SoftBank, the Japanese owner of Arm, is close to acquiring Ampere Computing, a company that develops data center chips based on Arm's architecture.
In January 2025, BNN Bloomberg reported SoftBank was exploring a purchase of Ampere, which is backed by Oracle and private equity firm Carlyle Group, in a move widely seen as part of Softbank’s bid to challenge AMD and Intel’s dominance in the AI and data center chip market. However, as we previously reported, there were some hurdles to be overcome - Ampere was gearing up for an IPO, suggesting a desire to remain independent, while SoftBank would require approval from both Oracle and Carlyle Group before a deal could move forward.
However, a new Bloomberg report suggests that the deal is nearing completion and could be announced in the coming weeks. Sources familiar with the matter estimate its value to be around $6.5 billion, including debt. In 2021, SoftBank valued Ampere at over $8 billion during a proposed minority investment.
Strategic questionsAmpere develops high-performance processors for data centers, including the 192-core "Polaris" AmpereOne and upcoming 256-core "Magnetrix", using Arm’s chip designs. Acquiring Ampere could help SoftBank, which previously bought UK-based AI chip designer Graphcore, expand its footprint in the competitive data center and AI markets.
That said, the move does raise some interesting strategic questions. Arm, long dominant in mobile chips, has been working to expand into server and AI processing.
Ampere is one of the few firms independently developing Arm-based server chips. If the deal moves forward, it could impact Arm’s role as a neutral supplier of intellectual property. Integrating Ampere into SoftBank’s ecosystem may also shift competitive dynamics in the industry.
Market conditions add a further level of complexity to the benefits buying Ampere will bring to SoftBank. The semiconductor sector faces rising competition and concerns over slowing AI-related investments.
As Bloomberg notes, “Chinese startup DeepSeek, which unveiled an inexpensively produced AI model last month, has raised the specter that technology providers won’t be generating as much revenue as predicted.”
You might also likeScandalous shockers should become a new Netflix sub-genre with the likes of Inventing Anna, The Tinder Swindler and now Apple Cider Vinegar. The "true-ish" new series exposes the bitter side of the wellness industry as Kaitlyn Dever (Unbelievable, Dopesick) portrays Belle Gibson, an Australian influencer and fake health guru who claims she cured her stage 4 brain tumor through healthy living and natural therapies.
Based on the book The Woman Who Fooled the World by Beau Donelly and Nick Toscano, Apple Cider Vinegar is important viewing in an era dominated by influencers and misinformation. This dramatization follows Belle, who built a lucrative wellness empire by pretending to have terminal brain cancer and other serious health issues.
Gibson's story attracted hundreds of thousands of followers on social media, prompting her to create a food and beverage app called The Whole Pantry as well as a cookbook. Eventually, the con woman's life came crashing down after Australian journalists uncovered her lies and scandals.
Female fraudster series are my new favorite sub-genreThere's just something about scandalous dramas like Baby Reindeer that I can't get enough of. So, when I saw the similarities Apple Cider Vinegar had to one of the best Hulu shows, The Dropout, I had to unbottle this shocking "true-ish" story built on a lie.
While Apple Cider Vinegar and The Dropout follow the lives of female fraudsters in the health and wellness industry, they're told in strikingly different ways. The Dropout focuses on Elizabeth Holmes (Amanda Seyfried), who founded the healthcare start-up Theranos and put millions of patients at risk with her claims to the point she eventually lost everything.
The Dropout is very much a slow-burn series that's told in a largely linear narrative, but the drama of the jaw-dropping story becomes too irresistible that you can't stop watching. With Apple Cider Vinegar, it's a fast, punchy and witty commentary on the desperation that leads someone to fabricate their whole life for attention and how social media can encourage this behavior.
Although Gibson is the main star of the show, Apple Cider Vinegar also explores three narratives as it jumps back and forth from 2010. One is her growing rivalry with another health influencer Milla Blake (Alicia Debnam-Carey) and a third follows cancer patient Lucy (Tilda Cobham-Hervey), who becomes absorbed in Belle's lies.
Where can you stream Apple Cider Vinegar? (Image credit: Netflix)What makes Apple Cider Vinegar well worth streaming is Dever's show-stopping performance as Gibson, whose masterful acting is something I couldn't take my eyes off while watching the series.
It's Dever's performance alongside the fact that the show has an 82% score from the critics (at the time of writing) on review aggregate site Rotten Tomatoes that cements it as one of the best Netflix shows.
All six episodes of Apple Cider Vinegar are available to stream on Netflix (aka the best streaming service) now in the US, UK and Australia.
You might also likeCybercriminals have been observed abusing a legitimate Salesforce service to attack people and businesses with Facebook-related phishing emails.
Researchers at Check Point warned about the ongoing campaign on its blog, describing how the criminals were using the automated mailing service that belongs to Salesforce as a marketing tool.
“In other words, they don’t breach any terms of service or the Salesforce security systems,” the researchers explained. “Rather, they use the service normally and choose not to change the sender ID. That way, the email is branded with the email address noreply [at] salesforce [dot] com.
FakebookThe body of the phishing email is nothing extraordinary. It is the usual “your Facebook account is under review” threat, in which victims are warned about their account being suspended, unless they “verify” their details. The email shares a link to a fake Facebook support page, where sensitive information, such as passwords, get stolen.
The landing page comes with a poor attempt at a Facebook logo (it says ‘Faceloook’, where crooks apparently wanted to make letters ‘lo’ look like the letter ‘b’).
Check Point says more than 12,200 of these emails were sent so far, with “hundreds” targeting different businesses. The majority of the targets are in the EU (45.5%) and the US (45%), with the remaining 9.5% targeting Australia.
“Nonetheless, versions of the notifications have also been found in Chinese and Arabic, showing that the campaign targeted companies across geographic locales,” Check Point stressed.
Phishing continues to be one of the most popular attack vectors in 2025. It is cheap, scalable, and omnipresent, making it a great tool for cybercriminals. And with generative AI coming into the mix, phishing has turned into the ideal way to trick victims into sharing login credentials, or installing malware.
You might also likeWelcome to the Cisco Live! 2025 live blog.
Here, we will be bringing you all the latest news and releases from Cisco Live! 2025 in Amsterdam.
We're looking forward to everything kicking off tomorrow at 9am with some exciting keynotes from Cisco's leadership.
So stay tuned, and we'll see you bright and early tomorrow morning for all the news from Cisco Live! 2025 as they happen.
Marvel isn't actively looking for another actor to replace the late Chadwick Boseman as T'Challa in its cinematic universe.
That's according to Nate Moore, who told TechRadar that the comic book titan hadn't discussed the prospect of recasting the character for Black Panther 3. Moore, who's among the film's many producers, said fans should ignore recent rumors that Marvel was finally ready to cast another actor as T'Challa and, in the process, hand the Black Panther mantle to another star for the third time.
