detail we currently have on the feature itself, which we're guessing will be accessible from the Settings menu or preferences list.

The feature is listed as being "in development", but has a scheduled rollout start date of July 2025, so users don't have too long to wait. When released, it will be available to users across the world using Teams on Windows, Mac, Android, and iOS.

The launch is the latest in a series of recent improvements to Microsoft Teams announced by the company as it looks to improve the experience for users.

This includes a tweak that will allow multiple people to control slides being presented in a meeting or call.

Microsoft says the addition will mean that presenters are able to maintain "a smooth flow during meetings or webinars" - hopefully meaning the end of manual slide changes - and hopefully, the phrase "next slide please".

It also recently announced it would be adding noise suppression for participants dialing in to a call, which should spell an end to potentially ear-splitting call interruptions, or participants being deafened by background noise from another person on the call.

The platform also revealed it is rolling out "enhanced spell check", giving users the tools to make sure their messages are as accurate as possible.

You might also like
Categories: Technology

Apple’s Mac-like multitasking feature is coming to these iPads soon – but I prefer these handy tools

Mon, 06/23/2025 - 05:22
  • iPadOS’s Stage Manager feature is coming to more iPads
  • That could improve multitasking capabilities for iPad users
  • But iPadOS 26 brings even better features to iPad than Stage Manager

If you’re a fan of multitasking on any of the best iPads, you were probably heartened to see all the new features Apple brought to iPadOS 26 at its Worldwide Developers Conference (WWDC). But while those additions are sure to make a splash for productivity power users, the company is also extending the existing Stage Manager feature to even more iPads.

In case you missed it, Stage Manager lets you group apps into sets and then switch between those sets as needed. It’s designed to help you focus on one task and all the windows you need to complete it, then change to a different task and group of apps after. It’s available on both iPadOS and macOS.

With iPadOS 26, Stage Manager will be available on more iPads than before. Previously, it only worked on the 13-inch iPad Pro with M4 chip, the 12.9-inch iPad Pro (third generation or later), the 11-inch iPad Pro (first generation or later), and the iPad Air (fifth generation or later).

As noted on Reddit, in addition to those tablets, Stage Manager now also works with the third-generation iPad Air or later (not just the fifth-generation model), the iPad mini (fifth generation or later), and the entry-level iPad (eighth-generation or later). In essence, Stage Manager works with any iPad that can run iPadOS 26.

Better than Stage Manager

(Image credit: Apple)

Stage Manager has proven to be a somewhat divisive feature since it was released – not helped by a buggy launch – and it’s struggled to establish itself as a must-have element of iPadOS. Although I was intrigued by it at first, I quickly found Stage Manager to be a little half-baked, and it never became a regular part of my setup on either my iPad or my Mac.

What looks to be far more interesting is the range of productivity tools Apple has added to iPadOS 26. That includes a Mac-like menu bar, full overlapping app support, window resizing, and even the “traffic light” buttons used to close, minimize or maximize app windows. Window tiling in particular is an excellent addition to the iPad, as you get a lot more window position options than just using an older feature like Split View.

Being able to use an iPad like a Mac offers much more appeal to me than Stage Manager. That’s partly because the Mac-like interface is just much more familiar to anyone who has used a computer before – there’s no new system to learn, as there is with Stage Manager. And gaining these new tools now makes it much more comfortable to work on the go with my iPad, as I no longer need to sacrifice capability in the name of portability.

Still, with Stage Manager coming to more iPads than before, it could still find an audience among Apple fans who have never had access to it. In any case, combined with iPadOS 26’s new multitasking features, it’s clear that Apple is taking productivity and user interface management a little more seriously.

You might also like
Categories: Technology

"No evidence" - here's why the massive 16 billion record data breach may not be as bad as first thought

Mon, 06/23/2025 - 05:22
  • The recent 16 billion record breach may not be as bad as it sounds
  • The datasets most likely contain previously leaked information
  • Nevertheless, those affected could still be at risk, so be on your guard

Following the recent reports of over 16 billion records being leaked in an ‘unimaginable’ major data breach, further research has claimed the reality of the incident might not be as disastrous as first thought.

Following significant speculation about the effects and origins of the breach, new findings from BleepingComputer suggest this “breach” may not be new, or even a breach - but instead just a compilation of existing leaked credentials.

The inital datasets discovered by the researchers included hordes of personal information, with each of the 30 datasets containing between tens of millions, to over 3.5 billion data points - totaling 16 billion records. It now looks likely this was a series of datasets simply containing breached credentials assembled by a cybersecurity firm (or by criminals) which was then exposed online.

