Error message

  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

Feed aggregator

New forum topics

Shred less, save more: why enterprises are ditching destruction for smart sanitization

TechRadar News - Thu, 08/28/2025 - 09:23

In an age where cybersecurity threats dominate headlines and sustainability tops boardroom agendas, enterprise IT disposal practices are under renewed scrutiny. For years, physically destroying end-of-life hardware - shredding hard drives, crushing servers - was the default method to guarantee data couldn’t be recovered. It felt final. Reassuring. Safe.

But that instinct is now being questioned. According to new research, there’s a growing disconnect between how organizations dispose of data-bearing assets and the financial, environmental, and compliance pressures they now face. Many still default to destruction, even as that approach becomes harder to justify—financially, ethically, and environmentally.

The cost of destruction

The financial argument against destruction is becoming harder to ignore. While physical destruction feels secure, it comes with a hidden bill. There are the direct costs of certified physical destruction services. Then there are indirect losses - reusable or resalable hardware is destroyed, prompting early replacements.

Just 22.3 % of the 62 million tons of e‑waste generated in 2022 was formally collected and recycled - a figure projected to fall to 20 % by 2030 as disposal volumes continue to outpace recycling efforts.

Latest industry research shows that 67% of organizations still rely on physical destruction for SSDs and HDDs, despite the financial and environmental drawbacks.

If a large enterprise refreshes its servers every three years, destroying even a portion instead of reselling or redeploying them can waste millions over a typical lifecycle. At a time when budgets are under constant pressure, that scale of waste is increasingly hard to defend.

As Techbuyer COO Mick Payne told the FT, he once offered a six-figure sum to buy and wipe thousands of used drives at a London data center - only to watch them get shredded instead. “It was a complete waste.”

And the financial toll is just one part of the problem - the environmental cost of destruction is just as severe.

The environmental toll

Beyond the financial impact, physical destruction takes an enormous toll on the environment. In 2024, UK households purchased over 1.14 billion small electronic devices - often referred to as "fast tech", with approximately half (589 million) discarded within the same year. And business waste is also significant.

Research shows UK businesses discarded up to 200,000 tons of electrical equipment, including laptops and servers, in just one year, with only about 108,000 tons entering proper recycling streams through authorized treatment facilities.

Destroying equipment removes the chance to recirculate valuable materials; from copper and aluminum to rare earth metals - triggering further mining, processing, and manufacturing fresh parts, dramatically expanding the carbon footprint of every new device.

As more businesses face scrutiny over their carbon reduction claims, sending reusable equipment straight to the shredder increasingly looks incompatible with their public commitments.

A proven alternative

For many IT leaders, the sticking point is data security. If a hard drive is destroyed, there is zero risk of data recovery - simple. But certified data erasure, or sanitization, now provides equivalent security while preserving the hardware for reuse.

Certified software-based erasure methods comply with international standards such as NIST 800-88, and meet the UK GDPR’s data protection requirements for safe disposal of personal information (ICO). These techniques ensure data is permanently overwritten and unrecoverable, even with advanced forensic methods.

The Information Commissioner’s Office specifically highlights secure overwriting as an approved, robust form of data destruction that includes a full audit trail, critical for regulated sectors like finance and healthcare.

Rather than destroying valuable drives, enterprises retain certified, clean assets that can be redeployed internally or sold on the secondary market, extracting further ROI.

Why the change is accelerating

Three powerful forces are accelerating this rethink. Globally, businesses are under mounting stakeholder pressure to prove their environmental credentials. The UK government’s sustainability strategies, including its commitment to a more circular economy, explicitly encourage reuse and refurbishment over destruction.

Second, the economic picture is shifting. According to Gartner, worldwide IT spending is projected to reach $5.61 trillion in 2025, an increase of 9.8% compared to 2024. This surge reflects a growing investment in digital transformation and advanced technologies - but it also means CIOs will be under pressure to maximize ROI.

Reselling or redeploying equipment can help extend budgets further, while destruction locks in a sunk cost, wasting the opportunity to capture residual hardware value and reinvest in innovation.

Third, the maturity of secure erasure technology has eliminated previous technical barriers. Until recently, many organizations avoided software-based erasure due to concerns around reliability and compliance. Today, however, certified erasure tools are globally trusted - backed by regulators, embedded in industry standards, and proven to deliver the same level of data security as physical destruction.

Time to break the habit

There will always be rare cases where physical destruction is necessary - such as devices exposed to state-level espionage. But for most enterprise assets, secure sanitization offers the same peace of mind without the destruction.

By moving away from blanket destruction, businesses can reduce emissions, cut unnecessary costs, and demonstrate a more responsible, circular approach. They’ll also be better prepared for tighter regulation and rising ESG expectations.

In short, “destroy first, ask questions later” is an outdated reflex. Today, secure data sanitization lets businesses shred less and save more - protecting both budgets and the planet.

We've featured the best green web hosting.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Vibe coding: democratizing DevOps or bad vibes?

TechRadar News - Thu, 08/28/2025 - 09:15

AI, like any technology, is neither inherently good nor bad. As always, it depends on who is using it and what they’re using it for. However, what is undeniable is that AI is evolving faster than its risk averse cousin, regulation, as legislators continue to struggle to keep pace.

Of course, it doesn’t help that AI is innovating within AI, which is in turn leading to unprecedented acceleration in technological development.

All of this is creating a new set of security challenges, the latest of which is vibe coding. As with any innovation cycle within AI, it’s critical that we understand what it is, and what the security implications are.

Vibe coding explained

At its core, vibe coding is a modern approach to software development. This shift is best understood through the changing role of the software developer. Previously, a developer would have been tasked with manually writing each line of code, before commencing the usual process of inspecting, testing, fixing and launching.

Now, with the introduction of vibe coding, a software developer – and your average Joe – is able skip the first step, have AI write the code in their stead, and simply guide, test, and refine it.

On paper, the benefits are plain to see. Devs can work more efficiently, it democratizes and opens up the act of coding beyond trained developers, and encourages creativity and experimentation, with new consumer-facing applications being created that are intuitive and easy to use.

