Error message

  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

Technology

New forum topics

Best Mineral Sunscreen of 2025

CNET News - Thu, 05/15/2025 - 13:17
Mineral sunscreens are a chemical-free way to protect your skin from harmful sun rays. We found the best options for a range of skin types and budgets.
Categories: Technology

Coinbase Refuses to Pay $20M Ransom After User Data Breach. Do This Now to Protect Your Money and Data

CNET News - Thu, 05/15/2025 - 13:05
The popular cryptocurrency exchange will reimburse you for stolen crypto, but you'll need to secure your personal information.
Categories: Technology

Perplexity and PayPal Team Up for AI Shopping: What It Means for You

CNET News - Thu, 05/15/2025 - 13:04
The partnership lets you browse and buy from one interface -- which is convenient, but be cautious.
Categories: Technology

FBI Warns of Scam Demanding Students Pay to Fix Their Immigration Status or Else

CNET News - Thu, 05/15/2025 - 12:10
The new scam targets Middle Eastern students, such as those from Saudi Arabia or Qatar, who are lawfully in the US.
Categories: Technology

Walmart Warns of Price Hikes on Food, Tech and Toys, Blames Tariffs

CNET News - Thu, 05/15/2025 - 11:55
You can expect to see prices creep up in the next few weeks.
Categories: Technology

La Liga Soccer Livestream: How to Watch Espanyol vs. Barcelona From Anywhere

CNET News - Thu, 05/15/2025 - 11:30
The Blaugrana could clinch the title with a win today at their local rivals.
Categories: Technology

Nintendo Switch 2 launch games: what you'll be able toplay on June 5

TechRadar News - Thu, 05/15/2025 - 11:10

The Nintendo Switch 2 launch games are looking like a very good lineup indeed. With the console now just hours away from release, it's a good idea to start planning what you'll be playing once you've unboxed your shiny new toy.

Whether you've managed to snag a Nintendo Switch 2 pre-order or not, you'll want to know which games will be playable on Nintendo Switch 2 come launch day. There's a handful of Switch 2 exclusives, new releases like Undertale follow-up Deltarune, and even new versions of the best Nintendo Switch games like Tears of the Kingdom. All in all, Nintendo Switch 2's launch should have plenty to keep you ticking over until new Switch 2 games arrive later this year.

Here's all of the confirmed Nintendo Switch 2 launch games, as well as some info on each. Thanks to preview events that've run in the lead up to the new console's launch, we've actually played a lot of these games already. You'll find TechRadar Gaming's expert opinions on what we played for some of the games listed below. Stay tuned for future updates to this page if additional launch games are revealed over the next 24 hours.

Nintendo Switch 2 launch games

(Image credit: Nintendo)

Here's the full list of confirmed Nintendo Switch launch games. These all launch alongside the console on June 5, 2025.

  • Arcade Archives 2 Ridge Racer
  • Bravely Default Flying Fairy HD Remaster
  • Cyberpunk 2077: Ultimate Edition
  • Deltarune
  • Fast Fusion
  • Fortnite
  • Hitman World of Assassination – Signature Edition
  • Hogwarts Legacy
  • Kunitsu-Gami: Path of the Goddess
  • Mario Kart World
  • Nintendo Switch 2 Welcome Tour
  • Nobunaga's Ambition: Awakening Complete Edition
  • Puyo Puyo Tetris 2S
  • Rune Factory: Guardians of Azuma
  • Sid Meier's Civilization 7 (Nintendo Switch 2 Edition)
  • Split Fiction
  • Street Fighter 6
  • Survival Kids
  • The Legend of Zelda: Breath of the Wild (Switch 2 Edition)
  • The Legend of Zelda: Tears of the Kingdom (Switch 2 Edition)
  • Yakuza 0 Director's Cut

It's likely that we'll hear more from Nintendo regarding upcoming Switch 2 games in the lead up to launch. We'll keep up to date, and add to the list above as the news comes in.