Save up to 68% on identity theft protection for TechRadar readers!

TechRadar editors praise Aura's upfront pricing and simplicity. Aura also includes a password manager, VPN, and antivirus to make its security solution an even more compelling deal.

Preferred partner (What does this mean?)View Deal

Infostealers to blame

“Despite the buzz, there's no evidence this compilation contains new or previously unseen data,” BleepingComputer confirms.

The information from these datasets has likely been circulating for a while, and the layout of the breached information suggests that it was collected using infostealers - a type of malware that has become one of the most prolific threats to security teams and internet users alike.

The information found in these datasets is formatted in such a way that points the finger firmly at infostealers, with credentials appearing in a one per line format (URL:username:password) all compiled in one ‘log’.

One attack from an infostealer can exfiltrate all of the credentials stored on a browser, and the logs are then uploaded and usually sold on the dark web.

Criminals will often upload samples of their stolen data as a ‘taster’ to prove the information is legitimate.

Since these breaches can sometimes contain billions of records, these samples frequently hold tens of thousands of credentials - and this data breach is most likely a compilation of these tasters.

What to do next

New or not, leaked credentials pose a huge threat to those affected. If your information has been leaked, make sure to take a look at some identity theft protection software, as criminals can use your name, address, and details to take out credit cards or loans in your name.

HaveIBeenPwned? is probably the best resource only to check if your details have been affected, offering a run-down of every big cyber incident of the past few years.

As a business, enabling multi-factor authentication (MFA) and ensuring all staff are thoroughly trained on the dangers and signs of social engineering attacks is key. Using business password managers can also help ensure all user passwords are secure.

And if you save passwords to a Google account, you can use Google's Password Checkup tool to see if any have been compromised, or sign up for one of the best password manager options we've rounded up to make sure your logins are protected.

"If this news frightens you, then your security program probably has some fundamental gaps,” argues James Shank, Director of Threat Operations at Expel.

“Let this be the fuel you need to position yourself and your department for solving the problem systematically, rather than defending against the news du jour. There will always be another breach, with even more passwords, and emergency handling will continue if you don't have systematic defenses in place."

You might also like
Categories: Technology

iPhone 17 Pro again tipped to get a vapor chamber – here's why that'd be a big deal

Mon, 06/23/2025 - 04:48
  • The iPhone 17 Pro and Pro Max are again rumored to have a vapor chamber
  • However, the base iPhone 17 and iPhone 17 Air might not have one
  • A vapor chamber could prevent overheating, allowing for better sustained performance and improved battery life

A few months ago, we heard that the iPhone 17 series could gain a vapor chamber to help prevent overheating, and now another source has echoed these claims – and even provided some evidence.

Leaker Majin Bu (via MacRumors) claims to have learned from an “internal source” that both the iPhone 17 Pro and iPhone 17 Pro Max will have a vapor chamber. This will supposedly be a Pro-exclusive upgrade, which is at odds with that earlier leak, which pointed to all four models getting a vapor chamber.

In any case, we’d take this latest tip with a pinch of salt, as Bu has a mixed track record, but they’ve supplied an image of what they claim is part of a vapor chamber intended for these upcoming phones (below).

A leaked image of a vapor chamber component (Image credit: Majin Bu)

That supposedly leaked image – coupled with the fact that multiple sources have now mentioned a vapor chamber – suggests that at least some iPhone 17 models may well be getting this upgrade.

Keeping it cool

In layman's terms, a vapor chamber should be able to cool these phones more effectively than the graphite sheets used for heat dissipation in current iPhones.

A vapor chamber is a small metal chamber full of liquid, and that liquid turns to vapor when it heats up, allowing the heat to dissipate across the chamber’s surface area. It works as a way of pulling heat away from internal components, which has several advantages.

For one thing, this prevents damage to components from overheating, but it should also reduce the need for thermal throttling – that is, performance reductions to cool the phone down. So, even if you’re pushing the iPhone 17 Pro hard with gaming or other demanding applications, it should be able to stay relatively cool and maintain its performance better.

This should also make the phone more energy efficient, so battery life could be improved too.

Clearly, there are a lot of potential advantages to a vapor chamber, so we hope this leak proves accurate. We should find out in September, as that’s when the iPhone 17 series is likely to launch.