Boseman passed away in August 2020 after privately battling bowel cancer. In the years since the beloved actor's death, Marvel has batted away questions that it would recast T'Challa in the Marvel Cinematic Universe (MCU). Indeed, speculation was rife about who would replace Boseman as T'Challa in the months prior to principal photography beginning on Black Panther: Wakanda Forever, the 2022 sequel to 2018's multi-billion dollar-making and 2019 Best Picture Oscar nominee Black Panther. As it turned out, Marvel decided not to recast T'Challa and, as part of Wakanda Forever's plot, passed the African nation's protector-in-chief role onto Letitia Wright's Shuri, aka T'Challa's brother.
Shuri adopted the Black Panther superhero mantle in Wakanda Forever (Image credit: Marvel Studios)With Marvel now confirming Black Panther 3 is in early development – studio head Kevin Feige admitted it was in the wake of Denzel Washington accidentally stating he'd have a role in it – the recasting rumor mill has restarted. In January, MCU leaker Jeff Sneider claimed Marvel had offered the role to an unnamed actor, but they turned it down due to their concerns with filling Boseman's iconic shoes. MyTimeToShineHello, another insider with a questionable track record for leaking information about Marvel projects, has also suggested that Marvel wants to find an actor to play T'Challa's son (also named T'Challa), who viewers met in Wakanda Forever's mid-credits scene.
Chadwick Boseman appeared as T'Challa/Black Panther three times before his unexpected death (Image credit: Marvel Studios)Moore, though, is clearly baffled by the hearsay surrounding any casting news about the studio's next Black Panther film. When I asked if he could comment on the rumors, Moore smiled and said: "There's no truth to those rumors.
"To be honest, Ryan [Coogler, director of the Black Panther franchise], is knee-deep on [his next movie] Sinners, so he hasn't really started cracking the story with us. So, it's funny to read all those reports online of the villains, casting rumors, and this and that. It's news to all of us.
"What I will say is that it speaks to how much the fans love that property," he continued. "We should be so lucky for fans to be interested in it and want to know what's happening. I can honestly say we haven't done anything, so any reports are false, but I do look forward to getting back into it with Ryan once he's ready."
It's funny to read all those reports online of the villains, casting rumors, and this and that. It's news to all of us
Nate Moore, Black Panther 3 producerIt'll be a long time before we see Black Panther 3, but it's possible that T'Challa's aged-up son could feature in one of the next two Avengers movies if Marvel wants to include him. Filming is reportedly expected to start on the first of those films – Avengers: Doomsday – in March, so maybe we'll learn more then.
Regardless of whether T'Challa's son appears in either or both films, there will be a new Black Panther production to enjoy later this year, with Marvel's Eyes of Wakanda animated spin-off show set to debut on Disney Plus. Per a Marvel trailer that unveiled its TV series line-up for 2025 last October, the Marvel Phase 5 program will be released on the streaming platform on August 6.
You might also likeGood news for anyone hankering for a cheaper OLED TV: a new scientific breakthrough could pave the way for cheaper, more efficient OLED displays in our smart TVs, phones, tablets, and pretty much everywhere else – though the impact could be largest on TVs.
Researchers at the University of Cambridge and University of Manchester have reportedly discovered a new ‘oxadiazine’ host material for creating high-efficiency, lower-cost, blue OLED pixels (via OLED-info).
Blue OLED pixels are the white (blue?) whale of TV panel development, proving much more difficult to produce with the same light-emitting efficiency as their red and green counterparts, with more risk of instability and a short shelf-life. As the abstract from the scientific paper says: “Energy-efficient and deep-blue organic light-emitting diode (OLED) with long operating stability remains a key challenge to enable a disruptive change in OLED display and lighting technology.”
However, it looks like headway is being made. The paper shows the molecular design of the new material, with 21% improvements in power efficiency and excellent “thermal stability” for use in blue OLED pixels.
And while all OLED devices use blue pixels, the reason that's especially good for TVs is that even the latest and greatest TV tech requires multiple layers of blue pixels, so that's where the biggest effects may be felt.
The Panasonic Z95B features LG Display's new four-stack OLED panel. (Image credit: Future) The future of OLEDThere’s been a big push in recent years towards developing 'phosphor OLED' panels with greater power efficiency and higher brightness
This means that a TV screen can deploy fewer layers of blue pixels for the same brightness output as existing screens.
LG's latest 'four-stack' Primary RGB Tandem OLED panel (used in the LG G5 and Panasonic Z95B), for example, uses more blue layers than red or green. QD-OLED, as used in the Samsung S95F, relies heavily on blue light coming through a layer of quantum dots, so also requires several layers of blue pixels. So any method for reducing the complexity or cost of blue pixels is going to be very welcome.
While phosphor OLED has proved difficult to manufacture so far, these kinds of breakthroughs show that headway is being made in blue options overall.
A laboratory breakthrough like this will take time to impact mass panel production, of course, but it does bode well for the development of OLED in the coming years, and the hope for cheaper, more accessible OLED TVs that offer excellent picture quality for longer.
While OLED TV prices have fallen in recent years, they’ve largely stalled around the $1,000 mark, and manufacturers and consumers alike have been waiting for something to break the deadlock. Hopefully, that future isn’t too far off.
You might also likeIf you're looking for a Super Bowl LIX game recap, you've tapped the wrong link. I want to talk about this year's Super Bowl ads, or more specifically a pair of tech-related ads, especially the one that had me reaching for the Kleenex and put the ongoing AI wars into a fresh perspective.
I'm old enough to remember a time when the Super Bowl ads were just about Pepsi, McDonald's, Wendy's, Doritos, beer, and the newest cars. Super Bowl LIX was another reminder that these days nothing drives ad dollars and, perhaps, consumer interest like technology.
Woven in between oddball AI slots like recreating football icon Jimmy Johnson for a simultaneously warm and creepy tribute were a whole lot of tech ads. T-Mobile ran an ad introducing its new Satellite cell service, and Square Space confusingly employed indie actor Barry Keoghan to pitch personal website building.
For me, though, nothing generated as much interest, engagement and emotion, along with some head-scratching, as a pair of AI-focused commercials, one from Google for the Pixel 9 phone running Gemini Live and the other from OpenAI, plugging ChatGPT.
Black and whiteOpenAI's minute-long ChatGPT spot, which TechRadar's John-Anthony Disotto has also written about. provoked the head-scratching. The lack of a voice-over, or color (beyond black and white), and use of pointillism-style dots to create imagery, made it almost impossible at first to divine whose commercial I was watching.
Granted, the music is sort of catchy and the imagery of things like flames, horses racing, corn blooming, ships sailing the high seas, trains racing toward you, and light bulbs is sort of compelling in a, "What the hell am I watching?" sort of way. But the key to a good Super Bowl ad is to grab people within the first 10 seconds, and OpenAI failed in that regard. I appreciated that the imagery was growing more refined and clearer – the dots kept getting smaller to represent ever-more complex imagery – but I still didn't get it.
