Error message

  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

Technology

New forum topics

Get ready for Audio Overview in Google Gemini, I’ve used it in Notebook LM and it's a complete game changer

TechRadar News - Tue, 03/18/2025 - 11:00
  • Audio Overview is coming to Gemini and Gemini Advanced subscribers from today
  • You can make great sounding podcasts out of articles and more, right in Gemini
  • It works with Deep Research reports as well

Audio Overview is coming to Google’s AI chatbot Gemini, and I think it will change the way we use it for good. You can use Audio Overview to turn documents, slides, and even Deep Research reports into easy-to-listen-to podcasts.

The first time I tried Audio Overview I was blown away by how good it was. The podcasts it creates are essentially 10-minute-long shows narrated by two AI hosts who talk about whatever subject you’ve fed them via Google documents, PDFs, or even YouTube videos.

The point of Audio Overview is to speed up the learning process for students. So, instead of having to read all those books, or watch all those YouTube videos yourself, you can get AI to do it for you and then get it to tell you all the important bits in a short information blast, but as if you were listening to a podcast.

Getting in the mix

Audio Overview first appeared as part of Google’s NotebookLM research tool. It was particularly favored by students who didn’t like to read very much, but the technology for creating its AI podcasts worked way better than it had any right to and obviously had implications for projects far beyond the world of education.

Rather than sounding like two boring AI robots discussing a subject academically, the podcast hosts sound as if they were two real humans talking about a subject they both really cared about, with a lot of dynamic back and forth.

I quickly realized there was scope for creating podcasts about pretty much anything using Audio Overview, and I’ve been using it ever since. Now we can use it with Deep Research reports, it will be even better.

Gemini integration

NotebookLM was already free to use, but having Audio Overviews integrated into Gemini just makes them easier to access. Audio Overview is starting to roll out today to Gemini and Gemini Advanced subscribers, globally in English, with more languages coming soon.

They work in Gemini by simply uploading documents into the prompt bar and then choosing Generate Audio Overview from the suggestion chip that pops up. Audio Overviews work in both the web and mobile app versions of Gemini. Go to gemini.google.com to see if they’re available to you yet.

You may also like
Categories: Technology

Bumble Introduces ID Verification To Make Online Dating Safer

CNET News - Tue, 03/18/2025 - 10:32
Users with verified profiles will get a special badge.
Categories: Technology

Best E-Reader for 2025: Ditch Those Paper Books for Good

CNET News - Tue, 03/18/2025 - 10:31
Having your entire library at your fingertips anytime can help you keep your reading habit. We've tested and picked the finest e-readers available this year.
Categories: Technology

Best Internet Providers in Staten Island, New York

CNET News - Tue, 03/18/2025 - 10:29
Staten Island is home to a slew of broadband providers. Our broadband experts have hand-picked the best ISPs and plans to get you the best service possible.
Categories: Technology

How to Watch March Madness Without Cable

CNET News - Tue, 03/18/2025 - 10:28
Check out the best streaming options for the men's and women's college basketball tournaments.
Categories: Technology

Fortinet firewall bugs are being targeted by LockBit ransomware hackers

TechRadar News - Tue, 03/18/2025 - 10:27
  • Security pros spot a new LockBit variant in the wild
  • A potential affiliate abused two Fortinet flaws to deploy the encryptor
  • There are multiple overlaps with LockBit 3.0

LockBit affiliates are using vulnerable Fortinet endpoints to target businesses with an updated ransomware strain, experts have warned.

Cybersecurity researchers at Forescout found the threat actor is using two vulnerabilities in Fortinet firewalls, tracked as CVE-2024-55591, and CVE-2025-24472, to deploy an updated ransomware strain named SuperBlack.

Both vulnerabilities had been used in the past before, and both were patched in January 2025 - so the best way to defend against the attacks is to make sure your Fortinet firewalls are up to date.

At least three victims

Forescout named the group running the attacks “Mora_001”. Since there are some overlaps in its tactics, techniques, and procedures (TTP) with LockBit, the researchers believe the group could be a LockBit affiliate.

