Error message

  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

Feed aggregator

New forum topics

I tried Codev and found it to be one of the easiest to use no-code platforms to use

TechRadar Reviews - Mon, 04/28/2025 - 03:47

Codev is a no-code platform that relies exclusively on Artificial Intelligence (AI) to help transform natural language descriptions into web apps. In this review we’ll delve into its features, interface, ease of use, integration and extensibility, deployment and maintenance, pricing and documentation, and compare it with its competitors.

Codev: Features

Codev is one of the simplest no-code platforms, which also makes it one of the easiest to get started with, even for first timers.

As we’ve mentioned, Codev is one of the growing number of no-code platforms that leverages AI to create apps. The use of AI makes it dead simple for non-developers to create web apps without writing a single line of code.

All you need to do is describe your app idea in regular English, and Codev will take care of the rest. The platform will analyze your input to build your app together with all the necessary components, styling, and functionality for the app.

You can then again use AI to keep refining the app. Very helpfully, the platform will keep track of all the iterations of the app, and you can revert to any previous version with a single click.

You can also upload images to the platform, which you can then ask it to use in the app. This is helpful for things like app logos, custom headers, product images, and such.

Besides AI, the platform also lets you customize the broader look, and feel of your apps with just a few clicks. You can, for instance, change the primary color to align the app to your brand, adjust the corner radius, and switch between light or dark modes.

(Image credit: Codev)

Codev can work with the open source Firebase-alternative, Supabase, which uses PostgreSQL to add databases to your apps. You can also use it to roll in authentication services, like user sign ups and logins.

By default, all Codev apps are responsive, which means they can adapt to different screen sizes and devices. This ensures that your apps provide a consistent user experience across desktops, and smartphones.

When you are done, you can also transfer your project to a GitHub repo, which is a helpful feature if you need to make manual code edits to your apps.

Codev: Interface and Ease of Use

Thanks to its limited number of features, Codev has a simple, and straightforward interface, unlike many of its peers. This makes it very approachable, especially if you are new to no-code app development platforms.

Once you’ve entered the prompt, the platform will start building the app, and detail each and every step.

Remember however, that you can only add authentication services, and databases to your app at the start of the app creation process.

One of the good things about Codev is its verbosity. The platform details each and every step in the app creation process. For instance, it’ll tell you how it’s going about putting together the backend (the database structure), and assembling the frontend (user interface).

It’ll also list all the features it has implemented, like contact listing with search, contact creation with form validation, and such. Codev will also list all that you can do with the app in simple language. Finally, the platform will also offer suggestions on how you can improve the first iteration of the app.

Once it’s done building the app, you can preview it on the left side of the screen. By default, the preview shows the desktop view, but you can also switch to the mobile view.

You can also optionally rate the output as well, based on how closely the app meets the requirements you specified in the AI prompt. The platform keeps track of all iterations of the app above the preview. Interestingly, you can switch, and preview any version, before you decide to revert to an older instance.

(Image credit: Codev)

There’s also a button to view the error log, in case it ran into any during the build. If you do get an error, you can use the Attempt Fix button to let the platform resolve the issue on its own.

Unlike many of its peers, Codev doesn’t include a designer to help fine tune the various elements in your app, such as the titles. However, you can use the Select Element option to hover, and mark the elements you want to refine. You can then describe how you’d like to modify these elements to Codev’s AI.

Codev: Integration and Extensibility

Codev relies on the Next.js framework to power its apps. The platform also does

Server-Side Rendering (SSR) and Static Site Generation (SSG) to pre-render the web apps on the server, which helps improve its initial load times, and SEO ranking.

The platform also uses the Prisma Object-Relational Mapper (ORM) to simplify database interactions, and make it easier to build data-driven apps.

As we’ve pointed out earlier, Codev gets its database from Supabase. Earlier, the platform offered a code download feature, but you can now hook it up with your GitHub account, and ask it to transfer your web app to a GitHub repo.

This is especially useful for advanced users who want to manually make changes to the code, or perhaps collaborate with other developers. Remember though, there’s no provision to upload the exported code back into Codev.

Codev: Deployment and Maintenance

Once your app is ready, you can publish it with a single click. By default, the platform will publish the latest version of the app. However, you can publish any of the earlier versions as well.

(Image credit: Codev)

As with its peers, Codev too publishes apps to its own subdomain. The advantage of this is that you don’t have to distract yourself with the nitty-gritties of web hosting. That said, you do have the option to deploy the app to your own custom domain.

