Error message

  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

TechRadar News

New forum topics

Subscribe to TechRadar News feed
Updated: 1 hour 54 min ago

This new 3D printing technology could make housing construction faster and more efficient

Sun, 12/15/2024 - 21:45
  • Streamlined 3D printing process reduces downtime for multiple buildings
  • Eco-friendly construction using 99% locally sourced materials
  • Modular design allows customization for diverse project needs

As global demand for housing and infrastructure grows, traditional construction methods often struggle to keep pace. However, the rise of 3D printing technology is set to transform the sector by enabling faster, more cost-effective, and eco-friendly building processes.

COBOD International, which has over 80 3D construction printing operations worldwide, says it has taken a significant leap forward with the launch of its BOD3 3D Construction Printer.

The company says BOD3 is its most advanced 3D construction printer to date, being designed to print with real concrete, and also introducing features which promise to enhance efficiency, reduce costs, and streamline the construction of low-rise buildings across various settings.

A new benchmark in 3D construction printing

The BOD3 has already been deployed globally, with operational units in countries such as Indonesia, Angola, and Bahrain, with these early implementations reducing downtime between projects and speeding up construction times, meaning the printer can handle high-volume construction projects.

BOD3 comes with an advanced, extendable ground-based track system which allows the printer to operate continuously along the Y-axis, meaning it can print multiple buildings one after another without the need for reinstallation, reducing setup time and making the printer highly efficient for large-scale construction sites where multiple structures need to be erected.

This new model comes with a modular design, allowing it to be customized to the specific needs of different construction projects. The BOD3 comes equipped with an operational stand that allows operators to control and monitor the 3D printer and its supplementary equipment through a single, integrated system. It also has a Universal X-Carriage for the integration of additional tools such as those for insulation, painting, and sanding.

This printer also comes with an Advanced House Management System (AHMS) which minimizes the need for manual labour by ensuring a smooth material flow via secured hoses, enhancing the overall efficiency of the construction process.

According to the company, BOD3 can print with 99% locally sourced materials, reducing the need for transporting expensive and environmentally costly resources. In partnership with Cemex, COBOD has also developed the D.fab solution, which allows traditional concrete to be adapted for 3D printing. This reduces the amount of binder required, making the construction process faster and eco-friendly.

"The global housing crisis demands a more efficient construction solution that is faster, more efficient, and scalable. The BOD3 is our answer to this challenge. Drawing on years of research and expertise, we’ve designed the BOD3 with innovative features, making it our most cost-effective and efficient model yet for multiple low-rise buildings," said Henrik Lund-Nielsen, Founder and General Manager of COBOD.

"Its design supports high-volume, linear production of houses, enabling mass production without compromising quality. The fact that six units have already been sold before its official launch speaks volumes about the BOD3’s market demand and the trust our customers place in our technology.”

You might also like
Categories: Technology

Quordle today – my hints and answers for Monday, December 16 (game #1057)

Sun, 12/15/2024 - 18:02

Quordle was one of the original Wordle alternatives and is still going strong now more than 1,000 games later. It offers a genuine challenge, though, so read on if you need some Quordle hints today – or scroll down further for the answers.

Enjoy playing word games? You can also check out my NYT Connections today and NYT Strands today pages for hints and answers for those puzzles, while Marc's Wordle today column covers the original viral word game.

SPOILER WARNING: Information about Quordle today is below, so don't read on if you don't want to know the answers.

Quordle today (game #1057) - hint #1 - Vowels How many different vowels are in Quordle today?

The number of different vowels in Quordle today is 4*.

* Note that by vowel we mean the five standard vowels (A, E, I, O, U), not Y (which is sometimes counted as a vowel too).

Quordle today (game #1057) - hint #2 - repeated letters Do any of today's Quordle answers contain repeated letters?

The number of Quordle answers containing a repeated letter today is 0.

Quordle today (game #1057) - hint #3 - uncommon letters Do the letters Q, Z, X or J appear in Quordle today?

• No. None of Q, Z, X or J appear among today's Quordle answers.

Quordle today (game #1057) - hint #4 - starting letters (1) Do any of today's Quordle puzzles start with the same letter?

The number of today's Quordle answers starting with the same letter is 2.

If you just want to know the answers at this stage, simply scroll down. If you're not ready yet then here's one more clue to make things a lot easier:

Quordle today (game #1057) - hint #5 - starting letters (2) What letters do today's Quordle answers start with?

• H

• C

• C

• S

Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.

Quordle today (game #1057) - the answers

(Image credit: Merriam-Webster)

The answers to today's Quordle, game #1057, are…

  • HYDRO
  • CREAM
  • CHIDE
  • SLIME

Renewable energy, CBD, analytics, online gambling, true crime podcasts, AI… the 21st century has seen many boom industries. Among them, the most unexpected and niche of them all (not even AI could have predicted it), is SLIME.

In the last century, Slime was a forfeit poured over the top of people’s heads in TV game shows or used for pranks. Today it’s evolved into a multi-billion dollar sector, with businesses and entrepreneurs stretching (and oozing) the boundaries of stuff you can put your fingers in.

These are complicated times and Slime is pure chemical fun, I mean it’s better than putting your hands in a tub of CREAM but I’d never CHIDE anyone for their hobbies.

How did you do today? Send me an email and let me know.

Daily Sequence today (game #1057) - the answers

(Image credit: Merriam-Webster)

The answers to today's Quordle Daily Sequence, game #1057, are…

  • EGRET
  • TOUCH
  • EQUIP
  • AGATE
Quordle answers: The past 20
  • Quordle #1056, Sunday 15 December: DROVE, STILT, LINEN, GIANT
  • Quordle #1055, Saturday 14 December: SPIEL, ONSET, TIGER, DITTO
  • Quordle #1054, Friday 13 December: ERECT, REBAR, MOIST, IDIOM
  • Quordle #1053, Thursday 12 December: MILKY, CRIER, STORK, DRIER
  • Quordle #1052, Wednesday 11 December: BRIAR, NASAL, SHARD, FLUFF
  • Quordle #1051, Tuesday 10 December: BEGAN, TRIAL, IDEAL, GUIDE
  • Quordle #1050, Monday 9 December: TITAN, FORTE, SPEED, BRIAR
  • Quordle #1049, Sunday 8 December: BUNCH, SHINY, MOULT, INTRO
  • Quordle #1048, Saturday 7 December: SHAKY, CROOK, GHOUL, VERSE
  • Quordle #1047, Friday 6 December: BRAWL, UNTIL, DOWRY, STING
  • Quordle #1046, Thursday 5 December: AGING, BICEP, CLOVE, SPILL
  • Quordle #1045, Wednesday 4 December: JUDGE, GIVER, GNASH, CLOAK
  • Quordle #1044, Tuesday 3 December: FUDGE, THICK, CRANK, STASH
  • Quordle #1043, Monday 2 December: TROPE, HOVER, SAUNA, SHAPE
  • Quordle #1042, Sunday 1 December: NAIVE, CIRCA, STEAD, MICRO
  • Quordle #1041, Saturday 30 November: MAMMA, SNUCK, CRYPT, TAROT
  • Quordle #1040, Friday 29 November: JOIST, DROOL, DUSKY, GLIDE
  • Quordle #1039, Thursday 28 November: GRADE, WORRY, NOISE, DAISY
  • Quordle #1038, Wednesday 27 November: HEART, ROGUE, INEPT, UTILE
  • Quordle #1037, Tuesday 26 November: PRIED, FAINT, HURRY, WOOER
Categories: Technology

NYT Connections today — my hints and answers for Monday, December 16 (game #554)

Sun, 12/15/2024 - 18:02

Good morning! Let's play Connections, the NYT's clever word game that challenges you to group answers in various categories. It can be tough, so read on if you need clues.