(Image credit: CD Projekt Red)Cyberpunk 2077: Ultimate Edition

Wake up, Samurai

Peerless quest designRemarkable ray-traced realismSuperb immersive sim gameplaySome half-baked mechanicsLots of unfortunate glitchesThe narrative feels compromised

Cyberpunk 2077: Ultimate Edition makes its way to Nintendo Switch 2 on launch day. It's a massively updated version of the last-gen builds of the game, and it'll feature the excellent Phantom Liberty DLC as well.

(Image credit: Epic Games)Fortnite

The best value in gaming

Vibrant worldFun combatUnique building mechanicExcellent monetizationStill only one mapConstantly shifting world can make it hard to keep up

Fortnite will be playable on Nintendo Switch 2, meaning you'll be able to earn a Victory Royale wherever you are. The game is currently in its sixth Chapter, and what we've heard about the next Season of Fortnite sounds very exciting indeed.

(Image credit: Nintendo)Mario Kart World

Seemless kart racing

Perhaps the most anticipated Switch 2 launch game is Mario Kart World. For good reason, too, as we certainly came away impressed after spending some time with the game. In TechRadar's Mario Kart World preview, Hardware Editor Rhys Wood praised the game's seamless open world and the new Knockout Tour mode.

(Image credit: Nintendo)Tears of the Kingdom (Nintendo Switch 2 Edition)

Through the dragon's eye

Powerful new abilitiesMassive, rich open worldStuffed with puzzlesComplex battles cause low framerates

A Nintendo Switch 2 version of Tears of the Kingdom arrives on June 5, promising upgraded visuals and performance. In TechRadar's Nintendo Switch 2 preview, hardware editor Rhys Wood had this to say about the new versions:

"Playing it (Breath of the Wild) and Tears of the Kingdom at a rock-solid 4K 60fps on console feels like it’s not real. But it is on Switch 2. Both games also have drastically sharper image quality, meaning they’re absolutely the definitive version of each release."

(Image credit: Capcom)Street Fighter 6

A new contender

Broad, accessible control schemesWorld Tour mode rulesSeamless online functionalityExcellent, diverse base rosterDifficulty spikes in World TourMicrotransaction support

We absolutely adored Street Fighter 6 on PS5, and it looks like we're in for a similar experience on Switch 2. TechRadar even previewed it during our Switch 2 hands-on finding that "It maintained a solid 60fps throughout gameplay and felt as responsive (and loaded just as quickly) as versions on those other systems."

(Image credit: Toby Fox)Deltarune

A new tale

Deltarune will release its next two chapters alongside a full release on Nintendo Switch 2. This one is from the creator of Undertale and features a story that runs in parallel to 2015's beloved cult RPG.

(Image credit: Hazelight Studios)Split Fiction

Enter the mirror

Seemingly endless array of varying game mechanicsStunning art direction, level, and world designAn epic crescendo that seamlessly mixes cinematics and gameplayPuzzles could be more challengingChanging perspectives can be jarring

Split Fiction is one of our favorite games of 2025 so far, building on team Hazellight's previous titles to deliver a truly explosive co-op experience. In TechRadar Gaming's Split Fiction review, we said that "It packs an array of captivating mini-games into a linear, yet highly rewarding platformer, laced with Hazelight’s trademark storytelling to keep you on your moral toes."

(Image credit: Nintendo)Nintendo Switch 2 Welcome Tour

Take a guided tour

Nintendo Switch 2 Welcome Tour is essentially an interactive demo for the new console. It's a good choice for the first game to play once your Nintendo Switch 2 has arrived, though be aware that Nintendo is charging for Nintendo Switch 2 Welcome Tour. A strange decision indeed.

(Image credit: 2K)Civilization 7

Making history

Visually impressiveMatches have a more consistent paceSwapping Civs is smartly implementedFantastic roster of leaders to choose from at launchLegacy Path system ultimately leads to samey gamesDiplomacy feels half-baked

Civilization 7 makes some bold changes to the tried and tested formula, changes that we praised in our Civilization 7 review. It'll make use of the Switch 2's Joy-Con mouse mode as well, which will surely make playing even easier for fans of 4X strategy games.

(Image credit: IO Interactive)Hitman World of Assassination - Signature Edition

Stone-cold killer

Great living and breathing locationsLooks fantastic on next-genTweaks to the expected formulaCutscenes don’t look the bestCould be more replayableNew camera tool doesn’t add much

Hitman World of Assassination bundles the three main Hitman games, their DLCs, as well as a whole heap of extra content. The Nintendo Switch 2 is getting a Signature Edition, which features some Mario-themed cosmetics for those who pre-order the game.