Even Google’s CEO, Sundar Pichai has been having a go, stating that “it feels delightful to be a coder”, after letting slip that he had been playing around with building a web app.

As with any AI innovation – and given the ever-growing accessibility of AI tools – it comes to the forefront of the industry, habits change, and new tools and companies are developed. Just a few weeks ago, vibe coding company Lovable was in talks for a $1.5 billion valuation.

What’s clear is that you can’t stop the tide. It’s about working with it, building suitable guardrails and managing the associated risks appropriately. But what are these risks?

The security risks

As equally as vibe coding can be used for innovative purposes, it can also perpetuate cyber threats. To be robust in today’s threat landscape, businesses require secure, compliant, and maintainable code. The reality is that malicious code does not need to be high quality or long-lasting to have an impact.

In today’s AI-driven threat landscape, bad actors can even use verbal commands to generate malicious code and target vulnerabilities. To extrapolate this issue one step further, AI agents will add another dangerous dimension.

While generative AI can provide coding capabilities as part of vibe coding, it still needs to be deployed and executed in isolation. That is until an AI agent takes on the responsibility.

Vibe coding also has the potential to cause issues within security teams themselves. Often, it’s done individually, therefore undermining the collaborative and agile nature of DevOps practices. Without structured programming and security awareness, vibe coding can introduce hidden risks.

Defensive strategies

Vibe coding represents a leap in abstraction, allowing programmers to generate code using natural language. And while it lowers the barrier to entry and democratizes access to coding, it ultimately increases the risk of misuse by unqualified users. Businesses must set themselves up with a long-term view.

Vibe coding is just the latest iteration of AI-driven attacks and while it’s easy to focus on the technology of the moment, organizations must be set up to defend against vibe coding and whatever the next innovation may be.

The first and foremost defensive strategy is deploying zero trust architecture. At its core, Zero Trust is a security process that assumes that no entity should be trusted by default, even if within the network perimeter. The old adage of “if you can reach it, you can breach it” rings true here, so by reducing or removing your attack surface you’re going a long way to protecting yourself.

Secondly, there’s incredible value in platform-based technologies. The intelligence that platform providers get from serving millions of customers is invaluable. Think of it somewhat like herd immunity. If a solution is applied to one, it is applied to the many. Essentially, you’re benefiting from the participation of others in the platform model.

Finally, it’s vital that businesses be proactive in security, shifting from defense to offence, or as we like to call it threat hunting. By mitigating risk before it escalates, enterprises can improve their overall security posture.

Looking ahead

Ultimately, due to reasons like cost efficiency, AI will continue to disrupt the ways that we work and therefore influence the ways that we protect ourselves against the evolving threat landscape. In the future, vibe coding might involve multiple AI agents handling different aspects of the process, with one agent for pillars such as creativity, security, and the structure.

Security when done right can be a revenue enabler, allowing for market expansion, agility and better business practices. When done poorly, it renders businesses vulnerable to the latest AI innovation and trend. By adopting a long-term view of the threat landscape, deploying Zero Trust and taking a proactive approach to their security posture, enterprises can thrive.

We've featured the best online cybersecurity course.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Websites still matter, but can't survive on their own

TechRadar News - Thu, 08/28/2025 - 09:09

A creator’s Instagram inbox used to be a beautiful mess. One minute it was quiet. The next, a product Reel pops off and they get buried in fire emojis, product questions, and a dozen “Is this still in stock?” DMs.

It was certainly exciting. And a bit overwhelming? Manually keeping up often meant lost sleep, missed sales, and a lot of copy-pasting.

But now, that chaos is being turned into opportunity: For creators and entrepreneurs alike, the DM is the new storefront, help desk, and loyalty engine, all rolled into one. It's where trust is built, products get discovered, and sales happen at the speed of a double tap.

As conversational commerce takes off, more creators and entrepreneurs are building entire revenue engines inside their DMs. And equipped with smart automation, they’ve honed their social platforms to evolve beyond customer engagement to driving discovery, conversion, and customer loyalty in real time.

Historically, traditional businesses have enjoyed a rich ecosystem of tools, whether that be automations, webhooks, email integrations, and marketing funnels. They made scaling and systematizing their customer journeys seamless. Social media, by contrast, was long a closed garden: a powerful engagement space but one that limited creators’ ability to fully build and scale businesses because of restricted access.

But that’s all changing. Social platforms are opening up, and integrating with search engines and third-party tools. Creators and entrepreneurs can build sophisticated marketing and sales systems within these once closed environments – meaning social media channels are ultimately leveling the playing field. They’re transformed into robust business platforms where engagement, discovery, and conversion seamlessly intertwine.

From clicks to conversations, why funnels are flattening

The old-school path to a sale was long: social post → link in bio → website → maybe a sale. But let's face it, we’re living in the age of instant gratification. People expect responses yesterday. Slow replies can lead to frustration, while quick, helpful answers leave a lasting impression.

Enter: automation.

Automation ensures no message gets lost, keeping your audience happy and engaged. It's reshaping the sales funnel. Instead of sending traffic away, creators are closing the loop inside the platforms themselves, often in one message. In fact, 71% of consumers say they expect to interact with brands via messaging platforms. And with an average response time of 2 minutes (vs. 17 hours for email), DMs are simply faster and smarter.

To be clear, this shift isn’t about ditching websites. Rather, brands need to meet their buyers where they’re at – and remove the friction between intent and action. DMs essentially pre-qualify intent to purchase. By the time a consumer clicks through to a link provided via DM, they’re warmer and more likely to convert.

And the numbers back it up. Some creators report conversion rates as high as 85–98% when routing sales through DMs. Others have seen revenue spike by tens of thousands of dollars in a single month, simply by automating responses they once handled manually. One campaign helped drive over 100,000 page views from just a single trigger. These are all proof that messaging is a real growth engine.

As buyers spend more time in chat-based environments, the most agile businesses are revamping their approach to building and driving action.

Personalization that scales:

Customers crave human connection and messaging platforms deliver it. With tools that pull in browsing behavior, purchase history, and real-time context, entrepreneurs and creators alike can now offer VIP-style service to every shopper. Think: automated coupon drops, back-in-stock alerts, or custom product recommendations – all within the chat thread.

