Error message

  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

Feed aggregator

New forum topics

IRS says churches can now endorse political candidates

NPR News Headlines - Tue, 07/08/2025 - 09:49

Since 1954, an IRS rule had barred houses of worship from explicitly endorsing political candidates.

(Image credit: Charlie Neibergall)

Categories: News

AI-generated or just poorly edited? Kylian Mbappé’s latest Instagram post rams home how hard it is to know what's real these days

TechRadar News - Tue, 07/08/2025 - 09:42

Spending time on the internet in 2025 is proving to be more difficult than ever before. After all, image generation tools are readily accessible in AI products like ChatGPT, and video generation software like Google's Veo 3 is available to the general public.

We're still at a point in the AI-powered internet journey where I'd argue it's still easy enough to tell what's real and what's not. That said, today's AI image and video tools are more powerful than ever, and the scary thing is: this is the worst they'll ever be.

The other day, while browsing Instagram, I stumbled across a new post from France and Real Madrid soccer superstar, Kylian Mbappé. Widely regarded as one of the best players in the world, the image showcased an incredible bicycle kick he had performed in the Club World Cup quarter-final the night before.

The thing is, while the image appeared normal at first glance, a closer inspection revealed some seriously bad editing, or quite possibly AI image generation.

You see, zoom into the crowd watching Mbappé's acrobatics and you'll see a Picasso-esque abstract work of art, people merging into each other, and something more akin to a horror movie than a soccer field. All of the faces blur together like a nightmare.

Initially, I couldn't quite believe that a social media admin for an Instagram account with over 124 million followers would use AI to enhance an image. But then I thought about it some more, and of course, AI has infiltrated the social profiles of public figures. It's everywhere.

A post shared by Kylian Mbappé (@k.mbappe)

A photo posted by on

What's real anymore?

You might be wondering why Kylian Mbappé's social media team used AI to edit this photo in the first place. After all, according to official reports, there were over 76,000 fans in MetLife Stadium for the game.

Since it started a few weeks ago, the FIFA Club World Cup has been plagued with stories of low attendance rates, with one report claiming the tournament had over 1 million empty seats in the group stage alone.

Now, 76,000 is closer to MetLife's 82,500 capacity than some of the other examples of low attendance in the tournament, but considering the terrible photo edits to the crowd, did Mbappé's incredible goal fall into the line of sight of empty seats?

Thinking about the context of the tournament and the badly edited photo, this is the conclusion that I'd feel most comfortable putting forward. After all, sometimes you have to call a spade a spade. Why would anyone play with the crowd capacity other than to fill gaps?

Whether Mbappe's photo was AI-edited or badly edited by a human, the world of photo editing on social media is nothing new. Since the inception of platforms like Facebook and Instagram, we've all had to adapt to the 21st-century way of living, which often includes curating your best angles and happiest moments online.

AI-generated instagram influencer (Image credit: @millasofiafin / Instagram)

In the past, influencers would slim down their waists using apps on their iPhones or by manually editing the photo. Now, AI can do it all with the press of a button. And that's not all, AI-edited photos are only the beginning.

Whether that's fully AI-generated influencers scoring brand deals, AI-generated YouTube channels garnering millions of views and subscribers, or AI beauty pageants, we no longer live in a world where it's easy to tell what's real on social media and what's not. The thing is, have we ever been able to? Or is AI just making it easier than ever before to bend reality to fit a narrative?

As someone who has used multiple AI photo editing tools for testing purposes, I'm fairly confident that Mbappé's terrible editing is the work of artificial intelligence, and most probably Apple's mediocre Clean Up tool.

This clear example of heavily-edited photography shines a light, not only on bad editing, but also on the fact that if bad edits slip through the cracks, there's a high chance most of the posts we see aren't actually rooted in real life.

You might also like
Categories: Technology

AI-generated or just poorly edited? Kylian Mbappé’s latest Instagram post rams home how hard it is to know what's real these days

TechRadar News - Tue, 07/08/2025 - 09:42

Spending time on the internet in 2025 is proving to be more difficult than ever before. After all, image generation tools are readily accessible in AI products like ChatGPT, and video generation software like Google's Veo 3 is available to the general public.

We're still at a point in the AI-powered internet journey where I'd argue it's still easy enough to tell what's real and what's not. That said, today's AI image and video tools are more powerful than ever, and the scary thing is: this is the worst they'll ever be.

The other day, while browsing Instagram, I stumbled across a new post from France and Real Madrid soccer superstar, Kylian Mbappé. Widely regarded as one of the best players in the world, the image showcased an incredible bicycle kick he had performed in the Club World Cup quarter-final the night before.

The thing is, while the image appeared normal at first glance, a closer inspection revealed some seriously bad editing, or quite possibly AI image generation.

You see, zoom into the crowd watching Mbappé's acrobatics and you'll see a Picasso-esque abstract work of art, people merging into each other, and something more akin to a horror movie than a soccer field. All of the faces blur together like a nightmare.

Initially, I couldn't quite believe that a social media admin for an Instagram account with over 124 million followers would use AI to enhance an image. But then I thought about it some more, and of course, AI has infiltrated the social profiles of public figures. It's everywhere.

A post shared by Kylian Mbappé (@k.mbappe)

A photo posted by on

What's real anymore?

You might be wondering why Kylian Mbappé's social media team used AI to edit this photo in the first place. After all, according to official reports, there were over 76,000 fans in MetLife Stadium for the game.

Since it started a few weeks ago, the FIFA Club World Cup has been plagued with stories of low attendance rates, with one report claiming the tournament had over 1 million empty seats in the group stage alone.

Now, 76,000 is closer to MetLife's 82,500 capacity than some of the other examples of low attendance in the tournament, but considering the terrible photo edits to the crowd, did Mbappé's incredible goal fall into the line of sight of empty seats?

Thinking about the context of the tournament and the badly edited photo, this is the conclusion that I'd feel most comfortable putting forward. After all, sometimes you have to call a spade a spade. Why would anyone play with the crowd capacity other than to fill gaps?

Whether Mbappe's photo was AI-edited or badly edited by a human, the world of photo editing on social media is nothing new. Since the inception of platforms like Facebook and Instagram, we've all had to adapt to the 21st-century way of living, which often includes curating your best angles and happiest moments online.

AI-generated instagram influencer (Image credit: @millasofiafin / Instagram)

In the past, influencers would slim down their waists using apps on their iPhones or by manually editing the photo. Now, AI can do it all with the press of a button. And that's not all, AI-edited photos are only the beginning.

Whether that's fully AI-generated influencers scoring brand deals, AI-generated YouTube channels garnering millions of views and subscribers, or AI beauty pageants, we no longer live in a world where it's easy to tell what's real on social media and what's not. The thing is, have we ever been able to? Or is AI just making it easier than ever before to bend reality to fit a narrative?

As someone who has used multiple AI photo editing tools for testing purposes, I'm fairly confident that Mbappé's terrible editing is the work of artificial intelligence, and most probably Apple's mediocre Clean Up tool.

This clear example of heavily-edited photography shines a light, not only on bad editing, but also on the fact that if bad edits slip through the cracks, there's a high chance most of the posts we see aren't actually rooted in real life.

You might also like
Categories: Technology

How McAfee+ Identity Protection Changed My Digital Habits

TechRadar Reviews - Tue, 07/08/2025 - 09:41

Protecting your digital identity has become increasingly important. With the rise of sophisticated cyber threats, such as phishing scams, identity theft, and data breaches, choosing a robust identity protection service is essential for safeguarding your personal information.