What should you do once you've finished? Why, play some more word games of course. I've also got daily Strands hints and answers and Quordle hints and answers articles if you need help for those too, while Marc's Wordle today page covers the original viral word game.

SPOILER WARNING: Information about NYT Connections today is below, so don't read on if you don't want to know the answers.

NYT Connections today (game #554) - today's words

(Image credit: New York Times)

Today's NYT Connections words are…

  • LIGHT BULB
  • SNOWBALL
  • HAM
  • CHICKEN
  • PILLOW
  • YODEL
  • BAR
  • FOOD
  • KNOCK-KNOCK
  • WALKIE-TALKIE
  • DING DONG
  • WATER BALLOON
  • SATELLITE
  • DEVIL DOG
  • AM
  • HOHO
NYT Connections today (game #554) - hint #1 - group hints

What are some clues for today's NYT Connections groups?

  • YELLOW: Listening 
  • GREEN: Fun scraps
  • BLUE: Sweet treats
  • PURPLE: Typical gags

Need more clues?

We're firmly in spoiler territory now, but read on if you want to know what the four theme answers are for today's NYT Connections puzzles…

NYT Connections today (game #554) - hint #2 - group answers

What are the answers for today's NYT Connections groups?

  • YELLOW: TYPES OF RADIO
  • GREEN: KINDS OF PLAY FIGHTS
  • BLUE: SNACK CAKES
  • PURPLE: CLASSIC JOKE STAPLES

Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.

NYT Connections today (game #554) - the answers

(Image credit: New York Times)

The answers to today's Connections, game #554, are…

  • YELLOW: TYPES OF RADIO AM, HAM, SATELLITE, WALKIE-TALKIE
  • GREEN: KINDS OF PLAY FIGHTS FOOD, PILLOW, SNOWBALL, WATER BALLOON
  • BLUE: SNACK CAKES DEVIL DOG, DING DONG, HOHO, YODEL
  • PURPLE: CLASSIC JOKE STAPLES BAR, CHICKEN, KNOCK-KNOCK, LIGHT BULB
  • My rating: Moderate
  • My score: 3 mistakes

A Connections word walks into a bar.

The barman says: “Sorry we don’t serve your type here.”

I struggled with blue today. I knew DEVIL DOGS were a type of cake, but I couldn’t think of the other two until a vague memory of a Simpsons episode came to mind – one where Homer has to choose between a winning lottery ticket or a YODEL and choses a Yodel. Mmm… Yodels.

This LIGHT BULB moment got me over the line on my final guess.

Yesterday's NYT Connections answers (Sunday, 15 December, game #553)
  • YELLOW: SPICES CLOVE, MACE, NUTMEG, PEPPER
  • GREEN: PERFORM POORLY FLAIL, FLOP, FLOUNDER, TANK
  • BLUE: SKIM THROUGH, AS PAGES FLIP, LEAF, RIFFLE, THUMB
  • PURPLE: POP SINGERS MINUS "S" KEY, MAR, SPEAR, STYLE
What is NYT Connections?

NYT Connections is one of several increasingly popular word games made by the New York Times. It challenges you to find groups of four items that share something in common, and each group has a different difficulty level: green is easy, yellow a little harder, blue often quite tough and purple usually very difficult.

On the plus side, you don't technically need to solve the final one, as you'll be able to answer that one by a process of elimination. What's more, you can make up to four mistakes, which gives you a little bit of breathing room.

It's a little more involved than something like Wordle, however, and there are plenty of opportunities for the game to trip you up with tricks. For instance, watch out for homophones and other word games that could disguise the answers.

It's playable for free via the NYT Games site on desktop or mobile.

Categories: Technology

NYT Strands today — my hints, answers and spangram for Monday, December 16 (game #288)

Sun, 12/15/2024 - 18:02

Strands is the NYT's latest word game after the likes of Wordle, Spelling Bee and Connections – and it's great fun. It can be difficult, though, so read on for my Strands hints.

Want more word-based fun? Then check out my NYT Connections today and Quordle today pages for hints and answers for those games, and Marc's Wordle today page for the original viral word game.

SPOILER WARNING: Information about NYT Strands today is below, so don't read on if you don't want to know the answers.

NYT Strands today (game #288) - hint #1 - today's theme What is the theme of today's NYT Strands?

Today's NYT Strands theme is… Crossed words

NYT Strands today (game #288) - hint #2 - clue words

Play any of these words to unlock the in-game hints system.

  • SURE
  • MATES
  • TANK
  • RATHER
  • HURT
  • NEAT
NYT Strands today (game #288) - hint #3 - spangram What is a hint for today's spangram?

Word smash

NYT Strands today (game #288) - hint #4 - spangram position What are two sides of the board that today's spangram touches?

First side: top, 4th column

Last side: bottom, 4th column

Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.

NYT Strands today (game #288) - the answers

(Image credit: New York Times)

The answers to today's Strands, game #288, are…

  • SMOG
  • SPORT
  • BRUNCH
  • ZORSE
  • ATHLEISURE
  • ANKLET
  • SPANGRAM: PORTMANTEAUX
  • My rating: Moderate
  • My score: 2 hints

In honor of today’s Spangram I’ve invented my own portmanteaux. Stranesia describes that moment playing Strands where your memory and brain power completely evade you. Today, I experienced this all-too-common sensation when, even though I only had five letters left, I still could not get the final word and was left dumbfounded.

In my defense, ZORSE is hardly the most common of words. But then again, none of my numerous attempts (Orzes – zesty Oreos?, etc) made any sense either.

According to Google, there are only around 100 Zorses (a hybrid between zebra and horse) in the world. Several years ago one breeder called the zorse "the horse of the future". But there is one hitch – zorses cannot breed, making their future bleak.

Zorse is also rumored to be the name of a puzzle game that the NYT has been testing, so this portmanteaux business could be a cunning bit of marketing. Zorse: the puzzle of the future. Or maybe it doesn't exist at all.

How did you do today? Send me an email and let me know.

Yesterday's NYT Strands answers (Sunday, 15 December, game #287)
  • FULL
  • WANING
  • WAXING
  • GIBBOUS
  • QUARTER
  • CRESCENT
  • SPANGRAM: LUNAR PHASE
What is NYT Strands?