This is the major shift automation enables: authentic presence at scale. For the first time, creators and entrepreneurs no longer have to choose between being responsive and being real. With AI, they can stay present in thousands of conversations without losing the tone, timing, or trust that made a brand reputable in the first place.

However, the power of this movement lies in the timing. Automations show up exactly when they’re needed. Whether that’s a discount sent at the moment of hesitation or a restock alert that feels like it was sent by a personal shopper. The result? Higher open rates, faster response times, and better conversion across the board.

Even solo creators are now delivering high-touch experiences that rival big brands. The difference is, it’s happening one-to-one and in real time, without a massive team.

Where there’s a DM, there’s a purchasing decision

Website analytics can tell that someone clicked. That they spent 42 seconds on the product page. Maybe they even added something to the cart. But that’s still guesswork. An entrepreneur is left interpreting behavior, hoping it means something. But a DM that says, “Hey, do you have this in stock?” That’s clear as day: a customer is getting ready to buy.

Conversations are becoming the new top-of-funnel. When a customer initiates a message, they’re sending a clear intent signal. One you can act on immediately. Share a size guide. Offer a promo. Drop a product link right into the thread. No forms, no delays.

To be clear: By no means does this replace the website. In fact, quite the opposite. DMs often serve as the warm introduction that makes the click-through more valuable. The result? Higher intent traffic, better conversion rates, and fewer missed opportunities.

Because when someone takes the time to message a brand, they’re making active purchasing decisions and creating opportunities to act on an intent signal in real-time: Offer a discount. Suggest the right size. Trigger a purchase link. That’s why more entrepreneurs are shifting from pageviews to conversations. And when entrepreneurs and creators have automation set up, they can act on those signals instantly.

The smartest businesses — and creators — aren’t waiting around for clicks or form fills. They’re meeting their audience where the conversation is already happening: in the DMs.

Because in today’s attention economy, speed matters. Relevance matters. And connection always matters. Together, they create real moments of engagement that build trust, strengthen relationships, and drive meaningful revenue, all without slowing down momentum.

We've featured the best ecommerce software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

NPM packages from Nx targeted in latest worrying software supply chain attack

TechRadar News - Thu, 08/28/2025 - 09:07
  • When a token with publishing rights was stolen, multiple poisoned Nx variants were released
  • The malware stole secrets and other important data
  • The attack lasted a few hours, but could be causing damage still

Countless software developers, likely including those within Fortune 500 companies, were victims of a supply chain attack after Nx, the open source build system and development toolkit, was compromised.

In an announcement posted on GitHub, Nx said, “malicious versions of Nx and some supporting plugins were published” on NPM.

At the same time, security researchers Wiz released a separate announcement, saying the malicious versions were carrying infostealing malware, grabbing secrets such as GitHub and NPM tokens, SSH keys, crypto wallet information, and more, from attacked developers.

Thousands of leaked tokens

How Nx was compromised remains unknown - Wiz believes the threat actors managed to get ahold of a token with publishing rights, which enabled them to push malicious versions to NPM, despite all maintainers having two-factor authentication (2FA) enabled at the time of the attack. Apparently, 2FA was not needed to publish the packages.

The attack lasted approximately four hours, before NPM removed all of the poisoned versions.

Nx did not discuss how many companies might have been struck in this supply chain attack, but Wiz told The Register via email that more than 1,000 valid GitHub tokens were leaked. Furthermore, the attackers stole around 20,000 files and “dozens” of valid cloud credentials and NPM tokens.

Affected users should reach out to Nx’s support team for help.

Both NPM and Nx are hugely popular in the software development community, with more than 70% of Fortune 500 companies are allegedly using it, so it’s perhaps not surprising it is under constant attack.

However, security researchers Step Security found something unique: the malware “weaponized AI CLI tools (including Claude, Gemini, and q) to aid in reconnaissance and data exfiltration - marking the first known case where attackers have turned developer AI assistants into tools for supply chain exploitation.”

"This technique forces the AI tools to recursively scan the file system and write discovered sensitive file paths to /tmp/inventory.txt, effectively using legitimate tools as accomplices in the attack."

You might also like
Categories: Technology

Quordle hints and answers for Friday, August 29 (game #1313)

TechRadar News - Thu, 08/28/2025 - 09:00
Looking for a different day?

A new Quordle puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Thursday's puzzle instead then click here: Quordle hints and answers for Thursday, August 28 (game #1312).

Quordle was one of the original Wordle alternatives and is still going strong now more than 1,100 games later. It offers a genuine challenge, though, so read on if you need some Quordle hints today – or scroll down further for the answers.

Enjoy playing word games? You can also check out my NYT Connections today and NYT Strands today pages for hints and answers for those puzzles, while Marc's Wordle today column covers the original viral word game.

SPOILER WARNING: Information about Quordle today is below, so don't read on if you don't want to know the answers.

Quordle today (game #1313) - hint #1 - VowelsHow many different vowels are in Quordle today?

The number of different vowels in Quordle today is 5*.

* Note that by vowel we mean the five standard vowels (A, E, I, O, U), not Y (which is sometimes counted as a vowel too).

Quordle today (game #1313) - hint #2 - repeated lettersDo any of today's Quordle answers contain repeated letters?

The number of Quordle answers containing a repeated letter today is 1.

Quordle today (game #1313) - hint #3 - uncommon lettersDo the letters Q, Z, X or J appear in Quordle today?

• No. None of Q, Z, X or J appear among today's Quordle answers.

Quordle today (game #1313) - hint #4 - starting letters (1)Do any of today's Quordle puzzles start with the same letter?

The number of today's Quordle answers starting with the same letter is 2.

If you just want to know the answers at this stage, simply scroll down. If you're not ready yet then here's one more clue to make things a lot easier:

Quordle today (game #1313) - hint #5 - starting letters (2)What letters do today's Quordle answers start with?

• F

• T

• F

• P

Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.