This review offers a comprehensive analysis of McAfee identity protection, examining its key features, effectiveness in preventing identity theft, and overall value to consumers. Key aspects covered include the service's monitoring capabilities, real-time alerts, recovery support, and user-friendly interface. Additionally, we'll explore how McAfee+ compares to other identity protection services on the market.

By the end of this review, you will have a clearer understanding of whether McAfee Identity Protection is the right solution for you in securing your sensitive information and maintaining your online peace of mind.

McAfee+: Plans and pricing

The McAfee Essential plan, often referred to as a "starter" plan within the McAfee Total Protection suite, is designed to provide a solid foundation of security for individuals with multiple devices. Priced at an introductory offer of $39.99 for the first year (with renewal prices typically higher), it offers protection for up to five devices, compatible with Windows, Mac, Android, iOS, and ChromeOS. This plan includes McAfee's award-winning antivirus and scam detection, ensuring real-time defense against malware, ransomware, and phishing attempts.

In addition to core antivirus protection, the Essential plan enhances online privacy with a Virtual Private Network (VPN), which often includes unlimited data usage, particularly when auto-renewal is enabled. Users also benefit from identity monitoring that alerts them if their personal information appears on the dark web. The plan includes a password manager (True Key) for secure login management and Safe Browse capabilities to warn against risky websites. Furthermore, it provides Personal Data Cleanup (scan only) to help identify where your data may be exposed on data broker sites and Online Account Cleanup (scan only) to locate old online accounts linked to your personal information. The McAfee Protection Score included in this plan helps users gauge their overall cybersecurity health. While the Essential plan offers a robust range of essential security and privacy features, it lacks the more extensive identity theft coverage and full-service data cleanup found in higher-tier McAfee+ plans.

In contrast, the McAfee+ Advanced Individual plan presents a much more comprehensive security package. Typically priced at an introductory fee of around $89.99 for the first year, this plan is more than double the cost of the Essential plan. The most significant upgrade is its coverage for unlimited devices (for one user), ensuring that all household devices are protected. Beyond the features of the Essential plan, the Advanced plan significantly enhances identity protection. It includes full-service Personal Data Cleanup, where McAfee actively assists in removing your information from data broker sites rather than merely scanning and alerting you. Furthermore, it provides $1 million in identity theft coverage and restoration services, enhanced bank and credit card transaction monitoring, and 1-bureau credit monitoring with monthly scores. The ability to initiate a security freeze in the event of suspected identity theft adds layer of security, making the McAfee+ Advanced Individual plan ideal for users who prioritize comprehensive identity and financial safety alongside robust device protection.

Lastly, the McAfee+ Advanced Family plan offers a comprehensive solution designed to protect the entire household (up to six users), extending beyond devices to include robust identity and privacy features. Its introductory price typically starts around $119.99 for the first year, though this can vary slightly depending on the retailer and current promotions.

This family plan offers unlimited device coverage for all compatible household devices, including Windows PCs, Macs, Android devices, iOS devices, and Chromebooks. A key differentiator for the family plan is the inclusion of Parental Controls (McAfee Safe Family), allowing parents to manage their children's online activities, set screen time limits, filter content, track locations, and view activity reports.

Beyond device security, the McAfee+ Advanced Family plan offers significant identity protection features. These include identity monitoring with alerts for personal information found on the dark web, as well as advanced tools such as bank and credit card transaction monitoring, along with 1-bureau credit monitoring that includes monthly credit scores. The financial protection is substantial, boasting up to $2 million in identity theft coverage and restoration services (an increase from the individual plan's $1 million coverage). This plan also allows users to place a security freeze on their credit if suspicious activity is suspected.

To enhance online privacy, the McAfee+ Advanced Family plan features an unlimited Secure VPN for safe browsing on public Wi-Fi. It includes full-service Personal Data Cleanup, where McAfee actively helps in removing personal information from data broker sites. Additionally, the Scam Detector, powered by McAfee Smart AI, identifies and warns against risky texts, emails, and videos. Meanwhile, the password manager (True Key) ensures secure login credentials. Safe Browse (WebAdvisor) blocks dangerous websites and downloads, further contributing to comprehensive cybersecurity. Lastly, the McAfee Protection Score tracks the overall cybersecurity health of the family, making the McAfee+ Advanced Family plan an ideal choice for families seeking comprehensive digital protection and peace of mind.

McAfee+: Features

McAfee+ is a comprehensive cybersecurity suite developed by McAfee that offers a variety of features to enhance your digital safety. Below are some key features included in the McAfee+ plans:

Antivirus and Antimalware: McAfee+ provides real-time protection against viruses, malware, spyware, ransomware, and other malicious threats. It scans your system to detect potential threats, preventing them from causing harm. Unlike many online identity protection suites, this feature is essential for personal security.

Firewall Protection: A built-in firewall monitors and controls incoming and outgoing network traffic, protecting your device from unauthorized access and blocking suspicious connections.

Web Protection: This feature helps safeguard your online activities by blocking malicious websites, phishing attempts, and dangerous downloads. It also scans email attachments and instant messages for potential threats, making it especially useful for children online.

Identity Theft Protection: McAfee+ helps protect your personal information from being compromised by monitoring potential identity theft risks. This may include features like credit monitoring, social security number tracking, and alerts for suspicious activity. McAfee’s Identity Theft Protection service monitors over 40 data broker sites to identify whether your personal information has been compromised.

Safe Browsing: McAfee+ provides secure browsing extensions or plugins for popular web browsers. These tools warn you about unsafe websites in search results and block harmful ads or pop-ups.

Credit Monitoring: Depending on the selected plan, credit bureau monitoring looks for threats to your identity and monitors the Dark Web for associated risks.

Password Manager: This unique tool securely stores your login credentials and assists in creating strong, unique passwords for each website or application you use.

Secure VPN: McAfee+ includes a virtual private network (VPN) feature that encrypts your internet connection and anonymizes your online activities, adding an extra layer of privacy and security.

System Optimization Tools: McAfee+ also offers system optimization tools to improve your device’s performance by cleaning up unnecessary files, managing startup programs, and optimizing system settings.

Parental Controls: McAfee+ products include parental control features that allow you to monitor and restrict your child's online activities, block inappropriate content, and set usage time limits.

Overall, McAfee+ provides a robust suite of tools designed to enhance your cybersecurity and protect your personal information online.

McAfee+: Support

As would be expected from a veteran provider, McAfee offers numerous methods for support. On the direct side, there is 24/7 phone support, although we would have liked to see the number more prominently featured as we had to go through multiple screens to find it. There is a virtual assistant, and we did find a chat to a real person available 24/7 for English speaking countries (and 9am to 6 pm on business days for the rest of the world). We did not find an email, or a support portal as alternate methods for direct contact.

There are some options on the self support as well. We found a Support Home page, with a search bar, which had jump offs to YouTube videos, a FAQ, and related articles. There are also links to McAfee social media sites, including a Twitter feed that is active with recent updates, but it was not reassuring to find the link to the Facebook site coming up as “This page is not available.”

McAfee+: Competition

While McAfee+ provides a comprehensive security suite, several outstanding alternatives offer similar, if not enhanced, protection tailored to your specific needs and budget.

One of the top contenders is Bitdefender, which consistently earns high marks for its impressive malware detection capabilities in independent lab tests. In addition to its robust antivirus protection, Bitdefender boasts a feature-rich package that includes parental controls, a secure VPN, scam protection, and a comprehensive firewall. Its user-friendly interface and streamlined performance make it an excellent choice for families seeking extensive security without a steep price point. Moreover, Bitdefender offers a unique feature called "Vulnerability Assessment," scanning for potential security risks on your devices, further fortifying your online safety.