More than halfway through, there was some historical audio from a newscast, the Apollo 11 mission to the moon, and even the iconic modem handshake sound (ask your parents). Finally, with just 20 seconds left, we hear someone ask an AI chatbot to summarize... er... something. The request audio started overlapping so I couldn't tell who was asking what.
One has to wonder if anyone at OpenAI even understands people.
The on-screen text says, 'All progress has a starting point.' Okay, sure. Whatever that means. Then you hear the more recognizable ChatGPT voice, and we see the first color of the entire ad, ChatGPT's blue voice chatbot icon, and we hear 'What do you want to create next?'
The spot ends with 'ChatGPT' in a large font, and then the OpenAI interwoven icon.
This is a commercial created by someone who thinks, "If they're smart enough, they'll get it. We're creating something new here. Let's be mysterious, charismatic, obtuse even. Everyone will love it and remember it."
I wonder if the only 'person' they showed this ad to was a version of ChatGPT, one of the models that can tell you about any photo or video you show it. Perhaps ChatGPT watched it and said "I see a series of dots and many moving images. This all represents ChatGPT (me)." Whoever created the ad likely fixated on the words "moving images" and assumed they'd struck a chord. And they did – one of confusion.
One has to wonder if anyone at OpenAI even understands people. Have they spent so much time in the bowels of ChatGPT's various powerful models that they've forgotten what it's like to be human, or even to talk to a human?
Moving imagesThe best Super Bowl LIX ads told a story: a horse rescuing a beer keg (trust me, it's better than it sounds); David Beckham discovering he has a secret twin (clever, funny) Matthew McConaughey showing how football might have been created just so we could eat more food. I'd argue that story-telling is a good rule of thumb for almost any TV commercial.
Google's Pixel ad, entitled 'Dream Job', was sneaky. It grabbed my attention from the start with a refrigerator featuring family shots and a guy clearly trying to find a job.
Google didn't try to hide the product or its intentions; the middle-aged guy is clearly holding a Pixel 9 phone and he's workshopping an interview pitch. From this point forward, though, Google cleverly blends product utility and emotion.
Google cleverly blends product utility and emotion.
The guy's pitch is dry and unemotional, but Google Gemini Live asks him a key question: "Tell me about the job that taught you the most." What follows is a walk back through the man's life as a stay-at-home dad, raising a little girl into a young woman. Each job experience he relates is actually about raising his daughter. When for example, we see an old video of him spoon-feeding his unhappy toddler daughter, he tells Gemini, "It was a role where I learned to take a lot of constructive criticism."
The whole two-minute spot is heartwarming.
Gemini eventually asks, "When it comes to work, what motivated you?" as the images flash back through his child's life right up to her high school graduation and his dropping her off for college. He answers, "I guess, knowing that people can depend on me."
Oh, but Google and Gemini are not done. Naturally, the daughter turns back and runs to the car to give her dad one more hug.
This is a commercial about AI, right? So why am I crying?! Through my tears, I see that the ad has circled back to showing Gemini complimenting the dad on his answer and telling him he's ready.
The ad ends with the words 'Google Pixel 9 with Gemini Live' and the dad beginning the real job interview.
Does Google get us?Google managed to pull us along through a whole emotional journey while showing exactly how you might use its powerful AI chatbot. By focusing on our shared humanity, the ad made Gemini Live feel like something a human would use.
If you're a parent, the ad's theme probably hits you like a gut punch. Even if you're not, you'd be made of stone if it didn't move you
OpenAI had a big opportunity with its Super Bowl LIX commercial: it would reach at least 100 million people, and the ad's message would probably define how consumers thought about ChatGPT for at least the next few months, if not longer. The problem is, the ad OpenAI delivered gave us nothing to think about it. It was about as inhuman and dispassionate as HAL 9000.
Google, on the other hand, has been playing this game for longer (it ran its first Super Bowl ad 15 years ago) and understood the task at hand: connect with real people about something that is intrinsically artificial. Make them want to try it. Make them remember by imprinting an emotional note they won't soon forget.
Based on these ads, Google gets us, OpenAI does not. And that's why Google Gemini may ultimately win this AI race.
You might also likeMicrosoft could soon give people whose keyboard has a Copilot key the ability to redefine it so a press of the key opens a context menu instead.
This is according to a well-known source of Windows-related rumors and happenings, PhantomOfEarth on X (formerly Twitter).
Future builds will add the option to remap the Copilot key to open a context menu.February 9, 2025
Remember, this is just a claim that Microsoft might do this in future test builds of Windows 11 – presumably based on clues found by the leaker digging around in current preview builds – and it still may not happen.
If none of the above makes much sense, and you’re scratching your head as to what’s potentially going on with the keyboard here, let us rewind a bit and explain.
What’s actually happening (or could be) is Microsoft is allowing the choice to revert the Copilot key back to what it was previously (on many laptop keyboards, anyway).
This old key that the Copilot button replaced was known as the ‘Menu’ key and it typically carries an icon with three horizontal lines (perhaps with a pointer, too), indicating that it’s used to summon the aforementioned context menu.
That context menu is the same one you invoke by right-clicking with your mouse, to give you options which are common actions in any given context (with files for example, you can click to see properties, or rename, and so forth).
Analysis: More choice is good, but… (Image credit: Future)Why would you want this old ‘Menu’ key that brings up the right-click context menu back, anyway? Well, it can be useful in situations where you don’t have a mouse (which is why this key is more often found on laptops) and so can’t necessarily right-click to bring up said menu. Microsoft used to have this key on its Surface devices, for example, between the ‘Alt’ key on the right and the arrow keys – but now it’s the Copilot key.
Not if you change it back by remapping, though – and if you find the context menu shortcut more useful than the Copilot key, well, apparently you might have your wish granted later this year. Albeit with the above caveats about this not even being in testing just yet.
Microsoft introduced the ability to remap the Copilot key to launch an app in preview (late last year). This move has since arrived in Windows 11, and you can switch the key to invoke a search, too, but remapping to an app comes with a notable (and annoying) catch that said software must be an MSIX-packaged application (not many apps are). This has been implemented that way for security reasons, in case you were wondering.
At any rate, a context menu option would at least be something, but I’m hoping that Microsoft will give us a lot more freedom eventually to redefine the Copilot key to do, well, anything we want (and act as a shortcut for any app at all, not just a limited selection). At least these all appear to be steps in the right direction for better customization, if only small strides.
Microsoft certainly appears to be giving up the notion that the Copilot key represented the most important introduction to the keyboard on Windows PCs since the Windows key itself.
Via XDA Developers
You may also like...Hospital Sisters Health System (HSHS), a nonprofit, Catholic healthcare system, suffered a cyberattack one and a half years ago, which resulted in the theft of sensitive patient data.
The firm has now filed a report with the Maine Office of the Attorney General, in which it detailed the attack, noting it discovered an “unauthorized third party” gaining temporary access to its network, on August 27, 2023.
“Upon learning of the situation, we immediately took steps to contain and remediate the incident and launched an internal investigation,” HSHS said in the filing.