Quordle today (game #1313) - the answers

(Image credit: Merriam-Webster)

The answers to today's Quordle, game #1313, are…

  • FLAIR
  • TAROT
  • FRAIL
  • PRUNE

I have never before experienced today’s phenomenon when an incorrect guess for one word turns out to be a correct guess for another. 

This is what happened with FLAIR and FRAIL, which feature the same letters but in a different order. My wrong guess for FLAIR gave me the unusual sensation of annoyance at coming so close and simultaneous pleasure after realizing it didn’t matter.

Daily Sequence today (game #1313) - the answers

(Image credit: Merriam-Webster)

The answers to today's Quordle Daily Sequence, game #1313, are…

  • REGAL
  • BULGE
  • QUELL
  • FURRY
Quordle answers: The past 20
  • Quordle #1312, Thursday, 28 August: AFOOT, TANGO, LUMEN, NAVAL
  • Quordle #1311, Wednesday, 27 August: TWEED, SCRAP, SHEIK, AWOKE
  • Quordle #1310, Tuesday, 26 August: BEGET, WRATH, HEARD, INDEX
  • Quordle #1309, Monday, 25 August: GEEKY, SHALT, CHIEF, JIFFY
  • Quordle #1308, Sunday, 24 August: ROVER, GONER, ANTIC, OUTDO
  • Quordle #1307, Saturday, 23 August: DEMON, GRATE, FLYER, SHEEP
  • Quordle #1306, Friday, 22 August: TROOP, SCOPE, TORSO, BRINY
  • Quordle #1305, Thursday, 21 August: QUEST, SPARK, WHITE, ACUTE
  • Quordle #1304, Wednesday, 20 August: DOLLY, MERRY, BUGLE, WORST
  • Quordle #1303, Tuesday, 19 August: KNAVE, SMART, CARRY, MAMMA
  • Quordle #1302, Monday, 18 August: FIBER, TRADE, RAYON, TEASE
  • Quordle #1301, Sunday, 17 August: FUNGI, AMITY, DRIER, CHECK
  • Quordle #1300, Saturday, 16 August: OWING, QUAKE, SLIDE, ELITE
  • Quordle #1299, Friday, 15 August: WHALE, PRISM, DRAKE, TEPEE
  • Quordle #1298, Thursday, 14 August: LAPEL, IDIOM, RENEW, LIVER
  • Quordle #1297, Wednesday, 13 August: CACTI, HOMER, EMAIL, ALBUM
  • Quordle #1296, Tuesday, 12 August: SPOOL, TITLE, JAUNT, OVINE
  • Quordle #1295, Monday, 11 August: ADULT, BROOM, PURER, CRUEL
  • Quordle #1294, Sunday, 10 August: SCRUM, PIPER, TROLL, SPORE
  • Quordle #1293, Saturday, 9 August: NOOSE, INLET, ELEGY, VIRUS
Categories: Technology

NYT Strands hints and answers for Friday, August 29 (game #544)

TechRadar News - Thu, 08/28/2025 - 09:00
Looking for a different day?

A new NYT Strands puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Thursday's puzzle instead then click here: NYT Strands hints and answers for Thursday, August 28 (game #543).

Strands is the NYT's latest word game after the likes of Wordle, Spelling Bee and Connections – and it's great fun. It can be difficult, though, so read on for my Strands hints.

Want more word-based fun? Then check out my NYT Connections today and Quordle today pages for hints and answers for those games, and Marc's Wordle today page for the original viral word game.

SPOILER WARNING: Information about NYT Strands today is below, so don't read on if you don't want to know the answers.

NYT Strands today (game #544) - hint #1 - today's themeWhat is the theme of today's NYT Strands?

Today's NYT Strands theme is… A long time in the making

NYT Strands today (game #544) - hint #2 - clue words

Play any of these words to unlock the in-game hints system.

  • RAIL
  • CHOP
  • CORE
  • SPEAR
  • LIAR
  • TRED
NYT Strands today (game #544) - hint #3 - spangram lettersHow many letters are in today's spangram?

Spangram has 13 letters

NYT Strands today (game #544) - hint #4 - spangram positionWhat are two sides of the board that today's spangram touches?

First side: left, 6th row

Last side: right, 6th row

Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.

NYT Strands today (game #544) - the answers

(Image credit: New York Times)

The answers to today's Strands, game #544, are…

  • SPIRE
  • ARCH
  • MESA
  • BUTTE
  • GORGE
  • PILLAR
  • SPANGRAM: ROCK FORMATION
  • My rating: Hard
  • My score: 2 hints

The theme made me think about buildings and I thought I was on the right track when I got SPIRE straight away after beginning my search in the left-hand corner. Next, I got ARCH and was convinced we were looking for parts of buildings.

The spangram came after I thought I’d got two non-game words before putting them together and realizing I was on the wrong track. From here I hit a wall and struggled to find anything.

Two hints gave me MESA and BUTTE, which was very helpful as these are two types of formation that were unfamiliar to me. From here I was able to complete the board.

Yesterday's NYT Strands answers (Thursday, August 28, game #543)
  • GABBY
  • VERBOSE
  • VOLUBLE
  • TALKATIVE
  • LOQUACIOUS
  • SPANGRAM: CHATTERBOX
What is NYT Strands?

Strands is the NYT's not-so-new-any-more word game, following Wordle and Connections. It's now a fully fledged member of the NYT's games stable that has been running for a year and which can be played on the NYT Games site on desktop or mobile.

I've got a full guide to how to play NYT Strands, complete with tips for solving it, so check that out if you're struggling to beat it each day.

Categories: Technology

NYT Connections hints and answers for Friday, August 29 (game #810)

TechRadar News - Thu, 08/28/2025 - 09:00
Looking for a different day?

A new NYT Connections puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Thursday's puzzle instead then click here: NYT Connections hints and answers for Thursday, August 28 (game #809).

Good morning! Let's play Connections, the NYT's clever word game that challenges you to group answers in various categories. It can be tough, so read on if you need Connections hints.

What should you do once you've finished? Why, play some more word games of course. I've also got daily Strands hints and answers and Quordle hints and answers articles if you need help for those too, while Marc's Wordle today page covers the original viral word game.

SPOILER WARNING: Information about NYT Connections today is below, so don't read on if you don't want to know the answers.