Norton 360 is another widely acclaimed option, often regarded as a gold standard in digital security. It encompasses a full suite that extends beyond basic antivirus functions, with many of its plans including features such as automatic cloud backup, a secure VPN, parental controls, and even identity theft protection. This makes Norton 360 an ideal choice for users looking for a holistic security solution. Moreover, it is equipped with advanced features like a password manager and dark web monitoring, ensuring that users are not only protected from current threats but also alerted to potential future risks. Norton also proudly offers a "100% Virus Protection Promise," reassuring users of its commitment to effective malware defense.

For those interested in a robust solution that includes a free tier, Avast One is an excellent option. Its free version is notably feature-rich, providing robust ransomware protection, a secure VPN, tracker blockers, and a built-in firewall. Furthermore, Avast’s reasonably priced premium upgrades offer even more sophisticated tools, such as advanced malware protection and a system cleanup feature, catering to a broad range of users with diverse budgets and requirements.

Other noteworthy alternatives include TotalAV, recognized for its superior web protection and system optimization tools. TotalAV not only helps shield against malware but also enhances system performance, making it a compelling choice for those seeking a more responsive computer experience alongside security. On the other hand, Malwarebytes is a household name recognized for its effective malware removal capabilities; its premium version provides real-time protection against a variety of online threats, making it an excellent complement to any primary antivirus.

Finally, consider solutions like Surfshark Antivirus, which is often bundled with the popular Surfshark VPN. This combination offers a substantial advantage in terms of privacy and security when browsing the internet. Similarly, Trend Micro is also a strong contender, offering comprehensive security features that include ransomware protection, Pay Guard for secure online transactions, and a social media privacy scanner, appealing to users who prioritize multifaceted protection.

In summary, while McAfee+ remains a solid choice, exploring these alternatives may lead to discovering a solution that better meets your specific security requirements and budgetary constraints.

McAfee+: Final verdict

McAfee+ provides a strong option for personal security and identity protection. We appreciate the variety of subscription tiers, the multitude of features, the support center, and the availability of 24/7 phone support. However, there are some areas that could be improved: the pricing is only available on an annual basis, the lowest tier lacks credit monitoring, there is only one method for direct support, and overall, the pricing tends to be on the expensive side. Nonetheless, when it comes to trusting a provider with your personal information, McAfee's longstanding reputation built over the years is a significant advantage.

We've featured the best internet security suites

Categories: Reviews

Fitness and Wellness Deals Worth Adding to Cart on Amazon Prime Day July 2025

CNET News - Tue, 07/08/2025 - 09:33
From massage guns to your favorite sunscreens, you’ll want to stock up now.
Categories: Technology

Securing the future: why cybersecurity must be secure by design – and by default

TechRadar News - Tue, 07/08/2025 - 09:24

The UK Public Accounts Committee’s recent report sends a clear and urgent message: cyber threats are evolving faster than defenses can keep up. The digital infrastructure underpinning our critical infrastructure is increasingly exposed—not only due to external threats but because of internal gaps in strategy, capability, and legacy system management.

Replacing outdated technology may be part of the solution, but it’s far from the full picture. We need a fundamental shift in mindset—toward continuous assurance, smarter system design, and a dynamic approach to skills development that anticipates the challenges of tomorrow, not just today.

Beyond ‘build and forget’: cybersecurity as an ongoing commitment

For too long, cybersecurity has followed a static, compliance-driven model—deploy once, tick the box, and move on. In today’s evolving threat landscape, this ‘build and forget’ mentality is no longer viable, if it ever was.

Security must be woven into every stage of design, development, and operations through a Secure by Design approach. With Cyber Physical Systems and enterprise IT environments in constant flux, reassessing security posture regularly ensures defenses remain adaptive and effective.

The UK government has rightly prioritized Secure by Design in its Defending the UK in a Digital World: Cyber Security Strategy 2022–25. Yet, despite this ambition, adoption across sectors remains uneven, with many organizations still relying on outdated risk frameworks and reactive measures—essentially attempting to counter modern threats with legacy solutions.

Cybersecurity must evolve beyond static processes. It requires continuous evaluation, proactive defense, and resilient security strategies to stay ahead of emerging risks.

Legacy systems: balancing risk and progress

Few areas illustrate the tension between innovation and practicality more clearly than legacy systems. Originally built for a different technological landscape, many were air-gapped, manually operated, and completely isolated from external networks—never designed to withstand the level of connectivity and cyber threats seen today.

In pursuit of efficiency and cost reduction, organizations have increasingly networked and remotely managed these systems, often without implementing adequate security safeguards. While this enhances operational flexibility, it also exposes critical infrastructure to new vulnerabilities, opening doors to sophisticated cyber threats.

The solution isn't as simple as replacing old systems outright. The decision to upgrade or extend the life of legacy platforms requires careful cyber risk evaluation, ensuring the right balance of mitigation strategies, isolation measures, and continuous monitoring to maintain security. Organizations must also weigh financial constraints, applying appropriate risk controls to optimize security investments without excessive costs.

Secure by design: a strategic imperative

Secure by Design isn’t just a cybersecurity buzzword—it’s an essential principle for building resilient digital infrastructure. It ensures that an appropriate level of security is built in from the ground up, integrated at every design, development, and operational phase to create adaptable, auditable, and testable systems.

Yet, despite its inclusion in policy frameworks and industry guidelines, implementation is often incomplete or superficial. Many organizations pay lip service to security but fail to embed it across teams and processes, treating it as an isolated function rather than an organizational priority – much like organizations approach health and safety.

Regulation will play a vital role in closing this gap. The upcoming Cyber Security and Resilience Bill is set to improve oversight, enforce stronger standards, and introduce mandatory incident reporting for high-risk sectors. Coupled with enhanced threat intelligence sharing, this legislation could shift cybersecurity strategies from reactive defense to proactive resilience.

Cyber talent: securing the future workforce

Another major challenge in cybersecurity is building a workforce capable of responding to evolving threats. As technology advances, skills become obsolete faster than ever, requiring ongoing investment in cyber capability development.

While direct government hiring plays a role—especially in sensitive security domains—industry partnerships offer a scalable alternative. Specialist organizations, like Thales, are well-positioned to train and upskill professionals through apprenticeships, immersive simulations, and diverse sector exposure, which traditional public-sector roles often lack.

This model provides dual benefits: it equips trainees with experience across various threat scenarios, while also fostering an agile workforce that can quickly adapt to emerging technologies like artificial intelligence and quantum computing. Cybersecurity isn't just about fixing vulnerabilities of the past—it's about anticipating and securing against the threats of the future.

Transparency and collaboration: strengthening cyber resilience

Cybersecurity can no longer be viewed as a standalone issue—threats don’t respect organizational boundaries, and weaknesses in one system can expose an entire network. Transparency, collaboration, and mandatory incident reporting are essential for national security, ensuring vulnerabilities are addressed before they escalate into widespread risks.

Reporting cyber incidents, much like the practice of reporting near misses and accidents in health and safety, strengthens overall resilience. Just as greater visibility has helped organizations reduce safety incidents, increased cyber reporting makes it harder for hackers to exploit gaps, reinforcing defenses before real damage occurs.

The Thales Data Threat Report underscores the growing risks to Critical National Infrastructure (CNI) and highlights the value of compliance—organisations that passed cybersecurity audits had significantly fewer breaches than those that failed. With the Cyber Security and Resilience Bill raising standards, stronger protections for essential infrastructure, including data centers that support AI innovation and national healthcare, will become the norm.

Each unreported cyber-attack is a missed opportunity to refine security strategies. Enhanced visibility into cyber threats improves collective intelligence, allowing organizations to make faster, smarter decisions in the face of emerging risks.