Stealing sensitive dataThe investigation determined that the unnamed attackers dwelled on HSHS’ network between August 16 and August 27, and during that time exfiltrated sensitive information belonging to exactly 882,782 people.
“We have since been reviewing those files and notifying individuals whose information was found in the files on a rolling basis as our review has continued,” the organization said.
While the type of information stolen varied from person to person, in general it included full names, postal addresses, birth dates, medical record numbers, limited treatment information, health insurance information, Social Security numbers (SSN), and driver’s license numbers.
This is more than enough to engage in highly personalized phishing, identity theft, or even wire fraud. However, HSHS says that at this time it has “no reason to believe” the data has been misused.
Healthcare information is highly sought on the black market because it contains sensitive personal, financial, and medical data that can be exploited for various types of fraud and cybercrimes. Unlike credit card data, which can be quickly canceled, stolen medical records provide long-term value as they include Social Security numbers, insurance details, and medical histories that can be used for identity theft, fraudulent billing, prescription fraud, and even blackmail. Additionally, the resale price of medical records is significantly higher than financial data due to their completeness and difficulty in detection.
That being said, even though there is no evidence of misuse, “out of an abundance of caution”, HSHS offered affected individuals a year’s worth of credit and identity theft monitoring through Equifax.
Via BleepingComputer
You might also likeNintendo has done what it does best when it comes to the newly-announced Nintendo Switch 2; take an excellent piece of hardware and tweak it until it peaks, throwing in a few feature gambits along the way.
Of course, the strategy relies on the hardware being great enough to warrant a new entry (see the Virtual Boy) to begin with, and they don't always stick the landing (see the Wii U and the Nintendo 64DD).
It always surprises me, however, to see how risk-averse gamers are when it comes to Nintendo's hardware. Yes, there have been some blunders, but broadly speaking Nintendo has always been among the most creative hardware manufacturers when it comes to creating consoles that inspire new games and new ways to play.
We've had our first glimpse at the Nintendo Switch 2, and while many of the new features are shrouded in mystery, and will remain so until the Nintendo Direct: Nintendo Switch 2 event on April 2, I think people have already grossly misunderstood what will make the Nintendo Switch sequel an excellent follow-up to one of my all-time favorite consoles: its rumored new mouse mode.
From a new matte coating to an additional USB-C port, a lot of long-rumored features were confirmed by Nintendo's Switch 2 announcement trailer. Among the most exciting, however, were the mysterious new system button, larger size, magnetic Joy-Con, and an improved kickstand that could finally make tabletop play more viable for the console.
The standout for me, however, was what appeared to be confirmation that the new Joy-Con will offer mouse-like control, opening new possibilities for PC game ports as well as new ways to play upcoming titles on the Switch 2.
Among the first games I purchased for the original Switch was an all-time favorite of mine; Sid Meier's Civilization VI. My excitement was short-lived; a game with this many fiddly interfaces on such a small screen just didn't gel with me, and I found myself crawling back to my gaming PC for the more enjoyable mouse input.
Of course, questions still remain; how comfortable and ergonomic can a Joy-Con be to use in this orientation? How smoothly will it work on different surfaces? Will the new and (hopefully) improved Joy-Con be robust enough for regular mouse mode use, or will we see degradation like the first-generation Nintendo Switch Joy-Con drift?
We won't know the answers to these questions until we've had hands-on time with the console, but one thing that was never a question in my mind was whether or not users would be a fan of the new feature.
Turns out, not everyone is as excited as I am for the new mouse mode, and I can't really fathom why.
We surveyed our WhatsApp followers to find out which new rumored features they were most excited about, and I was pretty surprised by the results.
The vast majority, understandably, said they were reserving their excitement until pricing has been confirmed. The most we know so far on that comes from Nintendo president Shuntaro Furukawa, who shared in a recent Q&A that the Switch 2 would be in line with the "affordable prices customers expect". TechRadar Gaming predicts that the cost of the Switch 2 will be around $399.99 / £349.99 / AU$699.95, or lower, which is excellent news, if true.
The next-most popular answers were a tie, as of writing; unsurprisingly, the larger screen (and Joy-Con) ranks highly among prospective Switch 2 owners, but I was floored to see the mysterious new right Joy-Con system button take the lead over mouse mode.
(Image credit: Future / Meta WhatsApp) Pushing imaginary buttonsFor one thing, we have no confirmation whatsoever as to what this button does. Nintendo gave us some solid visual cues for many of the new additions, including mouse mode, but we saw nary a click of the new button.
Rumors have been whirling for months since Joy-Con prototype images leaked online about what this button may be for, especially given earlier iterations featured a 'C' label which birthed all kinds of rumors. Does the 'C' stand for capture, or chat, perhaps? Or was it simply a label for prototype units?
Its placement suggests that it's more likely a system button than one used in gameplay, and given there's still a capture button for screenshots and short gameplay snippets, I'd hedge my bets that it's likely either for in-game text chat or quick control for voice chat.
And sure, that's fun; I used the Nintendo Switch Online-exclusive voice chat feature a lot during the pandemic when I was in the throes of my Animal Crossing: New Horizons grind, and shared frustrations with many Nintendo fans that online gaming features have been significantly lacking in the current-generation console.
Still, I fail to see how this could possibly inspire excitement more than Joy-Con mouse control.
(Image credit: Nintendo) Keeping it casualIn the weeks since the announcement, I've seen countless comments from readers and viewers seething with unfounded rage that the hardware won't be on par with other handheld gaming devices, comparing the Switch 2 to the likes of the Lenovo Legion Go, the Steam Deck, and the Asus ROG Ally X; which is about as fruitful of a comparison as apples to oranges.
Even when it comes to mouse control, it's a false equivalency; the Steam Deck trackpads offer a different form factor and experience, as does the Legion Go's FPS mode. The simple fact of the matter is we won't know until we've tried it, but I for one am incredibly excited to see how Nintendo might use the feature to allow for more whacky, whimsical, and wonderful games on the Switch 2.
Consider the success of the Wii and its motion controls. Were they new to the market? No; at the time, motion control was all the rage in gaming. What Nintendo did was make it more accessible, opening the market out to families and casual gamers with a piece of moderately priced hardware.
That is where Nintendo thrives. Performance and power are never the focus, and it boggles my mind when I so frequently see gamers misunderstand and misrepresent the very clear – and successful – price point strategy Nintendo opts for.
However, they do need to make games cheaper; I'll give the haters that one.
You might also like...Moore’s law, named after Gordon E. Moore, the co-founder of Intel, states that the number of components on a single chip doubles every two years at minimal cost. It’s not exactly hard science, but his simple observation of how rapidly chip technology was progressing back in 1965, has proved to be pretty useful for predicting where technology will be in the years to come.