Personally, I'm extremely excited to take Hitman on the go in portable mode. Being able to chip away at Freelancer Mode while commuting sounds like a dream, as does trying out time trial challenges for levels like Sapienza and the Berlin techno club-set "Apex Predator" mission.

You Might Also Like...
Categories: Technology

Want a Brighter Smile in 2025? These Expert-Tested Teeth Whitening Strips Can Help

CNET News - Thu, 05/15/2025 - 11:05
Get great-looking teeth without the dentist bills -- or ever leaving your home -- with these top-rated whitening strips.
Categories: Technology

Gemini Can Now Answer Questions About Images in Android's TalkBack Screen Reader

CNET News - Thu, 05/15/2025 - 11:00
Google's Expressive Captions can also convey more emotions and label new sounds in videos.
Categories: Technology

Sony WH-1000XM6 Review: Hail to the New Noise-Canceling King

CNET News - Thu, 05/15/2025 - 11:00
Sony upgraded the design and performance of its flagship noise-canceling headphones, pushing them slightly ahead of the competition. But not surprisingly, their price has also increased.
Categories: Technology

These 5 Reasons Are Why You Should Be Taking Ashwagandha

CNET News - Thu, 05/15/2025 - 10:32
Ashwagandha could help you deal with stress and inflammation, and that's just the beginning.
Categories: Technology

Nintendo reveals that the Switch 2's GL/G2 buttons are easily customizable, and can be mapped for any game in the console's quick menu

TechRadar News - Thu, 05/15/2025 - 10:13
  • A new tutorial on the Nintendo Today app shows players how to customize the Switch 2's GL and GR buttons
  • While in-game, players can bring up the Quick Settings menu and easily remap the buttons to whatever they want
  • The GL/GR buttons are only featured on the Joy-Con 2 Charging Grip and the Pro Controller 2

Nintendo has revealed a new way for players to customize the Switch 2's GL/GR buttons.

In a new post shared on the Nintendo Today app, the company offered an instructional overview video showing how the Switch 2's GL/GR buttons work and can be easily remapped for any game (via GameSpot).

Using Mario Kart World, Nintendo demonstrated that after launching the game to the start menu, players can bring up the Quick Settings menu, scroll down, and map the GL and GR buttons to whatever button they want, like A or B.

After assigning buttons, players can exit the menu and return to the game, making the process fast and simple.

[Switch 2]Use the Quick Settings menu to map the GL and GR buttons to whatever you want.These buttons are available on the Joy-Con 2 Charging Grip and the Pro Controller 2.(Also, day 1 patch confirmed for Mario Kart World. The title screen says it is on version 1.1.0.)[image or embed]@oatmealdome.bsky.social

In case you missed it, the GL and GR buttons are available only on the Joy-Con 2 Charging Grip and the Pro Controller 2, both of which are sold separately from the Switch 2.

The handheld's magnetically attached Joy-Con 2 controllers don't offer the feature.

The Nintendo Switch 2 launches globally on June 5, 2025, for $449.99 / £395.99. UK pre-orders and US pre-orders are now live.

The Pro Controller 2 will cost $79.99 / £74.99, and the Joy-Con Charging Grip will be priced at $40 / £30.

You might also like...
Categories: Technology

Trump Pushes Apple to Make Your Next iPhone in the US, Not India

CNET News - Thu, 05/15/2025 - 09:58
Apple has agreed to "up" production in the US, according to the president.
Categories: Technology

Garmin surprise launches two new Forerunner watches – the Garmin Forerunner 570 and Garmin Forerunner 970 – plus the HRM 600

TechRadar News - Thu, 05/15/2025 - 09:36
  • Garmin has announced the Garmin Forerunner 570 and Garmin Forerunner 970, along with a new HRM 600
  • The two watches include new-to-the-Forerunner-line hardware such as a speaker, mic and LED light
  • The 970 offers new metrics such as Running Economy and Tolerance

Garmin has announced the release of two new watches, the Garmin Forerunner 570 and Garmin Forerunner 970, along with a new Garmin HRM 600 heart rate monitor. The two watches boast Garmin's 'brightest AMOLED screen yet' and other features new to the Forerunner series such as a speaker and microphone, allowing you to take calls during a run without touching your phone, along with an Evening Report to add to Garmin's existing Morning Report functionality.