Conclusion: building security for the future

Modern cybersecurity requires more than patching vulnerabilities or checking compliance boxes—it demands a strategic rethink of how systems are designed, maintained, and safeguarded. Understanding how legacy and modern environments interact is key, alongside developing cyber talent that can anticipate and mitigate future risks.

Secure by Design must be the standard, not the exception. With the right balance of policy, proactive security measures, and skilled professionals, organizations can shift from reactive defense to sustainable resilience, ensuring they are prepared for the threats ahead, not just responding to the ones they see today.

We've featured the best endpoint protection software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Securing the future: why cybersecurity must be secure by design – and by default

TechRadar News - Tue, 07/08/2025 - 09:24

The UK Public Accounts Committee’s recent report sends a clear and urgent message: cyber threats are evolving faster than defenses can keep up. The digital infrastructure underpinning our critical infrastructure is increasingly exposed—not only due to external threats but because of internal gaps in strategy, capability, and legacy system management.

Replacing outdated technology may be part of the solution, but it’s far from the full picture. We need a fundamental shift in mindset—toward continuous assurance, smarter system design, and a dynamic approach to skills development that anticipates the challenges of tomorrow, not just today.

Beyond ‘build and forget’: cybersecurity as an ongoing commitment

For too long, cybersecurity has followed a static, compliance-driven model—deploy once, tick the box, and move on. In today’s evolving threat landscape, this ‘build and forget’ mentality is no longer viable, if it ever was.

Security must be woven into every stage of design, development, and operations through a Secure by Design approach. With Cyber Physical Systems and enterprise IT environments in constant flux, reassessing security posture regularly ensures defenses remain adaptive and effective.

The UK government has rightly prioritized Secure by Design in its Defending the UK in a Digital World: Cyber Security Strategy 2022–25. Yet, despite this ambition, adoption across sectors remains uneven, with many organizations still relying on outdated risk frameworks and reactive measures—essentially attempting to counter modern threats with legacy solutions.

Cybersecurity must evolve beyond static processes. It requires continuous evaluation, proactive defense, and resilient security strategies to stay ahead of emerging risks.

Legacy systems: balancing risk and progress

Few areas illustrate the tension between innovation and practicality more clearly than legacy systems. Originally built for a different technological landscape, many were air-gapped, manually operated, and completely isolated from external networks—never designed to withstand the level of connectivity and cyber threats seen today.

In pursuit of efficiency and cost reduction, organizations have increasingly networked and remotely managed these systems, often without implementing adequate security safeguards. While this enhances operational flexibility, it also exposes critical infrastructure to new vulnerabilities, opening doors to sophisticated cyber threats.

The solution isn't as simple as replacing old systems outright. The decision to upgrade or extend the life of legacy platforms requires careful cyber risk evaluation, ensuring the right balance of mitigation strategies, isolation measures, and continuous monitoring to maintain security. Organizations must also weigh financial constraints, applying appropriate risk controls to optimize security investments without excessive costs.

Secure by design: a strategic imperative

Secure by Design isn’t just a cybersecurity buzzword—it’s an essential principle for building resilient digital infrastructure. It ensures that an appropriate level of security is built in from the ground up, integrated at every design, development, and operational phase to create adaptable, auditable, and testable systems.

Yet, despite its inclusion in policy frameworks and industry guidelines, implementation is often incomplete or superficial. Many organizations pay lip service to security but fail to embed it across teams and processes, treating it as an isolated function rather than an organizational priority – much like organizations approach health and safety.

Regulation will play a vital role in closing this gap. The upcoming Cyber Security and Resilience Bill is set to improve oversight, enforce stronger standards, and introduce mandatory incident reporting for high-risk sectors. Coupled with enhanced threat intelligence sharing, this legislation could shift cybersecurity strategies from reactive defense to proactive resilience.

Cyber talent: securing the future workforce

Another major challenge in cybersecurity is building a workforce capable of responding to evolving threats. As technology advances, skills become obsolete faster than ever, requiring ongoing investment in cyber capability development.

While direct government hiring plays a role—especially in sensitive security domains—industry partnerships offer a scalable alternative. Specialist organizations, like Thales, are well-positioned to train and upskill professionals through apprenticeships, immersive simulations, and diverse sector exposure, which traditional public-sector roles often lack.

This model provides dual benefits: it equips trainees with experience across various threat scenarios, while also fostering an agile workforce that can quickly adapt to emerging technologies like artificial intelligence and quantum computing. Cybersecurity isn't just about fixing vulnerabilities of the past—it's about anticipating and securing against the threats of the future.

Transparency and collaboration: strengthening cyber resilience

Cybersecurity can no longer be viewed as a standalone issue—threats don’t respect organizational boundaries, and weaknesses in one system can expose an entire network. Transparency, collaboration, and mandatory incident reporting are essential for national security, ensuring vulnerabilities are addressed before they escalate into widespread risks.

Reporting cyber incidents, much like the practice of reporting near misses and accidents in health and safety, strengthens overall resilience. Just as greater visibility has helped organizations reduce safety incidents, increased cyber reporting makes it harder for hackers to exploit gaps, reinforcing defenses before real damage occurs.

The Thales Data Threat Report underscores the growing risks to Critical National Infrastructure (CNI) and highlights the value of compliance—organisations that passed cybersecurity audits had significantly fewer breaches than those that failed. With the Cyber Security and Resilience Bill raising standards, stronger protections for essential infrastructure, including data centers that support AI innovation and national healthcare, will become the norm.

Each unreported cyber-attack is a missed opportunity to refine security strategies. Enhanced visibility into cyber threats improves collective intelligence, allowing organizations to make faster, smarter decisions in the face of emerging risks.

Conclusion: building security for the future

Modern cybersecurity requires more than patching vulnerabilities or checking compliance boxes—it demands a strategic rethink of how systems are designed, maintained, and safeguarded. Understanding how legacy and modern environments interact is key, alongside developing cyber talent that can anticipate and mitigate future risks.

Secure by Design must be the standard, not the exception. With the right balance of policy, proactive security measures, and skilled professionals, organizations can shift from reactive defense to sustainable resilience, ensuring they are prepared for the threats ahead, not just responding to the ones they see today.

We've featured the best endpoint protection software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Open source, open science, and cryptography

TechRadar News - Tue, 07/08/2025 - 09:13

In the world of technology, open source refers to software which is made publicly available, and is free for anyone to use or modify. It is a very popular approach to software development, enabling an open and community engagement to building software projects.

One of the main advantages of open source is transparency, a property that is widely embraced by tech enthusiasts. Open source code means that anyone can inspect the code before usage, meaning that anyone could spot malicious, or broken, code. This is a perfect example of the mantra “Don't trust, verify”, which is popular in various technology spaces.

One of the main drawbacks of open source is considered to be lack of interested involvement from external developers. Many projects typically start with one, or a few, developers – and this base can struggle to grow, leading to a low “bus-factor” (dependency on too few developers) for the majority of open source projects.

This can lead to developer burnout or exhaustion, and can eventually cause the ultimate abandonment of projects. Alongside this, funding can also play a crucial role; many of the most successful projects are backed by some degree of funding from organizations and/or non-profits, effectively supporting developers throughout the time required to maintain the project.

Thankfully, while these issues are very much real there are several examples of successful and pioneering projects in the open source space which have overcome these obstacles. The Linux Foundation is the most prominent example, and there are also some interesting ones in the cryptography space, a field that can particularly benefit from adapting the open source approach. Let’s take a look at some of them individually below.

