Error message

  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

Technology

New forum topics

Fitness and Wellness Deals Worth Adding to Cart on Amazon Prime Day July 2025

CNET News - Tue, 07/08/2025 - 09:33
From massage guns to your favorite sunscreens, you’ll want to stock up now.
Categories: Technology

Securing the future: why cybersecurity must be secure by design – and by default

TechRadar News - Tue, 07/08/2025 - 09:24

The UK Public Accounts Committee’s recent report sends a clear and urgent message: cyber threats are evolving faster than defenses can keep up. The digital infrastructure underpinning our critical infrastructure is increasingly exposed—not only due to external threats but because of internal gaps in strategy, capability, and legacy system management.

Replacing outdated technology may be part of the solution, but it’s far from the full picture. We need a fundamental shift in mindset—toward continuous assurance, smarter system design, and a dynamic approach to skills development that anticipates the challenges of tomorrow, not just today.

Beyond ‘build and forget’: cybersecurity as an ongoing commitment

For too long, cybersecurity has followed a static, compliance-driven model—deploy once, tick the box, and move on. In today’s evolving threat landscape, this ‘build and forget’ mentality is no longer viable, if it ever was.

Security must be woven into every stage of design, development, and operations through a Secure by Design approach. With Cyber Physical Systems and enterprise IT environments in constant flux, reassessing security posture regularly ensures defenses remain adaptive and effective.

The UK government has rightly prioritized Secure by Design in its Defending the UK in a Digital World: Cyber Security Strategy 2022–25. Yet, despite this ambition, adoption across sectors remains uneven, with many organizations still relying on outdated risk frameworks and reactive measures—essentially attempting to counter modern threats with legacy solutions.

Cybersecurity must evolve beyond static processes. It requires continuous evaluation, proactive defense, and resilient security strategies to stay ahead of emerging risks.

Legacy systems: balancing risk and progress

Few areas illustrate the tension between innovation and practicality more clearly than legacy systems. Originally built for a different technological landscape, many were air-gapped, manually operated, and completely isolated from external networks—never designed to withstand the level of connectivity and cyber threats seen today.

In pursuit of efficiency and cost reduction, organizations have increasingly networked and remotely managed these systems, often without implementing adequate security safeguards. While this enhances operational flexibility, it also exposes critical infrastructure to new vulnerabilities, opening doors to sophisticated cyber threats.

The solution isn't as simple as replacing old systems outright. The decision to upgrade or extend the life of legacy platforms requires careful cyber risk evaluation, ensuring the right balance of mitigation strategies, isolation measures, and continuous monitoring to maintain security. Organizations must also weigh financial constraints, applying appropriate risk controls to optimize security investments without excessive costs.

Secure by design: a strategic imperative

Secure by Design isn’t just a cybersecurity buzzword—it’s an essential principle for building resilient digital infrastructure. It ensures that an appropriate level of security is built in from the ground up, integrated at every design, development, and operational phase to create adaptable, auditable, and testable systems.

Yet, despite its inclusion in policy frameworks and industry guidelines, implementation is often incomplete or superficial. Many organizations pay lip service to security but fail to embed it across teams and processes, treating it as an isolated function rather than an organizational priority – much like organizations approach health and safety.

Regulation will play a vital role in closing this gap. The upcoming Cyber Security and Resilience Bill is set to improve oversight, enforce stronger standards, and introduce mandatory incident reporting for high-risk sectors. Coupled with enhanced threat intelligence sharing, this legislation could shift cybersecurity strategies from reactive defense to proactive resilience.

Cyber talent: securing the future workforce

Another major challenge in cybersecurity is building a workforce capable of responding to evolving threats. As technology advances, skills become obsolete faster than ever, requiring ongoing investment in cyber capability development.

While direct government hiring plays a role—especially in sensitive security domains—industry partnerships offer a scalable alternative. Specialist organizations, like Thales, are well-positioned to train and upskill professionals through apprenticeships, immersive simulations, and diverse sector exposure, which traditional public-sector roles often lack.

This model provides dual benefits: it equips trainees with experience across various threat scenarios, while also fostering an agile workforce that can quickly adapt to emerging technologies like artificial intelligence and quantum computing. Cybersecurity isn't just about fixing vulnerabilities of the past—it's about anticipating and securing against the threats of the future.

Transparency and collaboration: strengthening cyber resilience

Cybersecurity can no longer be viewed as a standalone issue—threats don’t respect organizational boundaries, and weaknesses in one system can expose an entire network. Transparency, collaboration, and mandatory incident reporting are essential for national security, ensuring vulnerabilities are addressed before they escalate into widespread risks.

Reporting cyber incidents, much like the practice of reporting near misses and accidents in health and safety, strengthens overall resilience. Just as greater visibility has helped organizations reduce safety incidents, increased cyber reporting makes it harder for hackers to exploit gaps, reinforcing defenses before real damage occurs.

The Thales Data Threat Report underscores the growing risks to Critical National Infrastructure (CNI) and highlights the value of compliance—organisations that passed cybersecurity audits had significantly fewer breaches than those that failed. With the Cyber Security and Resilience Bill raising standards, stronger protections for essential infrastructure, including data centers that support AI innovation and national healthcare, will become the norm.

Each unreported cyber-attack is a missed opportunity to refine security strategies. Enhanced visibility into cyber threats improves collective intelligence, allowing organizations to make faster, smarter decisions in the face of emerging risks.

Conclusion: building security for the future

Modern cybersecurity requires more than patching vulnerabilities or checking compliance boxes—it demands a strategic rethink of how systems are designed, maintained, and safeguarded. Understanding how legacy and modern environments interact is key, alongside developing cyber talent that can anticipate and mitigate future risks.

Secure by Design must be the standard, not the exception. With the right balance of policy, proactive security measures, and skilled professionals, organizations can shift from reactive defense to sustainable resilience, ensuring they are prepared for the threats ahead, not just responding to the ones they see today.

We've featured the best endpoint protection software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Securing the future: why cybersecurity must be secure by design – and by default

TechRadar News - Tue, 07/08/2025 - 09:24

The UK Public Accounts Committee’s recent report sends a clear and urgent message: cyber threats are evolving faster than defenses can keep up. The digital infrastructure underpinning our critical infrastructure is increasingly exposed—not only due to external threats but because of internal gaps in strategy, capability, and legacy system management.

Replacing outdated technology may be part of the solution, but it’s far from the full picture. We need a fundamental shift in mindset—toward continuous assurance, smarter system design, and a dynamic approach to skills development that anticipates the challenges of tomorrow, not just today.

