Error message

  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

Technology

New forum topics

Google Lens just got an upgrade on your iPhone. Here’s how it works

TechRadar News - Wed, 02/19/2025 - 11:00
  • Google is adding gesture searching to its Google Lens feature
  • The update is coming to the Chrome and Google apps on iOS
  • The firm is also working on more AI capabilities for Lens

If you use the Chrome or Google apps on your iPhone, there’s now a new way to quickly find information based on whatever is on your screen. If it works well, it could end up saving you time and make your searches a little bit easier.

The update concerns Google Lens, which lets you search using images rather than words. Google says you can now use a gesture to select something on-screen and then search for it. You can draw around an object, for example, or tap it to select it. It works whether you’re reading an article, shopping for something new, or watching a video, as Google explains.

The best iPhones have had a similar feature for a while, but it’s always been an unofficial workaround that required using the Action button and the Shortcuts app. Now, it’s a built-in feature in some of the most popular iOS apps available.

Both the Chrome and Google apps on iOS already have Google Lens built in, but the past implementation was a little clunkier than today’s update. Before, you had to save an image or take a screenshot, and then upload it to Google Lens. That would potentially involve using multiple apps and was much more of a hassle. Now, a quick gesture is all it takes.

How to use the new Google Lens on iPhone

(Image credit: Future)

When you’re using the Chrome or Google apps, tap the three-dot menu button, then select Search Screen with Google Lens or Search this Screen, respectively. This will put a colored overlay on top of the web page you’re currently viewing.

You'll see a box at the bottom of your screen reading, “Circle or tap anywhere to search.” You can now use a gesture to select an item on-screen. Doing so will automatically search for the selected object using Google Lens.

The new gesture feature will roll out globally this week and will be available in the Chrome and Google apps on iOS. Google also confirmed it will add a new Lens icon in the app’s address bar in the future, which will give you another way to use gestures in Google Lens.

Google added that it is also leveraging artificial intelligence (AI) to add new abilities to Lens. This will let it look up more novel or unique subjects, and doing so will mean Google’s AI Overviews appear more frequently in your results.

This feature will also be rolled out this week and is coming to English-language users in nations where AI Overviews are available. For now, it's set to arrive in the Google app for Android and iOS first, with Chrome desktop and mobile availability arriving later.

You might also like
Categories: Technology

Champions League Soccer: Livestream Real Madrid vs. Man City From Anywhere

CNET News - Wed, 02/19/2025 - 11:00
Nothing less than a win at the Bernabeu will do for Pep Guardiola's men.
Categories: Technology

Champions League Soccer: Livestream PSG vs. Brest From Anywhere

CNET News - Wed, 02/19/2025 - 11:00
The Parisians boast a three goal advantage for today's home tie.
Categories: Technology

Google Pixel 10 model number leak hints that the next Google flagship is on the way

TechRadar News - Wed, 02/19/2025 - 10:45
  • Model numbers for four Pixel 10 phones spotted
  • The handsets may match the four Pixel 9 devices
  • We could see a launch sometime in August 2025

The grand unveiling of the Google Pixel 9 series was back in August 2024, which means we're starting to think about the Google Pixel 10 – and a fresh leak suggests that the next Pixel flagship is indeed on the way.

Model numbers for the Google Pixel 10 handsets have been spotted by the team at Smartprix, and there are four models expected: the Pixel 10, the Pixel 10 Pro, the Pixel 10 Pro XL, and the Pixel 10 Pro Fold.

That means we'd have four new handsets to match the four we got last year (our Google Pixel 9 review will help refresh your memory). There's no mention of the Google Pixel 10a, but that phone will likely come in 2026.

These numbers come from the official database of the GSMA – that's the Global System for Mobile Communications Association, the industry body responsible for registering new devices – so it's a leak with high credibility.

The Pixel 10 story so far

A successor to the Google Pixel 9 Pro Fold seems likely (Image credit: Future)

We haven't heard much about the Google Pixel 10 handsets up to this point, although codenames for the four phones did leak back in September – though the leak didn't really reveal much in terms of design or spec upgrades.

Another leak has suggested that the Pixel 10 will come with a Tensor G5 CPU fitted and offer some photo and video upgrades in the form of AI-assisted tools that help you edit your snaps and clips and even generate new content from scratch.

We might also get a redesign along with the Pixel 10 if recent Pixel 9a leaks are anything to go by. It seems Google is thinking about ditching the iconic Pixel camera bar on the mid-ranger, which is something that may happen with the Pixel 10, too.

From what we've heard so far, it seems we could get the Google Pixel 9a as early as March. That would then fit with an August 2025 launch for the Pixel 10 series, at which point Android 16 should also be available (at least for Pixel phones).

You might also like
Categories: Technology

Laptop Prices Increasing 10% Due to Tariffs, Acer CEO Says

CNET News - Wed, 02/19/2025 - 10:42
The increase will likely be seen by US shoppers in March on the company's line of laptops.
Categories: Technology

Apple iPhone 16e (2025): Specs, Price, Release Date

WIRED Top Stories - Wed, 02/19/2025 - 10:33
The iPhone SE is no more. It’s now replaced by the iPhone 16e, which includes a price hike, Face ID, and USB-C.
Categories: Technology

These fake macOS updates are actually just looking to spread malware

TechRadar News - Wed, 02/19/2025 - 10:23
  • Researchers from Proofpoint observE two groups engaging in "fake update" attacks
  • The groups have their separate assignments against macOS devices
  • The goal is to distribute FrigidStealer, a new infostealer malware

Cybercriminals are using fake macOS updates to distribute a new piece of malware called FrigidStealer, new research has claimed.

Cybersecurity researchers Proofpoint recently observed two new threat actors distributing the malware, tracked as TA2726 and TA2727, working together on different parts of the same campaign to get macOS users to install FrigidStealer.