Remember however, that any changes made to the app will not be reflected in the deployed version automatically. Instead, you’ll have to manually republish the app, while ensuring you select the latest version of the app.

Codev: Pricing and Documentation

Codev's pricing model offers flexible options in order to cater to a wide range of users, from startups to larger businesses.

The Free tier offers a limited number of features, but is good enough for exploring the platform. You can use it to query the AI 15 times a month, with a maximum of five messages a day.

If that number’s too low for you, there’s the $19/month Lite plan that offers 50 additional AI queries per month, with no daily limits. You can have up to five private projects in this plan, and publish projects to a custom domain as well. This plan also lets you transfer the code for your app to your GitHub repo.

If you are looking to publish more than one app, switch to the $49/month Pro plan, which allows you to publish an unlimited number of apps to an unlimited number of custom domains. The plan also offers an additional 150 AI messages, gives you early access to new features, and access to the platform’s developers.

In terms of documentation, Codev has a handful of tutorials that cover best practices for writing effective prompts, supabase setup, and authentication. The share update, and details about new features via their official blog.

Support is dispensed through Codev’s Discord channel, and Pro users can also seek support from the platform’s developers.

Codev: The Competition

Codev competes against three other platforms, all of which make extensive use of AI to democratize app development.

First up, is the newly launched Hostinger Horizons, which offers more integration like payment gateways. And while it won’t send code to your GitHub repo, it does let you download and edit it offline. Also, unlike its peers, you can interact with Horizons AI using several non-English languages, as well as through voice prompts.


Then there’s Lovable, which can do everything you can with Codev, and then some. For instance, it offers two-way sync with GitHub, pre-built templates, a Figma-like visual editor, and more.

Codev: Final Verdict

Codev’s best feature is its use of AI to design, and debug the app, which makes the platform usable by non-programmers as well.

However, Codev has a limited set of features, as compared to its peers. It also doesn’t have a visual GUI editor, nor any templates to jump start the app creation process. The platform also can only make web apps, and not mobile apps, or even progressive web apps (PWAs).

All things considered, Codev comes across as a barebones AI-powered no-code platform that offers the bare minimum features you need to spin up a Minimum Viable Product (MVP) with minimal effort.

Here’s a list of the best laptops for programming.

Categories: Reviews

Gartner: enabling cybersecurity amid geopolitical rifts

TechRadar News - Mon, 04/28/2025 - 02:29

The digital and physical worlds are increasingly intertwined, amplifying both the complexity and stakes for cybersecurity and risk management leaders. On top of that geopolitical tensions are escalating and regulatory requirements are evolving, which means SRM leaders need to move their organization beyond reactive security models.

Today, SRM leaders are integrating geopolitical awareness, cyber deterrence, and AI-driven security into their cybersecurity strategies, so they can swiftly counter threats and ensure operational continuity and resilience, protecting not just systems, but the trust and stability that fuel organizational success.

The growing influence of geopolitics on cybersecurity

Geopolitical instability is no longer a backdrop – it’s a direct driver of security decision-making. Gartner predicts that by 2029, geopolitics will be a significant consideration in security programs managed by global organizations. Three key forces drive this shift: regulatory fragmentation, increased cyber risks from third parties, and the growing importance of cyber resilience.

Governments worldwide are enforcing stricter data sovereignty laws, compelling businesses to reassess cloud computing strategies and third-party relationships. Regulatory frameworks such as the EU’s Cyber Resilience Act and the US Cyber Incident Reporting for Critical Infrastructure Act illustrate how businesses need to now navigate increasingly stringent compliance mandates. Failure to comply can result in penalties, disruptions, and weakened market positioning.

Cyber deterrence: a proactive paradigm

Traditional cybersecurity strategies focus on detection and response, but this reactive model has limitations. Cyber deterrence is an underutilized strategy with transformative potential for mitigating cyber risk before attacks occur. Unlike conventional security measures, deterrence discourages attacks by increasing the perceived costs for adversaries, aligning with their motivations for profit and anonymity.

Deterrence measures include automated domain takedowns, bug bounty programs, and deception technologies such as honeypots. These tactics disrupt adversaries’ ability to conduct reconnaissance, execute attacks, or operate within compromised environments. By 2027, over 75% of large enterprises deploying deterrence tactics will expand these measures, creating new benchmarks for operational resilience.

Despite its potential, cyber deterrence remains underdeveloped in most organizations. Many businesses mistakenly conflate deterrence with active countermeasures, such as “hack back” strategies. However, effective deterrence does not require retaliation—it focuses on shaping adversary behavior by exploiting their motivations, including financial incentives, anonymity concerns, and operational costs.