In his latest blog post, Sam Altman, CEO of OpenAI, makers of ChatGPT, just stated that ‘ Moore’s law changed the world at 2x every 18 months; this is unbelievably stronger. ‘ Altman was referring to the massive price drop we've seen for AI usage. For developers, this is measured in token cost, and the token cost to use AI has been falling about 10x every 12 months. Between early 2023 to mid-2024, the price per token for using ChatGPT has dropped about 150x.
AGI is comingTechnically, Altman got it wrong by writing “18 months” instead of “about two years”. The 18 months figure is a common misquote since there was a separate prediction by Moore’s colleague, Intel Executive David House that Moore’s Law would mean that chip performance would double every 18 months, with no increase in power consumption. So, a forgivable slip.
However, Altman’s point is that the falling cost of using AI is another indicator that artificial general intelligence (AGI) is “coming into view”. AGI is an artificial intelligence that is on a par with, or smarter than, human intelligence, and developing it is the whole reason that companies like OpenAI exist because the benefits of AGI could be truly world-changing, despite the dangers that we keep getting warned about.
It’s worth reading the whole of Sam Altman's blog post because it very much reads like a warning that the future is coming sooner than we think and that we really start to need to prepare for how the world is going to change. Altman’s predictions are certainly mind-blowing. His three key predictions for the immediate future are:
Altman doesn’t predict these changes happening in 2025, but since he’s already gone on record saying that humanity will achieve AGI this year, the changes would appear to be right around the corner.
His message is also that we have some tough choices coming up regarding AGI and how freely it should be used, because one possible future, “we can see is AI being used by authoritarian governments to control their population through mass surveillance and loss of autonomy.”
In Altman’s vision, ensuring that the benefits of AGI are broadly distributed is critical to prevent this from happening.
He ends with a quite astonishing prediction: “Anyone in 2035 should be able to marshall the intellectual capacity equivalent to everyone in 2025; everyone should have access to unlimited genius to direct however they can imagine.”
It’s hard to know how to process the breadth of Altman’s vision right now. Companies like OpenAI are committed to developing AGI, but the dangers inherent in who controls this technology are something that Altman is urging us to start considering and talking about right now.
You may also likeArtificial intelligence (AI) has great potential to revolutionize supply chain operations by enhancing demand forecasting, optimizing inventory management and streamlining logistics, to create more resilient and agile operations. However, to gain a competitive advantage, many companies are implementing AI before ensuring their supply chain systems are secure.
Without the proper data safeguards in place, AI-enabled systems can lead to significant vulnerabilities, including data breaches, biased decision-making and increased cost. These vulnerabilities can disrupt critical operations, damage reputations, and erode customer trust, causing long-term harm to the business. According to Gartner (hyperlink first link in link section), “Attacks on the software supply chain, including both proprietary and commercial code, pose significant security, regulatory and operational risks to organizations. A source estimates costs from these attacks will rise from $46 billion in 2023 to $138 billion by 2031.”
Organizations that are not already doing so should consider using cybersecurity as criteria for third-party transactions. This is especially important as items like order details, payment information and other confidential details move throughout a global supply chain – reaching third party suppliers and logistics partners.
To protect data integrity and maintain customer trust, organizations should approach AI with a security-first mindset. These three tactics can help.
1. Conduct a risk assessment to understand data securityA risk assessment will identify the systems and intellectual property that are most valuable to your company. Additionally, the risk assessment will identify what data is critical to your organization and where it’s located. Once defined, cybersecurity risks can be prioritized based on the likelihood of occurrence and the impact on your business. Then, your list of prioritized risks can be used to establish effective response protocols.
By understanding how cyber-attacks can impact your business, you will be able to recommend time-sensitive actions to be used in a multi-layer defense protocol. Think of it like breaking into Fort Knox: if a malicious actor breaks through the first line of security and no other safeguards are in place, they have free reign to cause unmitigated damage. However, with a multi-layer defense response in place, you can reduce the harm.
While considering data, it is important to understand how data flows, and where it is located. For example, items listed on Amazon’s marketplace could be sold and shipped by third parties. When this happens, important customer data is routed to the seller/supplier, who may have less secure data security, which could increase the threat of a breach or other attacks.
2. Implement security testing to develop immediate response protocolsCyber-attacks are constant and unpredictable. As a result, constant monitoring and testing is necessary. When vulnerabilities are detected, automation can trigger predefined responses – such as isolating infected systems, notifying personnel and initiating remediation processes to ensure that future attacks are prevented.
Scanning tools can monitor transactions, communications, and activities in the supply chain to identify suspicious behavior faster. By scanning software, hardware and network infrastructure, companies can identify weaknesses, like unpatched systems that could be exploited. These efforts help build a more resilient and adaptive defense against malicious actors. Through proactively identifying and patching weaknesses before they are breached, many intrusions can be reduced or eliminated.
In addition to scanning, you can use penetration testing to locate vulnerabilities and red teaming to simulate offensive attacks, to see how your systems would respond to potential cyber-attacks. Together, these tests will uncover hidden weaknesses and assess the effectiveness of your current security.
3. Promote a security-first cultureTo protect your company, your employees, and your customers, it is critical for companies to make security a cultural pillar. Companies should provide training to ensure that employees are aware of its importance and are actively engaged in maintaining high security standards.
In a supply chain where sensitive information travels between numerous parties, every employee and vendor should be considered as being a part of the security process. Efforts to foster a security-first environment include training on security threats, simulated phishing attempts with incentives for employees who demonstrate best practices, or the development of a security policy that includes IT, legal and procurement team members at every stage of the supply chain.
By promoting a security-first culture, you increase overall awareness and vigilance, making every individual a part of the security solution. A top-down commitment ensures that the right resources are allocated to cybersecurity, reducing the likelihood of lapses that can compromise the supply chain.
Putting it all togetherWith assessments that highlight areas of vulnerability, automated testing and monitoring, and championing a security-first culture, companies can cover nearly every phase of their operations and stay ahead of constantly evolving threats long into the future.
AI paves the way for new opportunities and technological advancements, revolutionizing industries and enhancing everyday life. By prioritizing robust security measures, your company can protect sensitive data and maintain customer trust, ensuring that both your business and customers reap the full benefits of AI safely and responsibly.
We've featured the best encryption software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Hackers are hijacking government software to access sensitive servers, experts have warned.
The warning comes from software vendor Trimble, whose product seems to have been used in the attack. In a letter sent to its customers and partners, Trimble said it observed cybercriminals abusing a deserialization vulnerability in its Cityworks product to engage in Remote Code Execution (RCE) and deploy Cobalt Strike beacons on Microsoft Internet Information Services (IIS) servers.
Trimble Cityworks is a Geographic Information System (GIS) asset management and permitting software designed to help local governments and utilities manage infrastructure, maintenance, and operations efficiently. It was found to have been vulnerable to CVE-2025-0994, a high-severity deserialization bug allowing for RCE, given a severity score of 8.6 (high).
Patching the flaw“Following our investigations of reports of unauthorized attempts to gain access to specific customers’ Cityworks deployments, we have three updates to provide you,” the company said in the letter. To tackle the threat, Trimble updated Cityworks 15.x to version 15.8.9, and 23.x to 23.10. It also warned about discovering some on-prem deployments having overprivileged IIS identity permissions, and added that some deployments haid incorrect attachment directory configurations.