Beyond ‘build and forget’: cybersecurity as an ongoing commitment

For too long, cybersecurity has followed a static, compliance-driven model—deploy once, tick the box, and move on. In today’s evolving threat landscape, this ‘build and forget’ mentality is no longer viable, if it ever was.

Security must be woven into every stage of design, development, and operations through a Secure by Design approach. With Cyber Physical Systems and enterprise IT environments in constant flux, reassessing security posture regularly ensures defenses remain adaptive and effective.

The UK government has rightly prioritized Secure by Design in its Defending the UK in a Digital World: Cyber Security Strategy 2022–25. Yet, despite this ambition, adoption across sectors remains uneven, with many organizations still relying on outdated risk frameworks and reactive measures—essentially attempting to counter modern threats with legacy solutions.

Cybersecurity must evolve beyond static processes. It requires continuous evaluation, proactive defense, and resilient security strategies to stay ahead of emerging risks.

Legacy systems: balancing risk and progress

Few areas illustrate the tension between innovation and practicality more clearly than legacy systems. Originally built for a different technological landscape, many were air-gapped, manually operated, and completely isolated from external networks—never designed to withstand the level of connectivity and cyber threats seen today.

In pursuit of efficiency and cost reduction, organizations have increasingly networked and remotely managed these systems, often without implementing adequate security safeguards. While this enhances operational flexibility, it also exposes critical infrastructure to new vulnerabilities, opening doors to sophisticated cyber threats.

The solution isn't as simple as replacing old systems outright. The decision to upgrade or extend the life of legacy platforms requires careful cyber risk evaluation, ensuring the right balance of mitigation strategies, isolation measures, and continuous monitoring to maintain security. Organizations must also weigh financial constraints, applying appropriate risk controls to optimize security investments without excessive costs.

Secure by design: a strategic imperative

Secure by Design isn’t just a cybersecurity buzzword—it’s an essential principle for building resilient digital infrastructure. It ensures that an appropriate level of security is built in from the ground up, integrated at every design, development, and operational phase to create adaptable, auditable, and testable systems.

Yet, despite its inclusion in policy frameworks and industry guidelines, implementation is often incomplete or superficial. Many organizations pay lip service to security but fail to embed it across teams and processes, treating it as an isolated function rather than an organizational priority – much like organizations approach health and safety.

Regulation will play a vital role in closing this gap. The upcoming Cyber Security and Resilience Bill is set to improve oversight, enforce stronger standards, and introduce mandatory incident reporting for high-risk sectors. Coupled with enhanced threat intelligence sharing, this legislation could shift cybersecurity strategies from reactive defense to proactive resilience.

Cyber talent: securing the future workforce

Another major challenge in cybersecurity is building a workforce capable of responding to evolving threats. As technology advances, skills become obsolete faster than ever, requiring ongoing investment in cyber capability development.

While direct government hiring plays a role—especially in sensitive security domains—industry partnerships offer a scalable alternative. Specialist organizations, like Thales, are well-positioned to train and upskill professionals through apprenticeships, immersive simulations, and diverse sector exposure, which traditional public-sector roles often lack.

This model provides dual benefits: it equips trainees with experience across various threat scenarios, while also fostering an agile workforce that can quickly adapt to emerging technologies like artificial intelligence and quantum computing. Cybersecurity isn't just about fixing vulnerabilities of the past—it's about anticipating and securing against the threats of the future.

Transparency and collaboration: strengthening cyber resilience

Cybersecurity can no longer be viewed as a standalone issue—threats don’t respect organizational boundaries, and weaknesses in one system can expose an entire network. Transparency, collaboration, and mandatory incident reporting are essential for national security, ensuring vulnerabilities are addressed before they escalate into widespread risks.

Reporting cyber incidents, much like the practice of reporting near misses and accidents in health and safety, strengthens overall resilience. Just as greater visibility has helped organizations reduce safety incidents, increased cyber reporting makes it harder for hackers to exploit gaps, reinforcing defenses before real damage occurs.

The Thales Data Threat Report underscores the growing risks to Critical National Infrastructure (CNI) and highlights the value of compliance—organisations that passed cybersecurity audits had significantly fewer breaches than those that failed. With the Cyber Security and Resilience Bill raising standards, stronger protections for essential infrastructure, including data centers that support AI innovation and national healthcare, will become the norm.

Each unreported cyber-attack is a missed opportunity to refine security strategies. Enhanced visibility into cyber threats improves collective intelligence, allowing organizations to make faster, smarter decisions in the face of emerging risks.

Conclusion: building security for the future

Modern cybersecurity requires more than patching vulnerabilities or checking compliance boxes—it demands a strategic rethink of how systems are designed, maintained, and safeguarded. Understanding how legacy and modern environments interact is key, alongside developing cyber talent that can anticipate and mitigate future risks.

Secure by Design must be the standard, not the exception. With the right balance of policy, proactive security measures, and skilled professionals, organizations can shift from reactive defense to sustainable resilience, ensuring they are prepared for the threats ahead, not just responding to the ones they see today.

We've featured the best endpoint protection software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Open source, open science, and cryptography

TechRadar News - Tue, 07/08/2025 - 09:13

In the world of technology, open source refers to software which is made publicly available, and is free for anyone to use or modify. It is a very popular approach to software development, enabling an open and community engagement to building software projects.

One of the main advantages of open source is transparency, a property that is widely embraced by tech enthusiasts. Open source code means that anyone can inspect the code before usage, meaning that anyone could spot malicious, or broken, code. This is a perfect example of the mantra “Don't trust, verify”, which is popular in various technology spaces.

One of the main drawbacks of open source is considered to be lack of interested involvement from external developers. Many projects typically start with one, or a few, developers – and this base can struggle to grow, leading to a low “bus-factor” (dependency on too few developers) for the majority of open source projects.

This can lead to developer burnout or exhaustion, and can eventually cause the ultimate abandonment of projects. Alongside this, funding can also play a crucial role; many of the most successful projects are backed by some degree of funding from organizations and/or non-profits, effectively supporting developers throughout the time required to maintain the project.

Thankfully, while these issues are very much real there are several examples of successful and pioneering projects in the open source space which have overcome these obstacles. The Linux Foundation is the most prominent example, and there are also some interesting ones in the cryptography space, a field that can particularly benefit from adapting the open source approach. Let’s take a look at some of them individually below.

The Linux Foundation

The most notable example of a successful open source project is the open source development of the Linux Kernel. Originally published in 1991 under a custom license which did not allow commercial usage, this was quickly shifted to an open source-friendly license (GPL), to enable developers to collaborate on the code and ensure wide and free availability of the software.