The third-party cyber risk conundrum

One of the most overlooked risks in cybersecurity is the growing reliance on third-party vendors. Every supplier, cloud computing provider, and outsourced service introduces potential vulnerabilities, and many businesses lack full visibility into their extended attack surface. Traditional third-party cyber risk management (TPCRM) approaches – lengthy security questionnaires and periodic audits – are proving insufficient in today’s fast-moving threat landscape.

Organizations need new ways to assess and monitor third-party risk in real time. Tools like generative AI (GenAI) are beginning to play a role in automating risk assessments, identifying anomalies, and flagging potential vulnerabilities before they can be exploited. But adoption remains slow, and many security teams are still struggling to allocate the resources needed to manage third-party threats effectively.

Building a resilient cybersecurity framework

The ability to anticipate, withstand, and recover from cyber disruptions determines whether an organization can maintain operations in an increasingly volatile world.

Building resilience requires SRM leaders a shift in mindset to include:

  1. Assess Geopolitical Risks: Analyze how global and regional dynamics impact both business operations and security programs and integrate into current planning.
  2. Adopt Cyber Deterrence Tactics: Leverage tools like automated deception and domain takedowns to proactively counter threats, dissuade attackers and limit their ability to operate.
  3. Strengthen Third-Party Risk Management: Focus on business continuity and compensating controls to mitigate vulnerabilities in extended ecosystems.
  4. Implement GenAI for Cybersecurity: Invest in AI capabilities to address resource constraints and enhance efficiency and precision in threat detection and response.
  5. Promote Crypto-Agility: Prepare for evolving cryptographic standards to ensure long-term data security in the face of advancing threats.
The path forward

The convergence of geopolitical risk, third-party vulnerabilities, and technological disruption presents a complex challenge—but also an opportunity. As cybersecurity evolves, SRM leaders that prioritize resilience, deterrence, and collaboration in their organization will be better positioned to navigate this dynamic landscape.

We rate the best endpoint protection software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

The government’s ransomware payment ban: what are the wider implications?

TechRadar News - Mon, 04/28/2025 - 01:44

The UK government’s recently announced ban on public sector ransomware payments has received mixed reactions from industry.

With the aim of removing the financial incentives that fuel ransomware attacks and making public sector bodies and critical national infrastructure less attractive targets, the policy marks a significant step in the fight against cybercrime.

But the introduction of this new policy has not come without criticism. While supporters acknowledge that ransom payments reward criminals and fund more crime, others warn that it could lead to negative consequences such as promoting a secondary black market or impacting ransomware reporting.

Cybersecurity is a complex web with no straightforward solution. While it’s positive to see new ideas being explored, industry experts and policy makers must act with caution and consider all possible consequences before implementing measures to address security risks.

Loopholes in the ban

The legislation seeks to prohibit payments from public sector bodies, but organizations may seek out ways around the restrictions to enable the recovery of their services, minimize financial impact of an attack, or even ensure that their customers data is not leaked to the world.

One potential loophole is the use of overseas bank accounts or third-party intermediaries to facilitate payments without direct involvement. If I were a firm with offices in the UK and Germany, what’s to stop me using my German entity to pay? Or using a third party that I pay back for ‘security services rendered’? Loopholes will be found that businesses can exploit, meaning the ransomware ban will lose its effectiveness and essentially create an uneven playing field for organizations.

The dilemma of payment

Ransomware already provides an ethical dilemma for CISOs. None want to pay, recognising it for promoting the continuing cycle of cyber attacks, however many are hesitant to sign a blanket non-payment policy, fearing that in extreme circumstances, they may need to break it to ensure the survival of their organization.

This ban will amplify that dilemma for Chief Information Security Officers (CISOs) and business leaders.

For organizations facing ransomware attacks, the reality is grim: pay the ransom and recover access to critical systems or refuse and risk prolonged service outages and uncontrolled data spills.

Will the government step in to support businesses that suffer from prolonged disruptions? How about if they face a stark choice between payment and business survival? And what if an organization is responsible for providing life-saving or critical public services, does the government bear some responsibility in ensuring operational continuity?

These are critical questions that remain unanswered.

CISOs may be hesitant to sign a blanket non-payment policy, fearing that in extreme circumstances, they may need to break it to protect their organization. A rigid stance against payment may be ideal in theory, but in practice, businesses need flexibility to respond to complex and evolving cyber threats.