Read on to see our initial impressions, and whether they'll be worthy of a place in our best Garmin watches list.

Garmin Forerunner 570

(Image credit: Garmin)

The Gamrin Forerunner 570 is priced at $549.99 / £459.99 / AU$999 for the 42mm, and $549.99 / £459.99 / AU$999 for the larger 47mm watch as well. With 11 days of battery life in smartwatch mode (the shortest of any watch in the last several generations of Forerunners) it sports a selection of jazzy new colorways including Slate Grey Aluminum, Raspberry Aluminum and Cloud Blue Aluminum, all with new translucent silicone bands.

Apart from the brightest screen yet, Evening Report and speaker/microphone combo, the watch seems to share a great deal of DNA with the rest of the Forerunner line. This includes access to Garmin Coach training programs, health metrics such as a skin temperature and Pulse Oximeter sensor, and Garmin's usual five-button design.

Unlike many of the other best Garmin watches, there is no solar-powered option with a duller, memory-in-pixel display to conserve battery life. You're stuck with a maximum of 11 days, which is likely to realistically top out at just over a week with repeated GPS workouts.

Garmin Forerunner 970

(Image credit: Garmin)

The Garmin Forerunner 970 comes in a single size, 47mm, priced at $749.99 / £629.99 / AU$1,399, with a 1.4-inch AMOLED screen that retains that 'brightest ever' distinction. It lasts up to 15 days in smartwatch mode: an improvement over the 570, but it seems that screen technology does suck more battery life than other Forerunners before it.

The 970 packs in all the features of the 570, with additions, including the LED light seen on the Garmin Epix Pro and Garmin Instinct 3 watches. New metrics include Eunning Economy, Step Speed Loss (both of which require the new Garmin HRM 600 to work) and Running Tolerance, which tells you about your body's limits and recommends a weekly mileage. It sounds like a useful feature worthy of one of the best running watches.

It also sports ECG functionality, more premium materials such as Sapphire Glass on the lens, and comes in different colorways, including Soft Gold Titanium and Carbon Grey DLC Titanium. Clearly Garmin wanted to evoke a little more luxury here.

Garmin HRM 600

(Image credit: Garmin)

The HRM 600 is Garmin's latest and best heart rate monitor, priced at $169.99 / £149.99 / AU$299. It's compatible with the two new Forerunners above to enable their expanded running dynamics measurement, as well as other smartwatches, Garmin cycling computers, or can be worn on its own.

It's capable of sending pace and distance data (indoor workouts only), steps, time and calories burned to Garmin Connect, allowing you to sync your workouts with your smartwatch. This can be done for greater accuracy, or during workouts where it's not appropriate to wear a smartwatch, such as boxing or climbing.

Categories: Technology

Scattered Spider moves beyond the UK, places crosshairs on US companies

TechRadar News - Thu, 05/15/2025 - 09:31
  • US retailers should "take note", Google is warning
  • Scattered Spider was seen targeting multiple US retailers this year
  • The group has been on a "long hiatus"

Scattered Spider, a known ransomware collective, is widening its target scope, no longer focusing exclusively on UK firms. This is according to Google’s Threat Intelligence Group (TIG), who told BleepingComputer that US retailers “should take note.”

"The US retail sector is currently being targeted in ransomware and extortion operations that we suspect are linked to UNC3944, also known as Scattered Spider," John Hultquist, Chief Analyst at Google Threat Intelligence Group, told the publication. Hultquist added that Scattered Spider has returned after a “long hiatus” to target multiple firms.

The group is not as tightly-knit as organizations such as LockBit or Cl0p. It is relatively loose, and operates within a larger hacking community known as “the Com”. Its members engage in all kinds of attacks, from social engineering and SIM swapping, to ransomware. Scattered Spider’s usual targets are financial institutions, technology firms, and entertainment/gambling organizations.