The open source version which can now be found on Github, is one of the most contributed projects in the history of open source. With over 15,000 contributors, this project has clearly been a huge success. Whilst only ~4% of Desktop computers worldwide are now running Linux, it is still the platform of choice for many computer scientists and cryptographers.

Let’s encrypt

In the cryptography space, a popular example is Let’s Encrypt. Let’s Encrypt is an influential open source certificate authority (CA) which helps enable secure communication via HTTPS over the web. This project was started by the Internet Security Research Group (ISG), which is a small non-profit launched in 2015 and backed by various industry players.

Since their launch in 2015, HTTPS usage on the internet has risen from ~40% to ~90%+ today. This, of course, is not down solely to Let’s encrypt, but their mission to “democratize HTTPS by making SSL/TLS certificates free, automated, and easy to obtain” has clearly had a major impact on this. Today, Let’s Encrypt powers secure communications for millions of sites, APIs, and services and is viewed as a major success in the cryptography space.

Open science

Open science is a similar idea which draws influence from open source. The goal of open science is to make academic publications (as well as any associated source code, data, etc) public and free for anyone to view or build on. Particularly in the cryptography space, this is something that academics tend to view as a must-have for their work: all experiments should be reproducible with available code. The website https://paperswithcode.com/ collects works which open-source their code in the Machine Learning space.

Such an approach can be critical for successful outcomes in science and research. Attempting to build on something “closed” is almost impossible, which may lead researchers to either completely rebuild something from scratch, or giving up entirely.

An additional element that can help promote this collaborative approach is the promotion of platforms like events and conferences that aim to gather experts and researchers and foster exchange. In the world of cryptography - and of Fully Homomorphic Encryption in particular - FHE.org is one such community, hosting regular online meetups and an annual conference to bring together the best and brightest minds.

Looking forward

The next frontier in this space, in my view, is AI. AI is an area showing immense growth over the past few years; there is a tangible improvement in models. OpenAI recently closed the largest funding round in history (40b at a 300b valuation). There is currently an AI-arms race between big-tech firms, and specialized start-ups who are vying to release the best model (Polymarket is currently backing Google, at the time of writing).

Clearly, this is a sector where open source principles could be applied well, with collaboration encouraged to ensure correct management of ethics, as opposed to control by a single organization or board.

We've featured the best encryption software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Open source, open science, and cryptography

TechRadar News - Tue, 07/08/2025 - 09:13

In the world of technology, open source refers to software which is made publicly available, and is free for anyone to use or modify. It is a very popular approach to software development, enabling an open and community engagement to building software projects.

One of the main advantages of open source is transparency, a property that is widely embraced by tech enthusiasts. Open source code means that anyone can inspect the code before usage, meaning that anyone could spot malicious, or broken, code. This is a perfect example of the mantra “Don't trust, verify”, which is popular in various technology spaces.

One of the main drawbacks of open source is considered to be lack of interested involvement from external developers. Many projects typically start with one, or a few, developers – and this base can struggle to grow, leading to a low “bus-factor” (dependency on too few developers) for the majority of open source projects.

This can lead to developer burnout or exhaustion, and can eventually cause the ultimate abandonment of projects. Alongside this, funding can also play a crucial role; many of the most successful projects are backed by some degree of funding from organizations and/or non-profits, effectively supporting developers throughout the time required to maintain the project.

Thankfully, while these issues are very much real there are several examples of successful and pioneering projects in the open source space which have overcome these obstacles. The Linux Foundation is the most prominent example, and there are also some interesting ones in the cryptography space, a field that can particularly benefit from adapting the open source approach. Let’s take a look at some of them individually below.

The Linux Foundation

The most notable example of a successful open source project is the open source development of the Linux Kernel. Originally published in 1991 under a custom license which did not allow commercial usage, this was quickly shifted to an open source-friendly license (GPL), to enable developers to collaborate on the code and ensure wide and free availability of the software.

The open source version which can now be found on Github, is one of the most contributed projects in the history of open source. With over 15,000 contributors, this project has clearly been a huge success. Whilst only ~4% of Desktop computers worldwide are now running Linux, it is still the platform of choice for many computer scientists and cryptographers.

Let’s encrypt

In the cryptography space, a popular example is Let’s Encrypt. Let’s Encrypt is an influential open source certificate authority (CA) which helps enable secure communication via HTTPS over the web. This project was started by the Internet Security Research Group (ISG), which is a small non-profit launched in 2015 and backed by various industry players.

Since their launch in 2015, HTTPS usage on the internet has risen from ~40% to ~90%+ today. This, of course, is not down solely to Let’s encrypt, but their mission to “democratize HTTPS by making SSL/TLS certificates free, automated, and easy to obtain” has clearly had a major impact on this. Today, Let’s Encrypt powers secure communications for millions of sites, APIs, and services and is viewed as a major success in the cryptography space.

Open science

Open science is a similar idea which draws influence from open source. The goal of open science is to make academic publications (as well as any associated source code, data, etc) public and free for anyone to view or build on. Particularly in the cryptography space, this is something that academics tend to view as a must-have for their work: all experiments should be reproducible with available code. The website https://paperswithcode.com/ collects works which open-source their code in the Machine Learning space.

Such an approach can be critical for successful outcomes in science and research. Attempting to build on something “closed” is almost impossible, which may lead researchers to either completely rebuild something from scratch, or giving up entirely.

An additional element that can help promote this collaborative approach is the promotion of platforms like events and conferences that aim to gather experts and researchers and foster exchange. In the world of cryptography - and of Fully Homomorphic Encryption in particular - FHE.org is one such community, hosting regular online meetups and an annual conference to bring together the best and brightest minds.

Looking forward

The next frontier in this space, in my view, is AI. AI is an area showing immense growth over the past few years; there is a tangible improvement in models. OpenAI recently closed the largest funding round in history (40b at a 300b valuation). There is currently an AI-arms race between big-tech firms, and specialized start-ups who are vying to release the best model (Polymarket is currently backing Google, at the time of writing).

Clearly, this is a sector where open source principles could be applied well, with collaboration encouraged to ensure correct management of ethics, as opposed to control by a single organization or board.

We've featured the best encryption software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Virgin River fans need to watch Netflix’s new ‘sister show’ with over 90% on Rotten Tomatoes

TechRadar News - Tue, 07/08/2025 - 09:10

It’s good news for those of us who can’t wait to head back to Virgin River, because seasons 1-2 of Sullivan’s Crossing – also created by author Robyn Carr – are now available to stream on Netflix. You might have missed it in everything new coming to Netflix in July 2025, but there’s a good reason why you shouldn’t overlook it (and not just that season 3 is still to come).