Impact on intelligence gathering

Another significant concern is the impact on information sharing. If businesses are legally stopped from making ransomware payments, they may choose to mislabel such attacks or avoid reporting ransomware incidents altogether to avoid scrutiny or potential penalties. This would enable them to have more flexibility in their response.

This could have severe consequences for cybersecurity intelligence. Reduced reporting means a lack of visibility into attack patterns, techniques, and emerging threats – this could inadvertently benefit cybercriminals in the long run.

Bypassing the ban does not come without risk, however. Secretly paying a ransom could drive the emergence of a secondary blackmail market, where attackers threaten to expose victims who choose to pay in secret.

Organizations may find themselves not only negotiating with cybercriminals for data access but also facing extortion threats over the payment itself. This added layer of complexity could lead firms into worse financial situations, all in their attempts to restore their service in the most effective manner.

A roadmap forward

A rigid stance against payment may be ideal in theory, but in practice, businesses will demand flexibility to respond to complex and evolving cyber threats as they see fit – enabling them to manage the complex risks and issue that follow a cyber attack – such as service restoration and data privacy.

It’s evident that we should strongly dissuade firms from paying ransomware demands, however a need for flexibility is what businesses really need. As such, perhaps the government could embrace a model that permits a controlled path for payment in exceptional circumstances.

Firstly, mandatory reporting of ransomware attacks to a suitable authority should be enforced, regardless of whether a payment is made. This would ensure comprehensive tracking and analysis of ransomware incidents, contributing to a more robust understanding of the threat landscape.

If a firm wished to pay a ransom, this could be permitted but only with the express approval of UK government or National Cyber Security Centre (NCSC). This would keep track of the payments and provide oversight on regular victims who would benefit from resilience improvements.

Businesses should also be required to provide staff with proper training and education around cyber-attacks, ensuring they are ready to react appropriately if an attack occurs.

A measured response is needed

While the government's ban on ransomware payments aims to reduce the financial incentives behind cyberattacks, it also presents several critical issues. Payment dilemmas and impacts on intelligence gathering, for example, must be addressed.

A collaborative effort between businesses and the government, with mandatory reporting, flexible payment options and required training, is needed. By providing the necessary tools, support and a clear protocol for reporting and response, organizations can better navigate the complexities of ransomware attacks.

We've rated the best antivirus software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Florida authorities declare a 'mass casualty' in deadly boat crash near Clearwater

NPR News Headlines - Mon, 04/28/2025 - 00:08

One person has died and several were injured Sunday when a boat crashed into a ferry off the Memorial Causeway Bridge and then fled the scene, authorities said.

(Image credit: Douglas R. Clifford/Tampa Bay Times)

Categories: News

Nothing makes sense: why the company's new (3a) Pro is my favorite affordable premium smartphone over the Google Pixel 9a

TechRadar News - Sun, 04/27/2025 - 23:53

I’ve come around on Nothing. Since its first device in 2022, the smartphone startup has provided an interesting but limited range of phones, mimicking the Google Pixel catalog in its small but mighty lineup. Nothing’s handsets are led by a strong commitment to aesthetics, both inside and out – and for a long time I thought it was extra and a bit cringe. That’s all changed with the brand’s latest release. I’ve come to love the Nothing Phone (3a) Pro – and consider it a proper Pixel A rival.

Let me set the scene for why the (3a) Pro impresses me so much. For the past four years, Google has dominated the affordable-premium segment of the phone market. The company’s Pixel A range of devices, released typically around five to six months after its Pixel flagships, have long been considered so good that they've been worth placing alongside the top end Pixel Pro device. In 2024, with the Pixel 8a, the phone entered the premium segment after a price rise in some territories, though in others it’s still considered a mid-ranger.

This price increase diminished the Pixel A series’ value, and helped the Samsung Galaxy A55 (and this year's Galaxy A56) take the crown for best mid-ranger. Today in the affordable-premium segment, where handsets like the iPhone 16e and Samsung Galaxy S24 FE reside, the Google Pixel 9a is one of the less expensive picks – though it’s now seeing serious competition from smaller phone makers, with Nothing a great example.

Compared to the Google Pixel 9a, Nothing has two aces up its sleeve. The first is its focus on customization, and even though its phones lean more on blacks, whites and dot-based designs in widgets and menus, you’re able to unleash a fair amount of creativity when it comes to the lock and home screens.