Strands is the NYT's new word game, following Wordle and Connections. It's now out of beta so is a fully fledged member of the NYT's games stable and can be played on the NYT Games site on desktop or mobile.

I've got a full guide to how to play NYT Strands, complete with tips for solving it, so check that out if you're struggling to beat it each day.

Categories: Technology

Ransomware defenses are being weakened by outdated backup technology, limited backup data encryption, and failed data backups

Sun, 12/15/2024 - 17:20
  • Ransomware attacks often now target backup data directly, experts warn
  • Zero Trust principles are key to data protection
  • 59% of organizations experienced ransomware attacks in 2023

Ransomware attacks have increasingly become a top concern for businesses worldwide, targeting organizations of all sizes and industries.

Recent research by Object First has highlighted key vulnerabilities and the growing importance of modern backup technologies in combating ransomware threats.

The survey revealed many businesses are still using outdated technologies that leave their backup data vulnerable to attack, suggesting they are not yet adequately prepared to fend off modern ransomware attacks.

The state of backup security

Backup data is becoming a prime target for cybercriminals, therefore organizations need to rethink their backup security practices to adopt more resilient, ransomware-proof solutions.

The report revealed while over a third (34%) of respondents pointed to outdated backup systems as a major weakness, making them easier targets for ransomware attackers, 31% cited a lack of backup data encryption, which prevents sensitive data from being securely stored and transferred.

In addition, failed data backups were identified by 28% of respondents as another key vulnerability. These failures leave organizations unable to restore their systems after an attack, often resulting in lengthy downtimes and expensive recovery processes.

More troubling is the finding that ransomware attacks are increasingly targeting backup data directly. Normally, backups are considered a last line of defense in the event of an attack. However, with attackers now focusing on compromising this data, simply having backups is no longer enough. This shift has led to a growing need for immutable storage backup systems designed to ensure data cannot be altered or deleted by ransomware once it is stored.

An overwhelming 93% of survey respondents agreed that immutable storage is essential for protecting against ransomware attacks, while 84% of IT workers highlighted that they need better backup security to meet regulatory compliance. This need for enhanced security is further evidenced by the fact that 97% of respondents plan to invest in immutable storage solutions as part of their cybersecurity strategy.

Immutable storage is built on Zero Trust principles, a security model that assumes no user or system is inherently trustworthy. This approach focuses on continuously validating every access request and limiting permissions to minimize the risk of unauthorized access.

The Object First survey found that 93% of IT professionals believe aligning their backup systems with Zero Trust principles is key to safeguarding their data from ransomware. Zero Trust architecture ensures that even if cybercriminals gain access to a system, they are limited in their ability to manipulate or delete critical data.

While the need for enhanced security is clear, the survey also revealed that managing backup storage systems remains a challenge for many organizations. Nearly 41% of IT professionals stated that they lack the skills necessary to manage complex backup solutions, and 69% reported that budget constraints prevent them from hiring additional security experts.

“Our research shows that almost half of organizations suffered attacks that targeted their backup data, highlighting the criticality of adopting backup storage solutions that are ransomware-proof,” said Andrew Wittman, Chief Marketing Officer at Object First.

You might also like
Categories: Technology

AWS, Azure and Google Cloud credentials from old accounts are putting businesses at risk

Sun, 12/15/2024 - 14:11
  • Report warns long-lived credentials remain a significant security risk
  • Outdated access keys increase vulnerability across cloud platforms
  • Automated credential management is crucial for cloud security

As cloud computing adoption continues to rise, organizations increasingly rely on platforms such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud for their infrastructure and services, however, this means their security risks also grow more complex.

The recent Datadog State of Cloud Security 2024 report reveals one particularly concerning issue - the use of long-lived credentials, which pose significant security threats across all major cloud providers.

Despite advancements in cloud security tools and practices, many organizations still use long-lived credentials, which do not expire automatically.

The prevalence of long-lived credentials

Long-lived credentials, particularly those that are no longer actively managed, can serve as an easy target for attackers. If leaked or compromised, they could provide unauthorized access to sensitive data or systems. The longer these credentials remain in place without rotation or monitoring, the greater the risk of a security breach.

Datadog's report reveals nearly half (46%) of organizations still have unmanaged users with long-lived credentials. These credentials are particularly problematic because they are often embedded in various assets such as source code, container images, and build logs. If these credentials are not properly managed, they can easily be leaked or exposed, providing an entry point for attackers to access critical systems and data.

Almost two-thirds 62% of Google Cloud service accounts, 60% of AWS Identity and Access Management (IAM) users, and 46% of Microsoft Entra ID applications have access keys that are more than a year old.

In response to these risks, cloud providers have been making strides toward improving security. Datadog's report notes that the adoption of cloud guardrails is on the rise. These guardrails are automated rules or configurations designed to enforce security best practices and prevent human error.

For instance, 79% of Amazon S3 buckets now have either account-wide or bucket-specific public access blocks enabled, up from 73% the previous year. However, while these proactive measures are a step in the right direction, long-lived credentials remain a major blind spot in cloud security efforts.

Furthermore, the report added there is a conspicuously high number of cloud resources with overly permissive configurations.

About 18% of AWS EC2 instances and 33% of Google Cloud VMs were found to have sensitive permissions that could potentially allow an attacker to compromise the environment. In cases where a cloud workload is breached, these sensitive permissions can be exploited to steal associated credentials, enabling attackers to access the broader cloud environment.

In addition, there is the risk of third-party integrations, which are common in modern cloud environments. More than 10% of third-party integrations examined in the report were found to have risky cloud permissions, potentially allowing the vendor to access sensitive data or take control of the entire AWS account.

What's more, 2% of these third-party roles do not enforce the use of External IDs, leaving them susceptible to a "confused deputy" attack, a scenario where an attacker tricks a service into using its privileges to perform unintended actions.

“The findings from the State of Cloud Security 2024 suggest it is unrealistic to expect that long-lived credentials can be securely managed,” said Andrew Krug, Head of Security Advocacy at Datadog.

“In addition to long-lived credentials being a major risk, the report found that most cloud security incidents are caused by compromised credentials. To protect themselves, companies need to secure identities with modern authentication mechanisms, leverage short-lived credentials and actively monitor changes to APIs that attackers commonly use,” Krug added.

You might also like
Categories: Technology

Build your own super mini PC with this $338 AMD AM5 barebone workstation that has OCuLink, two 2.5Gb LAN ports and can drive four 8K monitors once you add a GPU to its dock

Sun, 12/15/2024 - 12:33
  • Minisforum's customizable MS-A1 has AM5 socket for Ryzen CPUs
  • Compact design with up to 16TB storage, includes OCuLink port
  • Wi-Fi 6E, USB4, and advanced cooling for high performance

The Minisforum MS-A1 is the latest addition to the company's line of powerful mini PCs, and is the spiritual successor to the MS-01 model.

Unlike its predecessor, the MS-A1 introduces the option of swapping CPUs, utilizing an AM5 socket to take various AMD Ryzen processors, including AMD's 7000 series, 8000 PHX architecture (8700G/8600G), and potentially the AMD 9000 series following a BIOS update. It supports up to AMD 8700G APU for graphics.