Virgin River’s success alone is nothing short of astonishing. It’s now the longest-running original series on the platform, still pulling in almost 16 million viewers when season 6 dropped in December 2024. Virgin River season 7 has officially wrapped filming, but no release date is confirmed as of writing.

Bad news, right? Wrong! Sullivan’s Crossing is the ideal new TV show to tide us over in the meantime. Set in Canada rather than California, it’s the epitome of cozy comfort drama with plenty of famous faces thrown in for good measure.

Why I recommend watching Sullivan’s Crossing on Netflix

Neurosurgeon Maggie (Morgan Kohan) is looking to move away from her big city life in Boston after a terrible tragedy affects her personal life. She moves back to her childhood hometown of Sullivan’s Crossing, Nova Scotia, where her dad Sully (Scott Patterson) runs a campground. Maggie meets new resident Cal (Chad Michael Murray), and sparks soon fly. Where have we heard that storyline before?

Sure, Sullivan’s Crossing is exactly the same as Virgin River if you strip it back to its bare bones, but in reality, the hit TV show is so much more than its big sister. For starters, the cast unites When Hope Calls’ Kohan, noughties teen heartthrob Murray and Gilmore Girls legend Patterson in family conflict that always pulls on the heartstrings, allowing each actor to do what they’re best at. Obviously, it doesn’t hurt that any drama takes place against the jaw-droppingly picturesque vistas of rural Canada.

Our main anchor points differ from Virgin River, too. Maggie is falling for Cal, but still has tenuous links to her ex, Andrew (Allan Hawco). In essence, this acts as the reverse of Jack Sheridan (Martin Henderson), who falls for newcomer Mel (Alexandra Breckenridge) but hasn’t fully broken things off with Charmaine (Lauren Hammersley). Sullivan’s Crossing takes its romantic triangle one step further, embroiling the trio in a messy pregnancy plot destined to change all of their lives for good.

What’s the best thing about Sullivan’s Crossing, I hear you ask? The beautiful mundanity of their day-to-day lives. Where rival TV shows like Riverdale and the reboot of Dynasty take the drama in their dynamics to the extreme, Sullivan’s Crossing always returns to the simplicity of what real life really looks like, and that pays off in its popularity. You can blissfully lose your mind to the till breaking at the campground reception, inane chatter happening in the local diner and the many whimsical local events that bring the community together.

If you just can’t wait for Virgin River to return, or want to immerse yourself in more of the same, there’s no question that Sullivan’s Crossing will scratch that itch.

You might also like
Categories: Technology

Virgin River fans need to watch Netflix’s new ‘sister show’ with over 90% on Rotten Tomatoes

TechRadar News - Tue, 07/08/2025 - 09:10

It’s good news for those of us who can’t wait to head back to Virgin River, because seasons 1-2 of Sullivan’s Crossing – also created by author Robyn Carr – are now available to stream on Netflix. You might have missed it in everything new coming to Netflix in July 2025, but there’s a good reason why you shouldn’t overlook it (and not just that season 3 is still to come).

Virgin River’s success alone is nothing short of astonishing. It’s now the longest-running original series on the platform, still pulling in almost 16 million viewers when season 6 dropped in December 2024. Virgin River season 7 has officially wrapped filming, but no release date is confirmed as of writing.

Bad news, right? Wrong! Sullivan’s Crossing is the ideal new TV show to tide us over in the meantime. Set in Canada rather than California, it’s the epitome of cozy comfort drama with plenty of famous faces thrown in for good measure.

Why I recommend watching Sullivan’s Crossing on Netflix

Neurosurgeon Maggie (Morgan Kohan) is looking to move away from her big city life in Boston after a terrible tragedy affects her personal life. She moves back to her childhood hometown of Sullivan’s Crossing, Nova Scotia, where her dad Sully (Scott Patterson) runs a campground. Maggie meets new resident Cal (Chad Michael Murray), and sparks soon fly. Where have we heard that storyline before?

Sure, Sullivan’s Crossing is exactly the same as Virgin River if you strip it back to its bare bones, but in reality, the hit TV show is so much more than its big sister. For starters, the cast unites When Hope Calls’ Kohan, noughties teen heartthrob Murray and Gilmore Girls legend Patterson in family conflict that always pulls on the heartstrings, allowing each actor to do what they’re best at. Obviously, it doesn’t hurt that any drama takes place against the jaw-droppingly picturesque vistas of rural Canada.

Our main anchor points differ from Virgin River, too. Maggie is falling for Cal, but still has tenuous links to her ex, Andrew (Allan Hawco). In essence, this acts as the reverse of Jack Sheridan (Martin Henderson), who falls for newcomer Mel (Alexandra Breckenridge) but hasn’t fully broken things off with Charmaine (Lauren Hammersley). Sullivan’s Crossing takes its romantic triangle one step further, embroiling the trio in a messy pregnancy plot destined to change all of their lives for good.

What’s the best thing about Sullivan’s Crossing, I hear you ask? The beautiful mundanity of their day-to-day lives. Where rival TV shows like Riverdale and the reboot of Dynasty take the drama in their dynamics to the extreme, Sullivan’s Crossing always returns to the simplicity of what real life really looks like, and that pays off in its popularity. You can blissfully lose your mind to the till breaking at the campground reception, inane chatter happening in the local diner and the many whimsical local events that bring the community together.

If you just can’t wait for Virgin River to return, or want to immerse yourself in more of the same, there’s no question that Sullivan’s Crossing will scratch that itch.

You might also like
Categories: Technology

TSA May Soon Let You Keep Your Shoes On During Security Screening

CNET News - Tue, 07/08/2025 - 08:42
The shift comes after nearly 20 years of mandatory shoe removal, a rule put in place after the 2001 "shoe bomber" attempt reshaped airport security protocols.
Categories: Technology

Hi-fi legend KEF unveils its first Dolby Atmos soundbar, and this is one to get excited about

TechRadar News - Tue, 07/08/2025 - 08:19
  • The KEF XIO soundbar costs £1,999 / $2,499 / AU$3,600
  • Dolby Atmos, DTS:X and Sony 360 Reality Audio
  • 5.1.2 channels with 12 class D amplifiers

Audio legend KEF has been busy: not only did its team collaborate with Nothing on the Headphone (1), but it's also unveiled its first-ever Dolby Atmos soundbar. The team is clearly pretty proud of it, and promises a "transcendent" audio experience.