(Image credit: Zachariah Kelly / TechRadar)

Nothing’s cooked up the first phone to successfully pull me away from the Google Pixel A – and for the exact same reasons that I loved Google’s affordable-premium phones to begin with. Both manufacturers provide a comfortable off-ramp for Apple users looking to try something familiar (but ultimately not an iPhone) without an eye-watering price tag. Nothing’s real edge is its unique aesthetic and, despite offering lower performance than other affordable-premium phones when put through raw benchmarks, adequate day-to-day power that never left me wanting.

The Nothing Phone (3a) Pro feels like a pleasantly deviated interpretation of the ‘Apple but on an Android’ aspiration. The operating system is sleek, with a monotone-focused aesthetic that’s both recognizable and pleasant, while cutting down on bloatware.

On top of this, Nothing has an ace up its sleeve – the (3a) Pro isn’t your only option, and if you don’t mind trimming down on some camera capabilities and processing power, the standard 3a is also a worthwhile pick. We’ve previously compared the Nothing Phone (3a) Pro to the standard Phone (3a), and found them far more similar than different.

The Google Pixel 9a remains a great phone and I’ve enjoyed using it so far (and I’ll be writing an article on my experiences soon), but I’m left just so impressed with what Nothing has done here.

(Image credit: Zachariah Kelly / TechRadar) Beating Google at its own game

Customization has been a bit of a focus for phone companies as of late. Samsung and Apple both introduced sweeping aesthetic overhauls with their recent operating system versions, which I reflected on in my iPhone 16e and Samsung Galaxy S25 Ultra articles, and there’s more to it than just throwing on a fresh coat of paint – it’s about empowering the user to put their own spin on their device. Google understood this well when it introduced Material You back in 2021 as part of the Android 12 platform, and for this focus the Pixel range became the aesthetic heartthrob of the industry.

Nothing has obviously built upon Material You as it offers Android phones, but it’s done so with an uncompromising aesthetic. Apple and Google offer fairly neutral colours that could be appreciated by a wide audience, but Nothing wants you to commit to the monotone bit. You don’t have to – you can color the OS anyway you want – but this phone looks so damn gorgeous when you’re sticking to the blacks and whites.

(Image credit: Zachariah Kelly / TechRadar)

The startup also offers some decent levels of customization that put it well ahead of many contemporaries, including a focus on icon packs (or Material You coloring), lock screen editing (with tons of room for widgets) and even the ability to toggle Google’s search bar on or off.

Nothing’s widgets are the most impressive part of this; they’re broadly interactive and there are many shipped with the base OS, including a compass, a step tracker and a ‘News Reporter’ that uses a choppy, AI-generated voice of Nothing’s CFO Tim Holbrow to read the latest news stories to you. (I personally think this is a crass implementation of AI that degrades the value of narrators and reporters alike, but maybe that’s just me.) My personal favorite is the in-built media player widget, which feels leaps ahead of any similar widget offered on a Samsung or Google device.

Moreover, similar to Google’s own handsets, there’s a pleasant lack of bloatware, with only Google apps and a small slew of Nothing’s own apps preinstalled.

Adding to this, Nothing’s assuming you’ll start to treat your phone a little differently than usual: there’s an extra button on the side of the phone that’s used for taking voice memos.

Hold the button and you’ll start recording – good for putting down reminders on the fly, which you can then access by double pressing the button, which launches the dedicated Essential Space app. To make navigation to your reminder easier, a screenshot is taken at the moment you begin recording, which is then used as the icon for your memo.

(Image credit: Zachariah Kelly / TechRadar)

It’s a handy feature that I love the idea of, but I’d honestly prefer the ability to change that button to trigger another app – similar to the Action Button found on newer iPhones. Technically you can do this with a third party app like Key Remapper, but it’s such an obvious feature that it’s perplexing it’s not officially supported.

Nevertheless, it’s here, and whether or not you use it is down to your personal preferences.

Hardware where it matters (and some where it doesn’t)

The Nothing (3a) Pro has a great hardware offering that puts it in decent competition with other phones in its segment. Though its screen is lower resolution than many rivals, and it scores lower on benchmark tests, its display is noticeably bigger than most rivals and it has a brilliant camera array that I’ve come to love.

Originally I went into this article expecting the Phone (3a) Pro to blow the Pixel 9a out of the water in terms of processing power, but no, the Pixel 9a remains competitively robust at the lower-end of the affordable-premium price range. Google’s been improving its Tensor chip year-on-year, though it’s still a long way before it stands shoulder to shoulder with Samsung and Apple.