TechRadar Pro readers can get 60% off Premium Plans at RoboForm now!

New users can take advantage of RoboForm’s exclusive deal and get 60% off the Premium Plan. With this deal, you can get unlimited password storage, one-click login & autofill, password sharing, two-factor authentication for added protection, cloud backup, and emergency access for trusted contacts. To claim this deal, visit this link and sign up for the Premium Plan to lock in this huge discount.

Preferred partner (What does this mean?)View Deal

Names and addresses

Google is warning retailers to take note, however, Silent Push reported that in 2025 some of Scattered Spider’s victims included Chick-fil-A, Forbes, Instacart, New York Digital Investment Group, News Corporation, Nike, Twitter/X, Tinder, T-Mobile, and Vodafone.

Among the retailers targeted this year, BleepingComputer singled out Marks & Spencer, Co-op, and Harrods. In all of these attacks, the threat actors used DragonForce - a ransomware operation that emerged in December 2023 and gained some notoriety since then.

In April 2025, the UK National Cyber Security Centre (NCSC) published new guidance, helping UK firms defend against Scattered Spider better. The organizations urged the retail sector to “wake up” and tighten up on security.

"Whilst we have insights, we are not yet in a position to say if these attacks are linked, if this is a concerted campaign by a single actor, or whether there is no link between them at all," the NCSC said. "We are working with the victims and law enforcement colleagues to ascertain that."

Via BleepingComputerd

You might also like
Categories: Technology

As political violence manifests through cyber attacks, companies must prepare

TechRadar News - Thu, 05/15/2025 - 09:27

The Allianz Risk Barometer, an annual report detailing the risks businesses are most concerned about for the year ahead, has seen companies rank political risks and violence as a top 10 global risk for the past three years. Businesses’ concerns have been exacerbated by 2024’s record-breaking number of elections, the developing conflict in the Middle East, and ongoing war in Ukraine.

The negative impact of political violence on companies can manifest in many ways, from endangering employee and customer safety to operational disruptions caused by material damage to premises or assets. As technology advances, uncertainty grows, and political tensions remain high around the world, businesses must consider their vulnerabilities, particularly in the cyber realm.

According to Allianz Commercial’s new Political Violence and Civil Unrest Trends 2025 report, cyber breaches represent one important way that political violence activity can impact businesses. This year’s report identified a key trend: that “new tech versus old tech” has increased the threat of rogue state-triggered damage and disruption, alongside increased reliance on technology around the world and ongoing instability in the geopolitical landscape. Addressing areas of vulnerability will be essential as companies grow operations in an increasingly volatile cyber environment.

New tech, new threats

Advances in technology and global connectivity have increased production and dissemination of misinformation and disinformation. To sow discord, Advanced Persistent Threat (APT) actors, which are usually sponsored by rogue nations or organizations, leverage cyber-attacks to disseminate false information, using techniques such as manipulated online news platforms and compromised social media accounts to instigate real-world events such as aggravating political polarization, promoting social unrest and riots and undermining democratic elections.

APT groups often engage in sophisticated cyber espionage, such as in the case of the Southport attacks and subsequent far-right riots during 2024 in the UK, which spread disinformation and caused social disruption.

Increased digital reliance and geopolitical instability are also heightening the risk of cyber-attacks that inflict physical harm at the same time.

Exposures in critical infrastructure

Critical infrastructure, including energy, transportation, and manufacturing, faces growing vulnerability to disruptions, equipment damage, and threats to human safety via cyber means.

To manage physical processes at these large installations, complex Industrial Control Systems (ICS) or operational technology (OT) systems are used for control and monitor purpose. Typically, these systems are legacy in nature and have obsolescence issues. That means they are vulnerable to attacks that can disrupt physical processes which can lead to potentially hazardous scenarios. For example, in refinery operations manipulation of ICS and safety systems can lead to catastrophic fire, explosions and can cause major environmental damage due to hydrocarbon releases.

Utility companies, too, depend extensively on OT systems. The prevalence of outdated, internet-unsecured devices within such networks poses a major security challenge due to infrequent updates. The utility sector’s cyber security weaknesses render it highly vulnerable. Exploiting internet-accessible OT and ICS devices, including those in the wastewater and water sectors could affect millions of people, with potentially severe consequences for public health and safety.