NYT Connections today (game #810) - today's words

(Image credit: New York Times)

Today's NYT Connections words are…

  • SHELL
  • MUSHROOM
  • WAX
  • BANANA
  • STAR
  • STOCK
  • FIGURE
  • BALLOON
  • GULF
  • MOUNT
  • 7-10
  • 7-ELEVEN
  • PERSONALITY
  • CHEVRON
  • LICKETY
  • NAME
NYT Connections today (game #810) - hint #1 - group hints

What are some clues for today's NYT Connections groups?

  • YELLOW: Notable human
  • GREEN: Growing
  • BLUE: Petrol stops
  • PURPLE: Pull apart

Need more clues?

We're firmly in spoiler territory now, but read on if you want to know what the four theme answers are for today's NYT Connections puzzles…

NYT Connections today (game #810) - hint #2 - group answers

What are the answers for today's NYT Connections groups?

  • YELLOW: FAMOUS PERSON
  • GREEN: INCREASE
  • BLUE: PLACES THAT SELL GAS
  • PURPLE: SPLIT

Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.

NYT Connections today (game #810) - the answers

(Image credit: New York Times)

The answers to today's Connections, game #810, are…

  • YELLOW: FAMOUS PERSON FIGURE, NAME, PERSONALITY, STAR
  • GREEN: INCREASE BALLOON, MOUNT, MUSHROOM, WAX
  • BLUE: PLACES THAT SELL GAS 7-ELEVEN, CHEVRON, GULF, SHELL
  • PURPLE: SPLIT 7-10, BANANA, LICKETY, STOCK
  • My rating: Hard
  • My score: Fail

I crashed out today after cobbling together the yellow group having already made a couple of errors.

Annoyingly, I was on the right track for three of the groups. I thought that SPLIT was the link but I had PERSONALITY and CHEVRON instead of 7-10 and STOCK. Not even getting one away tricked me into thinking I was off track.

Then, with just one mistake left, I had BALLOON, MUSHROOM, and MOUNT but had STOCK instead of WAX.

Being based in the UK I think I can be forgiven for missing PLACES THAT SELL GAS, but, regardless, this was a poor round for me.

Yesterday's NYT Connections answers (Thursday, August 28, game #809)
  • YELLOW: PLACES TO GET TRAPPED NET, SNARE, TANGLE, WEB
  • GREEN: USED FOR TEA CUP, KETTLE, TEABAG, WATER
  • BLUE: ASSOCIATED WITH HARDNESS DIAMOND, NAILS, ROCK, STEEL
  • PURPLE: ENDING WITH KEYBOARD KEYS CANTAB, CYBERSPACE, ICECAPS, MAKESHIFT
What is NYT Connections?

NYT Connections is one of several increasingly popular word games made by the New York Times. It challenges you to find groups of four items that share something in common, and each group has a different difficulty level: green is easy, yellow a little harder, blue often quite tough and purple usually very difficult.

On the plus side, you don't technically need to solve the final one, as you'll be able to answer that one by a process of elimination. What's more, you can make up to four mistakes, which gives you a little bit of breathing room.

It's a little more involved than something like Wordle, however, and there are plenty of opportunities for the game to trip you up with tricks. For instance, watch out for homophones and other word games that could disguise the answers.

It's playable for free via the NYT Games site on desktop or mobile.

Categories: Technology

Resident Evil Requiem director explains why the game has a third-person mode, and it's mainly for players who couldn't handle first-person in Resident Evil 7 – 'I want to make sure that people can enjoy this game'

TechRadar News - Thu, 08/28/2025 - 08:21
  • Resident Evil Requiem director Koshi Nakanishi has explained why the game offers both a third-person and first-person mode
  • Nakanishi says Resident Evil 7 may have been "too scary" for some players, so a third-person option was added to Requiem partly for this reason
  • He also hopes the option will offer a more enjoyable experience for those who "either couldn't finish or didn't even start" Resident Evil 7

Resident Evil Requiem has a third-person mode for players who couldn't handle first-person in Resident Evil 7, according to game director Koshi Nakanishi.

In an interview with GamesRadar at Gamescom 2025, Nakanishi acknowledged that his previously directed game, Resident Evil 7, might have been too scary and decided to offer two options in the upcoming entry to allow for a more enjoyable experience.

"Looking back at Resident Evil 7's first person perspective, I implemented that as a way to make it more immersive and more scary than ever before, which I think most you know media and players agreed it was an incredibly scary game, but it was possibly too scary," Nakanishi said.

"I think some people couldn't handle it, and either couldn't finish or didn't even start it. And that's something that I look back on thinking that, you know, I want to make sure that people can enjoy this game."

Resident Evil Village introduced a third-person mode through downloadable content (DLC) post-launch, and like that game, Requiem will also allow the option to switch between first and third-person while playing, which Nakanishi hopes will make the jumpscares and horror more manageable.

"So if you started the game off in first person perspective, and you're finding it's too much, then third person is almost a way to step slightly back from that level of horror and make it slightly easier to deal with by having the character on screen as a kind of avatar of yourself," he explained.

Resident Evil Requiem is set to launch on February 27, 2026, for PlayStation 5, Xbox Series X, Xbox Series S, and PC.

You might also like...
Categories: Technology

Chinese nationals will no longer be allowed to manage Pentagon cloud services

TechRadar News - Thu, 08/28/2025 - 08:07
  • US Secretary of Defense Pete Hegseth calls for investigation into Microsoft's 'digital escort' system
  • The system saw Chinese nationals coding for DoD software vendors
  • Reports called this scheme 'inherently risky'

United States Secretary of Defense Pete Hegseth has ordered a review of the involvement of Chinese nationals in managing cloud services for the Pentagon and wider US military.

“For nearly a decade, Microsoft has used Chinese coders, remotely supervised by US contractors to support sensitive Department of Defense cloud systems - and if you’re thinking America First and common sense, this doesn’t pass either of those tests," Hesgeth said.

The declaration comes after a ProPublica report claimed Microsoft’s use of Chinese engineers to maintain Department of Defense computer systems with ‘minimal supervision by US personnel’ was ‘inherently risky’ - but Microsoft has said it will soon stop using these China based-engineers for US military tech support.