They opted for the “fake update” distribution method, where victims would visit a compromised website which would serve a popup. That popup would warn users that they needed to update either their Macs, or their browsers, in order to view the contents of the website.

Targeting Windows, Linux, macOS, and Android

Instead of an actual update, the victims would download and run the installer for the FrigidStealer malware, which did what infostealers usually do - it steals information, including browser cookies, files containing passwords or cryptocurrency-related data, files from Apple Notes, and similar.

Stolen data is stored in the user's home directory before being sent to the attacker’s command and control (C2) server: askforupdate[.]org.

Proofpoint says that the malware is distributed by TA2727, a financially motivated cybercriminal group. TA2726, on the other hand, acts as a Traffic Distribution System (TDS) operator, redirecting web traffic to TA2727’s payloads.

The majority of the targets seem to be located in North America and Europe, and besides FrigidStealer, the crooks are also using Lumma Stealer and DeerStealer for Windows targets, and Marcher Banking Trojan for Android users.

Fake update attacks are nothing new, they’ve been around for years. The SocGholish malware campaign, attributed to the threat actor TA569, is recognized as one of the most prolific users of these attacks. Active since at least April 2018, SocGholish employs malicious JavaScript injected into compromised websites to present visitors with deceptive prompts for software updates, such as fake browser or Flash Player updates.

You might also like
Categories: Technology

Italy to require VPN and DNS providers to block pirated content

TechRadar News - Wed, 02/19/2025 - 10:05

Italy is set to require VPN and DNS providers to block access to pirated content within 30 minutes – whether that's a football match or any other live event, on-demand movies and TV series included.

The country's communication regulator AGCOM approved the new anti-piracy measures on Tuesday, February 18, 2025, in a major boost to the existing anti-piracy system. Italy enforced the so-called Piracy Shield early last year specifically to fight against live sports piracy mostly via IP blocking.

The news comes as French streaming giant Canal+ is considering blocking VPN usage to prevent citizens from circumventing the country's anti-piracy tactics. Some of the best VPN providers on the market, however, are arguing that targeting their services risks undermining people's internet freedom rather than solving online piracy.

What is Italy's Piracy Shield?

Italy enforced its Piracy Shield system in February 2024 to prevent citizens from accessing live sports events through pirate sites, especially football matches. To do so, rightsholders can demand piracy-related domain names and IP addresses suspected of copyright infringement are blocked within 30 minutes.

While the Italian anti-piracy system has proven effective so far, tech companies have been raising concerns with EU authorities about multiple overblocking incidents.

Yet, industry criticism wasn't enough to stop AGCOM's mission. The country's communication regulator now wants to expand the reach of its Piracy Shield system even further to tackle the piracy plague affecting the movie and audiovisual industries.

As the AGCOM commissioner, Massimiliano Capitanio wrote in a LinkedIn post on Tuesday: "With the resolution voted today, the fight against piracy takes another step forward."

(Image credit: Future)
Online piracy and VPNs

Among the new AGCOM measures, "extending the blocking order to VPNs" is surely the one set to create the most discussions.

A virtual private network (VPN) is security software that encrypts all internet connections and spoofs the users' real IP address. While most people use VPNs in Italy and beyond to boost their online privacy, their IP-spoofing abilities also enable users to bypass anti-piracy restrictions.

This is exactly why French rightsholders have presented the likes of ProtonVPN, NordVPN, ExpressVPN, Surfhsark, and CyberGhost with legal action, seeking to block VPN access to people looking to infringe the country's copyright laws.

The targeted VPN firms plan to fight back against France's streaming giant's request, deeming the lawsuit "illogical" and warning this would have "sweeping consequences" for the internet security and privacy of people in France.

On its side, Italy has not shared how the VPN providers are expected to meet the new requirements. Nor it is clear if this would be technically feasible for companies operating no-log VPNs, which cannot supposedly see what users are doing when connected to their service.

We have contacted some of the most popular VPN providers asking for comments and will update the page accordingly.

Categories: Technology

Apple unveils iPhone 16e and C1, its first cellular modem chip

TechRadar News - Wed, 02/19/2025 - 10:00
  • Apple unveils its all-new iPhone 16e
  • The iPhone SE is no more
  • Apple finally designed its own modem chip, the C1

Leave it to Apple to surprise or at least turn the tables on the rumor factory. Yes, we got a new, more affordable iPhone, but it's not an iPhone SE 4. Instead, Apple unveiled the iPhone 16e, expanding the iPhone 16 lineup with a $599  / £599 / AU$999 5G, Apple Intelligence-ready budget phone.

Featuring the A18 CPU, the same 3-nanometer processor that's in the rest of the iPhone 16 lineup, much of the 6.1-inch iPhone 16e is a step down from the baseline iPhone 16 model.

It has just a single 48MP camera that shoots at 24MP by default (and up to 4K 60fps video).

(Image credit: Apple)

The screen is a Super Retina XDR display, but instead of the Dynamic Island, we're treated to the return of the notch featuring a 12MP TrueDepth camera. The good news is that it does enable Face ID, which can be used for unlocking and securely authenticating.

The iPhone 16e does include the Action Button but with the added wrinkle of being able to program it to run Visual Intelligence. This feature lets you point the camera at animals, plants, restaurants, and even event flyers to get information or take AI-powered actions. It's a notable update because it also means that the Camera Control button on the rest of the iPhone 16 lineup does not carry over to the iPhone 16e.

As for the rest of the build, it's a pace-grade aluminum with a ceramic shield covering the display. The iPhone 16e also boasts an IP68 rating just like the 16, 16 Plus, 16 Pro, and 16 Pro Max.