You might also like
Categories: Technology

Many businesses still don't trust their AI systems - and that could be a major problem

Mon, 06/23/2025 - 04:40
  • Businesses don't trust the accuracy of their AI/ML models, but it's due to poor data foundations, report claims
  • Only one in three have implemented or optimized data observability programs
  • Observability should be standard across the whole data lifecycle

New research from Ataccama has claimed a considerable proportion of businesses still don't trust the output of AI models - but this could simply be because their data isn't in order yet.

The study found two in five (42%) organizations don't trust their AI/ML model outputs, yet only three in five (58%) have implemented or optimised data observability programs.

Ataccama says this could be a problem, because traditional observability tools are not designed to monitor unstructured data, such as PDFs and images.

Don't trust AI? A lack of suitable data could be the problem

The report also revealed the ad-hoc approach that businesses often take, with observability often implemented reactively, resulting in fragmented governance and silos across the organization.

Ataccama defined an effective program as proactive, automated and embedded across the data lifecycle. More advanced observability could also include automated data quality checks and remediation workflows, which could ultimately prevent further issues upstream.

"They’ve invested in tools, but they haven’t operationalized trust. That means embedding observability into the full data lifecycle, from ingestion and pipeline execution to AI-driven consumption, so issues can surface and be resolved before they reach production," CPO Jay Limburn explained.

However, ongoing skills shortages and limited budgets are still presenting challenges along the way. Ataccama also noted that unstructured inputs continue to grow as a result of increased generative AI and RAG adoption, yet currently, fewer than one in three organizations feed unstructured data into their models.

The report goes on to explain: "The most mature programs are closing that gap by integrating observability directly into their data engineering and governance frameworks."

With proper observability in place, businesses can expect improved data reliability, faster decision-making and reduced operational risk.

You might also like
Categories: Technology

M&S and Co-op hacks publicly defined as a single attack - and could cost more than £400 million

Mon, 06/23/2025 - 04:08
  • Cyber Monitoring Centre says it is treating M&S and Co-op attacks as a single, combined event
  • M&S was hit by a major cyberattack earlier in 2025, Co-op hit weeks after
  • Cost of attacks could hit as high as £440 million, CMC estimates

The recent cyberattacks against Marks and Spencer (M&S) and the Co-op supermarket have been combined into a single incident by a major UK investigatory group.

The Cyber Monitoring Centre (CMC), an independent, non-profit body established to categorize major cyber events by the insurance industry, has declared it is treating the two incidents as one event by the same attacker - Scattered Spider.

"Given that one threat actor claimed responsibility for both M&S and Co-op, the close timing, and the similar tactics, techniques, and procedures (TTPs), CMC has assessed the incidents as a single combined cyber event," the CMC said.

Save up to 68% on identity theft protection for TechRadar readers!

TechRadar editors praise Aura's upfront pricing and simplicity. Aura also includes a password manager, VPN, and antivirus to make its security solution an even more compelling deal.

Preferred partner (What does this mean?)View Deal

Combined attack

The CMC says it has categorized the attacks as a "Category 2 systemic event," and estimated the security breaches will have a total financial impact of between £270 million to £440 million ($363 million to $592 million) on the two firms.

It added the effects of the attacks had been classified as "narrow and deep", with "significant implications" not only for the two retailers, but their suppliers, partners and service providers as well.

This definition is opposed to “shallow and broad” events such as the 2024 CrowdStrike incident, which affected a large number of businesses across the economy, but the impact to any one company was much smaller.

"Although both of the targeted companies suffered business disruption, data loss, and costs for incident response and IT rebuild, business disruption drives the vast majority of the financial cost," the CMC added.

"Most of the estimated disruption cost is faced by the two companies, but our analysis seeks to estimate the wider cost to partners, suppliers and others."

Despite happening around the same time, the CMC has said the cyberattack on Harrods, another major British retailer, will not been included at this stage, citing a lack of adequate information available about the cause and impact.

M&S was apparently hit by the attack on April 22, revealing news of the incident several days later. The Co-op revealed news of its event on April 30, saying it had been forced to take down parts of its IT systems in an attempt to mitigate the effects.

M&S has forecast the attack could cost it around £300 million in lost operating profit in its financial year.

M&S has not confirmed whether it has paid a ransom to the hackers, but did admit some customer data was stolen in the attack. This did not include any passwords or card or payment details, but home addresses, phone numbers and dates of birth may have been affected.

Anyone concerned their data may have been taken, we recommend using a dark web monitoring service, or using a breach monitor such as Have I Been Pwned to check for potential exposures.