The Minisforum MS-A1 is available as a barebone system (without a CPU or OS) starting at $259 or as a pre-configured model. At the moment, there’s an offer to save $20, bringing the barebone price down to $239. You can add the Minisforum Deg1 OCuLink graphics docking station when purchasing the workstation for an additional $99, which allows the system to drive up to four 8K screens simultaneously.

Staying cool

The mini PC supports up to 16TB of storage via four SSDs using PCIe 4.0 M.2 slots. There are five USB Type-A ports, a USB4 port capable of 40Gbps, the OCuLink interface, and dual Ethernet RJ45 ports supporting up to 2.5Gbps each.

For display outputs, the device includes HDMI 2.1 and DisplayPort 2.0 connections, with the USB4 interface also supporting screen output. Without an eGPU, it can still drive three 8K displays. For wireless connectivity, the Minisforum MS-A1 offers WiFi 6E and Bluetooth 5.2.

The mini PC's housing is compact and constructed from a mix of metal and plastic. The Cold Wave cooling system, featuring dual fans and quad heat pipes, prevents overheating even when under load.

With customizable CPU options and affordable eGPU support, the Minisforum MS-A1 offers a flexible, mini PC solution that is ideal for users seeking a compact yet powerful workstation for content creation, multitasking, gaming, or general productivity.

You might also like
Categories: Technology

The Samsung Galaxy S25 is tipped to come with a huge Bixby AI upgrade

Sun, 12/15/2024 - 11:30
  • Bixby could catch up to Google Gemini in 2025
  • The upgrade may arrive alongside One UI 7
  • The new Bixby is already available in China

Amidst the rapid rise of ChatGPT, Copilot, and Gemini, you might have forgotten all about Samsung's Bixby – but a revamp is coming for the AI assistant, and it could be available worldwide at the same time as the Samsung Galaxy S25.

A new report in South Korean outlet ET News (via @Jukanlosreve) says that Bixby will come with Large Language Model (LLM) support at the start of next year, matching the generative AI chatbots we've already mentioned.

This Bixby upgrade has actually already been quietly pushed out – but only in China. Based on this new report, it looks as though the rest of the world will be getting access to the new version, most probably in January.

That's when the Galaxy S25 series is rumored to be launching, and it's also when we're expecting One UI 7 (based on Android 15) to be pushed out to the masses. The One UI 7 software update is currently in beta testing.

'The biggest selling point'

The biggest selling point of Galaxy S25 series: the new Bixby returns!December 15, 2024

Samsung has of course already pushed out plenty of Galaxy AI features on its phones this year – including Sketch to Image and the Circle to Search feature. Google Gemini is also available on Samsung handsets as well.

But with LLM support added to Bixby, Samsung phones will get even more powerful, with more comprehensive answers and image generation capabilities. Another well-known tipster, @UniverseIce, says it will be "the biggest selling point" of the Galaxy S25.

Google has already given its own Google Assistant an LLM upgrade in the form of Google Gemini – and it'll be interesting to see how much competition Bixby gives Gemini when it comes to built-in options on the best Android phones.

We'll be sure to bring you all the details of the new and improved Bixby when it arrives – maybe in a month or so from now. In the meantime, Apple continues to push out its own Apple Intelligence features through iOS updates.

You might also like
Categories: Technology

China launches new compact radiation detection chip for semiconductor self-reliance

Sun, 12/15/2024 - 10:29
  • Chinese firm develops new compact radiation detection chip
  • The chip measures just 15mm x 15mm x 3mm and consumes 1 milliwatt in operation
  • The chip could be planted in phones and drones for every

Amid escalating efforts to boost its national semiconductor self-reliance, China National Nuclear Corporation (CNNC), a state-owned nuclear enterprise, has revealed the development of a groundbreaking radiation detection chip.

According to CNNC’s official statement on its WeChat channel, the chip can monitor radiation doses across a wide range of environments and adapt to multiple settings including nuclear workplaces, personnel monitoring, and environmental safety inspections.

This chip measures dose rates from 100 nanoSievert (nSv) per hour to 10 milliSievert (mSv) per hour, allowing it to cover various use cases, from monitoring natural background radiation (typically 60–200 nSv/h) to more specific industrial scenarios.

Versatile applications and high-sensitivity

The chip can also detect radiation energies between 50 kiloelectron volts (keV) and 2 mega-electron volts (MeV). This range covers both X-rays and gamma rays, making it useful for industries such as healthcare, nuclear energy, and environmental monitoring.

The chip measures only 15mm x 15mm x 3mm and its energy consumption to operate is just 1 milliwatt. Despite its miniature form, the chip offers sensitivity comparable to traditional Geiger-Muller counters, which are widely used for environmental radiation measurement.

The company announced mass production of the chip has now begun, marking a significant milestone in China's technological push in radiation sensing applications.

This achievement is seen as part of the broader strategy to overcome trade and technology restrictions imposed by the United States, particularly in the semiconductor sector.

Speaking to Chinese state news agency, Xinhua, during his visit to the southeastern high-tech hub of Hefei, Chinese President Xi Jinping said, “High-tech development cannot be begged for; we must accelerate the realisation of high-level technological self-reliance and self-improvement.”

CNNC envisions broader applications beyond industrial use, stating that the chip can be integrated into consumer devices such as smartphones and drones. This could enable smart devices to offer real-time radiation detection, opening up new possibilities for consumer and environmental safety applications.

The development of this chip involved the full cycle of semiconductor production, including chip design, tape-out, packaging, and testing. The mass production was outsourced to "authorized factories," though details about these partners were not disclosed.

Via SCMP

You might also like
Categories: Technology

Identity fraud attacks using AI are fooling biometric security systems

Sun, 12/15/2024 - 08:14
  • Deepfake selfies can now bypass traditional verification systems
  • Fraudsters are exploiting AI for synthetic identity creation
  • Organizations must adopt advanced behavior-based detection methods

The latest Global Identity Fraud Report by AU10TIX reveals a new wave in identity fraud, largely driven by the industrialization of AI-based attacks.

With millions of transactions analyzed from July through September 2024, the report reveals how digital platforms across sectors, particularly social media, payments, and crypto, are facing unprecedented challenges.

Fraud tactics have evolved from simple document forgeries to sophisticated synthetic identities, deepfake images, and automated bots that can bypass conventional verification systems.

Election-driven surge in social media bot attacks

Social media platforms experienced a dramatic escalation in automated bot attacks in the lead-up to the 2024 US presidential election. The report reveals that social media attacks accounted for 28% of all fraud attempts in Q3 2024, a notable jump from only 3% in Q1.

These attacks focus on disinformation and the manipulation of public opinion on a large scale. AU10TIX says these bot-driven disinformation campaigns employ advanced Generative AI (GenAI) elements to avoid detection, an innovation that has enabled attackers to scale their operations while evading traditional verification systems.

The GenAI-powered attacks began escalating in March 2024 and peaked in September and are believed to influence public perception by spreading false narratives and inflammatory content.