The Linux Foundation

The most notable example of a successful open source project is the open source development of the Linux Kernel. Originally published in 1991 under a custom license which did not allow commercial usage, this was quickly shifted to an open source-friendly license (GPL), to enable developers to collaborate on the code and ensure wide and free availability of the software.

The open source version which can now be found on Github, is one of the most contributed projects in the history of open source. With over 15,000 contributors, this project has clearly been a huge success. Whilst only ~4% of Desktop computers worldwide are now running Linux, it is still the platform of choice for many computer scientists and cryptographers.

Let’s encrypt

In the cryptography space, a popular example is Let’s Encrypt. Let’s Encrypt is an influential open source certificate authority (CA) which helps enable secure communication via HTTPS over the web. This project was started by the Internet Security Research Group (ISG), which is a small non-profit launched in 2015 and backed by various industry players.

Since their launch in 2015, HTTPS usage on the internet has risen from ~40% to ~90%+ today. This, of course, is not down solely to Let’s encrypt, but their mission to “democratize HTTPS by making SSL/TLS certificates free, automated, and easy to obtain” has clearly had a major impact on this. Today, Let’s Encrypt powers secure communications for millions of sites, APIs, and services and is viewed as a major success in the cryptography space.

Open science

Open science is a similar idea which draws influence from open source. The goal of open science is to make academic publications (as well as any associated source code, data, etc) public and free for anyone to view or build on. Particularly in the cryptography space, this is something that academics tend to view as a must-have for their work: all experiments should be reproducible with available code. The website https://paperswithcode.com/ collects works which open-source their code in the Machine Learning space.

Such an approach can be critical for successful outcomes in science and research. Attempting to build on something “closed” is almost impossible, which may lead researchers to either completely rebuild something from scratch, or giving up entirely.

An additional element that can help promote this collaborative approach is the promotion of platforms like events and conferences that aim to gather experts and researchers and foster exchange. In the world of cryptography - and of Fully Homomorphic Encryption in particular - FHE.org is one such community, hosting regular online meetups and an annual conference to bring together the best and brightest minds.

Looking forward

The next frontier in this space, in my view, is AI. AI is an area showing immense growth over the past few years; there is a tangible improvement in models. OpenAI recently closed the largest funding round in history (40b at a 300b valuation). There is currently an AI-arms race between big-tech firms, and specialized start-ups who are vying to release the best model (Polymarket is currently backing Google, at the time of writing).

Clearly, this is a sector where open source principles could be applied well, with collaboration encouraged to ensure correct management of ethics, as opposed to control by a single organization or board.

We've featured the best encryption software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Open source, open science, and cryptography

TechRadar News - Tue, 07/08/2025 - 09:13

In the world of technology, open source refers to software which is made publicly available, and is free for anyone to use or modify. It is a very popular approach to software development, enabling an open and community engagement to building software projects.

One of the main advantages of open source is transparency, a property that is widely embraced by tech enthusiasts. Open source code means that anyone can inspect the code before usage, meaning that anyone could spot malicious, or broken, code. This is a perfect example of the mantra “Don't trust, verify”, which is popular in various technology spaces.

One of the main drawbacks of open source is considered to be lack of interested involvement from external developers. Many projects typically start with one, or a few, developers – and this base can struggle to grow, leading to a low “bus-factor” (dependency on too few developers) for the majority of open source projects.

This can lead to developer burnout or exhaustion, and can eventually cause the ultimate abandonment of projects. Alongside this, funding can also play a crucial role; many of the most successful projects are backed by some degree of funding from organizations and/or non-profits, effectively supporting developers throughout the time required to maintain the project.

Thankfully, while these issues are very much real there are several examples of successful and pioneering projects in the open source space which have overcome these obstacles. The Linux Foundation is the most prominent example, and there are also some interesting ones in the cryptography space, a field that can particularly benefit from adapting the open source approach. Let’s take a look at some of them individually below.

The Linux Foundation

The most notable example of a successful open source project is the open source development of the Linux Kernel. Originally published in 1991 under a custom license which did not allow commercial usage, this was quickly shifted to an open source-friendly license (GPL), to enable developers to collaborate on the code and ensure wide and free availability of the software.

The open source version which can now be found on Github, is one of the most contributed projects in the history of open source. With over 15,000 contributors, this project has clearly been a huge success. Whilst only ~4% of Desktop computers worldwide are now running Linux, it is still the platform of choice for many computer scientists and cryptographers.

Let’s encrypt

In the cryptography space, a popular example is Let’s Encrypt. Let’s Encrypt is an influential open source certificate authority (CA) which helps enable secure communication via HTTPS over the web. This project was started by the Internet Security Research Group (ISG), which is a small non-profit launched in 2015 and backed by various industry players.

Since their launch in 2015, HTTPS usage on the internet has risen from ~40% to ~90%+ today. This, of course, is not down solely to Let’s encrypt, but their mission to “democratize HTTPS by making SSL/TLS certificates free, automated, and easy to obtain” has clearly had a major impact on this. Today, Let’s Encrypt powers secure communications for millions of sites, APIs, and services and is viewed as a major success in the cryptography space.

Open science

Open science is a similar idea which draws influence from open source. The goal of open science is to make academic publications (as well as any associated source code, data, etc) public and free for anyone to view or build on. Particularly in the cryptography space, this is something that academics tend to view as a must-have for their work: all experiments should be reproducible with available code. The website https://paperswithcode.com/ collects works which open-source their code in the Machine Learning space.

Such an approach can be critical for successful outcomes in science and research. Attempting to build on something “closed” is almost impossible, which may lead researchers to either completely rebuild something from scratch, or giving up entirely.

An additional element that can help promote this collaborative approach is the promotion of platforms like events and conferences that aim to gather experts and researchers and foster exchange. In the world of cryptography - and of Fully Homomorphic Encryption in particular - FHE.org is one such community, hosting regular online meetups and an annual conference to bring together the best and brightest minds.

Looking forward

The next frontier in this space, in my view, is AI. AI is an area showing immense growth over the past few years; there is a tangible improvement in models. OpenAI recently closed the largest funding round in history (40b at a 300b valuation). There is currently an AI-arms race between big-tech firms, and specialized start-ups who are vying to release the best model (Polymarket is currently backing Google, at the time of writing).

Clearly, this is a sector where open source principles could be applied well, with collaboration encouraged to ensure correct management of ethics, as opposed to control by a single organization or board.

We've featured the best encryption software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Virgin River fans need to watch Netflix’s new ‘sister show’ with over 90% on Rotten Tomatoes

TechRadar News - Tue, 07/08/2025 - 09:10

It’s good news for those of us who can’t wait to head back to Virgin River, because seasons 1-2 of Sullivan’s Crossing – also created by author Robyn Carr – are now available to stream on Netflix. You might have missed it in everything new coming to Netflix in July 2025, but there’s a good reason why you shouldn’t overlook it (and not just that season 3 is still to come).

Virgin River’s success alone is nothing short of astonishing. It’s now the longest-running original series on the platform, still pulling in almost 16 million viewers when season 6 dropped in December 2024. Virgin River season 7 has officially wrapped filming, but no release date is confirmed as of writing.

Bad news, right? Wrong! Sullivan’s Crossing is the ideal new TV show to tide us over in the meantime. Set in Canada rather than California, it’s the epitome of cozy comfort drama with plenty of famous faces thrown in for good measure.

Why I recommend watching Sullivan’s Crossing on Netflix

Neurosurgeon Maggie (Morgan Kohan) is looking to move away from her big city life in Boston after a terrible tragedy affects her personal life. She moves back to her childhood hometown of Sullivan’s Crossing, Nova Scotia, where her dad Sully (Scott Patterson) runs a campground. Maggie meets new resident Cal (Chad Michael Murray), and sparks soon fly. Where have we heard that storyline before?