At $2,499 / £1,999 this is clearly one for high-end home theaters. It's a 5.1.2-channel all-in-one soundbar with 12 class D amplifiers putting out a whopping 820W of total power.

Despite that, the XIO soundbar is still shallow enough to look good on a wall. And where many soundbars are made specifically for movies, KEF says that the XIO has been made with music in mind too.

(Image credit: KEF)KEF XIO soundbar: key features

The soundbar has six Uni-Q MX drivers, which are smaller versions of the Uni-Q drivers you'll find in larger KEF speakers. These are special because they're two speaker in one – a smaller driver sits at the center of the cone of the large speaker, creating a wider soundstage between them that forms one clear audio signal.

Three of these drivers are placed on top for upward-firing audio, and the other three face forwards. They're teamed up with four P185 bass drivers, which are rectangular drivers that KEF says have the same radiating area as a standard circular 10cm driver. The rectangular shape means the soundbar can accommodate more drivers without adding bulk – similar racetrack drivers are used in lots of the best soundbars.

Despite that serious low-end power, you shouldn't get much in the way of unwanted vibration: KEF says the way it has arranged the drivers, with two pairs facing in opposite directions, meaning that each driver cancels out the vibration of its opposite.

The XIO also features KEF's patent-pending Velocity Control Technology, which it calls VECO. It's a sensor that monitors the P185 driver cones, adjusting the movement to compensate for any errors it detects in order to minimize distortion and compression.

Another key acronym is MIE, short for the Music Integrity Engine. This is a suite of DSP algorithms made specifically for the XIO to handle multi-channel processing, virtualization and object placement. The result, KEF says, is "transcendent soundscapes".

The XIO works with all the major streamers including Tidal, Amazon Music, Qobuz and Deezer, and it has HDMI eARC, optical and subwoofer outputs. You can also add any KEF subwoofer via the optional KW2 wireless receiver.

The KEF XIO is available via early access to myKEF members from today, 8 July, and it goes on sale on the 18th of July. It'll also be available from today in certain retailers, including Peter Tyson AV and Sevenoaks Sound & Vision in the UK, with wider retail availability starting on 8th August 2025.

You might also like
Categories: Technology

Hi-fi legend KEF unveils its first Dolby Atmos soundbar, and this is one to get excited about

TechRadar News - Tue, 07/08/2025 - 08:19
  • The KEF XIO soundbar costs £1,999 / $2,499 / AU$3,600
  • Dolby Atmos, DTS:X and Sony 360 Reality Audio
  • 5.1.2 channels with 12 class D amplifiers

Audio legend KEF has been busy: not only did its team collaborate with Nothing on the Headphone (1), but it's also unveiled its first-ever Dolby Atmos soundbar. The team is clearly pretty proud of it, and promises a "transcendent" audio experience.

At $2,499 / £1,999 this is clearly one for high-end home theaters. It's a 5.1.2-channel all-in-one soundbar with 12 class D amplifiers putting out a whopping 820W of total power.

Despite that, the XIO soundbar is still shallow enough to look good on a wall. And where many soundbars are made specifically for movies, KEF says that the XIO has been made with music in mind too.

(Image credit: KEF)KEF XIO soundbar: key features

The soundbar has six Uni-Q MX drivers, which are smaller versions of the Uni-Q drivers you'll find in larger KEF speakers. These are special because they're two speaker in one – a smaller driver sits at the center of the cone of the large speaker, creating a wider soundstage between them that forms one clear audio signal.

Three of these drivers are placed on top for upward-firing audio, and the other three face forwards. They're teamed up with four P185 bass drivers, which are rectangular drivers that KEF says have the same radiating area as a standard circular 10cm driver. The rectangular shape means the soundbar can accommodate more drivers without adding bulk – similar racetrack drivers are used in lots of the best soundbars.

Despite that serious low-end power, you shouldn't get much in the way of unwanted vibration: KEF says the way it has arranged the drivers, with two pairs facing in opposite directions, meaning that each driver cancels out the vibration of its opposite.

The XIO also features KEF's patent-pending Velocity Control Technology, which it calls VECO. It's a sensor that monitors the P185 driver cones, adjusting the movement to compensate for any errors it detects in order to minimize distortion and compression.

Another key acronym is MIE, short for the Music Integrity Engine. This is a suite of DSP algorithms made specifically for the XIO to handle multi-channel processing, virtualization and object placement. The result, KEF says, is "transcendent soundscapes".

The XIO works with all the major streamers including Tidal, Amazon Music, Qobuz and Deezer, and it has HDMI eARC, optical and subwoofer outputs. You can also add any KEF subwoofer via the optional KW2 wireless receiver.

The KEF XIO is available via early access to myKEF members from today, 8 July, and it goes on sale on the 18th of July. It'll also be available from today in certain retailers, including Peter Tyson AV and Sevenoaks Sound & Vision in the UK, with wider retail availability starting on 8th August 2025.

You might also like
Categories: Technology

One of the biggest security threats to Apple systems just got a major upgrade - here's what we know

TechRadar News - Tue, 07/08/2025 - 08:05
  • Atomic Stealer, or AMOS, is no longer just a pure infostealer, experts warn
  • The tool now comes with a backdoor and a persistence mechanism
  • A new variant was seen circulating in the wild

Atomic Stealer (AMOS), one of the most dangerous infostealer malware threats on the macOS ecosystem, just got a significant upgrade that makes it even more dangerous, experts have warned.

A new version of the malware was spotted sporting a backdoor that not only allows persistent access and survives reboots, but also grants the attackers the ability to deploy any other malware on the compromised device, as well.

The news comes courtesy of MacPaw’s cybersecurity arm, Moonlock, who were tipped off by an independent researcher with the alias g0njxa., who noted the backdoored version of Atomic macOS Stealer now has the potential to gain full access to thousands of Mac devices worldwide.

Get 55% off Incogni's Data Removal service with code TECHRADAR

Wipe your personal data off the internet with the Incogni data removal service. Stop identity thieves
and protect your privacy from unwanted spam and scam calls.View Deal

A popular infostealer

AMOS has been around for years, establishing itself as the go-to stealer malware used in many major hacking campaigns. Until now, it was capable of extracting a wide range of data, including browser-stored passwords and keychains, autofill data, cryptocurrency wallet information, system data, and different files. It was also able to bypass macOS protections, tricking Gatekeeper and other macOS security features.