Digital escorts

These workers were supervised by ‘digital escorts’ - who were found to be mainly low-skilled and low-paid workers with very little coding experience.

One such escort told ProPublica; ‘we’re trusting that what they’re doing isn’t malicious, but we really can’t tell.’

“The use of Chinese nationals to service Department of Defense cloud environments, it’s over,” Hegseth went on. “We’re requiring a third-party audit of Microsoft’s digital escort program, including the code and the submissions by Chinese nationals.”

Not only that, but Hegseth will also require the Department of Defense to carry out a separate investigation of the digital escort program and the Chinese Microsoft employees involved.

“The program was designed to comply with contracting rules, but it exposed the department to unacceptable risk,” he argued.

“These investigations will help us determine the impact of this digital escort workaround. Did they put anything in the code that we don’t know about? We’re going to find out.”

Going forward, all software vendors for the DoD will also have to identify and terminate any Chinese involvement in DoD systems.

“It blows my mind that I’m even saying these things, that we allowed it to happen - that’s why we’re attacking it so hard,” Hegseth said.

You might also like
Categories: Technology

Banana Ball Fans: How to Watch the Savannah Bananas This Weekend

CNET News - Thu, 08/28/2025 - 08:00
Everything you need to know to stream this week's games and the rest of the Banana Ball season.
Categories: Technology

Standalone AI Devices Are Back, Baby. The Note-Taking Plaud Note 3 Proves It

CNET News - Thu, 08/28/2025 - 08:00
Plaud AI has already sold over a million AI devices. Is it time for you to add it to your tech collection?
Categories: Technology

Microsoft guns for Google with new search CloudFlare partnership that aims to make websites more AI agent-friendly

TechRadar News - Thu, 08/28/2025 - 08:00
  • Microsoft and Cloudflare want websites to behave like conversational AI apps
  • Cloudflare’s AutoRAG indexes content automatically, promising seamless updates for website data
  • NLWeb introduces structured MCP endpoints for AI agents seeking reliable access

Microsoft and Cloudflare have announced a new collaboration which seeks to make websites easier for both people and automated systems to query.

The initiative merges Microsoft’s “NLWeb” standard with Cloudflare’s “AutoRAG” infrastructure, providing a model for conversational search.

Instead of keyword-based navigation, the system allows natural language interaction, presenting direct answers rather than lists of links.

From search engines to answer engines

The goal of the new launch is to make any site function like an AI app, where human visitors and AI agents can ask questions and receive structured responses.

“Together, NLWeb and AutoRAG let publishers go beyond search boxes, making conversational interfaces for websites simple to create and deploy,” said R.V. Guha, creator of NLWeb, CVP, and Technical Fellow at Microsoft. “This integration will enable every website to easily become AI-ready for both people and trusted agents.”

Traditional search relies on keywords, leaving users to sift through multiple links to reach relevant information, but advocates of this new approach argue the model no longer matches expectations shaped by tools such as ChatGPT, Copilot, and Claude.

These systems provide immediate answers, and people increasingly expect websites to do the same.

However, while that framing is compelling, it assumes that all users prefer conversational responses over browsing.

The partnership also emphasizes the role of AI agents as a new class of “visitors.”

These automated systems typically scrape pages or follow keyword queries, but NLWeb introduces a structured “MCP” endpoint that gives them controlled access to site data.

This could reduce the inefficiency of scraping while allowing website owners to define the terms of access.

Yet questions remain about whether site operators will see tangible benefits or primarily additional technical burdens.

Cloudflare’s AutoRAG component handles crawling, indexing, and embedding site content into a managed vector database.

The system promises to keep information fresh with continuous updates and provide observability through Cloudflare’s AI Gateway.

While this sounds efficient, it effectively places indexing and access pipelines in the hands of a third-party infrastructure provider.

That raises concerns about cost, dependency, and whether site owners will cede too much control over how their data is handled.

By framing websites as first-class data sources for AI tools, Microsoft and Cloudflare are positioning themselves in direct competition with traditional search engines, particularly Google.

If AI writer models and LLM systems increasingly rely on structured access rather than scraping, search traffic patterns could change significantly.

To enable conversational search on a website through Cloudflare’s AutoRAG, users log into the Cloudflare Dashboard, create a new AutoRAG instance using the NLWeb Website quick deploy option, select the desired domain, and start indexing.

Once the process is complete, the site’s content becomes searchable through natural language queries, and owners can preview or embed the conversational interface to test how it will appear to visitors.

You might also like
Categories: Technology

Researchers reveal passkeys may not be as safe as we think they are - here's how to stay safe

TechRadar News - Thu, 08/28/2025 - 08:00
  • Browsers are the weak link that attackers now exploit for control
  • SquareX shows how trivial scripts can intercept and hijack passkey flows
  • From a user’s perspective, fake passkey prompts look entirely genuine

For years, the shift away from passwords toward passkeys has been framed as the future of secure authentication.

By relying on cryptographic key pairs instead of weak or reused strings, passkeys promised to remove the risks that have long plagued password systems.

However at the recent DEF CON 33 event, SquareX researchers presented new findings which challenge this view, claiming the very browsers relied upon to manage passkey workflows can be exploited in ways that bypass their protections.

The mechanics of passkeys

Passkeys operate through a system where a private key remains on a user’s device while a public key is stored by the service provider.

To log in, the user verifies identity locally with biometrics, a PIN, or a hardware token, and the server authenticates the response against its stored public key.

This structure should eliminate many of the classic risks, such as phishing or brute force attacks, yet the entire process assumes the browser serves as a trustworthy mediator, a role that SquareX researchers now argue is dangerously fragile.

They showed how attackers can manipulate the browser environment with malicious extensions or scripts, allowing them to intercept the registration flow, substitute keys, and even trick users into re-registering under attacker-controlled conditions.

From the victim’s perspective, the login process looks indistinguishable from a legitimate passkey operation, with no warning signs that credentials are being compromised.

Established enterprise security tools, whether endpoint protection or network defenses, do not provide visibility into this level of browser activity.