The vulnerability of transportation systems to cyber threats also raises critical concerns regarding the potential for cyber-physical attacks to cause tangible damage. While modern aircraft possess strong security protocols, vulnerabilities within airport infrastructure, including baggage handling and air traffic control, present a tangible risk of physical damage stemming from cyberattacks. Cyber-attacks targeting other transportation infrastructure also pose a significant risk of physical damage, with disruptions to signaling systems capable of triggering collisions or derailments. In August 2023, a cyber-attack on Poland’s railway system, where hackers manipulated unsecured radio signals to activate emergency train stops, demonstrates the susceptibility of outdated infrastructure to digital threats.

Addressing cyber vulnerabilities

Assessing the robustness of cybersecurity for key infrastructure demands a multi-faceted approach. Companies should engage with their insurance providers through cyber risk dialogue to discuss potential threats to the industry, as well as the insured’s weaknesses in people, technology and processes. Beyond traditional IT defenses, evaluations also include scrutinizing vulnerabilities, including legacy systems which are often ill-equipped for modern cyber threats, as well as an end-to-end assessment of the insured’s value chain.

Key weaknesses often reside in unpatched, poorly secured legacy systems, and the convergence of IT and OT networks. Supply chain vulnerabilities, inadequate incident response plans, and a lack of robust security awareness training further exacerbate these risks. Human error, particularly in access management and patching protocols, remains a significant entry point for malicious actors.

The convergence of Artificial Intelligence, social media, phishing, and Business Email Compromise attacks creates a potent and evolving threat landscape. These technologies are being weaponized to create more convincing and effective cyber-attacks.

How an organization will recover and maintain critical functions during and after a disruption is key. A robust business continuity plan encompasses a business impact analysis to pinpoint critical functions, defined recovery strategies and procedures, clear communication protocols, reliable data backup and recovery systems, flexible alternative work arrangements, and regularly conducted testing and exercises. Comprehensive audits encompass physical security, incident response protocols, and supply chain resilience. Regular penetration testing and threat intelligence integration are also crucial for identifying and mitigating emerging risks, ensuring the continuous protection of essential services.

We've featured the best antivirus software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

The iPhone will soon turn 20, but the last thing it needs is an all-glass makeover

TechRadar News - Thu, 05/15/2025 - 09:27

Steve Jobs was a design and materials guy. He grew up around homes built by legendary architect Joseph Eichler. Even if you don't know the name, you're likely familiar with their signature feature: floor-to-ceiling glass exterior walls. Eichler's influence on Jobs can be seen to this day in dozens of iconic Apple Stores around the world and at Apple Park, where the Steve Jobs Theater is, above ground, wrapped in 22-foot-tall glass panes.

Job's love of glass is the reason your iPhone 16 screen is covered in Corning's Gorilla Glass. As recounted in Walter Isaacson's biography of the late Apple CEO and founder, Steve Jobs hopped on the phone with Corning execs and convinced them to start making Gorilla Glass again, specifically for the first iPhone.

The rest, as they say, is history. How, though, might Apple celebrate this history when the iPhone turns 20 in 2027? According to multiple rumors, the iOS-running device is due for a major makeover, one that might include a significant increase in the use of glass.

Glasserversary

According to GSM Arena, for this anniversary handset Apple might do away with the bezel, the thin black bar that currently runs around your Super Retina XDR display, completely. With the glass running not only to the edges of the phone but seemingly spilling over them to the sides, the effect would be as if the handset were made entirely of glass.

This rumored design decision might have pleased Jobs. His love of glass never diminished, and most of his designs were built around the concept of mass-produced beauty. Jobs, according to his biography, once took his team to a Tiffany Glass exhibit at the Metropolitan Museum in New York to show them how to build repeatable beauty at scale.

What made Apple special almost 20 years ago is no longer unique among smartphone manufacturers.

Like Jobs, I appreciate beautiful design and exquisite materials. Job's decision to build the first iPhone chassis out of glass and aluminum is why I had such a strong emotional reaction when I first held the phone in 2007.