It was sold as MaaS (malware-as-a-service) on underground forums, and often distributed via fake apps and malicious websites.

We last heard of AMOS in early June 2025, when Russian threat actors used the popular ClickFix method to deploy it against their targets. At the time, security researchers from CloudSek reported multiple websites spoofing Spectrum, a US-based telecommunications provider, to deliver the malware.

In early January, software developer Ryan Chenkie spotted a malicious campaign on Google, promoting a fake version of Homebrew, an open source package manager for macOS and Linux that was, in fact, AMOS.

"AMOS malware campaigns have already reached over 120 countries, with the United States, France, Italy, the United Kingdom, and Canada among the most affected," the researchers warned.

Via BleepingComputer

You might also like
Categories: Technology

One of the biggest security threats to Apple systems just got a major upgrade - here's what we know

TechRadar News - Tue, 07/08/2025 - 08:05
  • Atomic Stealer, or AMOS, is no longer just a pure infostealer, experts warn
  • The tool now comes with a backdoor and a persistence mechanism
  • A new variant was seen circulating in the wild

Atomic Stealer (AMOS), one of the most dangerous infostealer malware threats on the macOS ecosystem, just got a significant upgrade that makes it even more dangerous, experts have warned.

A new version of the malware was spotted sporting a backdoor that not only allows persistent access and survives reboots, but also grants the attackers the ability to deploy any other malware on the compromised device, as well.

The news comes courtesy of MacPaw’s cybersecurity arm, Moonlock, who were tipped off by an independent researcher with the alias g0njxa., who noted the backdoored version of Atomic macOS Stealer now has the potential to gain full access to thousands of Mac devices worldwide.

Get 55% off Incogni's Data Removal service with code TECHRADAR

Wipe your personal data off the internet with the Incogni data removal service. Stop identity thieves
and protect your privacy from unwanted spam and scam calls.View Deal

A popular infostealer

AMOS has been around for years, establishing itself as the go-to stealer malware used in many major hacking campaigns. Until now, it was capable of extracting a wide range of data, including browser-stored passwords and keychains, autofill data, cryptocurrency wallet information, system data, and different files. It was also able to bypass macOS protections, tricking Gatekeeper and other macOS security features.

It was sold as MaaS (malware-as-a-service) on underground forums, and often distributed via fake apps and malicious websites.

We last heard of AMOS in early June 2025, when Russian threat actors used the popular ClickFix method to deploy it against their targets. At the time, security researchers from CloudSek reported multiple websites spoofing Spectrum, a US-based telecommunications provider, to deliver the malware.

In early January, software developer Ryan Chenkie spotted a malicious campaign on Google, promoting a fake version of Homebrew, an open source package manager for macOS and Linux that was, in fact, AMOS.

"AMOS malware campaigns have already reached over 120 countries, with the United States, France, Italy, the United Kingdom, and Canada among the most affected," the researchers warned.

Via BleepingComputer

You might also like
Categories: Technology

This Light-Pulsing Rubik's Cube Is a Dazzling Way to Play in the Dark

CNET News - Tue, 07/08/2025 - 08:00
Exclusive: The Rubik's Pulse Cube from Spin Master transforms from a bland mirror cube to a light show puzzle.
Categories: Technology

'She's ready to take this on': Foundation star Lou Llobell teases Gaal Dornick's all-consuming quest to stop The Mule in the Apple TV+ show's third season

TechRadar News - Tue, 07/08/2025 - 08:00
  • Foundation season 3 will see Gaal Dornick sacrifice everything to stop The Mule
  • Hari Seldon's protégé really steps up this season, actor Lou Llobell says
  • It remains to be seen if she'll succeed in thwarting this season's main villain

Lou Llobell has indicated Gaal Dornick will stop at nothing to ensure The Mule doesn't become the new galactic tyrant in Foundation season 3.

Speaking to TechRadar, Llobell, who has portrayed Dornick since the Apple TV+ sci-fi series began, says her character is willing to "sacrifice everything" to defeat this season's primary antagonist.

First teased in last season's finale, The Mule is an incredibly dangerous Mentalic – people who possess superhuman psychic abilities – who wants to bring the entire galaxy under his iron fist. You can read my Foundation season 2 ending explained article and/or exclusive chat with Pilou Asbaek, who says The Mule needs to be seen as "a big threat" to The Foundation and The Imperium, for more details.

However, Dornick, who's also a Mentalic, has had visions of The Mule since Foundation season 2. Alongside mentor and psychohistorian Hari Seldon (Jared Harris), Dornick has spent the past 152 years in and out of cryosleep to prepare a secret Ignis-based community of Mentalics – also known as Second Foundation – for The Mule's arrival.

Gaal has spent the past 152 years preparing for The Mule's arrival (Image credit: Apple TV+)

With the unhinged and ambitious villain finally showing his face in one of the best Apple TV+ shows' third season, it's time for Dornick to fully step up and prevent him from achieving his goal of becoming the galaxy's latest authoritarian.

To combat the demonstrably evil character played by Asbaek – the Game of Thrones alumnus replaced Mikael Persbrandt as The Mule in a season 3 cast shake-up, FYI – though, Dornick will have to put everything else aside, including her own happiness, to thwart his rapid and successful conquering of Foundation's fictional universe.

"Gail has grown so much," Llobell told me, "And you see her really take a massive leap into this new role as a leader and someone who's going to sacrifice everything to make sure the plan stays on track and that The Mule is stopped.

"It's beautiful to see her with all these different people [on Ignis] and the relationships that she has [with them]," Llobell continued. "But, her one goal is still to deal with The Mule. She's ready to take this on, even though things might not go according to plan as the season unfolds."

Find out what I thought about the first half of the show's latest chapter by reading my Foundation season 3 review. Be sure to read the below section, too, for more coverage, exclusive or otherwise, of the Apple TV Original before season 3 arrives on July 11, too.

You might also like
Categories: Technology

'She's ready to take this on': Foundation star Lou Llobell teases Gaal Dornick's all-consuming quest to stop The Mule in the Apple TV+ show's third season

TechRadar News - Tue, 07/08/2025 - 08:00
  • Foundation season 3 will see Gaal Dornick sacrifice everything to stop The Mule
  • Hari Seldon's protégé really steps up this season, actor Lou Llobell says
  • It remains to be seen if she'll succeed in thwarting this season's main villain

Lou Llobell has indicated Gaal Dornick will stop at nothing to ensure The Mule doesn't become the new galactic tyrant in Foundation season 3.

Speaking to TechRadar, Llobell, who has portrayed Dornick since the Apple TV+ sci-fi series began, says her character is willing to "sacrifice everything" to defeat this season's primary antagonist.