The Phone (3a) Pro really isn’t a phone for any intensive use – such as gaming, as indicated by the GPU-intensive 3D Mark test results. Despite this, Nothing has made meaningful strides in physical areas. The large screen speaks for itself – I barely notice the resolution difference, but I sure appreciate having more screen space. The UI is, as already discussed, very flexible, and despite lower benchmark scores and less impressive specs, this never translated to hangups in day-to-day use or unimpressive battery life.

I also appreciate the photos the Nothing Phone (3a) Pro is able to capture. Close-up shots lack much of the macro detail that Google has gotten extremely good at snapping, but apart from that, these photos look brilliant, though with a bit more color injected into them than with a Pixel phone.

Image 1 of 6

(Image credit: Zachariah Kelly / TechRadar)Image 2 of 6

(Image credit: Zachariah kelly / TechRadar)Image 3 of 6

(Image credit: Zachariah Kelly / TechRadar)Image 4 of 6

(Image credit: Zachariah Kelly / TechRadar)Image 5 of 6

(Image credit: Zachariah Kelly / TechRadar)Image 6 of 6

(Image credit: Zachariah Kelly / TechRadar)

Here are some comparison photos from the Google Pixel 9a:

Image 1 of 6

(Image credit: Zachariah Kelly / TechRadar)Image 2 of 6

(Image credit: Zachariah Kelly / TechRadar)Image 3 of 6

(Image credit: Zachariah Kelly / TechRadar)Image 4 of 6

(Image credit: Zachariah Kelly / TechRadar)Image 5 of 6

(Image credit: Zachariah Kelly / TechRadar)Image 6 of 6

(Image credit: Zachariah Kelly / TechRadar)

I’m very impressed that Nothing has offered such a powerful array of cameras at this price point. This is normally Google’s bread and butter and while the Pixel range continues to lead on close-up detail, it’s cool to see Nothing pull off some great results.

It’s not all rosey, though. Those impressive cameras are in large part thanks to a gigantic camera housing, which protrudes far and wide out of the back of the phone. I recommend purchasing a case to help minimize the bulge.

Additionally, and how could I forget, the Phone (3a) Pro comes with Nothing’s signature Glyph system – a set of lights across the back that flash to note a text coming through, an alarm going off, or flash when music plays. It’s a cool but limited feature, and although it’s one of Nothing’s drawcards (and the lights can be useful when holding the phone up to dimly lit spaces, like when I’m looking at the insides of my computer), I just can’t get too excited about it. I honestly find it a little pointless. Sorry!

So should I buy the Nothing Phone (3a) Pro?

(Image credit: Zachariah Kelly / TechRadar)

Nothing’s cooking here – the Phone (3a) Pro is now my preferred affordable-premium smartphone, a category I denote as a cut below flagship handsets and sporting the same name with an affordability indicator (e, a, FE, etc). I recommend it to anybody considering the Pixel 9a, the iPhone 16e or the Samsung Galaxy S24 FE.

That being said, these are all really good phones and each device has advantages in areas where others are lacking. I personally think that the unique styling of the Nothing (3a) Pro should be enough to draw you in, but it lacks the comfortable neutrality of Apple’s iOS or Google’s own version of Android.

It’s certainly worth considering if you want to detox from the big three, and if you can nab it on sale, it’s all the better. (I’ve already spotted it on sale in Australia but I can’t speak for other markets).

You might also like...
Categories: Technology

North Korea confirms it sent troops to Russia to support its war against Ukraine

NPR News Headlines - Sun, 04/27/2025 - 23:46

The North Korean announcement came two days after Russia said its troops have fully reclaimed the Kursk region. Ukrainian officials denied the claim.

(Image credit: Kristina Kormilitsyna)

Categories: News

Today's NYT Connections: Sports Edition Hints and Answers for April 28, #217

CNET News - Sun, 04/27/2025 - 22:53
Hints and answers for the NYT Connections: Sports Edition puzzle, No. 217, for April 28.
Categories: Technology

Today's NYT Mini Crossword Answers for Monday, April 28

CNET News - Sun, 04/27/2025 - 22:46
Here are the answers for The New York Times Mini Crossword for April 28.
Categories: Technology

I used the Cuktech 20 Power Bank for a week to charge my laptop and it’s quick, powerful, and totally overkill for most people

TechRadar Reviews - Sun, 04/27/2025 - 20:03
Cuktech 20 Power Bank: review

The Cuktech 20 Power Bank has a high power output and large capacity, designed for charging laptops and similar devices while traveling. As you would expect from a battery of this ilk, it’s quite a handful. It’s thick across its depth, although thankfully it’s not as wide, nor is it as heavy as I was expecting.