One of the most striking discoveries in the report involves the emergence of 100% deepfake synthetic selfies - hyper-realistic images created to mimic authentic facial features with the intention of bypassing verification systems.

Traditionally, selfies were considered a reliable method for biometric authentication, as the technology needed to convincingly fake a facial image was beyond the reach of most fraudsters.

AU10TIX highlights these synthetic selfies pose a unique challenge to traditional KYC (Know Your Customer) procedures. The shift suggests that moving forward, organizations relying solely on facial matching technology may need to re-evaluate and bolster their detection methods.

Furthermore, fraudsters are increasingly using AI to generate variations of synthetic identities with the help of “image template” attacks. These involve manipulating a single ID template to create multiple unique identities, complete with randomized photo elements, document numbers, and other personal identifiers, allowing attackers to quickly create fraudulent accounts across platforms by leveraging AI to scale synthetic identity creation.

In the payment sector, the fraud rate saw a decline in Q3, from 52% in Q2 to 39%. AU10TIX credits this progress to increased regulatory oversight and law enforcement interventions. However, despite the reduction in direct attacks, the payments industry remains the most frequently targeted sector with many fraudsters, deterred by heightened security, redirecting their efforts toward the crypto market, which accounted for 31% of all attacks in Q3.

AU10TIX recommends that organizations move beyond traditional document-based verification methods. One critical recommendation is adopting behaviour-based detection systems that go deeper than standard identity checks. By analyzing patterns in user behaviour such as login routines, traffic sources, and other unique behavioural cues, companies can identify anomalies that indicate potentially fraudulent activity.

“Fraudsters are evolving faster than ever, leveraging AI to scale and execute their attacks, especially in the social media and payments sectors,” said Dan Yerushalmi, CEO of AU10TIX.

“While companies are using AI to bolster security, criminals are weaponizing the same technology to create synthetic selfies and fake documents, making detection almost impossible."

You might also like
Categories: Technology

We just got a hint that we might have to pay more for the iPhone 17

Sun, 12/15/2024 - 07:30
  • iPhone 17 price increases are expected
  • As yet we haven't seen many price leaks
  • A new model is expected to appear in 2025

It's a pretty safe bet that the iPhone 17 is going to break cover at some point during September 2025, but how much is it going to cost? Well, more than the iPhone 16, if recent comments from an industry analyst are to be believed.

Commenting at a guest lecture (via @Jukanlosreve), Samsung Securities Research Center senior researcher Jong Wook Lee has gone on record as saying "iPhone prices are expected to increase next year" – after no price increase in 2024.

iPhone 16 pricing currently starts at $799 / £799 / AU$1,399, which matches the launch pricing of the iPhone 15 (though that phone is now available for less) – in fact, the 2024 model was AU$100 cheaper than the 2023 model was in Australia.

According to Lee, that means Apple is set to hike prices this time around, though we don't know how much they might go up. In fact, we haven't heard much in the way of iPhone 17 price leaks at all, up to this point.

The price is right?

At a guest lecture, Jong Wook Lee, a senior researcher at Samsung Securities Research Center, stated, “Although there were initial expectations that Apple’s iPhone prices would rise this year, prices were unusually not increased. As a result, profit margins have declined since…December 14, 2024

While we don't know how much the iPhone 17 will cost, we can look at current pricing. We've already mentioned the iPhone 16, and the iPhone 16 Plus starts at $899 / £899 / AU$1,599 for the lowest amount of storage.

The iPhone 16 Pro will set you back $999 / £999 / AU$1,799 and up, while the iPhone 16 Pro Max starts at a considerable $1,199 / £1,199 / AU$2,149. We'll have to wait and see whether price hikes hit some or all of the iPhone 17 models.

And there's rumored to be a new model arriving in place of the iPhone 16 Plus: the iPhone 17 Air. That phone is apparently going to set you back $1,299 (around £1,030 / AU$2,045), which would be a considerable jump over the handset it's replacing.

With sales of the iPhone 16 Plus reportedly not what they could be, perhaps a change in design can help – and of course a higher price will often mean more money per device for Apple. We can expect a few more price leaks to appear between now in September.

You might also like
Categories: Technology

This free tool offers SMBs critical insights into compromised credentials found on the dark web

Sun, 12/15/2024 - 06:36
  • Quadrant offers free Dark Web reports for small businesses
  • Early detection helps prevent costly data breaches
  • Small businesses are increasingly targeted by cybercriminals

The Dark Web, a hidden part of the web where illicit activities often occur, has become a prime marketplace for stolen data, including compromised credentials from businesses, and with cyberattacks on the rise, organizations must remain vigilant.

This is especially true for small and mid-sized companies that may not have the same resources as larger enterprises.

In response to this need, Quadrant Information Security, has launched Free Dark Web Reports, a new service offering companies crucial insights into what sensitive data, specifically user credentials, has been leaked and is potentially up for sale on the Dark Web.

Free Dark Web report for small and medium size businesses

The service provides a monthly report that highlights newly discovered compromised credentials related to the organization, and provides actionable insights, allowing organizations to implement timely measures such as enforcing password resets, increasing multi-factor authentication (MFA) usage, or refining security policies.

Any discovered passwords or other confidential data are redacted to comply with regulatory standards, ensuring organizations can act on the information without risking further exposure.

Cybersecurity breaches that involve compromised credentials are among the most common and dangerous types of attacks. With credentials can be harvested through phishing schemes or security lapses and often find their way onto the Dark Web where can be sold or misused by malicious actors, leading to costly data breaches or even identity theft.

Early detection of compromised credentials is one of the most effective ways to prevent a cybersecurity incident. By offering these reports, Quadrant empowers organizations to respond swiftly to any security gaps identified. Moreover, these reports can be especially beneficial for businesses that lack the internal resources to monitor the Dark Web themselves.

Quadrant's Dark Web Reports can also identify high-risk users, such as top executives, employees handling sensitive data, or any user with privileged access. By flagging compromised accounts or users at higher risk, organizations can prioritize their security efforts and implement targeted defensive measures, such as additional authentication layers for these users.

“Many security leaders are shocked to see the sheer amount of compromised data sitting on the Dark Web related to their organization," said Jeff Foresman, President of Services at Quadrant.

"This proactive discovery of compromised credentials helps companies avoid expensive breaches and data loss. These reports are informational and directly useful for implementing better security measures."

You might also like
Categories: Technology

NotLockBit ransomware targets Apple users with advanced file-locking and data exfiltration

Sun, 12/15/2024 - 03:16
  • macOS faces an emerging ransomware threat, NotLockBit
  • NotLockBit malware demonstrates file-locking capabilities
  • Apple's built-in protections face issues from evolving ransomware threats

For years, ransomware attacks have predominantly targeted Windows and Linux platforms, however cybercriminals have begun to shift their focus toward macOS users, experts have claimed.

The recent discovery of macOS.NotLockBit suggests a shift in the landscape, as this newly identified malware, named after the notorious LockBit variant, could mark the beginning of more serious ransomware campaigns against Mac users.