The iPhone 16e also marks – unless Apple keeps around the iPhone SE 3rd gen – the end of the home button. Touch ID may live on in other buttons (Macs, iPads), but that iconic button is, it seems, finally no more. Pour one out for the Home Button.

(Image credit: Apple)

There is, however, one significant and notable technological update buried inside the new handset: Apple's C1 chip, its first homegrown cellular modem.

Not much is known about this chip yet, but Apple is claiming some battery efficiency as a result of it. Apple claims 26 hours of video playback on a single charge. If that bears out in our reporting, that would be a huge deal for this class of smartphone.

While the iPhone 16e is not a true update to the iPhone SE lineup, it does bring some welcome features to Apple's most affordable smartphone.

The iPhone 16e features a USB-C port for charging but also supports wireless charging. It's running an A18 chip that supports Apple Intelligence and all the features currently supported in iOS 18, including Genmojis, writing assistance, and call transcription. It even includes Satellite communications support and starts with 128GB of storage but can be configured up to 512GB.

Preorders for the iPhone 16e start on Friday, February 21 and the phone starts shipping on February 28. It's available in matte black or matte white.

You might also like
Categories: Technology

Amazon's new Eero 7 and Pro 7 complete a 'comprehensive lineup' for its customers – here's everything you need to know

TechRadar News - Wed, 02/19/2025 - 10:00
  • Eero's launching two new models, both of which support Wi-Fi 7 and up to multi-gigabit speeds
  • The Eero 7 and Eero Pro 7 sit below and next to the Max 7
  • It's a 'comprehensive lineup' for Wi-Fi 7, according to CEO Nick Weaver

Amazon’s Eero brand is turning 10, and as it has been since day one, it’s all about making Wi-Fi easy and hassle-free. Now, as Eero CEO Nick Weaver told TechRadar, it’s launching “a comprehensive lineup for customers, all with the latest Wi-Fi technology.” That lineup comprises the new Eero 7 and Eero Pro 7, both of which join Amazon’s existing Wi-Fi powerhouse, the Eero Max 7.

Perhaps most importantly, both the standard Eero 7 and the Pro 7 deliver Wi-Fi 7 support at way more affordable prices. The Eero 7 starts at $169.99 / £169.99 for one, and the Eero Pro 7 is $299.99 / £299.99 – both models will also arrive in Australia at a date and price yet to be confirmed. The launch comes just over a week before Amazon's next devices launch event, at which we expect the brand to show off its new supercharged Alexa experience.

The Eero 7 and Eero Pro 7 fully integrate with Eero’s existing ecosystem and live within the companion Eero app for iOS and Android. There, you can get your network online, monitor which devices are connected, troubleshoot any issues, opt for Eero Plus features if you subscribe, and easily add another access point.

(Image credit: Amazon/Eero)

All of this comes together as the secret sauce that’s made Eero so successful, and cemented it as one of the best mesh Wi-Fi systems around – the brand is now 10 years burning down the road after launching on February 3, 2015. Just like the Eero Max 7, the 7 and Pro 7 both support the Wi-Fi 7 standard, but there’s a key difference between the two.

The standard Eero 7 is a dual-band router with 2.4Ghz and 5Ghz channels for your devices to connect to. It’s multi-gigabit capable, with promised speeds of up to 1.8Gbps wirelessly and 2.3Gbps wired. Each Eero 7 gets two 2.5Gb Ethernet ports and a USB-C port for power, and a cable and wall plug are included in the box. A single Eero 7 offers coverage up to 2,000 square feet, making it likely plentiful for an apartment or smaller home with just a few devices.

However, if you want more channels for devices to connect to and to avoid interference, a tri-band router potentially – and therefore network – is likely the route. And that’s where the Eero Pro 7 comes in – it looks like a Max 7, meaning it’s a sort of an oval-like tower design with a fanless design to help keep things cool. Basically, it sucks the heat in at the bottom and back, then pushes it out the top.

Each Pro 7 is tri-band with 2.4Ghz, 5Ghz, and 6GHz channels, giving however many devices you have connected plenty of room on your network. It’s multi-gigabit, and designed to handle even more traffic and offer even better connectivity, as it’s rated for up to 3.9Gbps wireless speeds and up to an impressive 4.7Gbps when wired. The Eero Pro 7 trades the 2.5Gb ports of the standard Eero 7 for two 5Gb Ethernet ports, which makes it better if you have a multi-gigabit connection from your service provider. A single Pro 7 can cover 2,000 square feet like the standard 7, but can handle up to 200 devices connected to a single point.

(Image credit: Amazon/Eero)

Beyond the differences between dual-band and tri-band, and the Ethernet ports, the Eero 7 and Pro 7 also pack smart home connectivity in that Matter, Thread, and Zigbee devices can get connected as these also act as border routers or home hubs.

You’ll also get three major benefits from Eero courtesy of dedicated features – TrueChannel, which picks the best channel for your device to connect; TrueRoam, which can pass your connected device from access point to access point without interruption; and TrueMesh, which routes your device via the best possible route. It’s some excellent naming, but really speaks to the technology in these routers, and the Eero OS working to give you the strongest network connection possible and prioritizing the various devices connected to the network.

If you have a Wi-Fi 7-capable device, you can also take advantage of standard features, such as multi-device connections, allowing your device to be on two channels simultaneously. As more devices adopt Wi-Fi 7, you’ll be set for quite some time with the Eero 7 and Pro 7, as they offer plenty of future proofing. And if you need to grow your network, you can also mix and match or expand your Eero system. This means you can start with an Eero Pro 7 as your main router, get one extra Pro 7 to act as an access point somewhere else in your home, and maybe opt for a standard 7 for your garage. It’s all pretty plug-and-play.