First teased in last season's finale, The Mule is an incredibly dangerous Mentalic – people who possess superhuman psychic abilities – who wants to bring the entire galaxy under his iron fist. You can read my Foundation season 2 ending explained article and/or exclusive chat with Pilou Asbaek, who says The Mule needs to be seen as "a big threat" to The Foundation and The Imperium, for more details.

However, Dornick, who's also a Mentalic, has had visions of The Mule since Foundation season 2. Alongside mentor and psychohistorian Hari Seldon (Jared Harris), Dornick has spent the past 152 years in and out of cryosleep to prepare a secret Ignis-based community of Mentalics – also known as Second Foundation – for The Mule's arrival.

Gaal has spent the past 152 years preparing for The Mule's arrival (Image credit: Apple TV+)

With the unhinged and ambitious villain finally showing his face in one of the best Apple TV+ shows' third season, it's time for Dornick to fully step up and prevent him from achieving his goal of becoming the galaxy's latest authoritarian.

To combat the demonstrably evil character played by Asbaek – the Game of Thrones alumnus replaced Mikael Persbrandt as The Mule in a season 3 cast shake-up, FYI – though, Dornick will have to put everything else aside, including her own happiness, to thwart his rapid and successful conquering of Foundation's fictional universe.

"Gail has grown so much," Llobell told me, "And you see her really take a massive leap into this new role as a leader and someone who's going to sacrifice everything to make sure the plan stays on track and that The Mule is stopped.

"It's beautiful to see her with all these different people [on Ignis] and the relationships that she has [with them]," Llobell continued. "But, her one goal is still to deal with The Mule. She's ready to take this on, even though things might not go according to plan as the season unfolds."

Find out what I thought about the first half of the show's latest chapter by reading my Foundation season 3 review. Be sure to read the below section, too, for more coverage, exclusive or otherwise, of the Apple TV Original before season 3 arrives on July 11, too.

You might also like
Categories: Technology

Virtuos believes the GPU capabilities of the Nintendo Switch 2 and Xbox Series S are 'comparable', making it easier to port some games that run at 60fps to the new console

TechRadar News - Tue, 07/08/2025 - 07:37
  • Developer Virtuos believes it would be easy to port an Xbox Series S game that runs at 60FPS to the Nintendo Switch 2
  • Eoin O’Grady, technical director at Virtuos' subsidiary Black Shamrock says the GPU capabilities of both consoles are "comparable overall"
  • However, CPU-wise, the Switch 2 is closer to the PlayStation 4

Port studio Virtuos believes that it would be easy to bring an Xbox Series S game to the Nintendo Switch 2, considering their technical similarities.

In an interview with Wccftech, Alex Heise, director of business development at Virtuos North America, and Eoin O’Grady, technical director at Virtuos' subsidiary Black Shamrock, discussed Nintendo's new hardware and its technical capabilities.

According to O'Grady, both consoles' GPUs are similar in power despite the Switch 2 performing lower than the Xbox Series S and offering Nvidia's Deep Learning Super Sampling (DLSS), but believes it would still be an easy task to port a Series S game that performs at 60fps to the latest console.

"GPU-wise, the Switch 2 performs slightly below the Series S; this difference is more noticeable in handheld mode," O'Grady said. "However, the Series S does not support technologies like DLSS, which the Switch 2 does. This makes the GPU capabilities of the two consoles comparable overall.

The technical director noted, however, that CPU-wise, there is a "clearer distinction between the two consoles," and the Switch 2 is closer to the PlayStation 4 in that respect since it has a slightly more powerful CPU.

"Since most games tend to be more GPU-bound than CPU-bound when well optimized, the impact of this difference largely depends on the specific game and its target frame rate," O'Grady explained.

"Any game shipping at 60fps on the Series S should easily port to the Switch 2. Likewise, a 30fps Series S game that’s GPU-bound should also port well. Games with complex physics, animations, or other CPU-intensive elements might incur additional challenges in reaching 30 or 60fps or require extra optimization during porting."

Cyberpunk 2077, which can only hit 60fps on Xbox Series S but not consistently on the PS4, just received an official Switch 2 port. However, this version doesn't offer 60fps the same way the Series S does, and instead features two modes to choose from while docked, including a 40fps performance mode and a 30fps quality mode.

You might also like...
Categories: Technology

Virtuos believes the GPU capabilities of the Nintendo Switch 2 and Xbox Series S are 'comparable', making it easier to port some games that run at 60fps to the new console

TechRadar News - Tue, 07/08/2025 - 07:37
  • Developer Virtuos believes it would be easy to port an Xbox Series S game that runs at 60FPS to the Nintendo Switch 2
  • Eoin O’Grady, technical director at Virtuos' subsidiary Black Shamrock says the GPU capabilities of both consoles are "comparable overall"
  • However, CPU-wise, the Switch 2 is closer to the PlayStation 4

Port studio Virtuos believes that it would be easy to bring an Xbox Series S game to the Nintendo Switch 2, considering their technical similarities.

In an interview with Wccftech, Alex Heise, director of business development at Virtuos North America, and Eoin O’Grady, technical director at Virtuos' subsidiary Black Shamrock, discussed Nintendo's new hardware and its technical capabilities.

According to O'Grady, both consoles' GPUs are similar in power despite the Switch 2 performing lower than the Xbox Series S and offering Nvidia's Deep Learning Super Sampling (DLSS), but believes it would still be an easy task to port a Series S game that performs at 60fps to the latest console.

"GPU-wise, the Switch 2 performs slightly below the Series S; this difference is more noticeable in handheld mode," O'Grady said. "However, the Series S does not support technologies like DLSS, which the Switch 2 does. This makes the GPU capabilities of the two consoles comparable overall.

The technical director noted, however, that CPU-wise, there is a "clearer distinction between the two consoles," and the Switch 2 is closer to the PlayStation 4 in that respect since it has a slightly more powerful CPU.

"Since most games tend to be more GPU-bound than CPU-bound when well optimized, the impact of this difference largely depends on the specific game and its target frame rate," O'Grady explained.

"Any game shipping at 60fps on the Series S should easily port to the Switch 2. Likewise, a 30fps Series S game that’s GPU-bound should also port well. Games with complex physics, animations, or other CPU-intensive elements might incur additional challenges in reaching 30 or 60fps or require extra optimization during porting."