Discovered by researchers at Trend Micro and later analyzed by SentinelLabs, macOS.NotLockBit shows credible file-locking and data exfiltration capabilities, posing a potential risk to macOS users.

macOS.NotLockBit threat

Ransomware targeting Mac devices tends to lack the necessary tools to truly lock files or exfiltrate data. The general perception has been that macOS is better protected against these kinds of threats, partially due to Apple's built-in security features, such as Transparency, Consent, and Control (TCC) protections. However, the emergence of macOS.NotLockBit signals that hackers are actively developing more sophisticated methods for targeting Apple devices.

macOS.NotLockBit functions similarly to other ransomware, but it specifically targets macOS systems. The malware only runs on Intel-based Macs or Apple silicon Macs with Rosetta emulation software installed, which allows it to execute x86_64 binaries on newer Apple processors.

Upon execution, the ransomware collects system information, including the product name, version, and architecture. It also gathers data on how long the system has been running since its last reboot. Before locking the user’s files, macOS.NotLockBit attempts to exfiltrate data to a remote server using Amazon Web Services (AWS) S3 storage. The malware employs a public key for asymmetric encryption, meaning decryption without the attacker’s private key is nearly impossible.

The malware drops a README.txt file in directories containing encrypted files. The encrypted files are marked with an “.abcd” extension, and the README instructs victims on how to recover their files, typically by paying a ransom. Additionally, in later versions of the malware, macOS.NotLockBit displays a LockBit 2.0-themed desktop wallpaper, co-opting the branding of the LockBit ransomware group.

Thankfully, Apple’s TCC protections remain a hard nut for macOS.NotLockBit to crack. These safeguards require user consent before granting access to sensitive directories or allowing control over processes like System Events. While this creates a hurdle for the ransomware’s full functionality, bypassing TCC protection is not insurmountable, and security experts expect that future iterations of the malware may develop ways to circumvent these alerts.

Researchers from SentinelLabs and Trend Micro have not yet identified a specific distribution method, and there are no known victims at present. However, the rapid evolution of the malware demonstrated by the increasing size and sophistication of each new sample indicates that the attackers are actively working on improving its capabilities.

SentinelLabs identified multiple versions of the malware, suggesting that macOS.NotLockBit is still in active development. Early samples appeared lighter in functionality, focusing solely on encryption. Later versions added data exfiltration capabilities and began employing AWS S3 cloud storage to exfiltrate stolen files. The attackers hardcoded AWS credentials into the malware to create new repositories for storing victim data, though these accounts have since been deactivated.

In one of its most recent versions, macOS.NotLockBit requires macOS Sonoma, indicating that the malware developers are targeting some the latest macOS versions. It also showed attempts at obfuscating code, suggesting that the attackers are testing various techniques to evade detection by antivirus software.

You might also like
Categories: Technology

AI investment isn't slowing down — venture capitalists are funding startups while trying to grapple with environmental impact

Sat, 12/14/2024 - 22:05
  • AI investments aren't slowing, despite skepticism and real world dangers
  • AI is expected to be an integral part of most industries
  • Tech giants are going nuclear to manage electricity demands

Despite the wide-ranging potential applications of AI technology, concerns remain about its reliability, the legality of training models on copyrighted data without permission, and environmental impact.

In face of this, many investors believe generative AI will become integral to industries such as business analytics, creative services, and automation.

Analysts predict 60% of current skeptics will embrace generative AI within the next few years, knowingly or not, and investors are not slowing down as they continue to throw their hat in the ring.

The rapid expansion of Generative AI

New figures from PitchBook hae claimed investment in generative AI startups remains robust, with venture capitalists pouring $3.9 billion across 206 deals in the third quarter of 2024. US-based companies attracted the lion’s share, raising $2.9 billion across 127 deals and this does not include OpenAI’s notable $6.6 billion round.

Some standout funding rounds include Magic, a coding assistant startup that secured $320 million in August, and Glean, an enterprise search company, which raised $260 million in September.

Meanwhile, Hebbia, a business analytics firm, drew $130 million in July. Furthermore, investments extended beyond the U.S., with China’s Moonshot AI raising $300 million and Japan’s Sakana AI closing a $214 million round focused on scientific discovery.

Unfortunately, the rapid expansion of generative AI also brings challenges, particularly regarding energy consumption. According to Bain & Company, companies deploying AI at scale will require gigawatt-scale data centers, which consume up to 20 times the power of typical data centers today. This demand risks straining global electricity and labour markets.

The reliance on data centers has already prolonged the use of coal-fired power plants, with Morgan Stanley warning greenhouse gas emissions could triple by 2030 if the trend continues unchecked.

In response, major data center operators like Microsoft, Amazon, and Google are turning to nuclear energy to offset their environmental impact. Microsoft, for instance, announced plans to source power from the controversial Three Mile Island nuclear facility, though such projects could take years to become operational.

Despite these environmental and technical hurdles, investor interest in generative AI remains high. ElevenLabs, known for its viral voice-cloning tool, is reportedly seeking to raise funds at a $3 billion valuation. Black Forest Labs, the company behind a controversial image generator on the X platform, is also in talks for a $100 million funding round.

Via TechCrunch

You might also like
Categories: Technology

NYT Connections today — my hints and answers for Sunday, December 15 (game #553)

Sat, 12/14/2024 - 18:02

Good morning! Let's play Connections, the NYT's clever word game that challenges you to group answers in various categories. It can be tough, so read on if you need clues.

What should you do once you've finished? Why, play some more word games of course. I've also got daily Strands hints and answers and Quordle hints and answers articles if you need help for those too, while Marc's Wordle today page covers the original viral word game.

SPOILER WARNING: Information about NYT Connections today is below, so don't read on if you don't want to know the answers.

NYT Connections today (game #553) - today's words

(Image credit: New York Times)

Today's NYT Connections words are…

  • THUMB
  • KEY
  • LEAF
  • STYLE
  • MACE
  • MAR
  • FLAIL
  • FLIP
  • SPEAR
  • CLOVE
  • TANK
  • PEPPER
  • RIFFLE
  • FLOUNDER
  • NUTMEG
  • FLOP
NYT Connections today (game #553) - hint #1 - group hints

What are some clues for today's NYT Connections groups?

  • YELLOW: Seasonings
  • GREEN: Below par
  • BLUE: Browsing
  • PURPLE: Popular vocalists

Need more clues?

We're firmly in spoiler territory now, but read on if you want to know what the four theme answers are for today's NYT Connections puzzles…

NYT Connections today (game #553) - hint #2 - group answers

What are the answers for today's NYT Connections groups?

  • YELLOW: SPICES
  • GREEN: PERFORM POORLY 
  • BLUE: SKIM THROUGH, AS PAGES 
  • PURPLE: POP SINGERS MINUS "S" 

Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.