I’m particularly excited to see how the Eero Pro 7 pairs with a Max 7 as the main point – Eero’s flagship model has brought new speeds and endurance to my home network, but at $599.99 for one, it never really did tick the ‘affordable’ box. The Pro 7 trickles down the improved design with still really strong network chops for a good chunk of change less. The Max 7, for comparison, covers 2,500 square feet with just one unit, delivers wireless speeds up to 4.3Gbps, and has four Ethernet ports (two of which are 10Gb).

We’ll be testing the new Eero 7 and Eero Pro 7 as soon as we can set them up and connect them. If you’re already sold, Eero is taking orders for the new models right now. Shipments will start on February 26, 2025. The US and UK are the launch countries, and as mentioned they’ll launch in Australia later this year.

Here’s the pricing breakdown, and you can order these at Amazon now.

  • Eero 7 single: $169.99 / £169.99
  • Eero 7 two-pack: $279.99 / £279.99
  • Eero 7 three-pack: $3499.99 / £3499.99
  • Eero Pro 7 single: $299.99 / £299.99
  • Eero Pro 7 two-pack: $549.99 / £549.99
  • Eero Pro 7 three-pack: $699.99 / £699.99
You might also like
Categories: Technology

The Best Mesh Routers of 2025, Tested and Reviewed

WIRED Top Stories - Wed, 02/19/2025 - 10:00
Forget about patchy internet connections and dead spots in the house. These WIRED-tested multiroom mesh systems will get you online in no time.
Categories: Technology

Champions League Soccer: Livestream Borussia Dortmund vs. Sporting CP From Anywhere

CNET News - Wed, 02/19/2025 - 09:45
BVB aim to get the job done as they host a Sporting side left shellshocked after last week's thrashing in Lisbon.
Categories: Technology

iPhone 16e live updates – Apple's next-gen budget iPhone is official

TechRadar News - Wed, 02/19/2025 - 09:35

Apple has officially launched the iPhone 16e. The company announced the new budget-friendly iPhone at 11am ET / 8am PT / 4pm GMT on February 19, confirming that the iPhone 16e is a new member of the iPhone 16 family and not, as many suspected, a standalone iPhone SE 4.

The new phone features the A18 chipset, a 6.1-inch OLED display, Apple Intelligence compatibility, a single 48MP rear camera, and a 12MP front-facing camera. The iPhone 16e also features a notch instead of the Dynamic Island, but it does inherit the Action button from the iPhone 15 Pro and iPhone 16 lines.

Pre-orders for the iPhone 16e begin on February 21, and the device will ship from February 28. It starts at $599 / £599 / AU$999 and comes in either 128GB, 256GB, or 512GB storage configurations.

Follow along as we react to the announcement of Apple's latest mid-range model, which has discontinued both the iPhone SE (2022) and the iPhone 14.

The latest news
  • Apple has officially announced the iPhone 16e
  • It features the A18 chipset, a 6.1-inch OLED display, a single 48MP rear camera, and a 12MP front-facing camera
  • The iPhone 16e is also compatible with Apple Intelligence
  • The phone features Apple's first homegrown cellular modem, the C1
  • Pricing starts at $599 / £599 / AU$999
  • Pre-orders begin on February 21; shipping starts on February 28

(Image credit: Apple / Future)

Welcome to our iPhone SE 4 liveblog

Hello, I'm Axel Metz (TechRadar's Phones Editor) and I'll be running our Apple event live blog for the next few hours. We're expecting Apple to announce something later today, and though nothing has been confirmed as yet, all the signs point towards a refresh for the company's ageing iPhone SE line.

In the following posts, I'll be rounding up the latest news and rumors about the iPhone SE 4 (or might that be the iPhone 16E?), and keeping you updated with all the official information as it's revealed by Apple.

What does Apple's teaser tell us?

Get ready to meet the newest member of the family.Wednesday, February 19. #AppleLaunch pic.twitter.com/0ML0NfMeduFebruary 13, 2025

Let's kick off with a proper look at Apple's official teaser, which was shared to X on February 13. Tim Cook's shiny Apple logo doesn't give a lot away, but the internet has some compelling theories.

Firstly, the tagline "get ready to meet the newest member of the family" does tally with rumors of a new iPhone SE. It'd be part of the iPhone family, but does that also hint at a rebrand? The iPhone SE 3 was simply the iPhone SE (2022) and there have also been rumors that the new model might be called the iPhone 16E.

The circle around the logo could also be hinting at the new SE's single camera, or the move away from a physical home button. It does also look a lot like an AirTag (potentially the AirTag 2?), but we weren't expecting to see a new one of those for quite a while yet...

The biggest iPhone SE upgrade rumors

(Image credit: Apple)

As for the iPhone SE 4 specifically, we're expecting the new device to bring major hardware and software improvements over its now-outdated predecessor. The biggest rumored upgrades for the iPhone SE 4 are as follows:

The Apple Store is down!

(Image credit: Apple)

OK, here's our first big indicator that a product launch is imminent. Apple has closed its online store for maintenance, which is almost always a sign that new devices are on the way.

In this case, Apple has only closed the product page for the iPhone SE (2022), which (surprise!) strongly hints that a replacement device is about to be revealed. But will it be the iPhone SE 4, the iPhone SE (2022), or the iPhone 16E? Given Tim Cook's "family" comment, my money's on the latter.

What might the iPhone SE 4 look like?

Are you ready for iPhone SE 4? pic.twitter.com/ohacicAvgBFebruary 10, 2025

We don't yet know the name of Apple's new device, but is this its official design?

The above images (or perhaps best-guess renders) shared by leaker Majin Bu are the closest thing we have to a peek at the new iPhone SE's possible design. They certainly line up with previous leaks; the device in question has a notch, a flat metal frame, and a single-lens camera.