Sure, Sullivan’s Crossing is exactly the same as Virgin River if you strip it back to its bare bones, but in reality, the hit TV show is so much more than its big sister. For starters, the cast unites When Hope Calls’ Kohan, noughties teen heartthrob Murray and Gilmore Girls legend Patterson in family conflict that always pulls on the heartstrings, allowing each actor to do what they’re best at. Obviously, it doesn’t hurt that any drama takes place against the jaw-droppingly picturesque vistas of rural Canada.

Our main anchor points differ from Virgin River, too. Maggie is falling for Cal, but still has tenuous links to her ex, Andrew (Allan Hawco). In essence, this acts as the reverse of Jack Sheridan (Martin Henderson), who falls for newcomer Mel (Alexandra Breckenridge) but hasn’t fully broken things off with Charmaine (Lauren Hammersley). Sullivan’s Crossing takes its romantic triangle one step further, embroiling the trio in a messy pregnancy plot destined to change all of their lives for good.

What’s the best thing about Sullivan’s Crossing, I hear you ask? The beautiful mundanity of their day-to-day lives. Where rival TV shows like Riverdale and the reboot of Dynasty take the drama in their dynamics to the extreme, Sullivan’s Crossing always returns to the simplicity of what real life really looks like, and that pays off in its popularity. You can blissfully lose your mind to the till breaking at the campground reception, inane chatter happening in the local diner and the many whimsical local events that bring the community together.

If you just can’t wait for Virgin River to return, or want to immerse yourself in more of the same, there’s no question that Sullivan’s Crossing will scratch that itch.

You might also like
Categories: Technology

Virgin River fans need to watch Netflix’s new ‘sister show’ with over 90% on Rotten Tomatoes

TechRadar News - Tue, 07/08/2025 - 09:10

It’s good news for those of us who can’t wait to head back to Virgin River, because seasons 1-2 of Sullivan’s Crossing – also created by author Robyn Carr – are now available to stream on Netflix. You might have missed it in everything new coming to Netflix in July 2025, but there’s a good reason why you shouldn’t overlook it (and not just that season 3 is still to come).

Virgin River’s success alone is nothing short of astonishing. It’s now the longest-running original series on the platform, still pulling in almost 16 million viewers when season 6 dropped in December 2024. Virgin River season 7 has officially wrapped filming, but no release date is confirmed as of writing.

Bad news, right? Wrong! Sullivan’s Crossing is the ideal new TV show to tide us over in the meantime. Set in Canada rather than California, it’s the epitome of cozy comfort drama with plenty of famous faces thrown in for good measure.

Why I recommend watching Sullivan’s Crossing on Netflix

Neurosurgeon Maggie (Morgan Kohan) is looking to move away from her big city life in Boston after a terrible tragedy affects her personal life. She moves back to her childhood hometown of Sullivan’s Crossing, Nova Scotia, where her dad Sully (Scott Patterson) runs a campground. Maggie meets new resident Cal (Chad Michael Murray), and sparks soon fly. Where have we heard that storyline before?

Sure, Sullivan’s Crossing is exactly the same as Virgin River if you strip it back to its bare bones, but in reality, the hit TV show is so much more than its big sister. For starters, the cast unites When Hope Calls’ Kohan, noughties teen heartthrob Murray and Gilmore Girls legend Patterson in family conflict that always pulls on the heartstrings, allowing each actor to do what they’re best at. Obviously, it doesn’t hurt that any drama takes place against the jaw-droppingly picturesque vistas of rural Canada.

Our main anchor points differ from Virgin River, too. Maggie is falling for Cal, but still has tenuous links to her ex, Andrew (Allan Hawco). In essence, this acts as the reverse of Jack Sheridan (Martin Henderson), who falls for newcomer Mel (Alexandra Breckenridge) but hasn’t fully broken things off with Charmaine (Lauren Hammersley). Sullivan’s Crossing takes its romantic triangle one step further, embroiling the trio in a messy pregnancy plot destined to change all of their lives for good.

What’s the best thing about Sullivan’s Crossing, I hear you ask? The beautiful mundanity of their day-to-day lives. Where rival TV shows like Riverdale and the reboot of Dynasty take the drama in their dynamics to the extreme, Sullivan’s Crossing always returns to the simplicity of what real life really looks like, and that pays off in its popularity. You can blissfully lose your mind to the till breaking at the campground reception, inane chatter happening in the local diner and the many whimsical local events that bring the community together.

If you just can’t wait for Virgin River to return, or want to immerse yourself in more of the same, there’s no question that Sullivan’s Crossing will scratch that itch.

You might also like
Categories: Technology

TSA May Soon Let You Keep Your Shoes On During Security Screening

CNET News - Tue, 07/08/2025 - 08:42
The shift comes after nearly 20 years of mandatory shoe removal, a rule put in place after the 2001 "shoe bomber" attempt reshaped airport security protocols.
Categories: Technology

Hi-fi legend KEF unveils its first Dolby Atmos soundbar, and this is one to get excited about

TechRadar News - Tue, 07/08/2025 - 08:19
  • The KEF XIO soundbar costs £1,999 / $2,499 / AU$3,600
  • Dolby Atmos, DTS:X and Sony 360 Reality Audio
  • 5.1.2 channels with 12 class D amplifiers

Audio legend KEF has been busy: not only did its team collaborate with Nothing on the Headphone (1), but it's also unveiled its first-ever Dolby Atmos soundbar. The team is clearly pretty proud of it, and promises a "transcendent" audio experience.

At $2,499 / £1,999 this is clearly one for high-end home theaters. It's a 5.1.2-channel all-in-one soundbar with 12 class D amplifiers putting out a whopping 820W of total power.

Despite that, the XIO soundbar is still shallow enough to look good on a wall. And where many soundbars are made specifically for movies, KEF says that the XIO has been made with music in mind too.

(Image credit: KEF)KEF XIO soundbar: key features

The soundbar has six Uni-Q MX drivers, which are smaller versions of the Uni-Q drivers you'll find in larger KEF speakers. These are special because they're two speaker in one – a smaller driver sits at the center of the cone of the large speaker, creating a wider soundstage between them that forms one clear audio signal.

Three of these drivers are placed on top for upward-firing audio, and the other three face forwards. They're teamed up with four P185 bass drivers, which are rectangular drivers that KEF says have the same radiating area as a standard circular 10cm driver. The rectangular shape means the soundbar can accommodate more drivers without adding bulk – similar racetrack drivers are used in lots of the best soundbars.

Despite that serious low-end power, you shouldn't get much in the way of unwanted vibration: KEF says the way it has arranged the drivers, with two pairs facing in opposite directions, meaning that each driver cancels out the vibration of its opposite.

The XIO also features KEF's patent-pending Velocity Control Technology, which it calls VECO. It's a sensor that monitors the P185 driver cones, adjusting the movement to compensate for any errors it detects in order to minimize distortion and compression.

Another key acronym is MIE, short for the Music Integrity Engine. This is a suite of DSP algorithms made specifically for the XIO to handle multi-channel processing, virtualization and object placement. The result, KEF says, is "transcendent soundscapes".

The XIO works with all the major streamers including Tidal, Amazon Music, Qobuz and Deezer, and it has HDMI eARC, optical and subwoofer outputs. You can also add any KEF subwoofer via the optional KW2 wireless receiver.

The KEF XIO is available via early access to myKEF members from today, 8 July, and it goes on sale on the 18th of July. It'll also be available from today in certain retailers, including Peter Tyson AV and Sevenoaks Sound & Vision in the UK, with wider retail availability starting on 8th August 2025.