All of these should be addressed at the same time, to mitigate the threat and resume normal operations with Cityworks.
We don’t know how big the attack is, or if any organizations were compromised as a result, but the US Cybersecurity and Infrastructure Security Agency (CISA) has released a coordinated advisory, urging customers to apply the patches as soon as possible, BleepingComputer has found. “CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures,” it was said in the advisory.
“Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.”
Via BleepingComputer
You might also likeCaptain America: Brave New World's creative team has responded to rumors surrounding the Marvel movie's protracted development.
The Marvel Phase 5 film is set to fly into theaters this Friday (February 14), aka Valentine's Day. However, there's no *ahem* love lost between those working on the superhero flick and industry insiders, with the latter claiming that Captain America 4's development cycle has been difficult. From reports of poor audience reactions during initial test screenings, to the rumors that it underwent significant reshoots across three different time periods, you'd be forgiven for thinking Brave New World's production was anything but troubled.
Speaking to TechRadar at the film's UK junket, though, director Julius Onah and producer Nate Moore played it off as nothing more than idle gossip. Indeed, the pair insisted that one of 2025's most exciting new movies only underwent one period of extensive reshoots in a bid to make it the best film possible.
No, Marvel didn't sneakily reshoot large portions of Brave New World on multiple occasions (Image credit: Marvel Studios)"They're not as significant [the reshoots] as the reports say they are," Moore told me. "It's actually less than what we've done on other Marvel projects.
"Our goal is to make the best movie – always," he continued. "And our task is to keep turning over the stones until it's as good as we think we can make it. The blessing of working at a place like Marvel is we have the resources to do that, so why not take that opportunity?"
Our task is to keep turning over the stones until it's as good as we think we can make it
Nate Moore, Captain America 4 producerWhen I put the same question to Onah in a separate interview, the director of Captain America's latest big-screen adventure, which stars Anthony Mackie's Sam Wilson as Steve Rogers' successor, said: "Every movie of this scale has additional photography baked into the creative process. There are things you're going to refine and the story is going to evolve.
"Like every single MCU [Marvel Cinematic Universe] movie, we had one period of reshoots, so whatever the reports might have been out there, that's not the reality of how this movie was made. When you're making something of this scale with action, visual effects, and different plot threads and characters, you have to take your time. You have to make sure you're creating the best experience for the audience. But, yes, we had one singular additional photography process and then utilized that to make this film the best it could be."
I’ve consistently heard CAPTAIN AMERICA: BRAVE NEW WORLD is OK-to-pretty good. Those expecting a disaster are gonna be disappointed.February 9, 2025
That answers speculation about Cap 4 requiring more than one spell of reshoots to get it right, but what about the conjecture that Brave New World's original cut was given the thumbs down by fans who were lucky enough to see it early? For that, we go back to Moore.
"The test screenings have been over-reported as well," he replied. "We're aware of what people are talking about a lot of the time, but there's no use in us raising our hands when those reports come to say 'well, that's not correct'. We really want the film to do the talking and, now that it finally can, I think people are going to be surprised and impressed. I can't wait for everyone to see it."
I'll be covering Brave New World in much more detail leading up and after the superhero movie's launch. Ahead of more exclusive coverage heading your way, find out more about the film in my Captain America: Brave New World guide and read my Captain America 4 cast and character piece to see who's joining Mackie on the screen for this one.
You might also likeData has exploded over the last decade. People generate more than 402.74 million terabytes of new unique data every day in 2024. Amounting to 147 zettabytes of data this year. This figure is even more remarkable if you consider that an estimated 90% of the world's data was generated in the last two years alone.
The growth of data is overwhelming enterprises, leading to challenges in processing, transferring, and storing vast amounts of information efficiently. This often results in increased costs, data management complexities, and the need for advanced infrastructure and analytics solutions to handle the influx.
In today's digital landscape, data processing can occur either at centralized locations like data centers and on-premise servers or at the edge, where data is generated and used, such as in the field or in factories. The choice between these two approaches is becoming increasingly critical due to the sheer volume of data being produced.
Processing data centrally can lead to significant transmission delays, impacting decision-making times. This latency makes edge computing, which processes data closer to its source, an attractive solution. By reducing the distance data needs to travel, edge computing can enhance real-time processing and responsiveness. However, despite its advantages, edge alone isn’t enough — security should be at the forefront of these technological advancements.
The benefits of edge computingEdge computing effectively shortens the distance data has to travel, removing the need to send data to a central processing location, thereby alleviating a tremendous strain on network resources. It also represents a significant reduction in transactional and transmission delays, enabling devices and users to use data more efficiently and securely and make faster decisions.
The emergence of the hybrid work model has delivered benefits, but it has also come with inefficiencies, sometimes requiring employees to travel back and forth more frequently. Edge devices can, in some cases, reduce the need for a worker to make a repair call or check the status of a piece of equipment on a factory floor. By processing IoT data closer to devices, edge computing can help enhance bandwidth and deliver near-real-time data.
Thus, one of the UK ports that acts as a vital hub for global trade, has significantly enhanced its operational efficiency and safety by deploying a Private 5G network. By using already developed solutions from Verizon Business, the port’s network now supports advanced technologies such as IoT sensors, autonomous vehicles, AI-powered logistics, and augmented remote assistance, enabling real-time asset tracking and environmental monitoring. These innovations have helped position the port as a leader in port innovation, delivering substantial operational improvements and efficiencies across its ports and harbors.
Synergy with 5GEdge computing shows tremendous potential to introduce compelling new use cases, but as applications become increasingly immersive and graphics-intensive, they also become increasingly data-intensive. In other words, for enterprises to take full advantage of these applications and to make use of emerging technologies, like artificial intelligence and machine learning, they’ll need a robust network infrastructure.
With more advanced solutions comes a need for more processing power. With more endpoints and devices at the edge, built-in network security is increasingly important. Among other things, 5G can enhance security for edge computing which can allow edge computing to be fully realised. 5G can deliver increased bandwidth that can scale on demand; the reliability needed to support the continuous availability of mission-critical applications; end-to-end data encryption and can power advanced cybersecurity tools; the ability to increase network capacity to support more devices; and a network agile enough to support rapid changes and demands.
However, with the promise of more connected devices, especially IoT devices, comes an increased risk. Securing these devices in a 5G-enabled world is not just a technical challenge – it’s a fundamental requirement for building trust and ensuring that this innovation is sustainable. Securing IoT devices requires a multilayer approach: strong authentication methods, data encryption both at rest and in transit, and constant updates to keep devices secure against new threats. But it’s not enough to secure the devices in isolation. IoT security must be integrated into the broader network, with tight access controls and continuous monitoring to detect and respond to threats. This is the promise of 5G: not just faster speeds or more devices, but a safer, more secure foundation for the next wave of innovation.