There's also a customizable action button (a nice bonus for a more affordable iPhone). The notch means this should also be the first SE model with Face ID, which is a nice time-saver on my iPhone 16 Pro. If this is all true, it could prove popular – if the price is right...

The iPhone 16e is official!

(Image credit: Apple)

The iPhone 16e is official!

Apple officially announced the new device on its website at 11am ET / 8am PT / 4pm GMT, confirming that the iPhone 16e is a new member of the iPhone 16 family and not, as many suspected, a standalone iPhone SE 4.

Specs incoming...

(Image credit: Apple)

Here's the official product page for the iPhone 16e in the UK.

The phone will start at $599 / £599 / AU$999 and comes in either 128GB, 256GB, or 512GB storage configurations. That's a huge increase on the $429 / £419 / AU$719 starting price of the iPhone SE (2022). Can we really consider this a budget phone?

Farewell, iPhone 14 and iPhone SE (2022)

(Image credit: Apple)

And just like that, the iPhone 14 and iPhone SE (2022) are no more. Apple has removed both models from its website.

The official iPhone 16e announcement video

Here's the official iPhone 16e announcement video, hosted by Tim Cook himself.

Initial reaction from TechRadar's US Managing Editor of News, Jake Krol: "The iPhone 16e seemingly took some inspiration from the iPhone 4, and I'm kind of here for it"

Do the specs justify the price?

Now for those specs...

The iPhone 16e features the A18 chipset, a 6.1-inch OLED display, Apple Intelligence compatibility, a single 48MP rear camera, and a 12MP front-facing camera. There's a notch instead of the Dynamic Island, but the new phone does inherit the Action button from the iPhone 15 Pro and iPhone 16 lines.

All told, then, this is a major step up from the iPhone SE (2022), but the iPhone 16e's $599 / £599 / AU$999 price tag also marks a major increase over that of its predecessor.

(Image credit: Apple)

Here's that 48MP camera lens up close. It's the same 'Fusion' camera as you'll find on the iPhone 16, which Apple claims "has the capabilities of two cameras in one." That's because it features an integrated 2x telephoto that lets you zoom in with optical quality. The 48MP Fusion camera lets you shoot 4K video in Dolby Vision, too, which is neat.

'I think this could be a hit for Apple'

Some more reactions to the iPhone 16e announcement from the TechRadar team for you here:

"I like the simple, unfussy design paired with some powerful chips and access to Apple Intelligence. I think this could be a hit for Apple, though the price is a bit high, but I think people will gobble it up." – Roland Moore-Colyer, Managing Editor, Mobile Computing

"At $599, the iPhone 16e is more expensive than any of us were hoping – but it looks like there's some serious Apple power under the hood, too. Looking forward to trying this one out, but not sure I'd recommend pre-ordering." – Jamie Richards, Staff Writer, Mobile Computing

"It's somehow killed off two phones [the iPhone 14 and previous iPhone SE] without filling the void left by either of them." – Rob Dunne (aka The Dunnster), VPN Editor

No MagSafe?!

(Image credit: Apple)

A quick look at Apple's new model comparison page reveals a few frustrating omissions for the iPhone 16e.

The biggest is the lack of MagSafe support. Yes, you read that right: the iPhone 16e will not support MagSafe cases, wallets, and wireless chargers. The phone does have wireless charging capabilities, but only up to 7.5W, which is punishingly slow. There's also no ultra-wideband (UWB) technology, and the GPU is made up of only four cores (compared to five and six on the iPhone 16 and iPhone 16 Pro Max, respectively).

'Apple is finally simplifying its iPhone lineup'

"Apple is finally simplifying its iPhone lineup, squeezing almost all of it into the 16 family. This is a good thing for people trying to choose and it also means that the distance from a budget iPhone to a Pro one isn't as great as it used to be. For my money, though, the inclusion of the C1 chip is the most intriguing bit. It isn't often your most affordable handset gets your newest and maybe most controversial piece of tech." – Lance Ulanoff, Editor-at-Large

"What would have sold it for me is Apple opting down in terms of computing power to offer a non-AI iPhone alternative, which would cater to a big chunk of consumers who just aren't bothered about AI et. But then, that's basically admitting that consumers might not care about Silicon Valley's latest golden goose." – Josie Watson, Managing Editor, Lifestyle

"I've never noticed Tim Cook's accent before – isn't it lovely?" – Becky Scarrott, Audio Editor

Thanks, Becky.

(Image credit: Apple)

Here's the front and back of the new iPhone 16e, which comes in either Black or White (where are the funky colors, Apple?).

Categories: Technology

Netflix is getting its first-ever English medical procedural series and a historical drama that looks like a Spanish Bridgerton

TechRadar News - Wed, 02/19/2025 - 09:30
  • Netflix has revealed its first-ever English-language medical procedural series and a Spanish period drama.
  • Pulse is a medical drama that focuses on Miami's busiest hospital during a hurricane.
  • The Lady's Companion centers on a respected lady-in-waiting in 1880 Madrid.

After Netflix announced its new western series Ransom Canyon, the streamer has since unveiled two more exciting new TV shows coming to its library over the next two months.

These include its first English-language medical procedural series, called Pulse, and a Spanish period drama titled The Lady’s Companion (which is also known as Manual Para Señoritas in Spanish) that looks straight out of Bridgerton.

What do we know so far about The Lady's Companion?

When it comes to period dramas, Netflix is somewhat of an expert in producing popular programs within that genre. The cultural phenomenon Bridgerton is one of Netflix's most popular shows of all time and has also found success with its prequel Queen Charlotte: A Bridgerton Story, as well as the German historical drama The Empress.