Apparently, SuperBlack is based on the builder that was used in LockBit 3.0 attacks, and which leaked in the past. Furthermore, the ransom note in both LockBit and Mora_001 attacks uses the same messaging address.

Speaking to TechCrunch, senior manager of threat hunting at Forescout, Sai Molige, said there were at least three confirmed cases, but added that “there could be others”.

LockBit was one of the most disruptive and influential ransomware groups around, however, in late February 2024, it was struck by the FBI, and it never fully recovered. The law enforcement seized its website, the data it held, and obtained “thousands” of decryption keys.

It also obtained information about its affiliates which, at the time, counted around 200 groups, and later urged the affiliates to come forward. In February this year, the bulletproof hosting service provider, allegedly used by LockBit, was sanctioned by the US and the UK.

LockBit took roughly a week to get back on its feet and resume operations, but it is possible that many of its affiliates pivoted to other groups, such as RansomHub or Medusa.

You might also like
Categories: Technology

How phishing attacks are hitting the supply chain – and how to fight back

TechRadar News - Tue, 03/18/2025 - 10:21

The global supply chain is the backbone of the world’s economy. From suppliers and manufacturers to transporters, retailers, and consumers, every step is interconnected. Yet, as powerful and efficient as it usually is, this vast network is highly vulnerable to disruption.

A cyberattack can delay shipments, halt construction projects, or leave manufacturers unable to get the parts they need—whether it’s for electronics, medical supplies, or even everyday goods. For consumers, it means missing out on the products they rely on, facing longer wait times for deliveries, or even seeing prices skyrocket as shortages set in. When cybercriminals target supply chain operations, the ripple effects can be devastating.

One of the growing threats in this space is phishing scams – specifically, double brokering fraud attacks. In the past few years, freight and transportation companies have faced an alarming rise in these scams. Complaints relating to double brokering have surged by 400% since 2022, with 50% of freight brokers naming it their top concern.

Attackers impersonate legitimate transport companies, tricking victims into divulging sensitive shipment details, which are then intercepted or redirected for financial gain. The consequences can be severe: financial losses, uninsured loads, delayed deliveries, and lasting reputational damage.

Double brokering: The hidden cyber threat affecting global transport

Double brokering scams are particularly effective because they exploit the fast-paced nature of the logistics industry, where efficiency and cost savings often outweigh thorough vetting processes.

Here’s how they work: Scammers pose as legitimate freight brokers or create fake transportation companies. Using phishing emails, they gain access to shipment details – such as pick-up, destination, size, and scheduling. They then offer a lower rate than competitors for their services, in order to win contracts from unsuspecting businesses.

Once they secure the job, instead of transporting the shipment themselves, they pass it off to a legitimate carrier – often a real trucking company that believes it has been hired for a normal job. The scammer collects payment from the original client but never pays the actual carrier, pocketing the money and then disappearing – long before the fraud is discovered.

These scams have gained traction due to the sheer number of transportation companies out there, many of which – surprisingly in this digital age – operate without websites, making them much easier to impersonate. Meanwhile, phishing emails have become increasingly sophisticated, with scammers using real carrier numbers and forged (but legitimate looking) documents to avoid detection.

Why phishing is the perfect vehicle for double brokering

Phishing is the go-to tactic for double brokering scams because it doesn’t rely on hacking technical systems – it preys on human error. A simple click on a malicious link or an unwitting disclosure of shipment details can be enough to set a scam in motion. Since email is so ingrained in the supply chain, it provides cybercriminals with an easy, high-reward entry point.

Scammers often register fake domains that mimic legitimate ones (e.g., xyzshippingllc.com instead of xyzshipping.com). Once they deceive a victim into sharing shipment details, they act fast – hijacking the load and redirecting payments before anyone realizes what’s happened. The fallout extends far beyond financial losses. Businesses face delayed deliveries, lost or damaged goods, and a tarnished reputation that can have long-term consequences – leaving businesses to pick up the pieces long after the scam is over.

With cybercriminals becoming increasingly sophisticated, staying one step ahead requires a proactive approach to security, verification, and fraud prevention.