You might also like
Categories: Technology

Hi-fi legend KEF unveils its first Dolby Atmos soundbar, and this is one to get excited about

TechRadar News - Tue, 07/08/2025 - 08:19
  • The KEF XIO soundbar costs £1,999 / $2,499 / AU$3,600
  • Dolby Atmos, DTS:X and Sony 360 Reality Audio
  • 5.1.2 channels with 12 class D amplifiers

Audio legend KEF has been busy: not only did its team collaborate with Nothing on the Headphone (1), but it's also unveiled its first-ever Dolby Atmos soundbar. The team is clearly pretty proud of it, and promises a "transcendent" audio experience.

At $2,499 / £1,999 this is clearly one for high-end home theaters. It's a 5.1.2-channel all-in-one soundbar with 12 class D amplifiers putting out a whopping 820W of total power.

Despite that, the XIO soundbar is still shallow enough to look good on a wall. And where many soundbars are made specifically for movies, KEF says that the XIO has been made with music in mind too.

(Image credit: KEF)KEF XIO soundbar: key features

The soundbar has six Uni-Q MX drivers, which are smaller versions of the Uni-Q drivers you'll find in larger KEF speakers. These are special because they're two speaker in one – a smaller driver sits at the center of the cone of the large speaker, creating a wider soundstage between them that forms one clear audio signal.

Three of these drivers are placed on top for upward-firing audio, and the other three face forwards. They're teamed up with four P185 bass drivers, which are rectangular drivers that KEF says have the same radiating area as a standard circular 10cm driver. The rectangular shape means the soundbar can accommodate more drivers without adding bulk – similar racetrack drivers are used in lots of the best soundbars.

Despite that serious low-end power, you shouldn't get much in the way of unwanted vibration: KEF says the way it has arranged the drivers, with two pairs facing in opposite directions, meaning that each driver cancels out the vibration of its opposite.

The XIO also features KEF's patent-pending Velocity Control Technology, which it calls VECO. It's a sensor that monitors the P185 driver cones, adjusting the movement to compensate for any errors it detects in order to minimize distortion and compression.

Another key acronym is MIE, short for the Music Integrity Engine. This is a suite of DSP algorithms made specifically for the XIO to handle multi-channel processing, virtualization and object placement. The result, KEF says, is "transcendent soundscapes".

The XIO works with all the major streamers including Tidal, Amazon Music, Qobuz and Deezer, and it has HDMI eARC, optical and subwoofer outputs. You can also add any KEF subwoofer via the optional KW2 wireless receiver.

The KEF XIO is available via early access to myKEF members from today, 8 July, and it goes on sale on the 18th of July. It'll also be available from today in certain retailers, including Peter Tyson AV and Sevenoaks Sound & Vision in the UK, with wider retail availability starting on 8th August 2025.

You might also like
Categories: Technology

One of the biggest security threats to Apple systems just got a major upgrade - here's what we know

TechRadar News - Tue, 07/08/2025 - 08:05
  • Atomic Stealer, or AMOS, is no longer just a pure infostealer, experts warn
  • The tool now comes with a backdoor and a persistence mechanism
  • A new variant was seen circulating in the wild

Atomic Stealer (AMOS), one of the most dangerous infostealer malware threats on the macOS ecosystem, just got a significant upgrade that makes it even more dangerous, experts have warned.

A new version of the malware was spotted sporting a backdoor that not only allows persistent access and survives reboots, but also grants the attackers the ability to deploy any other malware on the compromised device, as well.

The news comes courtesy of MacPaw’s cybersecurity arm, Moonlock, who were tipped off by an independent researcher with the alias g0njxa., who noted the backdoored version of Atomic macOS Stealer now has the potential to gain full access to thousands of Mac devices worldwide.

Get 55% off Incogni's Data Removal service with code TECHRADAR

Wipe your personal data off the internet with the Incogni data removal service. Stop identity thieves
and protect your privacy from unwanted spam and scam calls.View Deal

A popular infostealer

AMOS has been around for years, establishing itself as the go-to stealer malware used in many major hacking campaigns. Until now, it was capable of extracting a wide range of data, including browser-stored passwords and keychains, autofill data, cryptocurrency wallet information, system data, and different files. It was also able to bypass macOS protections, tricking Gatekeeper and other macOS security features.

It was sold as MaaS (malware-as-a-service) on underground forums, and often distributed via fake apps and malicious websites.

We last heard of AMOS in early June 2025, when Russian threat actors used the popular ClickFix method to deploy it against their targets. At the time, security researchers from CloudSek reported multiple websites spoofing Spectrum, a US-based telecommunications provider, to deliver the malware.

In early January, software developer Ryan Chenkie spotted a malicious campaign on Google, promoting a fake version of Homebrew, an open source package manager for macOS and Linux that was, in fact, AMOS.

"AMOS malware campaigns have already reached over 120 countries, with the United States, France, Italy, the United Kingdom, and Canada among the most affected," the researchers warned.

Via BleepingComputer

You might also like
Categories: Technology

One of the biggest security threats to Apple systems just got a major upgrade - here's what we know

TechRadar News - Tue, 07/08/2025 - 08:05
  • Atomic Stealer, or AMOS, is no longer just a pure infostealer, experts warn
  • The tool now comes with a backdoor and a persistence mechanism
  • A new variant was seen circulating in the wild

Atomic Stealer (AMOS), one of the most dangerous infostealer malware threats on the macOS ecosystem, just got a significant upgrade that makes it even more dangerous, experts have warned.

A new version of the malware was spotted sporting a backdoor that not only allows persistent access and survives reboots, but also grants the attackers the ability to deploy any other malware on the compromised device, as well.

The news comes courtesy of MacPaw’s cybersecurity arm, Moonlock, who were tipped off by an independent researcher with the alias g0njxa., who noted the backdoored version of Atomic macOS Stealer now has the potential to gain full access to thousands of Mac devices worldwide.

Get 55% off Incogni's Data Removal service with code TECHRADAR

Wipe your personal data off the internet with the Incogni data removal service. Stop identity thieves
and protect your privacy from unwanted spam and scam calls.View Deal

A popular infostealer

AMOS has been around for years, establishing itself as the go-to stealer malware used in many major hacking campaigns. Until now, it was capable of extracting a wide range of data, including browser-stored passwords and keychains, autofill data, cryptocurrency wallet information, system data, and different files. It was also able to bypass macOS protections, tricking Gatekeeper and other macOS security features.

It was sold as MaaS (malware-as-a-service) on underground forums, and often distributed via fake apps and malicious websites.

We last heard of AMOS in early June 2025, when Russian threat actors used the popular ClickFix method to deploy it against their targets. At the time, security researchers from CloudSek reported multiple websites spoofing Spectrum, a US-based telecommunications provider, to deliver the malware.

In early January, software developer Ryan Chenkie spotted a malicious campaign on Google, promoting a fake version of Homebrew, an open source package manager for macOS and Linux that was, in fact, AMOS.

"AMOS malware campaigns have already reached over 120 countries, with the United States, France, Italy, the United Kingdom, and Canada among the most affected," the researchers warned.

Via BleepingComputer

You might also like
Categories: Technology

This Light-Pulsing Rubik's Cube Is a Dazzling Way to Play in the Dark

CNET News - Tue, 07/08/2025 - 08:00
Exclusive: The Rubik's Pulse Cube from Spin Master transforms from a bland mirror cube to a light show puzzle.
Categories: Technology

'She's ready to take this on': Foundation star Lou Llobell teases Gaal Dornick's all-consuming quest to stop The Mule in the Apple TV+ show's third season

TechRadar News - Tue, 07/08/2025 - 08:00
  • Foundation season 3 will see Gaal Dornick sacrifice everything to stop The Mule
  • Hari Seldon's protégé really steps up this season, actor Lou Llobell says
  • It remains to be seen if she'll succeed in thwarting this season's main villain

Lou Llobell has indicated Gaal Dornick will stop at nothing to ensure The Mule doesn't become the new galactic tyrant in Foundation season 3.