Now, Netflix is lining up a royal rival with The Lady’s Companion, a period romantic comedy-drama set in 1880 Madrid. There is currently no English-language trailer available, but you can watch the Spanish version below:

Released on March 28, 2025, the official plot of The Lady's Companion reads: "Madrid, 1880. Elena Bianda is the most sought-after lady-in-waiting in the entire city. Despite her youth, more than 20 ladies have already had decent courtships and courtships under her tutelage. Her success lies in being rigid in morality with their families and sensitive to the concerns of the ladies. A complicated balance that Elena handles perfectly. She was born for it: seeing them successfully walk down the aisle is, quite simply, her whole life. All this changes when she arrives at the Mencía house and has to take care of three sisters.”

According to What's On Netflix: The Lady's Companion "is a mix of Bridgerton for its aesthetics, Cable Girls for its style, and The Law According to Lidia Poët for its feminist tilt" and a second season is already being developed.

What do we know so far about Pulse?

Pulse is a new medical drama coming to Netflix. (Image credit: ANNA KOORIS/Netflix 2024)

While the best streaming service for genre hoppers has licensed plenty of medical dramas like the smash hit Grey's Anatomy and Fox's The Resident, Pulse will be Netflix’s first-ever English-language medical procedural.

As a hurricane descends on Miami's busiest trauma center, Pulse follows third-year medical resident Dr. Danny Simms (Willa Fitzgerald) who is unexpectedly promoted when respected Chief Resident Dr. Xander Phillips (Colin Woodell) is suspended. Amid the intensifying storm and a flood of trauma cases, Danny and Xander must navigate the fallout of their secret romance as the hospital goes into lockdown. At the same time, their colleagues must balance their own personal and professional challenges as they work to save their patients' lives. Pulse will consist of 10 episodes and premieres on April 3, 2025.

We'll just have to wait and see if Pulse and The Lady's Companion become one of the best Netflix shows when these shows are released in March and April, respectively.

You might also like
Categories: Technology

Save Up to 50% on a Personalized Smart Bed from Sleep Number

CNET News - Wed, 02/19/2025 - 09:27
A good night's sleep is different for everyone, and Sleep Number's smart technology lets you and your partner optimize each side for your own comfort.
Categories: Technology

Lee Enterprises blames cyberattack for encrypting critical systems as US newspaper outages drag on

TechRadar News - Wed, 02/19/2025 - 09:21
  • Lee Enterprises filed a new report with the SEC
  • It confirmed suffering a ransomware attack and having files encrypted
  • As outage drags on, the investigation continues

The recent cyberattack on newspaper firm Lee Enterprises has turned out to be a ransomware attack, after all.

The company confirmed the news in a recent 8-K report filed with the US Securities and Exchange Commission (SEC), sharing more details about the attack, confirming that it was a ransomware strike.

“Preliminary investigations indicate that threat actors unlawfully accessed the company’s network, encrypted critical applications, and exfiltrated certain files,” it was said in the filing. “The company is actively conducting forensic analysis to determine whether sensitive data or personally identifiable information (PII) was compromised. At this time, no conclusive evidence has been identified, but the investigation remains ongoing.”

Advanced evasion techniques

The news comes roughly a week after it filed a 10-Q form with the SEC saying it suffered a cyberattack which forced it to pull parts of its IT infrastructure offline.

“On February 3, 2025, the company experienced a technology outage due to a cyber incident affecting certain business applications, resulting in an operational disruption,” it was said in the filing. “The company is actively investigating the incident, implementing recovery measures, and assessing the potential impact on its operations, financial condition, and internal controls.”

The incident impacted Lee’s operations, including distribution of products, billing, collections, and vendor payments, the company further stressed.

Distribution of print publications across its portfolio of products experienced delays, and online operations are partially limited. It still said that it now distributes all core products in “normal cadence”, although weekly and ancillary products have not yet been restored.

Some of the affected publications include the Winston-Salem Journal, Albany Democrat-Herald, Corvallis Gazette-Times, and others. A full list of affected outlets can be found on this link.

Via TechCrunch

You might also like
Categories: Technology

Sounding the alarm on AI-powered cybersecurity threats in 2025

TechRadar News - Wed, 02/19/2025 - 09:19

The cost of data breaches is at an all-time high. According to IBM, the global average cost of a security breach currently sits at a staggering $4.9 million, spiking by 10% in 2024. These numbers are only expected to worsen, with USAID forecasting that cybercrime will cost the global economy $24 trillion by 2027.

This upward trajectory is driven in part by the emergence of a new threat: AI-powered malware. While AI has become an integral tool for business workflows and innovation, this technology has also proven particularly beneficial for malicious actors, allowing them to develop more stealthy and sophisticated tactics than ever before. In a world where everything is increasingly connected, it’s critical for businesses to anticipate the incoming wave of new threats and develop surefire strategies to not only mitigate incidents but stop them in their tracks.

AI’s double-edged sword: today’s threat landscape

In recent years, the world witnessed incredible advancements in the power of AI. While AI has helped strengthen cyber resilience, with technologies like automated phishing detection and predictive analysis, it has also become a severe threat to business networks. Stepping up from traditional malware that relies on static attack patterns, AI-powered malware is capable of adapting, evading, and learning, constantly evaluating ways to overcome obstacles and successfully inject itself into protected systems. Building on the knowledge from failed attempts to develop new attack strategies, the ever-changing nature of these threats makes detection increasingly difficult, and in turn, weakens defense mechanisms.

BlackMatter ransomware is an infamous yet prime example of how AI has dramatically changed the cyber threat landscape. As an evolution of DarkSide, BlackMatter has quickly become one of the most formidable ransomware threats, bringing a new level of sophistication to the space. Its AI algorithms are built to refine encryption strategies and analyze victims’ defenses in real time, allowing it to circumvent endpoint detection and response (EDR) tools that would typically neutralize ransomware threats. This evasion tactic ultimately renders conventional defences ineffective.