Staying ahead

The foundation of any cybersecurity strategy is awareness. Phishing may be subtle, but it’s preventable. Employees must be trained to recognize the warning signs of fraudulent emails – such as unusual variations, where cybercriminals swap out characters or add extra words like "LLC" or "INC" to make an email look legitimate. When in doubt, always verify. A quick call to confirm the sender’s identity before sharing sensitive shipment information can prevent costly fraud.

Technology plays a crucial role in strengthening defenses, but it’s not foolproof. Solutions like zero trust security postures help businesses secure their applications and data, ensuring only verified users and legitimate requests can access critical systems, reducing the risk of phishing-based fraud.

Email security protocols including DMARC, DKIM, and SPF, help reduce phishing threats, but they aren’t perfect – 89% of phishing emails still slip through traditional filters. This is where advanced technologies like machine learning and artificial intelligence provide additional benefits, identifying patterns and flagging suspicious activity with greater accuracy and in real time to detect fraud before it hits.

Beyond prevention, businesses must also focus on cyber resilience – the ability to withstand and recover from cyberattacks without significant disruption. It’s not just about preventing threats but ensuring operations can continue even if a breach occurs. Strengthening cyber resilience starts with evaluating your risks and vulnerabilities across the entire supply chain, from internal systems to third-party logistics partners, and making sure there is no weak link.

By combining awareness, advanced security tools, and a cyber-resilient mindset, organizations can stay ahead of cybercriminals and protect their operations from the growing threat of double brokering scams.

Collaboration is key

Protecting the global supply chain against phishing and cyber threats isn’t just an individual responsibility – it requires industry-wide collaboration. Given the complexity of modern logistics, mitigating cyber risks depends on businesses, industry groups, and regulators sharing knowledge, threat intelligence, and best practices.

For transport companies, cyber resilience must be a priority. Raising awareness, investing in advance technology, and promoting a secure culture can significantly reduce the impact of phishing scams and double brokering fraud. Meanwhile, consumers who interact with logistics platforms must also remain cautious, as cybercriminals exploit vulnerabilities at every level of the supply chain.

A stronger, more secure supply chain starts with identifying and reinforcing weak links. By making cybersecurity a shared mission, businesses can protect not just their own operations but the broader economy – ensuring a safer, more resilient future for global trade.

We profile the best Enterprise Resource Planning (ERP) software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

New OLED pixel breakthrough could make TVs, phones, watches and more much more energy efficient – and brighter

TechRadar News - Tue, 03/18/2025 - 10:10
  • Chiral semiconductors use a few tricks from Mother Nature
  • The same brightness with much less energy usage
  • Big implications for future computers as well as displays

A breakthrough new OLED technology could mean smartwatches with longer battery life, more energy-efficient TVs, and even brighter displays all around.

The breakthrough comes from researchers at the University of Cambridge and the Eindhoven University of Technology, and it revolves around what are called chiral semiconductors.

The research shows that these semiconductors can deliver "record-breaking" brightness and efficiency, and that could be a really big deal for any device with a display from the smallest smartwatch to the most massive OLED TV.

Here comes the science bit

One of the biggest energy drains in screens is the use of polarization layers, which in OLED TVs are generally used to reduce ambient light leakage, ensure the precise contrast the tech is known for. But this filtering process absorbs a lot of light – the firm American Polarizers Inc says that any polarizer absorbs more than 50% of the light going through it; that's a lot of wasted energy.

This new technology is different because it does its own polarization.

According to Eindhoven University of Technology, the semiconductor that the researchers have developed emits circularly polarized light that "carries information about the ‘left or right-handedness’ of electrons." Where normal silicon semiconductors are symmetrical, chiral molecules are left- or right-handed and mirror one another. The most famous example of that is in DNA, where they form the double helix we know so well.

Making chiral semiconductors has proven to be very difficult, but the researchers have found a way. Taking their inspiration from nature, the researchers created right- and left-handed spiral columns from stacks of semiconducting molecules. And those columns could transform the best OLED TVs, the best smartwatches, and everything in between.

