Error message

  • Warning: date_timezone_set() expects parameter 1 to be DateTime, bool given in format_date() (line 2062 of /home/cay45lq1/public_html/includes/common.inc).
  • Warning: date_format() expects parameter 1 to be DateTimeInterface, bool given in format_date() (line 2072 of /home/cay45lq1/public_html/includes/common.inc).
  • Warning: date_timezone_set() expects parameter 1 to be DateTime, bool given in format_date() (line 2062 of /home/cay45lq1/public_html/includes/common.inc).
  • Warning: date_format() expects parameter 1 to be DateTimeInterface, bool given in format_date() (line 2072 of /home/cay45lq1/public_html/includes/common.inc).
  • Warning: date_timezone_set() expects parameter 1 to be DateTime, bool given in format_date() (line 2062 of /home/cay45lq1/public_html/includes/common.inc).
  • Warning: date_format() expects parameter 1 to be DateTimeInterface, bool given in format_date() (line 2072 of /home/cay45lq1/public_html/includes/common.inc).
  • Warning: date_timezone_set() expects parameter 1 to be DateTime, bool given in format_date() (line 2062 of /home/cay45lq1/public_html/includes/common.inc).
  • Warning: date_format() expects parameter 1 to be DateTimeInterface, bool given in format_date() (line 2072 of /home/cay45lq1/public_html/includes/common.inc).
  • Warning: date_timezone_set() expects parameter 1 to be DateTime, bool given in format_date() (line 2062 of /home/cay45lq1/public_html/includes/common.inc).
  • Warning: date_format() expects parameter 1 to be DateTimeInterface, bool given in format_date() (line 2072 of /home/cay45lq1/public_html/includes/common.inc).
  • Warning: date_timezone_set() expects parameter 1 to be DateTime, bool given in format_date() (line 2062 of /home/cay45lq1/public_html/includes/common.inc).
  • Warning: date_format() expects parameter 1 to be DateTimeInterface, bool given in format_date() (line 2072 of /home/cay45lq1/public_html/includes/common.inc).
  • Warning: date_timezone_set() expects parameter 1 to be DateTime, bool given in format_date() (line 2062 of /home/cay45lq1/public_html/includes/common.inc).
  • Warning: date_format() expects parameter 1 to be DateTimeInterface, bool given in format_date() (line 2072 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

Technology

New forum topics

Uber Eats Is Giving You a Taste of AI With These New App Features

CNET News - Thu, 07/31/2025 - 12:36
The biggest change for customers is a familiar one for competitors like DoorDash.
Categories: Technology

Asus releases security updates for its routers after major vulnerabilities surface - here's how to stay safe

TechRadar News - Thu, 07/31/2025 - 12:33
  • Asus updates MyAsus app to fix two new security issues affecting PCs
  • Company confirms past issues in routers and software are now fully resolved
  • Users urged to update software, use strong passwords, and disable unused services

Asus has released new security patches for its MyAsus software, following fresh reports from security researchers highlighting flaws across multiple services.

The update applies to all compatible desktops, laptops, NUCs, and All-in-One PCs, addressing two vulnerabilities tracked as CVE-2025-4569 and CVE-2025-4570.

The new versions are 4.0.36.0 for x64 systems and 4.2.35.0 for Arm-based computers - and users can update through the MyAsus app or via the Microsoft Store.

Patch now

The CVE-2025-4569 flaw received a CVSS v4.0 score of 7.7, marking it as high severity. CVE-2025-4570 was rated at 6.9, a medium-level risk.

Both are resolved in the update. Asus also confirmed that is has addressed related issues in Armoury Crate, DriverHub, and specific router models, although details were limited. The company says all reported vulnerabilities have now been resolved.

This patch follows a string of vulnerability disclosures this year.

Back in April 2025, the company patched a critical vulnerability in routers using AiCloud, a service that lets users access and share files over the internet.

Tracked as CVE-2025-2492, it had a severity score of 9.2 and could allow remote attackers to execute functions without permission.

Asus urged users to disable AiCloud on unsupported models and update the firmware immediately.

Then in June 2025, Asus also patched CVE-2024-3080, a critical authentication bypass flaw affecting seven popular router models, including ZenWiFi XT8 and RT-AX88U.

That update also covered a buffer overflow issue and a system command execution bug, both tied to admin privileges.

In a related incident, a high-severity flaw tracked as CVE-2023-39780 was exploited by attackers to build a botnet using compromised routers.

That vulnerability allowed persistent access via non-volatile memory.

Asus responded by urging users to reset affected devices and use stronger credentials.

It's important to keep your router secure - regardless of the make - by checking firmware regularly, updating software, and limiting remote access features whenever possible.

You might also like
Categories: Technology

Google AI Model Helps Us See the Planet as We Never Have Before

CNET News - Thu, 07/31/2025 - 12:14
AlphaEarth Foundations could help tackle food insecurity, deforestation, urban expansion and water sharing issues.
Categories: Technology

DJI Has a New 360 Camera That You Can't Have (Yet?)

CNET News - Thu, 07/31/2025 - 12:07
The Osmo 360 does 8K video, 120 megapixel photos but for right now it isn't available in the US.
Categories: Technology

Weapons director assures fans it's just as good as his first horror movie hit: 'If you liked Barbarian, this is more – and in a good way'

TechRadar News - Thu, 07/31/2025 - 12:00
  • Weapons director Zach Cregger admits he's feeling the pressure after the success of his previous movie, Barbarian
  • But he told TechRadar that he "feels secure" in the movie he's made
  • Weapons is in theaters from August 8

Zach Cregger terrified us all in 2022 with his horror hit Barbarian and he is set to do it again with the new movie Weapons.

It's not easy following up from a breakout movie. With Barbarian scoring an impressive 92% on Rotten Tomatoes from the critics, horror fans are hoping for the same standard when it comes to Weapons.

In Cregger's latest movie, we follow the mysterious disappearances of multiple children who ran away from their homes at exactly 2:17am. Weapons viral marketing campaign had everyone talking, and now the pressure is on for it to be as good as Barbarian.

Speaking to TechRadar, Cregger told me about how he was feeling ahead of Weapons' release. He said: "I'm nervous just because I love the movie so much, and I want people to go see it, but I feel very confident because I feel secure in the movie that I made. "

"I love Weapons. I think it's a bigger riff on Barbarian. This is more and in a good way. I feel like I can sleep soundly at night no matter what happens, knowing like I did my job, but, you know, you hope people show up. "

Weapons is also Cregger's first time scoring a movie alongside two of his friends, so fans will get to hear some of his music on this project.

He told me: "I did it with two of my best friends who I was in a band with in high school, and we just kind of have the same musical mind and so the three of us, Hays and Ryan Holladay and myself, we kind of scored it.

"We scored the movie before I shot it, and then when I was editing it, you know, we just laid the score in."

One of the things I loved about Barbarian was the one word, impactful title, something that he did again with Weapons. I asked about the title and he said : "I think it's such a mysterious thing and with the mystery, it's just incredible. It just feels right."

You might also like
Categories: Technology

Pages

Subscribe to The Vortex aggregator - Technology