Speaking to TechRadar, Llobell, who has portrayed Dornick since the Apple TV+ sci-fi series began, says her character is willing to "sacrifice everything" to defeat this season's primary antagonist.

First teased in last season's finale, The Mule is an incredibly dangerous Mentalic – people who possess superhuman psychic abilities – who wants to bring the entire galaxy under his iron fist. You can read my Foundation season 2 ending explained article and/or exclusive chat with Pilou Asbaek, who says The Mule needs to be seen as "a big threat" to The Foundation and The Imperium, for more details.

However, Dornick, who's also a Mentalic, has had visions of The Mule since Foundation season 2. Alongside mentor and psychohistorian Hari Seldon (Jared Harris), Dornick has spent the past 152 years in and out of cryosleep to prepare a secret Ignis-based community of Mentalics – also known as Second Foundation – for The Mule's arrival.

Gaal has spent the past 152 years preparing for The Mule's arrival (Image credit: Apple TV+)

With the unhinged and ambitious villain finally showing his face in one of the best Apple TV+ shows' third season, it's time for Dornick to fully step up and prevent him from achieving his goal of becoming the galaxy's latest authoritarian.

To combat the demonstrably evil character played by Asbaek – the Game of Thrones alumnus replaced Mikael Persbrandt as The Mule in a season 3 cast shake-up, FYI – though, Dornick will have to put everything else aside, including her own happiness, to thwart his rapid and successful conquering of Foundation's fictional universe.

"Gail has grown so much," Llobell told me, "And you see her really take a massive leap into this new role as a leader and someone who's going to sacrifice everything to make sure the plan stays on track and that The Mule is stopped.

"It's beautiful to see her with all these different people [on Ignis] and the relationships that she has [with them]," Llobell continued. "But, her one goal is still to deal with The Mule. She's ready to take this on, even though things might not go according to plan as the season unfolds."

Find out what I thought about the first half of the show's latest chapter by reading my Foundation season 3 review. Be sure to read the below section, too, for more coverage, exclusive or otherwise, of the Apple TV Original before season 3 arrives on July 11, too.

You might also like
Categories: Technology

'She's ready to take this on': Foundation star Lou Llobell teases Gaal Dornick's all-consuming quest to stop The Mule in the Apple TV+ show's third season

TechRadar News - Tue, 07/08/2025 - 08:00
  • Foundation season 3 will see Gaal Dornick sacrifice everything to stop The Mule
  • Hari Seldon's protégé really steps up this season, actor Lou Llobell says
  • It remains to be seen if she'll succeed in thwarting this season's main villain

Lou Llobell has indicated Gaal Dornick will stop at nothing to ensure The Mule doesn't become the new galactic tyrant in Foundation season 3.

Speaking to TechRadar, Llobell, who has portrayed Dornick since the Apple TV+ sci-fi series began, says her character is willing to "sacrifice everything" to defeat this season's primary antagonist.

First teased in last season's finale, The Mule is an incredibly dangerous Mentalic – people who possess superhuman psychic abilities – who wants to bring the entire galaxy under his iron fist. You can read my Foundation season 2 ending explained article and/or exclusive chat with Pilou Asbaek, who says The Mule needs to be seen as "a big threat" to The Foundation and The Imperium, for more details.

However, Dornick, who's also a Mentalic, has had visions of The Mule since Foundation season 2. Alongside mentor and psychohistorian Hari Seldon (Jared Harris), Dornick has spent the past 152 years in and out of cryosleep to prepare a secret Ignis-based community of Mentalics – also known as Second Foundation – for The Mule's arrival.

Gaal has spent the past 152 years preparing for The Mule's arrival (Image credit: Apple TV+)

With the unhinged and ambitious villain finally showing his face in one of the best Apple TV+ shows' third season, it's time for Dornick to fully step up and prevent him from achieving his goal of becoming the galaxy's latest authoritarian.

To combat the demonstrably evil character played by Asbaek – the Game of Thrones alumnus replaced Mikael Persbrandt as The Mule in a season 3 cast shake-up, FYI – though, Dornick will have to put everything else aside, including her own happiness, to thwart his rapid and successful conquering of Foundation's fictional universe.

"Gail has grown so much," Llobell told me, "And you see her really take a massive leap into this new role as a leader and someone who's going to sacrifice everything to make sure the plan stays on track and that The Mule is stopped.

"It's beautiful to see her with all these different people [on Ignis] and the relationships that she has [with them]," Llobell continued. "But, her one goal is still to deal with The Mule. She's ready to take this on, even though things might not go according to plan as the season unfolds."

Find out what I thought about the first half of the show's latest chapter by reading my Foundation season 3 review. Be sure to read the below section, too, for more coverage, exclusive or otherwise, of the Apple TV Original before season 3 arrives on July 11, too.

You might also like
Categories: Technology

Virtuos believes the GPU capabilities of the Nintendo Switch 2 and Xbox Series S are 'comparable', making it easier to port some games that run at 60fps to the new console

TechRadar News - Tue, 07/08/2025 - 07:37
  • Developer Virtuos believes it would be easy to port an Xbox Series S game that runs at 60FPS to the Nintendo Switch 2
  • Eoin O’Grady, technical director at Virtuos' subsidiary Black Shamrock says the GPU capabilities of both consoles are "comparable overall"
  • However, CPU-wise, the Switch 2 is closer to the PlayStation 4

Port studio Virtuos believes that it would be easy to bring an Xbox Series S game to the Nintendo Switch 2, considering their technical similarities.

In an interview with Wccftech, Alex Heise, director of business development at Virtuos North America, and Eoin O’Grady, technical director at Virtuos' subsidiary Black Shamrock, discussed Nintendo's new hardware and its technical capabilities.

According to O'Grady, both consoles' GPUs are similar in power despite the Switch 2 performing lower than the Xbox Series S and offering Nvidia's Deep Learning Super Sampling (DLSS), but believes it would still be an easy task to port a Series S game that performs at 60fps to the latest console.

"GPU-wise, the Switch 2 performs slightly below the Series S; this difference is more noticeable in handheld mode," O'Grady said. "However, the Series S does not support technologies like DLSS, which the Switch 2 does. This makes the GPU capabilities of the two consoles comparable overall.

The technical director noted, however, that CPU-wise, there is a "clearer distinction between the two consoles," and the Switch 2 is closer to the PlayStation 4 in that respect since it has a slightly more powerful CPU.

"Since most games tend to be more GPU-bound than CPU-bound when well optimized, the impact of this difference largely depends on the specific game and its target frame rate," O'Grady explained.

"Any game shipping at 60fps on the Series S should easily port to the Switch 2. Likewise, a 30fps Series S game that’s GPU-bound should also port well. Games with complex physics, animations, or other CPU-intensive elements might incur additional challenges in reaching 30 or 60fps or require extra optimization during porting."

Cyberpunk 2077, which can only hit 60fps on Xbox Series S but not consistently on the PS4, just received an official Switch 2 port. However, this version doesn't offer 60fps the same way the Series S does, and instead features two modes to choose from while docked, including a 40fps performance mode and a 30fps quality mode.

You might also like...
Categories: Technology

Pages

Subscribe to The Vortex aggregator