What made Apple special almost 20 years ago is no longer unique among smartphone manufacturers. They all use Gorilla Glass and some form of steel, aluminum, or even titanium. The battle for smartphone supremacy is now less about aesthetics and more about features, performance, and photography.

That alone might justify Apple completely overhauling the design for the iPhone 19. But making it virtually all glass is not the right way to go.

Never scratchproof

For as good as Gorilla Glass is (most phones now use the Victus 2 formula, and some add a Ceramic covering for more strength), it's still not as strong as metal, or even as resilient as plastic.

Every phone I've tested and owned has scratches, sometimes significant ones, on the screen. I haven't dropped these phones from a great height or dragged them across concrete, and yet they still have these blemishes.

Most people carry their iPhones in thick shock-proof cases to protect the comparatively fragile front and back glass. Like most smartphones, iPhones remain especially vulnerable at the corners; drop your iPhone just right on the pavement and it could shatter.

Broken glass

Now imagine what it would be like owning a phone that's all but dipped in glass. Glass along the edges, even if they're curved, will be far too exposed. No one would ever dare carry such a phone unprotected, would they?

So why would Apple do this? As I said, they want to celebrate 20 years of the iPhone, and what better way to do it than with a design that's too precious to hold or use. I could see a 'Special Edition iPhone 19', one that's covered in glass and which costs twice as much as the most expensive flagship. Few will buy it, but some will end up in museums and behind more glass inside glass-encased Apple Stores.

Those will be the perfect home for those iPhones, if Apple does insist on building them.

You might also like
Categories: Technology

Safeguarding data for the quantum era

TechRadar News - Thu, 05/15/2025 - 09:15

Staying ahead of potential cyber threats is a constant challenge with ransomware, phishing and AI just a few risks organizations must guard against. But what about quantum computing?

While not an immediate threat, quantum computing is one of the most complex and far-reaching challenges on the horizon. Thanks to its ability to perform complex calculations exponentially faster than classical computers, quantum will revolutionize numerous scientific fields – including chemistry, physics, and materials science. It also poses a significant cybersecurity risk due to its ability to break modern encryption methods and expose sensitive data – with ‘collect now, decrypt later’ attacks underscoring the urgency of preparing for a future where current cryptographic standards may be rendered obsolete.

So how can we protect against the cybersecurity threat this technology poses, both now and in the future?

The cybersecurity risks posed

Current encryption protocols, such as ECC (Elliptic Curve Cryptography) and RSA (Rivest-Shamir-Adleman), either rely on the difficulty of factoring large numbers or solving discrete logarithm problems for security. However, quantum computers using advanced methods like Shor’s algorithm – which can factor large numbers faster than any other algorithm – could efficiently solve these problems, leaving traditional encryption methods vulnerable to attack.

While a sufficiently powerful quantum computer capable of breaking modern encryption is unlikely to be available within the next decade, this window is narrowing with each quantum-led innovation. The issue is, threat actors are already collecting and storing sensitive data for future decryption, highlighting the need for proactive measures to safeguard information against post-quantum threats now.

To address this demand, the global cybersecurity community is actively developing quantum-safe encryption standards. This includes The National Institute of Standards and Technology (NIST), which has spearheaded the Post-Quantum Cryptography Standardisation project. This aims to evaluate and standardize quantum-resistant algorithms, helping to pave the way for the widespread adoption of quantum-safe encryption.

Organizations in the UK are also being urged to prepare for the cybersecurity risks posed by quantum computing, with a recent report by the Information Commissioner’s Office (ICO) identifying data privacy concerns posed by the technology. The government has also established a Quantum Regulatory Forum to promote safe and responsible development. While significant progress is being made in the development of safe and secure quantum computing, specifically mitigating the cybersecurity threats is crucial. But how can this be done?

Addressing these threats

Adopting quantum-safe encryption strategies is one mitigation technique. This refers to cryptographic protocols designed to resist quantum attacks. Unlike traditional encryption, which depends on computational complexity, quantum-safe encryption is rooted in mathematical problems believed to be insurmountable even for quantum computers.