Enterprises need to adaptWith innovative technologies knocking on enterprises’ doors daily, the latter face constant mounting pressure and challenges to deploy the technologies to keep up with the pace of global development. However, organizations must ensure their current ecosystems, internal policies and tech stack are ready for the deployment of edge computing technologies. Simply, outdated connection hardware could cause havoc in the warehouse of the manufacturing department or old cybersecurity protocols could expose retailers’ vulnerabilities making it a sweet spot for hackers.
To avoid such a nightmare on a mundane Friday afternoon, businesses should follow a step-by-step guide to preparing their operations for the deployment of 5G edge computing technologies:
However, the decentralized nature of edge computing introduces unique vulnerabilities such as increased exposure to cyber-attacks, unauthorized access, and tampering due to the diverse environments in which edge devices operate. Unlike centralized systems, edge devices operate across diverse environments, increasing exposure to security risks. As data is processed closer to the source, devices may become targets of cyber attacks, unauthorized access, or tampering. Implementing a layered security strategy is critical to address these challenges. This includes robust authentication measures, endpoint security solutions, and encryption protocols to protect data both in transit and at rest.
Storing and processing data at the edge also raises important privacy concerns, especially when housing sensitive information such as health and financial data. Organizations must design their infrastructures with privacy always being front of mind, adhering to regulations such as GDPR and deploying encryption and anonymization strategies. Regular audits and strong governance ensure data stays protected, proving edge computing can balance both innovation and compliance.
In a world where security is only as strong as its weakest link, zero-trust architecture and network segmentation aren't just options but real imperatives. Every device, every user, and every request must be verified. By isolating sensitive assets and controlling access, businesses can limit the damage of potential future data breaches. This interconnected approach ensures that security measures are comprehensive and cohesive, addressing the multifaceted challenges posed by edge computing.
The explosion of data over the last decade has overwhelmed enterprises, leading to challenges in processing, transferring, and storing vast amounts of information efficiently. Centralized data processing can cause significant transmission delays, impacting decision-making times. Edge computing, which processes data closer to its source, offers a solution by enhancing real-time processing and responsiveness. However, to fully leverage these technologies, enterprises must ensure their tech infrastructure and policies are compatible and that the necessary security measures are in place.
We've featured the best business VPN.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
The scramble for Nvidia’s new graphics cards has been an unpleasant affair (once again), especially with the RTX 5090, as stock of the flagship GPU has been even more scarce than the RTX 5080 – but Zotac has a plan to help genuine buyers (as opposed to scalpers) in the US.
VideoCardz reports that Zotac’s Discord channel in the US is running a “priority access campaign exclusively for our loyal community” to offer active members an opportunity to purchase an RTX 5090 or 5080 graphics card.
It’s a raffle system, with a chance to buy as the prize, and there are some conditions attached, as you might expect. Notably a clause that any Discord member must have been actively engaged in discussions, challenges, and the like, to be eligible. Anyone joining to spam a few three-word-messages in the hopes of getting a purchase won’t (or shouldn’t) be considered.
Any kind of “manipulation” or “cheating” won’t be tolerated either, Zotac says. Furthermore, the board maker will keep an eye on reselling activity, with serial numbers of GPUs that are bought being recorded, and a threat of publicly exposing any scalper who does resell their graphics card.
(Image credit: Zotac) Analysis: Zotac shows the wayQuite how Zotac might police the entire playing field for resellers isn’t clear, and probably not feasible, but still – I’ve got to admire the stance taken here against scalpers and bots.
These nefarious characters make any low-stock hardware launch much more of a nightmare than it should be, so efforts such as the scheme Zotac has concocted here must be applauded.
Wondering how Zotac plan has played out so far? According to the Reddit thread that VideoCardz picked up on this development through, Zotac’s Discord channel has witnessed a flood of folks signing up since the announcement.
So, it’s certainly going to drive more traffic for the channel, clearly, but if all a new member does is spam rubbish, they should be weeded out and be ineligible for the Blackwell purchase raffles.
Those who were active members before the announcement have apparently got a private channel with separate raffles to the main ones, with much greater chances of winning (like 25%, compared to less than 1% for the main raffles, we’re told, though take that with some seasoning).
It all sounds well enough organized, in short.
Why don’t all graphics card makers go down this route? Well, as VideoCardz points out, Zotac is one of the smaller outfits of the larger manufacturers (if you get what I mean), and it’s probably much more of a headache for some of the biggest operations in the GPU sphere to run a scheme such as this.
Still, shoring up defenses against scalping more broadly when it comes to popular launches like the RTX 5000 GPUs is well worth giving some more thought to, for both retailers and Nvidia’s board-making partners alike. Sadly, what we’ve seen elsewhere is official asking prices from graphics card makers themselves creeping up, or even jumping up, as a reaction to thin supply in the face of huge demand – so, what’d be a start is not doing this, please.
We’re trying to help as best we can, through our guides on where to buy an RTX 5080 today and also our RTX 5090 graphics card finder too. Best of luck out there, GPU hunters, but of course if you’re already on the Zotac Discord, you need to get yourself in the lottery there.
You might also like...New Wall Street Journal reporting has revealed an alarming trend within the tech sector – much like sceptics anticipated years ago, artificial intelligence looks to be displacing human workers and leading to higher unemployment rates.
The report found IT sector unemployment rates rose from 3.9% in December to 5.7% in January, or from 98,000 to 152,000 Janco Associates analysis of the US Department of Labor data.
More broadly, 143,000 new jobs were added in January 2025 to the US economy, albeit at a slower rate than optimal.
AI is costing IT jobsIn fact, white-collar and knowledge workers are seen as the most at-risk when it comes to AI-induced job displacement. Jaco Associates CEO Victor Janulaitis commented: “Jobs are being eliminated within the IT function which are routine and mundane, such as reporting, clerical administration.”
Companies are also reducing their reliance on programmers and system designers in the hope that artificial intelligence can deliver further cost savings. The number of software development job posts dropped 8.5% year-over-year in January 2025.
Although last year's pattern was considerably lower than 2023, when layoffs.fyi tracked 264,000 tech sector redundancies, as estimated 152,000 tech workers still lost their jobs in 2024 – nearly as many as the 165,000 workers who lost their jobs in 2022.
Recent notable job losses include Sonos (12% of its headcount), Meta (5%), Microsoft, Amazon and Google.
The report also suggests that further corporate investment in artificial intelligence could serve as an early sign that future job cuts could come – a trend described as “cost avoidance.”
However, while certain jobs may be at risk, others remain in high demand. The report reveals that certain in-person and skilled roles are in greater demand than many white-collar positions – the 'in-person' element of that trend is particularly interesting, given the widespread return-to-office mandates that have been enacted post-pandemic.
It's not all bad news though – Janulaitis revealed that January’s figures, which paint a negative picture for the year ahead, could indeed be artificially inflated by many companies who are looking to implement this year’s cost-cutting measures now, rather than later.