“Passkeys are a highly trusted form of authentication, so when users see a biometric prompt, they take that as a signal for security,” said SquareX researcher Shourya Pratap Singh.

“What they don’t know is that attackers can easily fake passkey registrations and authentication by intercepting the passkey workflow in the browser. This puts pretty much every enterprise and consumer application, including critical banking and data storage apps, at risk.”

With the majority of enterprise data now stored in SaaS platforms, passkeys are being rapidly adopted as the default authentication method.

SquareX’s findings suggest this transition introduces a new dependency on browser security, an area where oversight has traditionally been weak.

Passkeys may still represent progress beyond traditional credentials, yet the SquareX researcg shows no system is completely free from flaws, and organizations may have moved too quickly to embrace passkeys as a universal solution.

How to stay safe
  • Use a trusted antivirus to detect and block hidden malicious code.
  • Install extensions only from verified sources and review their permissions regularly.
  • Keep browsers updated to ensure the latest security fixes are applied.
  • Employ a password manager to securely handle legacy accounts that still rely on passwords.
  • Pair sign-in processes with an authenticator app to strengthen verification steps.
  • Regularly audit browser settings to minimize exposure to untrusted scripts or add-ons.
  • Limit the number of devices used for sensitive logins to reduce attack opportunities.
You might also like
Categories: Technology

2 new rivalries could emerge in The Gilded Age season 4, and that means Bertha is in trouble

TechRadar News - Thu, 08/28/2025 - 07:03

The Gilded Age season 4 is nowhere near being released yet, but I already feel incredibly sorry for Bertha (Carrie Coon). Granted, she hasn't been my favorite person during the last three seasons of the hit HBO Max show, nor is she usually the most agreeable.

However, she's got the weight of the world on her shoulders after the shocking last moments in the season 3 finale.

Let's rewind for a second. In episode 7, Bertha's husband George (Morgan Spector) was left on death’s door after being shot by a 19th century hitman disguised as a courier. We learn in episode 8 that he (just about) pulls through, but later uses his brush with death to tell Bertha he doesn't love her.

Well, at least he's no longer sure if he does. While he mulls it over, George leaves for New York without so much as an amicable thought between them. Meanwhile, Gladys (Taissa Farmiga) has got hitched to the Duke of Buckingham, announcing her pregnancy in the season's final moments.

In short, this all means Bertha's living her dream life vicariously through her daughter, sans husband. The Gilded Age season 4 will surely be her redemption arc, but I think there are two other potential foes in her way that we've not even considered.

Agnes and Enid could both be coming for Bertha in The Gilded Age season 4

Christine Baranski's Agnes could cause new trouble in The Gilded Age season 4. (Image credit: HBO)

Instead of Bertha peacefully trying to assimilate into the British Royal family, she's potentially got two other fights on her hands: with longstanding rival Enid (Kelley Curran) and a new potential sparring partner in Agnes (Christine Baranski).

Let's start with Agnes first. By the time the season 3 finale rolled around, niece Marian (Louisa Jacobson) and Larry Russell (Harry Richardson) hadn't officially got their engagement back on track, though both have said they want to do so. This is a nightmare for Agnes because up until now, she's merely tolerated the new money that the Russell family represent.

If the marriage goes ahead, there's sure to be arguments galore as the two families try to blend into one. Bertha had Agnes' approval after winning the season 2 opera war against Mrs. Astor (Donna Murphy), but that tolerance can be taken away in an instance.

This is where Enid comes in. Agnes’ son, Oscar (Blake Ritson) has potential nuptials on the cards with Enid, the woman who was fired from being Bertha's maid by sexually propositioning George. Oops.

Once again, she's new money, and after Oscar was scammed out of all of the family's money (that came up again in the season 3 Haymarket double-cross), that's bad news. Larry and Marian marrying would make Enid essentially a part of the Russell family, so there are more issues to stoke the potential fire of feud.

We've currently got no idea if George is coming back for The Gilded Age season 4, but again, this could cause further problems. Bertha would have to welcome Enid back into the family if the nuptials go ahead, and that's set to open old wounds if George is still kicking around (and worse, if he decides he no longer wants to be with Bertha).

Is any of this what Bertha needs in The Gilded Age season 4? Absolutely not. Are the potential new rivalries going to make new episodes even juicier for us? You can count on it.

All three seasons of The Gilded Age are streaming on HBO Max in the US, NOW TV in the UK and Paramount+ in Australia.

You might also like
Categories: Technology

Microsoft flags dangerous cybercriminals ransacking organizations - and then letting you know about it via Teams

TechRadar News - Thu, 08/28/2025 - 07:03
  • Microsoft warns of Storm-0501, a ransomware group targeting mostly cloud platforms
  • This approach allows them to be faster and more efficient
  • There are ways to defend against this threat, so stay alert

Microsoft is warning users about a ransomware operator that is more interested in compromising cloud infrastructure than on-premise devices since it’s faster, more efficient, and more disruptive.

In a new report, the company highlighted Storm-0501, a financially motivated group observed to go primarily for hybrid cloud environments. The group would first compromise on-premise Active Directory domains via domain trust relationships, and then use Entra Connect Sync servers to pivot towards the cloud and into Microsoft Entra ID tenants.

From there, the group would exploit a non-human synced identity with Global Admin rights, and no multi-factor authentication (MFA) set up, to gain full cloud access which, in turn, allowed them to create a backdoor using malicious federated domains, and by abusing SAML tokens.

Weathering the storm

Compromising Azure this way is an alarming turn of events, since crooks can gain owner role across subscriptions, map critical assets using AzureHound, exfiltrate data via AzCopy CLI, delete backups and storage using Azure operations and, in some instances, even encrypt the files using custom Azure Key Vault keys.

Attacking the cloud rather than on-prem infrastructure allows for faster data exfiltration, as well as the destruction of backups. Adding insult to injury, it also allows them to reach out to their victims via Microsoft Teams to and demand a ransom payment.

"Leveraging cloud-native capabilities, Storm-0501 rapidly exfiltrates large volumes of data, destroys data and backups within the victim environment, and demands ransom — all without relying on traditional malware deployment," Microsoft wrote.