According to Professor Sir Richard Friend from Cambridge University, who co-led the research, “Unlike rigid inorganic semiconductors, molecular materials offer incredible flexibility – allowing us to design entirely new structures, like chiral LEDs. It’s like working with a Lego set with every kind of shape you can imagine, rather than just rectangular bricks.”

The semiconductor the team has created is based on a material known as triazatruxene, or TAT for short. It self-assembles into a helix and electrons can spiral along it; the university describes it as being like the head of a screw.

Those structures can be incorporated into OLED panels, as co-first author Rituparno Chowdhury, from Cambridge’s Cavendish Laboratory, explains. "We’ve essentially reworked the standard recipe for making OLEDs like we have in our smartphones, allowing us to trap a chiral structure within a stable, non-crystallising matrix."

The circularized, polarized LEDs demonstrated "record-breaking efficiency, brightness and polarization, making them the best of their kind," Eindhoven University of Technology says.

We're still years away from seeing this technology in any of the best TVs. But it's a big breakthrough that's relevant not just to TVs and other electronic items. According to Eindhoven University of Technology it also has big implications for quantum computing and what's known as "spintronics": a field of research that uses electrons' spin to store and process information, and that one day may lead to faster, more secure computers.

You might also like
Categories: Technology

China's BYD Claims 5-Minute EV Battery Charge Gives 250 Miles of Range

CNET News - Tue, 03/18/2025 - 10:03
An apparent battery breakthrough could be good news for the EV industry from a Chinese company that previously pledged to work with Tesla.
Categories: Technology

Surfshark Alternative Number Keeps Your Digital Life Safe and Private

CNET News - Tue, 03/18/2025 - 10:00
Protect yourself from spam calls, scammy texts and data breaches with one convenient app.
Categories: Technology

Will Tomorrow's Fed Decision Matter for Mortgage Rates? It's Complicated

CNET News - Tue, 03/18/2025 - 09:59
The Fed's plan to hold interest rates steady on Wednesday won't provide relief for the housing market.
Categories: Technology

Best Internet Providers in Albany, Georgia

CNET News - Tue, 03/18/2025 - 09:30
Find high speed internet in the Good Life City, from fiber to cable internet.
Categories: Technology

HyperX Pulsefire Haste 2 Pro 4K Review: A Lighter and Faster Mouse

WIRED Top Stories - Tue, 03/18/2025 - 09:00
This slate gray mouse feels buttery smooth but is outshined by its cheaper non-pro sibling.
Categories: Technology

Is Your Face Puffy or Do You Have 'Cortisol Face'? Here's What an Expert Has to Say

CNET News - Tue, 03/18/2025 - 08:47
If you're dealing with a puffy or swollen face, you might think you have cortisol face. Here are the facts.
Categories: Technology

Should You Take Ashwagandha Supplements for Stress and Anxiety?

CNET News - Tue, 03/18/2025 - 08:16
Feeling stressed? We asked experts about who should take ashwagandha to potentially help with anxiety, sleep, stress and more.
Categories: Technology

Meet the Game Developer Turning Fanfic Into Deadpool DLC

WIRED Top Stories - Tue, 03/18/2025 - 08:15
When Emma Kidwell got tapped to work on a new piece of content for Marvel's Midnight Suns, she went back to her fanfic roots. She won't be the only one following the rules of fan-written stories to develop fresh ideas.
Categories: Technology

11 Best Early Amazon Spring Sale Deals (2025)

WIRED Top Stories - Tue, 03/18/2025 - 08:02
Now’s your chance to save on headphones, tablets, and home gadgets.
Categories: Technology

CNET Survey: Americans Are Rushing to Buy Tech Before Tariff Price Hikes

CNET News - Tue, 03/18/2025 - 08:00
One in three shoppers feel pressure to make purchases now, with smartphones and laptops at the top of their lists.
Categories: Technology

Balmuda MoonKettle Review: a Luxury Electric Kettle

WIRED Top Stories - Tue, 03/18/2025 - 07:31
Balmuda’s new MoonKettle splits the crosshairs between traditional style and modern whistles and bells.
Categories: Technology

The AMD Ryzen AI Max+ 395 dominates as the "most powerful" APU on the market, but its competition is questionable

TechRadar News - Tue, 03/18/2025 - 07:24
  • AMD has published official benchmarks for the Ryzen AI Max+ 395 APU
  • It demonstrates a clear lead over the Intel Core Ultra 7 258V
  • The tests were conducted in LM Studio with various LLMs

Official benchmarks have backed up the "Strix Halo" AMD Ryzen AI Max+ 395's performance as the "most powerful x86 APU" on the market for AI computing.