Cyberpunk 2077, which can only hit 60fps on Xbox Series S but not consistently on the PS4, just received an official Switch 2 port. However, this version doesn't offer 60fps the same way the Series S does, and instead features two modes to choose from while docked, including a 40fps performance mode and a 30fps quality mode.

You might also like...
Categories: Technology

OpenAI is reportedly upping security following rumored foreign threats

TechRadar News - Tue, 07/08/2025 - 07:32
  • OpenAI reportedly boosting both its cyber and physical security
  • DeepSeek model could be a distillation of an OpenAI model
  • The ChatGPT maker is already funding further AI security research

ChatGPT-maker OpenAI has reportedly intensified its security operations to combat corporate espionage, amid rumors foreign companies could be looking to the AI giant for inspiration.

The move follows Chinese startup DeepSeek's release of a competing AI model, which reportedly uses distillation to copy OpenAI's technology.

Distillation is where a third-party transfers knowledge from a large, complex 'teacher' model to a smaller, more efficient 'student' model, allowing the third-party to create a smaller model with improved inferencing speed.

OpenAI boosts protection against rival AI companies

OpenAI has reportedly introduced new policies to restrict employee access to sensitive projects and discussions, similar to how it handled the development of the o1 model – according to a TechCrunch report, only pre-approved staff could discuss the o1 model in shared office areas.

Moreover, proprietary technologies are now being kept on offline systems to prevent the chances of a breach, while offices now use fingerprint scans for access to strengthen physical security. Strict network policies also center around a deny-by-default approach, with external connections requiring additional approval.

The reports also indicate that OpenAI has added more personnel to strengthen its cybersecurity teams and to enhance physical security and important sites like its data centers.

Being at the forefront of AI innovation comes with added cost for OpenAI – its Cybersecurity Grant Program has funded 28 research initiatives that explore the concepts of prompt injection, secure code generation and autonomous cybersecurity defenses, with the company acknowledging that AI has the power to democratize cyberattackers' access to more sophisticated technologies.

TechRadar Pro has asked OpenAI for more context surrounding the reports, but the company did not respond to our request.

You might also like
Categories: Technology

OpenAI is reportedly upping security following rumored foreign threats

TechRadar News - Tue, 07/08/2025 - 07:32
  • OpenAI reportedly boosting both its cyber and physical security
  • DeepSeek model could be a distillation of an OpenAI model
  • The ChatGPT maker is already funding further AI security research

ChatGPT-maker OpenAI has reportedly intensified its security operations to combat corporate espionage, amid rumors foreign companies could be looking to the AI giant for inspiration.

The move follows Chinese startup DeepSeek's release of a competing AI model, which reportedly uses distillation to copy OpenAI's technology.

Distillation is where a third-party transfers knowledge from a large, complex 'teacher' model to a smaller, more efficient 'student' model, allowing the third-party to create a smaller model with improved inferencing speed.

OpenAI boosts protection against rival AI companies

OpenAI has reportedly introduced new policies to restrict employee access to sensitive projects and discussions, similar to how it handled the development of the o1 model – according to a TechCrunch report, only pre-approved staff could discuss the o1 model in shared office areas.

Moreover, proprietary technologies are now being kept on offline systems to prevent the chances of a breach, while offices now use fingerprint scans for access to strengthen physical security. Strict network policies also center around a deny-by-default approach, with external connections requiring additional approval.

The reports also indicate that OpenAI has added more personnel to strengthen its cybersecurity teams and to enhance physical security and important sites like its data centers.

Being at the forefront of AI innovation comes with added cost for OpenAI – its Cybersecurity Grant Program has funded 28 research initiatives that explore the concepts of prompt injection, secure code generation and autonomous cybersecurity defenses, with the company acknowledging that AI has the power to democratize cyberattackers' access to more sophisticated technologies.

TechRadar Pro has asked OpenAI for more context surrounding the reports, but the company did not respond to our request.

You might also like
Categories: Technology

Prime Video’s best action movie of 2025? This new buddy comedy is a ‘really good, dumb’ watch that surprised me

TechRadar News - Tue, 07/08/2025 - 07:21

Prime Video wouldn’t be one of the best streaming services around if it didn’t have a new original movie topping the streaming charts. Luckily for them (and us), July’s big release is a slam dunk that’s become its number one most-watched movie this week… and an absolutely stupid one at that.

Don’t be fooled, though. In this context, stupid is the best compliment I could give. New action movie Heads of State is streaming on Prime Video now, and you’d be a fool to miss this explosive riot. Indeed, not every critic agrees with its 67% Rotten Tomatoes score, with Empire Magazine calling it “a really good, dumb comedy”.

Once again, we’re spoiled for choice with everything new on Prime Video in July 2025. Heads of State isn’t the only new title that’s got everyone’s tongues wagging: we can also sing along to Cynthia Erivo’s infamous vocal riff in Wicked, and get stuck into more insatiable teen drama in The Summer I Turned Pretty season 3.

Why I recommend watching Prime Video’s Heads of State

Let’s set the scene. Idris Elba is in the position of power he’s always deserved to have, playing British Prime Minister Sam Clarke. His natural rival is US President Will Derringer (John Cena), and they’re not shy of making their hatred of one another incredibly public. But when an Air Force One plane is shot down over enemy territory, they’ve got no choice but to work together.

On paper, Heads of State is a new movie that should be written off as a total failure, filed away in the same cheap and mediocre cabinet as Another Simple Favor and G20. But third time’s the charm here, with Elba and Cena’s natural chemistry giving us the throwback to the pinnacle of great 2000s action we didn’t know we needed.

There’s nothing to take seriously in Heads of State – everything you see is stupidly bonkers. But in a world where we don’t have enough time to laugh or let our guard down, Prime Video’s new movie is a welcome reprieve. Watching two action heroes running around with guns trying to save the world is enough to take our minds off anything, especially given how well it’s all put together.

Clearly, Amazon has spared no expense with this release. Where something like G20 suffered from its visuals, Heads of State has the glossy Hollywood look we’ve come to expect from big-budget studios. At the same time, it’s not lost its own sense of identity, standing out from Amazon’s other action features with its own signature sense of humor, light-heartedness and lack of fear. Being dumb is fun, people!

Everybody involved in Heads of State is clearly letting their hair down and having a blast, so why shouldn’t we? A good time at the movies doesn’t have to be baked in serious subject matter, transformational perspectives or unique visuals we’ve never seen before. Sometimes, the best approach is to take a simple, fun concept and do it well, and you’re not going to regret carving out time to watch Elba and Cena do exactly that.

You might also like
Categories: Technology

Pages

Subscribe to The Vortex aggregator - Technology