Three major approaches are already being explored, with the first being Quantum Key Distribution (QKD) – a secure way of sharing encryption keys using the principles of quantum mechanics, ensuring only the intended recipient can access the key. In cryptography terms, these entangled quantum particles or ‘qubits’ are encoded with cryptographic keys and transmitted between a sender and a receiver. If an eavesdropper attempts to intercept these particles, their quantum states will be disturbed, alerting the sender and receiver to an intruder. This ensures any attempt at unauthorized interception is immediately detected.

Despite facing challenges related to scalability, transmission distance and integration with existing infrastructure, this encryption method is already being put into practice. One example is JPMorgan Chase (JPMC), which used QKD to secure multiple high-speed virtual private networks traversing a single 100 Gbps fiber connecting data centers.

Other quantum-safe solutions include Quantum-Safe Encryption, which ensures a secure key exchange resistant to quantum attacks, and Post-Quantum Cryptography (PQC). This implements cryptographic algorithms believed to be difficult for quantum computers to solve, such as lattice-based encryption.

While these approaches offer a means of securing data against quantum computing, we must remember that adopting quantum-safe solutions and protecting data poses several challenges. Interoperability, performance impact, and backward compatibility must be considered and leaders need to carefully assess existing infrastructure and devise a roadmap for migration to quantum-resistant encryption.

The future quantum landscape

As cyber threats continue to evolve, ensuring the long-term security of sensitive information is paramount. This includes for quantum computing. While no single technology will solve this challenge alone, harnessing the power of quantum-resistant cryptographic algorithms and QKD technologies can help protect data while allowing organizations to stay resilient in the face of continued technological advancements.

We've featured the best malware removal.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Huawei Watch 5 Tested: Easy Heart Scanning, but Not for Americans

CNET News - Thu, 05/15/2025 - 09:00
The watch's X-Tap sensor makes it simple to get an overview of your health. But it won't be available in the US.
Categories: Technology

Largest US steel manufacturer puts production on the backburner after cyber attack

TechRadar News - Thu, 05/15/2025 - 09:00
  • Nucor confirmed suffering a cyberattack
  • It was forced to shut down parts of its operations to contain the incident
  • No threat actors claimed responsibility yet

Nucor, one of the biggest steel manufacturers in the United States, was forced to shut down parts of its operations to address an ongoing cyberattack. The company confirmed the news in a new 8-K form filed with the US Securities and Exchange Commission (SEC).

In the filing, Nucor said it recently observed an “unauthorized third party” accessing “certain information technology systems.” When it spotted the intrusion, it activated its incident response plan, brought in a third-party cybersecurity company to assist, and notified relevant law enforcement agencies.

However, it also took “potentially affected systems offline” to implement “other containment, remediation, or recovery measures”.

TechRadar Pro readers can get 60% off Premium Plans at RoboForm now!

New users can take advantage of RoboForm’s exclusive deal and get 60% off the Premium Plan. With this deal, you can get unlimited password storage, one-click login & autofill, password sharing, two-factor authentication for added protection, cloud backup, and emergency access for trusted contacts. To claim this deal, visit this link and sign up for the Premium Plan to lock in this huge discount.

Preferred partner (What does this mean?)View Deal

Was it ransomware?

Nucor told the SEC that it “temporarily and proactively” stopped certain production operations at various locations “in an abundance of caution”. It is now restarting those operations, it added.

Usually, when a company shuts down its operations to contain a cyberattack, it usually ends up being a ransomware attack. While the company did not explicitly say so, the fact that it halted operations could suggest this is the case.

Furthermore, The Register tried reaching out to the company’s facilities around the US, but found many phone numbers “either shut down or unobtainable.” Sometimes, a ransomware attack also results in inaccessible phone lines.

The importance Nucor plays in supporting the US critical infrastructure would also make it a prime target for ransomware attackers. No threat actors have claimed responsibility just yet, and we don’t know if any sensitive data was taken in the breach.

Nucor is headquartered in Charlotte, North Carolina, and is widely considered as the largest US steel producer, and one of the top recyclers. It operates more than 300 facilities across the US, Canada, and Mexico, and manufactures a wide range of steel products. Last year, it reported annual net sales of $30.73 billion.

Via The Register

You might also like
Categories: Technology

Pages

Subscribe to The Vortex aggregator - Technology