The AMD Ryzen AI Max+ 395 is a 16-core (32 threads) processor with a 50+ peak AI TOPS XDNA 2 NPU, and Radeon 8060S integrated graphics (40 RDNA 3.5 Compute Units) for some serious processing power for the form factor. It's being primarily marketed by AMD for its handling of AI workloads, such as in applications such as LM Studio.

This is evident in AMD's published benchmarks for the Ryzen AI Max+ 395, which are measured in 'tokens per second' and 'time to first token' in LM Studio against its competition. Specifically, we see how the new "Strix Halo" processor inside of the Asus ROG Flow Z13 with 64GB RAM compares to a similar spec Asus Zenbook S14 with 32GB RAM.

The latter machine has half the unified memory and is using the Intel Core Ultra 7 258V APU with its baked-in Arc integrated graphics clocked at 140V, so it's not necessarily a 1:1 comparison. However, AMD has showcased the prowess of its latest chipset in LM Studio 0.3.11 with "various LLMs" with a 16GB model size, demonstrating at least twice the effective tokens per second with DeepSeek R1, Phi 4 Mini Instruct, and Llama 3.2 compared to its rival.

The lead becomes more dramatic when comparing time to first token in text models, with up to 12.2x faster as evidenced by the benchmarks in DeepSeek R1 Distill Qwen 14b, with a similar lead of 11.3x in Phi 4 14b. It's not a consistent lead across all text models, however, as the Ryzen AI Max+ 395 is anywhere from 4x to 9x faster in Llama 3.2 and other DeepSeek R1 distilled models.

AMD's Ryzen AI Max+ 395 is also claimed to be up to seven times faster in SOTA vision models in the time to first token, this can be seen in IBM Granite Vision 3.2 2B while the chip is six times faster in Google Gemma 3 12b; it's roughly halved when comparing against Gema 3 4b, though.

Powerful performance that should not be too shocking

AMD's leading "Strix Point" APU is head and shoulders above the Intel Core Ultra 7 processor in a way that should not be surprising to those interested in AI computing. That's because Team Blue's hardware was made with lower threshold AI computing in mind, and this can be seen in the architectural differences when analyzing the two.

The Intel Core Ultra 7 258V features eight cores and eight threads with a maximum boost clock of up to 4.8 GHz and a maximum TDP of 37W. In contrast, the AMD Ryzen AI Max+ 395 has 16 cores, 32 threads, a boost clock of up to 5.1 GHz, and a default TDP of 55W. However, this TDP is configurable up to 120W, so it's a night and day hardware difference in the chipsets. Of course, AMD's hardware was going to come out on top; it's far more powerful across the board.

Then we have to consider the two tested machines used for the benchmarks, the differences between the Asus ROG Flow Z13 (a leading gaming laptop) and the Asus Zenbook S14 (a midrange ultrabook). We reviewed the latter device late last year giving it a four-star write-up, citing the "solid performance" from the Lunar Lake processor. The chip debuted inside this machine (and similar) back in September 2024, while the AMD Ryzen™ AI Max+ 395 hit the scene this month.

It's not just AI laptops that are using the flagship Ryzen AI chipset for its performance capabilities as a myriad of mini PCs are using them for productivity and even gaming use. It's become a race to launch the most powerful AI mini PCs possible as mid-March to mid-May are targeted from companies, such as GMKTec and Aoostar, which are leading the charge.

You may also like...
Categories: Technology

Pages

Subscribe to The Vortex aggregator - Technology