To mitigate the threat, businesses should - before doing anything else - enforce MFA for all users, especially for privileged accounts. Then, they should restrict Directory Synchronization Account permissions, use TPM on Entra Connect Sync Servers, and apply Azure resource locks and immutability policies.

Finally, Microsoft advises enabling Defender for Endpoint and Defender for Cloud across all tenants, and naturally - monitoring with Azure activity logs and advanced hunting queries.

You might also like
Categories: Technology

Pixel 10 Pro XL vs. Galaxy S25 Ultra: Android Camera Battle

CNET News - Thu, 08/28/2025 - 07:00
Commentary: Which top-tier Android phone offers the best camera system? I took hundreds of photos in and around Seattle to find out.
Categories: Technology

Pixel 10's US Launch Might Be the Moment That eSIM Finally Becomes Easy

CNET News - Thu, 08/28/2025 - 07:00
Commentary: While eSIM has its kinks, changes at the wireless carriers and with Apple's iOS might bode well for Google's new phone.
Categories: Technology

Samsung is bringing Microsoft's Copilot AI to its newest TVs – at least it's better than Bixby

TechRadar News - Thu, 08/28/2025 - 06:57
  • Microsoft Copilot is coming to many 2025 Samsung TVs and monitors
  • Voice-powered interface and "friendly" on-screen character
  • Integration with Tizen OS Home and Samsung Daily+

Samsung is bringing Microsoft Copilot to its TVs and monitors this year "for smarter on-screen experiences". The news comes via Samsung's Dutch website and Microsoft's Generative AI blog, which says that the combination of Copilot and Bixby "creates a richer, more contextual smart display experience."

According to Samsung, the new Copilot integration will be accessible through the Tizen OS Home and Samsung Daily+. Copilot will provide "personalized recommendations, relevant information, and interactive learning experiences."

Copilot will respond to questions "instantly to share quick facts about actors or athletes, summarize plots, support foreign language learning, or help break down complex concepts – all from the biggest screen in the home."

What will Copilot on TV actually do?

While Samsung's press release is pretty light on detail, Microsoft gives five specific scenarios for Copilot on TV. They are:

  • Custom, spoiler-free recaps: “I want to get back into The Crown, I left off at Season 3, Episode 4. What happened up until then?”
  • Ultra-specific recommendations: “Like The Queen’s Gambit, but about cooking instead of chess, and under two hours.”
  • Group-friendly picks: “Hannah likes rom-coms, David likes sci-fi, Mark likes thrillers. What’s something we’ll all like?” Perfect for when everyone’s gathered in the living room and you want to decide together.
  • Post-watch deep dives: “Who was the voice actor for that character?” or “What else has the director done?”
  • Everyday help: “Will Saturday in Seattle be good conditions for hiking?” or “Cheer me up after a breakup.”

Microsoft calls it Copilot but I prefer Mr Blobby (Image credit: Microsoft)

The Microsoft blog also shows a video of Copilot in action, its weird blobby face pulsing on the screen with its lips synched to its speech.

Copilot will be coming to some of the best Samsung TVs and monitors in "select markets", and we've put a call in to Samsung to find out which ones.

Microsoft says Copilot will be coming to 2025 models including "Micro RGB, Neo QLED, OLED, The Frame Pro, The Frame, as well as the M7, M8, and M9 Smart Monitors."

That list includes some of the best TVs of this year – though there's no word yet on whether this will come to older TVs as part of Samsung's commitment to seven years of software updates for its TVs.

You might also like
Categories: Technology

How U.S. policy failed Gaza. And, the latest info on the Minneapolis school shooting

NPR News Headlines - Thu, 08/28/2025 - 06:30

Exclusive interviews with NPR reveal how U.S. policy during Biden's administration impacted Gaza. And, a shooter opened fire on a Minneapolis church yesterday, killing two children.

(Image credit: Bashar Taleb)

Categories: News

WhatsApp’s new AI-powered writing helper could help you avert another awkward conversation disaster

TechRadar News - Thu, 08/28/2025 - 06:27
  • Meta has added a new AI-powered Writing Help feature to WhatsApp
  • The tool can rephrase your text or proofread it for errors
  • It’s opt-in, so you’ll need to enable it before you can use it

These days it seems that every app is incorporating artificial intelligence (AI) in some way, and WhatsApp is rolling out a new AI feature that could help improve your messages and enable you to say exactly what you want to say.

Meta announced the new Writing Help feature in a blog post. It uses AI to suggest different ways you could phrase a drafted sentence, with options to simply proofread or rephrase the text, or to spruce it up in a more professional, humorous, or supportive manner.

Meta says this AI helper is built upon its Private Processing tech. This is a cloud service that encrypts your requests, meaning neither Meta nor WhatsApp can read them. Meta says it only uses data “that’s useful for processing the user’s request.” Once your query has been answered, it’s no longer stored on Meta’s servers. Meta doesn’t say whether your messages are used to train its AI, though.

How to use Writing Help

(Image credit: Shutterstock)

The feature isn't available everywhere yet, as Meta says it’s rolling it out starting in the US and “several other countries” with more coming “later this year”. It's also opt-in, so you'll need to enable it first. To do so, open WhatsApp, tap Settings > Chats > Private Processing, then enable the Private Processing feature – if you don't see this option then it's not available in your region yet.

To use Writing Help, you’ll first need to open a thread and draft a message in its text box. Once you’ve done that, you should see the sticker icon in the chat bar transform into a pencil. Tap this, then choose a writing option or style from the bottom of the app. If you’ve chosen to rephrase your text, you’ll see a range of different choices – tap one to have it replace your original draft text.

Note that you don’t have to just stick with whatever WhatsApp has suggested, as you can subsequently edit the new text and make further refinements before sending it.

If you do decide to enable Private Processing – and, with it, Writing Help – you might find it’s a useful way to get across the meaning of what you want to say when you can’t quite think of the right words. That might help prevent a rash of awkward conversations where your meaning is misunderstood or misinterpreted.

You might also like
Categories: Technology

Pages

Subscribe to The Vortex aggregator