NYT Connections today (game #553) - the answers

(Image credit: New York Times)

The answers to today's Connections, game #553, are…

  • YELLOW: SPICES CLOVE, MACE, NUTMEG, PEPPER
  • GREEN: PERFORM POORLY FLAIL, FLOP, FLOUNDER, TANK
  • BLUE: SKIM THROUGH, AS PAGES FLIP, LEAF, RIFFLE, THUMB
  • PURPLE: POP SINGERS MINUS "S" KEY, MAR, SPEAR, STYLE
  • My rating: Easy
  • My score: Perfect

As someone who is known to PERFORM BADLY at Connections, it’s no surprise that I landed on the Green group first today – although I did momentarily think the connection was “Things you do when drunk”.

POP SINGERS MINUS “S” was a good one, especially as SPEAR could have been a weapon along with RIFLE and MACE.

I’m off to listen to Empire State of Mind.

Yesterday's NYT Connections answers (Saturday, 14 December, game #552)
  • YELLOW: FISH FLUKE, MULLET, SOLE, TANG
  • GREEN: WORDS IN AN AUCTION-ENDING PHRASE GOING, ONCE, SOLD, TWICE
  • BLUE: GLOBAL CURRENCIES POUND, REAL, SOL, YUAN
  • PURPLE: WORDS BEFORE "CUP" BUTTER, DIVA, SOLO, WORLD
What is NYT Connections?

NYT Connections is one of several increasingly popular word games made by the New York Times. It challenges you to find groups of four items that share something in common, and each group has a different difficulty level: green is easy, yellow a little harder, blue often quite tough and purple usually very difficult.

On the plus side, you don't technically need to solve the final one, as you'll be able to answer that one by a process of elimination. What's more, you can make up to four mistakes, which gives you a little bit of breathing room.

It's a little more involved than something like Wordle, however, and there are plenty of opportunities for the game to trip you up with tricks. For instance, watch out for homophones and other word games that could disguise the answers.

It's playable for free via the NYT Games site on desktop or mobile.

Categories: Technology

NYT Strands today — my hints, answers and spangram for Sunday, December 15 (game #287)

Sat, 12/14/2024 - 18:02

Strands is the NYT's latest word game after the likes of Wordle, Spelling Bee and Connections – and it's great fun. It can be difficult, though, so read on for my Strands hints.

Want more word-based fun? Then check out my NYT Connections today and Quordle today pages for hints and answers for those games, and Marc's Wordle today page for the original viral word game.

SPOILER WARNING: Information about NYT Strands today is below, so don't read on if you don't want to know the answers.

NYT Strands today (game #287) - hint #1 - today's theme What is the theme of today's NYT Strands?

Today's NYT Strands theme is… Moonlighting

NYT Strands today (game #287) - hint #2 - clue words

Play any of these words to unlock the in-game hints system.

  • QUEST
  • TEAR
  • BEST
  • RESCUE
  • TAPE
  • NEAR
NYT Strands today (game #287) - hint #3 - spangram What is a hint for today's spangram?

Satellite stages

NYT Strands today (game #287) - hint #4 - spangram position What are two sides of the board that today's spangram touches?

First side: left, 5th row

Last side: right, 5th row

Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.

NYT Strands today (game #287) - the answers

(Image credit: New York Times)

The answers to today's Strands, game #287, are…

  • FULL
  • WANING
  • WAXING
  • GIBBOUS
  • QUARTER
  • CRESCENT
  • SPANGRAM: LUNAR PHASE
  • My rating: Easy
  • My score: Perfect

Many wonderful songs mention the moon – Moon River, Fly Me to the Moon, Moondance, Bad Moon Rising – but few mention a particular LUNAR PHASE, today’s Spangram.

A couple of exceptions…

The fabulous Whole of the Moon by The Waterboys, is a tribute to someone with greater otherworldly talent than the singer, Mike Scott. “I sighed, you swooned," he croons. "I saw the crescent / You saw the whole of the Moon”.

Another favorite is Easy from Now On by Emmylou Harris, which describes running away from a bad relationship and finding yourself beneath a “Quarter moon in a ten-cent town”.

Finally, a tune about the phase of the moon when it appears bulging outward but is not yet full: the off-kilter lament Gibbous Moon by Momus: "This world is lugubrious/ Aghast beneath a gibbous moon/ Waxing and waning with the death of all feeling/ But we will be free soon.”

Thank you, Strands, for this little Spotify rabbit hole.

How did you do today? Send me an email and let me know.

Yesterday's NYT Strands answers (Saturday, 14 December, game #286)
  • FIRE 
  • PASSION
  • DRIVE 
  • DEVOTION
  • INTENSITY
  • PURPOSE
  • SPANGRAM: GO GETTER
What is NYT Strands?

Strands is the NYT's new word game, following Wordle and Connections. It's now out of beta so is a fully fledged member of the NYT's games stable and can be played on the NYT Games site on desktop or mobile.

I've got a full guide to how to play NYT Strands, complete with tips for solving it, so check that out if you're struggling to beat it each day.

Categories: Technology

Quordle today – my hints and answers for Sunday, December 15 (game #1056)

Sat, 12/14/2024 - 18:02

Quordle was one of the original Wordle alternatives and is still going strong now more than 1,000 games later. It offers a genuine challenge, though, so read on if you need some Quordle hints today – or scroll down further for the answers.

Enjoy playing word games? You can also check out my NYT Connections today and NYT Strands today pages for hints and answers for those puzzles, while Marc's Wordle today column covers the original viral word game.

SPOILER WARNING: Information about Quordle today is below, so don't read on if you don't want to know the answers.

Quordle today (game #1056) - hint #1 - Vowels How many different vowels are in Quordle today?

The number of different vowels in Quordle today is 4*.

* Note that by vowel we mean the five standard vowels (A, E, I, O, U), not Y (which is sometimes counted as a vowel too).

Quordle today (game #1056) - hint #2 - repeated letters Do any of today's Quordle answers contain repeated letters?

The number of Quordle answers containing a repeated letter today is 2.

Quordle today (game #1056) - hint #3 - uncommon letters Do the letters Q, Z, X or J appear in Quordle today?

• No. None of Q, Z, X or J appear among today's Quordle answers.

Quordle today (game #1056) - hint #4 - starting letters (1) Do any of today's Quordle puzzles start with the same letter?

The number of today's Quordle answers starting with the same letter is 0.

If you just want to know the answers at this stage, simply scroll down. If you're not ready yet then here's one more clue to make things a lot easier:

Quordle today (game #1056) - hint #5 - starting letters (2) What letters do today's Quordle answers start with?

• D

• S

• L

• G

Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.

Quordle today (game #1056) - the answers

(Image credit: Merriam-Webster)

The answers to today's Quordle, game #1056, are…

  • DROVE
  • STILT
  • LINEN
  • GIANT

I started with Point and Break today. There are no repeat letters, so it’s not a bad punt – and well, it’s my tribute to one of the greatest films of all time.

But where did my gamble get me? I went to the red zone as I ran out of lines for LINEN and climbed on board the last train to Loserville.

As the rain thunders down on my laptop and the waves crash, there is only one thing left to say word-surfing Quordle friends…

Vaya con Dios.