This dangerous shift in gear poses significant challenges to cybersecurity defenses. To effectively protect against these threats, businesses must first assess the biggest threats that lie ahead.

Autonomous attacks

With self-directed learning for real-time evasion, AI-powered malware can essentially ‘think for itself’, independently altering its behavior to bypass existing cybersecurity measures. In other words, no human input necessary. This leads to more frequent attempts in a shortened time frame, making it harder for defenders to counter new attack vectors, and increasing the likelihood of a successful breach.

Furthermore, AI-enhanced malware can spread across networks or systems without instruction. Once it’s infiltrated one machine, the malware self-propagates and infects other connected systems and devices within minutes.

Intelligent attack methods

AI-powered malware can also carry out more destructive ransomware attacks by identifying the most valuable files and systems to target. Instead of simply encrypting, AI algorithms can identify critical databases, financial records, or intellectual property to maximize disruption and increase the likelihood of a ransom payment.

Moreover, AI-powered malware can apply machine learning to mimic the behaviors of manual systems, making it more difficult for traditional intrusion detection systems to identify. It can even avoid detection by only executing malicious actions during off-peak periods.

Sophisticated targeting

AI can also be used to conduct highly targeted attacks by analyzing large amounts of data, such as social media profiles or network behaviors. This facilitates the weaponization of social engineering tactics, generating personalized phishing emails, which are harder to detect. For instance, an AI-powered phishing email might reference a known contact, a recent purchase, or even mimic the writing style of a trusted colleague. This level of personalization makes it much easier coerce individuals into clicking on malicious links, downloading infected attachments, or revealing sensitive information.

Combatting suspicious activity

Attackers aren’t the only ones that can apply AI to their cyber strategy. In fact, it’s important that defenders follow suit and employ AI-based threat intelligence solutions for effective mitigation. According to IBM, organizations that used AI and automation extensively in attack prevention averaged $2.2 million in cost savings than those that didn’t.

How can AI be implemented? This could manifest in AI-powered anomaly detection software, with continuous monitoring and behavior analysis to flag real-time threats, such as unusually high levels of entropy in software code.

Physical network segmentation

While software-based security measures are a key element of any cybersecurity strategy, data and systems remain vulnerable to AI-powered attacks that exploit vulnerabilities. The constantly self-developing nature of these threats calls for a different approach, which has led to a renewed focus on physical segmentation and isolation as a means of protecting networks.

Moving away from the ‘always on’, interconnected model of today’s systems, physical network segmentation is the practice of isolating different parts of a network using physical hardware, such as routers and switches, enabling organizations to establish secure zones with restricted access to critical systems and data.

In prevention, physically disconnecting digital assets from the internet when they’re not in use will significantly reduce the attack surface and provide a much higher level of protection for sensitive data and systems. This is particularly crucial for critical infrastructure, operational technology, and sensitive research data, which may not require constant internet connectivity.

In crisis, if one segment is compromised, the damage is contained within its isolated network, preventing the rapid spread of malware and cutting off connection before the problem worsens. This segmentation technique acts as a powerful defense-in-depth strategy that makes it notably harder for cyber threats to traverse the entire network and target sensitive areas.

Cyber resilience is in your hands

AI-powered malware presents a myriad of dynamic and unpredictable cyber threats. With its enhanced ability to learn, adapt, and autonomously exploit weaknesses, attackers can use AI to execute more sophisticated, evasive, and damaging attacks. Traditional cybersecurity measures are often ill-equipped to handle these advanced threats.

To truly combat cyber threats, there’s a need for a more tangible solution. By isolating different data sets and physically disconnecting from networks, businesses can rest assured they are optimizing their cyber resilience and mitigating the impact of successful attacks.

We've featured the best firewall software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

'Win or Lose': How to Watch the Pixar Original Series From Anywhere

CNET News - Wed, 02/19/2025 - 09:17
The Toy Story maker's first-ever original series hits streaming this week.
Categories: Technology

HubSpot and Canva team up to level the creative playing field

TechRadar News - Wed, 02/19/2025 - 09:08
  • Canva and HubSpot unveiled a new integration
  • The new offering is designed for small businesses and solopreneurs
  • It's available globally right now

Canva and HubSpot have just announced a partnership that will see Canva’s design tools integrated into HubSpot’s customer relationship platform.

In a press release shared with TechRadar Pro earlier this week, the two companies said the new integration will give growing businesses, small and medium-sized organizations, and solopreneurs, a creative edge that will level the playing field against large enterprises and other big budget organizations.

The embedded experience, which includes Canva’s complete design offering, as well as Magic Studio AI tools, will be accessible through a native “Design with Canva” button, now available in the HubSpot portal.

The two organizations said the integration is available globally for free across all HubSpot hubs and tiers with a Canva subscription.

How the integration works

As the announcement explains, teams will now be able to add Canva Pro Elements to their designs, comment and share Canva designs with their teams, and find designs created in HubSpot on their Canva homepage. The two organizations claim businesses will be able to create on-brand content “in minutes”, including email templates, social posts, and landing pages.

For example, to add an image to a social post, ad, page, or email, users can simply click the Upload icon and select “Design with Canva”. From there, they can select a format, design the image in the Canva editor, and press Save.

“Visual storytelling is one of the most powerful ways to show, not tell, your story to customers - one image can do the work of a thousand words,” said Karen Ng, Senior Vice President of Product & Partnerships at HubSpot. “By bringing together Canva's creative platform with HubSpot's customer platform, we're making it fast and easy for teams to create professional designs at scale. Whether you're a team of one or hundreds, this integration empowers you to meet the growing content demands of today's market.”