This makes the Cuktech 20 Power Bank reasonably portable all things considered, although it’s slightly more cumbersome than some rivals with similar specs.

Thankfully, the Cuktech 20 Power Bank is still airline safe despite its size, since it falls below the TSA’s 100Wh limit. It’s also useful that this is clearly labelled on the side, so if an agent is ever doubtful, you can at least show them.

Cuktech has tried to inject some interest into its appearance as well, with its two-tone design and translucent front panel, and I did appreciate the linear texture on the sides, which aids grip and feels premium to the touch. However, this is still a rather austere looking brick, albeit one that’s perhaps a bit more sleek than some of the best power banks.

One of the standout features of the Cuktech 20 Power Bank is the screen, which displays various information, such as the battery life and estimated charging time, as well as the wattage, voltage, and amperage for each port in real time. There’s also a handy indicator to tell you whether a port is delivering or receiving power.

Although this information is certainly useful, it’s a shame the display area is quite small. It’s also a shame that given its size, the Cuktech 20 Power Bank only has three ports, as other power banks of this ilk can squeeze in one or two more. Still, at least two of them are USB-C, and both are input and output capable.

The first USB-C port has an output of 140W, whereas the second tops out at 60W. The USB-A port, meanwhile, has a maximum power output of 30W. Despite this, the maximum output doesn’t quite add up to 230W, but 210W – which is still plenty of power for a brick this size.

Charging via all three ports simultaneously is also supported, while an additional trickle charging mode is available for charging low current devices, such as earbuds and smartwatches, which can be activated by double pressing the power button.

It took just under two hours for the Cuktech 20 Power Bank to charge an HP Chromebook Plus, which has a 58Wh battery, from empty to full via the most powerful USB-C port, which is a solid performance. The estimated time given by the bank was accurate for the most part too, closely matching that of the Chromebook’s, although figures went awry at the tail-end of the charge.

The Cuktech 20 Power Bank lost 82% of its charge in the process, which unfortunately means you’ll likely only get one laptop charge out of it, but this is expected given the capacity – and if it did have more juice in the tank, it would likely exceed flight limits. Charging the bank itself took two hours from empty to full in, which is another impressive performance.

When charging the bank itself, it’s a shame that the screen goes off, although fortunately this can be changed in the settings. Also, there’s a handy LED strip running vertically below it that repeatedly fills up to indicate charging, which also looks stylish – for what that’s worth.

I should mention, however, that my first attempt to charge the Cuktech 20 Power Bank failed. After 30 minutes or so, I noticed it wasn’t receiving any charge, despite my cable being attached correctly. I’m not sure if this was because the bank was expecting to deliver an output rather than receive an input, but a simple re-plug fixed the issue. I can also report that I only experienced this once during my testing, so I can only presume this was a one-time glitch.

If you’re looking for another large yet flight-ready power bank, the Anker Laptop Power Bank is a great alternative. It’s slightly cheaper than the Cuktech 20 Power Bank, but it has more convenient features, such as two built-in USB-C cables, one of which can be looped to create a carrying handle. It has less total power than the Cuktech 20 Power Bank (165W), but this is still plenty for many people’s needs.

But if you do need over 200W of total power, in a reasonably portable and flight-ready package, the Cuktech 20 Power Bank is a solid pick for charging laptops and the like on the go.

(Image credit: Future) Cuktech 20 Power Bank review: price & specs

(Image credit: Future) Should I buy the Cuktech 20 Power Bank? Buy it if…

You want plenty of power
With 210W of total power, the Cuktech 20 should be enough for all kinds of devices.

You still want to fly with it
Despite its power and size, the Cuktech 20 is still airline safe, which is helpfully labelled on one side.

Don't buy it if…

You want something small
The Cuktech 20 does a good job of keeping things compact, but it's undeniably thick, which can be inconvenient.

You want something cheap
With all that power comes a high price, and there are some equally capable but slightly cheaper alternatives out there.

Cuktech 20 Power Bank review: Also consider

Anker Laptop Power Bank
Not only does it have the same capacity as the Cuktech 20 Power Bank, the Anker Laptop Power Bank has features two integrated USB-C cables, one of which doubles as a handy carrying loop. It’s about the same size and weight as the Cuktech 20 Power Bank, and is similarly flight-ready, but costs slightly less. At 165W, it’s less powerful – but still not exactly what you’d call weak. Read our Anker Laptop Power Bank review.