Via InfoSecurity

You might also like
Categories: Technology

Don’t be distracted by AI – fundamental cyber skills are still key

Mon, 06/23/2025 - 03:54

The hype around generative AI (GenAI) is impossible to ignore in most industries, and cybersecurity is no exception. The potential for cybercriminals enhancing their attacks with AI looms large in industry discussions. At the same time, the security world is gripped by the promise of faster, smarter defenses, from AI-powered EDR to co-pilot-enabled SOC teams.

But here’s the uncomfortable truth: none of it matters if your patching is months out of date, your cloud assets are misconfigured, or your employees freeze under pressure. The security fundamentals are still what really makes the difference in preventing a breach.

While security teams race to bolt on the latest GenAI tools, basic cyber hygiene is in danger of being overlooked.

So how can organizations ensure their cyber skills are up to the challenge in the age of AI?

GenAI is making the basics more urgent - not obsolete

It’s easy to assume that the widespread use of GenAI requires an entirely new approach to security and it’s undeniable that AI-assisted threats are evolving fast. But the real danger isn’t that GenAI changes the game, it’s the way it accelerates the same tactics that already work.

Attackers are primarily using GenAI to scale up familiar playbooks. Social engineering, reconnaissance, and privilege escalation aren’t new, they’re just happening faster and at greater volume.

In many cases, using AI tools can also be a security risk in and of itself. Immersive’s research found that 88% of users could fool a GenAI system into leaking sensitive information, with the machines being surprisingly vulnerable to human psychological tricks. As with any other software tool, misconfigurations and poor access controls also expose GenAI to greater exploitation.

Rather than replacing hygiene, GenAI makes it more essential. If anything, organizations need to double down on the fundamentals.

Cyber hygiene is still the frontline defense

The security landscape may be changing rapidly, but the fundamentals aren’t. Most breaches today still stem from issues that are entirely preventable: an unpatched server, a poorly configured firewall, an admin account with excessive privileges. These aren’t sophisticated zero-days that require experienced threat actors to exploit. They’re hygiene failures.

Yet too many organizations treat cyber hygiene as a legacy concern, something solved once they’ve rolled out the latest AI-powered tools. That mindset is dangerous because hygiene fundamentals aren’t something you graduate from; they’re the baseline that allows advanced defenses to function effectively.

If core defenses such as access permissions and configurations are weak, AI-powered tools are just watching the breach happen in high definition. Security starts with doing the basics well and doing them consistently.

Why poor training is the real weak link

If your security fundamentals are slipping, it’s worth asking: is the problem your tools, or your training?

For most organizations, it’s the latter. Legacy training still dominates, often reduced to short videos and multiple-choice quizzes that check boxes but fail to build capability.

The issue isn’t that people don’t care about security. It’s that they’ve been taught to memorize, not to respond. Training is too often generic, passive, and disconnected from the reality of a live incident. As a result, critical cyber hygiene habits like patch management or recognising phishing attempts fall apart in the moments they matter most.

These issues are intensified when a crisis rears its head. It’s no surprise that teams struggle to respond under pressure, because most have never been given the chance to prepare in a meaningful way.

If we want better outcomes, we need to stop blaming individuals and start fixing the systems that fail to prepare them. No amount of AI will compensate for a team that doesn’t know what to do when the alert goes off.

Drills build muscle memory and enforce hygiene

We wouldn’t expect someone to be ready to fight a fire or fly a plane just because they’d watched a video and taken a quiz, and the same is true for responding to a cyberattack.

This is where cyber drills come in. Unlike traditional training, drills place people in realistic, high-pressure scenarios where they must act, not just observe. They test judgment, coordination, and the ability to follow protocols under stress. Crucially, they reinforce both crisis handling and the importance of essential cyber hygiene through repetition and lived experience.

Cyber drills also expose weaknesses that would otherwise remain hidden. A playbook that looks perfect on paper might collapse under real-time pressure. A confident team might struggle when roles blur in the heat of an incident.

Real cyber readiness isn’t achieved through once-a-year compliance exercises, it’s built into the daily rhythm of how teams work, communicate, and make decisions. That requires more than technology. It takes culture.

Don’t bet everything on the shiniest tools

GenAI is continuing to change the security landscape in unpredictable ways, but it hasn’t changed the fundamentals. Most breaches still come down to human error and poor hygiene, regardless of the tools surrounding them.

Advanced tools won’t protect you if your team isn’t ready. True cyber resilience means training for the basics, testing under pressure, and building a culture where readiness is second nature.

We list the best endpoint protection software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Pages