Regardless, with a further 10,800 job cuts actioned in the first five weeks of 2025 across the industry, many workers are faced with an uncertain future.
You might also likeA wide range of Virtual Private Network (VPN) and other networking devices are currently under attack by threat actors trying to break in to wider networks, experts have warned.
Threat monitoring platform The Shadowserver Foundation warned about the ongoing attack on X, noting someone is currently using roughly 2.8 million different IP addresses to try and guess the passwords for VPNs and similar devices built by Palo Alto Networks, Ivanti, SonicWall, and others.
Besides VPNs, the threat actors are going for gateways, security appliances, and other edge devices connected to the public internet.
Brute forceTo conduct the attack, the threat actors are using MikroTik, Huawei, Cisco, Boa, and ZTE routers and other internet-connected devices, likely compromised with malware, or broken into themselves, thanks to weak passwords.
Speaking to BleepingComputer, The Shadowserver Foundation said that the attack recently increased in intensity.
From those 2.8 million, the majority (1.1 million) are located in Brazil, with the rest split between Turkey, Russia, Argentina, Morocco, and Mexico.
This is a typical brute-force attack, in which threat actors try to log into a device by submitting an enormous amount of username/password combinations, until one succeeds. Brute-force attacks are usually successful against devices protected with poor passwords (those that don’t have a strong combination of uppercase and lowercase letters, numbers, and special symbols). The whole process is automated, making it possible on a grander scale.
The automation part is made possible through malware. Usually, the devices used in the attack are part of a botnet, or a residential proxy service. Residential proxies are IP addresses assigned to real devices by internet service providers (ISPs). They make it appear as though the user is browsing from a legitimate residential location rather than a data center, which makes them a major target for cybercriminals.
You might also likeAfter a year of speculation, months of rumors, and weeks of post-announcement waiting, the Samsung Galaxy S25 series is finally here – the first Galaxy S25, Galaxy S25 Plus, and Galaxy S25 Ultra units have hit store shelves and customer’s doorsteps. The wait is finally over.
If you’re like me, though, and always on the lookout for a great tech deal, then you may have been waiting for a piece of news about a different Galaxy smartphone – for the past few weeks, I’ve been holding out hope that we might see an official price reduction for the Samsung Galaxy S24 Ultra in the wake of the Galaxy S25 Ultra going on sale.
It’s standard practice for phone makers to reduce the price of their older models as new flagships take center stage, in recognition that these erstwhile pack-leaders are no longer at the cutting edge of technology or the company’s smartphone lineup.
However, at the time of writing, the Samsung Galaxy S24 Ultra remains on sale from Samsung directly at full price in the US and UK.
The Samsung Galaxy S25 Ultra (Image credit: Future / Roland Moore-Colyer)Personally, I’m a little confused by this decision. Is Samsung suggesting the Galaxy S25 Ultra and Galaxy S24 Ultra are of equal value? That wouldn’t make much sense if it wants people to see the Galaxy S25 Ultra as the shiny, new, bucket-of-AI device that it is.
Perhaps Samsung is banking on more selective customers, who prefer the sharper design and exclusive colors of the Galaxy S24 Ultra, being willing to shell out to get these features. But that doesn’t quite add up either, as Samsung is now drastically undercut on the Galaxy S24 Ultra by third-party retailers.
I hate to say it, but the continued listing of the Galaxy S24 Ultra at full price could also just be a last minute cash grab as stocks dwindle. Though Samsung doesn’t leave any signs of this on the Galaxy S24 Ultra’s various international landing pages, the absence of certain storage configurations suggests a “while stocks last” situation is afoot.
From this perspective, I have to raise some concerns about Samsung’s approach. Is leaving the Galaxy S24 Ultra up at full price really the fairest thing to do for those who may not be up-to-date on the latest tech releases? On the phone’s UK landing page, there’s no mention of its successor being available. I’m not sure that’s the most considerate way to do things.
Is it just the S Pen? The Samsung Galaxy S25 Ultra (Image credit: Peter Hoffmann)As we previously covered, the Galaxy S24 Ultra does have a stylus-shaped ace up its sleeve over the Galaxy S25 Ultra – a Bluetooth-enabled S Pen.
The Galaxy S24 Ultra’s stylus is able to function as a remote control for One UI, the camera app, and other gesture-based commands – but the Galaxy S25 Ultra cut this connectivity, leaving many Samsung fans dismayed.
A petition to bring back Bluetooth connectivity to the S Pen was signed thousands of times in its first few days online.
I’m not seriously suggesting that Samsung is charging a premium for the Bluetooth S Pen by keeping the Galaxy S24 Ultra at full price, but this sole example of the older phone having a hardware advantage does highlight the feature disparity between the two evenly-priced devices.
The Galaxy S25 Ultra comes equipped with the blazing-fast Snapdragon 8 Elite for Galaxy chipset, gets a new 50MP ultra-wide camera, and has the new Personal Data Engine hardware core for AI and security.
In comparison, the Galaxy S24 Ultra has the Snapdragon 8 Gen 3 for Galaxy chipset, a 12MP ultra-wide camera, and no such core. The phones are otherwise very similar hardware wise.
In any case, if the “while stocks last” theory holds, we may not have to worry about this conundrum for much longer – though if you are looking to buy a top-end handset directly from Samsung, be sure to take a look at our Samsung Galaxy S25 Ultra review and our Samsung Galaxy S24 Ultra review to make sure you’re really getting the one you want.
You might also likeHewlett Packard Enterprise (HPE) has started sending out breach notification letters to people who were affected by the 2023 data breach, with TechCrunch reporting the company has notified at least a dozen individuals so far, citing a review of breach notices filed with two US state attorney generals.
HPE reported Russian state-sponsored threat actors known as Midnight Blizzard breached its IT systems in 2023 and stole sensitive data from its employees’ email inboxes. In an 8-K submission filed with the US Securities and Exchange Commission (SEC) at the time, the company said the attack started in mid-May 2023, and that it spotted it on December 12.
The investigation uncovered that Midnight Blizzard (also known as Cozy Bear, or Nobelium) had access to “a small percentage” of HPE’s cloud-based email inboxes. Newer reports claim the crooks took Social Security numbers, driver’s license information, and credit card numbers, as well.
No material impactHPE said the attackers used “a compromised account to access internal HPE email boxes in our Office 365 email environment.” Later, the company clarified the mailboxes belonged to HPE employees in cybersecurity, go-to-market, and business departments.
The exact number of compromised individuals is not known. The company told TechCrunch the data was “limited to information contained in the users’ mailboxes,” suggesting a relatively small number.
That being said, HPE doesn’t believe the attack will have a material impact on the company, or that it will disrupt its operations.
“Upon undertaking such actions, we determined that such activity did not materially impact the Company,” HPE said in the filing. “As of the date of this filing, the incident has not had a material impact on the Company’s operations, and the Company has not determined the incident is reasonably likely to materially impact the Company’s financial condition or results of operations.”
You might also like