Categories: Reviews

Homes destroyed and 1,500 detained in Kashmir as India cracks down following attacks

NPR News Headlines - Sun, 04/27/2025 - 17:23

Indian authorities have detained at least 1,500 people in India-administered Kashmir after a militant attack killed 26 people this past week, a top police officer told NPR.

(Image credit: Bilal Kuchay)

Categories: News

Best Internet Providers in Salt Lake City, Utah

CNET News - Sun, 04/27/2025 - 16:59
These are the top internet service providers in Salt Lake City according to CNET's experts.
Categories: Technology

Best Internet Providers in St. George, Utah

CNET News - Sun, 04/27/2025 - 16:18
Whether you’re after speed or savings, these are the top internet options in St. George.
Categories: Technology

'Prophetic' letter written by Titanic survivor sells for nearly $400,000 at auction

NPR News Headlines - Sun, 04/27/2025 - 15:10

The letter, written by first-class passenger Archibald Gracie, sold for five times its expected price at auction. It was written aboard the ship five days before it sank.

(Image credit: Henry Aldridge & Son)

Categories: News

Today's NYT Connections Hints, Answers and Help for April 28, #687

CNET News - Sun, 04/27/2025 - 15:00
Hints and answers for Connections for April 28, #687.
Categories: Technology

Today's NYT Strands Hints, Answers and Help for April 28, #421

CNET News - Sun, 04/27/2025 - 15:00
Here are hints and answers for the NYT Strands puzzle No. 421 for April 28.
Categories: Technology

Today's Wordle Hints, Answer and Help for April 28, #1409

CNET News - Sun, 04/27/2025 - 15:00
Here are hints and the answer for today's Wordle No. 1,409 for April 28.
Categories: Technology

Best Internet Providers in Madison, Illinois

CNET News - Sun, 04/27/2025 - 15:00
The best internet providers in Madison, from budget plans to the fastest speeds available -- according to CNET experts.
Categories: Technology

Step Out of the Shadows. How to Turn Off Your iPhone's Incognito Mode

CNET News - Sun, 04/27/2025 - 13:15
The iPhone's incognito mode is ideal for sensitive searches and avoiding targeted ads. But there are time when you may want to turn it off.
Categories: Technology

The DEA says 114 immigrants in the U.S. illegally were arrested at a Colorado nightclub

NPR News Headlines - Sun, 04/27/2025 - 12:51

The Drug Enforcement Administration said the arrests occurred as part of a raid at an underground nightclub in Colorado Springs.

Categories: News

Largest DDoS attack of 2025 hit an online betting organization with 1Tbps brute force: here's what we know

TechRadar News - Sun, 04/27/2025 - 12:33
  • A massive DDoS attack was recently detected during a major NHL event
  • Attack grew from 67Gbps to nearly 1Tbps in twenty minutes
  • Multivector strike used UDP, SYN, IP, and TCP flood techniques

Cybersecurity firm Qrator Labs has claimed it successfully mitigated the largest DDoS attack so far recorded in 2025.

The April 3 attack targeted an unnamed online betting organization, lasting around 90 minutes, starting at 11:15 with a surge of 67Gbps, before escalating sharply to 217Gbps by 11:23, and peaked just short of 1Tbps at 965Gbps by 11:36.

Activity then slowly decreased to 549Gbps by 12:41, with the attack ending shortly afterwards. The DDoS attack was multivector in nature, featuring a peak of 965Gbps in UDP flood, 229Gbps in SYN flood, 214Gbps in IP flood, and 169Gbps in TCP flood.

Sporting events are major targets

Qrator notes that the attack happened on the same day that NHL star Alexander Ovechkin scored his 892nd goal, tying Wayne Gretzky's long-standing record. Ovechkin’s achievement was likely the trigger for the attack as the online betting sector is especially vulnerable during major sporting events.

A similar attack pattern was spotted during the 2024 UEFA European Football Championship, held in Germany, where spikes in DDoS activity also targeted online betting sites.

“This new incident is a clear reminder that major industry-specific events can be exploited by malicious actors. Companies that work with them, such as online betting platforms, must prepare in advance to defend their digital infrastructure when attention is at its peak,” said Andrey Leskin, Chief Technology Officer at Qrator Labs.

With major sporting moments drawing massive audiences online, betting platforms continue to be a prime target for coordinated attacks such as this one.

Other noteworthy sporting events set to take place this year, which could prove to be a target for similar DDoS strikes, include the FIFA Club World Cup in the United States and the World Athletics Championships in Tokyo.

You might also like
Categories: Technology

Pages

Subscribe to The Vortex aggregator