You might also like
Categories: Technology

Protectors of the modern world: defending against Shadow ML and Agentic AI

TechRadar News - Wed, 02/19/2025 - 09:03

It may sound like hyperbole to say that machine learning operations (MLOps) have become the backbone of our digital future, but it’s actually true. Similar to how we view energy grids or transportation systems as part of the critical infrastructure that powers society, AI/ML software and capabilities is quickly becoming essential technology for a wide range of companies, industries, and citizen services.

With artificial intelligence (AI) and machine learning (ML) rapidly transform industries, we’ve also seen the rise of a new age of “Shadow IT” now referred to as “Shadow ML.” Employees are increasingly deploying AI agents and ML models without the knowledge or approval of IT departments, often circumventing security protocols, data governance policies, and compliance frameworks.

This unchecked proliferation of unauthorized AI tools introduces significant risks, from data leakage to model bias and vulnerabilities that threat actors could exploit. CISOs and IT leaders are now tasked with shining a light into the shadows– ensuring that AI-driven decisions are explainable, secure, and aligned with enterprise policies. Understanding the evolving role of MLOps in managing and securing the rapidly expanding AI/ML IT landscape is essential to safeguarding the interconnected systems that define our era.

Software is critical infrastructure

Software is an omnipresent component of our day-to-day lives, operating quietly but indispensably behind the scenes. For that reason, failures in these systems are often hard to detect, can happen at any moment, and spread quickly across the globe, disrupting businesses, upsetting economies, undermining governments or even endangering lives.

The stakes are even more significant as AI and ML technologies increasingly take center stage when it comes to software development and management. Traditional software operations are giving way to AI-driven systems capable of decision-making, prediction, and automation at unprecedented scale. However, like any technology that ushers in new but immense potential, AI and ML also introduce new complexities and risks, elevating the importance and need for strong MLOps security. As reliance on AI/ML grows, the robustness of MLOps security becomes foundational to fending off evolving cyber threats.

Understanding the risks of the MLOps lifecycle

The lifecycle of building and deploying ML models is filled with both complexity and opportunity. At its core, these processes include:

  • Selecting an appropriate ML algorithm, such as a support vector machine (SVM) or decision tree.
  • Feeding a dataset into the algorithm to train the model.
  • Producing a pre-trained model that can be queried for predictions.
  • Registering the pre-trained model in a model registry.
  • Deploying the pre-trained model into production by either embedding it in an app or hosting it on an inference server.

It’s a structured approach but one with significant vulnerabilities that threaten stability and security. These vulnerabilities, broadly categorized as inherent and implementation-related, include:

  • Inherent Vulnerabilities: The complexity of ML environments, including cloud services and open-source tools, can create security gaps that may be exploited.
  • Malicious ML models: Pre-trained models can be weaponized or intentionally crafted to produce biased or harmful outputs, causing trickle-down damage across dependent systems.
  • Malicious datasets: Training data can be poisoned to inject subtle yet dangerous behaviors that undermine a model’s integrity and reliability.
  • Jupyter “sandbox escapes”: In another example of “Shadow ML,” many data scientists today rely on Jupyter Notebook, which can serve as a path for malicious code execution and unauthorized access when not adequately secured.
Implementation vulnerabilities
  • Authentication shortcomings: Poor access controls expose MLOps platforms to unauthorized users, enabling data theft or model tampering.
  • Container escape: Containerized environments with improper configuration allow attackers to break isolation and access the host system and other containers.
  • MLOps platform immaturity: The rapid pace of innovation in AI/ML often outpaces the development of secure tooling, creating gaps in resilience and reliability.

While AI and ML can offer enormous benefits for organizations, it’s crucial not to prioritize rapid development over security. Doing so could compromise ML models and put organizations at risk. Furthermore, developers must exercise caution when loading models from public repositories, ensuring they validate the source and potential risks associated with the model files. Robust input validation, restricted access, and continuous vulnerability assessments are critical to mitigating risks and ensuring the secure deployment of machine learning solutions.

MLOps hygiene best practices

There are many other vulnerabilities across the MLOps pipeline, underscoring the importance of vigilance among teams. Many separate elements within a model serve as potential attack vectors, which organizations typically manage and secure. Therefore, implementing standard APIs for artifact access and ensuring seamless integration of security tools across various ML platforms for data scientists, machine learning engineers, and core development teams is essential. Key security considerations for MLOps development should include:

  • Dependencies and packages: Teams often use open-source frameworks and libraries like TensorFlow and PyTorch. Providing access to these dependencies from trusted sources—rather than directly from the internet—and conducting vulnerability scans to block malicious packages ensures the security of each component within the model.
  • Source code: Models are typically developed in languages such as Python, C++, or R. Employing static application security testing (SAST) to scan source code can identify and alleviate errors that may compromise model security.
  • Container images: Containers are used to deploy models for training and facilitate their use by other developers or applications. Performing comprehensive scans of container images before deployment helps prevent introducing risks into the operational environment.
  • Artifact signing: Signing all new service components early in the MLOps lifecycle and treating them as immutable units throughout different stages ensures that the application remains unchanged as it advances toward release.
  • Promotion/release blocking: Automatically rescanning the application or service at each stage of the MLOps pipeline allows for early detection of issues, which in turn helps with swift resolution and maintaining the integrity of the deployment process.

By adhering to these best practices, organizations can effectively safeguard MLOps pipelines and ensure that security measures enhance rather than impede the development and deployment of ML models. As we move further into an AI-driven future, the resilience of the MLOps infrastructure will become an increasingly key component to maintaining the trust, reliability, and security of the digital systems that power the world.

We've featured the best online cybersecurity course.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Pages

Subscribe to The Vortex aggregator - Technology