How did you do today? Send me an email and let me know.

Daily Sequence today (game #1056) - the answers

(Image credit: Merriam-Webster)

The answers to today's Quordle Daily Sequence, game #1056, are…

  • SHARD
  • CHURN
  • MACRO
  • PRANK
Quordle answers: The past 20
  • Quordle #10545, Saturday 14 December: SPIEL, ONSET, TIGER, DITTO
  • Quordle #1054, Friday 13 December: ERECT, REBAR, MOIST, IDIOM
  • Quordle #1053, Thursday 12 December: MILKY, CRIER, STORK, DRIER
  • Quordle #1052, Wednesday 11 December: BRIAR, NASAL, SHARD, FLUFF
  • Quordle #1051, Tuesday 10 December: BEGAN, TRIAL, IDEAL, GUIDE
  • Quordle #1050, Monday 9 December: TITAN, FORTE, SPEED, BRIAR
  • Quordle #1049, Sunday 8 December: BUNCH, SHINY, MOULT, INTRO
  • Quordle #1048, Saturday 7 December: SHAKY, CROOK, GHOUL, VERSE
  • Quordle #1047, Friday 6 December: BRAWL, UNTIL, DOWRY, STING
  • Quordle #1046, Thursday 5 December: AGING, BICEP, CLOVE, SPILL
  • Quordle #1045, Wednesday 4 December: JUDGE, GIVER, GNASH, CLOAK
  • Quordle #1044, Tuesday 3 December: FUDGE, THICK, CRANK, STASH
  • Quordle #1043, Monday 2 December: TROPE, HOVER, SAUNA, SHAPE
  • Quordle #1042, Sunday 1 December: NAIVE, CIRCA, STEAD, MICRO
  • Quordle #1041, Saturday 30 November: MAMMA, SNUCK, CRYPT, TAROT
  • Quordle #1040, Friday 29 November: JOIST, DROOL, DUSKY, GLIDE
  • Quordle #1039, Thursday 28 November: GRADE, WORRY, NOISE, DAISY
  • Quordle #1038, Wednesday 27 November: HEART, ROGUE, INEPT, UTILE
  • Quordle #1037, Tuesday 26 November: PRIED, FAINT, HURRY, WOOER
  • Quordle #1036, Monday 25 November: NUDGE, SNOOP, SHACK, DRYLY
Categories: Technology

US border surveillance towers face significant operational failures — vast areas unwatched, national security potentially at risk

Sat, 12/14/2024 - 15:22

Recent reports have revealed that high-cost southern border surveillance technology is failing to deliver on its purpose.

A leaked memo obtained by NBC News reveals that nearly one-third of the cameras on the border’s primary surveillance towers are currently offline.

The report reveals that out of the 500 cameras installed on surveillance towers along the border between the U.S. and Mexico, about 150 are currently inactive.

Overlapping agencies and fragmented responsibilities

One of the core problems with the surveillance towers lies in the complicated web of federal oversight. While the Border Patrol depends on these systems to monitor remote areas, the Federal Aviation Administration (FAA) is responsible for maintaining the towers. This division of responsibility creates delays in repairs and maintenance, undermining the network’s effectiveness.

The Remote Video Surveillance System, where many of these cameras are installed, is only one part of the broader surveillance network. However, the entire system has been hampered by poor coordination, frequent project cancellations, and incompatible technologies developed by different vendors.

The history of surveillance technology at the border is marked by delays, budget overruns, and cancelled programs. One prominent example is the Secure Border Initiative Network (SBInet), which aimed to deploy towers across the U.S.-Mexico border. By 2010, after spending $1 billion, only 15 towers had been installed along a 53-mile stretch of Arizona’s border, covering just a fraction of the 387-mile expanse. The program was eventually scrapped in 2011 following internal reviews that criticized its performance and high costs.

There have been attempts to replace SBInet with new initiatives, such as the Arizona Border Surveillance Technology Plan and the Southwest Border Technology Plan. However, they are also struggling.

Over the past two decades, the U.S. government has spent nearly $6 billion on surveillance towers and made efforts to consolidate the various systems into the Integrated Surveillance Towers network. However, there are challenges due to incompatible components and outdated technology.

A recurring issue with the surveillance towers is the absence of meaningful performance metrics to evaluate their effectiveness. In a 2017 report, the Government Accountability Office (GAO) criticized the Border Patrol for failing to assess whether these technologies were improving security. The GAO urged the agency to develop performance metrics, but recent assessments suggest that little progress has been made.

In February 2023, the GAO noted that Customs and Border Protection (CBP) officials expect operational shortfalls of up to 36% by 2025, putting more towers at risk of becoming non-functional. Without clear benchmarks for success, it remains difficult to determine how much these expensive surveillance systems contribute to national security efforts.

The outages have frustrated Border Patrol agents, who rely on the cameras to monitor vast, remote regions. There are legitimate concerns about officer safety and border security due to non-operational towers.

You might also like
Categories: Technology

Chinese flagship phones are great value for money, but they won't stay cheaper for much longer – here's why

Sat, 12/14/2024 - 13:00

Made in China: three words that are as ubiquitous as they are controversial. Pick up anything mass-produced these days – be it clothing, toys, or technology products – and there's a good chance you’ll find this phrase emblazoned on a label or plastic underside.

In the smartphone world, devices made by Chinese brands have long been seen as a curiosity – lesser-known phones with impressive specs that are often unavailable in Western markets.

However, while it’s still very difficult to get a hold of a Chinese phone in the US, companies like Xiaomi and Oppo have made strides in either entering or returning to local smartphone scenes in the UK, Australia, and mainland Europe.

Oppo, for instance, recently returned to the UK with the Oppo Find X8 Pro, a hugely impressive device that rivals the Samsung Galaxy S24 Ultra and iPhone 16 Pro with its dazzling screen and exceptional photography capabilities.

Xiaomi, too, offers a wide range of high-end devices; our list of the best Xiaomi phones is currently capped by the Xiaomi 14 Ultra, which lives up to its name with a ludicrous quad-camera system centered on a 1-inch sensor.

The Xiaomi 14 Ultra is among the best phones we've tested this year (Image credit: Future / Roland Moore-Colyer)

At the start of the Chinese smartphone boom, the sources of inspiration for these high-spec devices were obvious. Manufacturers including Huawei and OnePlus were once associated with producing – how to put this? – affectionate renditions of more popular flagships.

For instance, the Huawei Mate 20 Pro, released in 2018, took design and software cues from the iPhone XS, while 2020’s OnePlus 8T shared an uncanny resemblance with the Samsung Galaxy S20.

This proved to be a sustainable and lucrative business practice, as these Chinese brands were generally able to undercut the competition by fairly significant margins, offering consumers iPhone- and Samsung-rivaling products at more accessible prices. For the most part, this sentiment remains true for the mid-range models offered by these companies.

However, following the smartphone industry’s switch to tiered flagship families, there seems to be a different priority in mind for high-end Chinese mobile makers: overtaking the Western competition.

Better products, bigger prices

The Honor Magic 6 Pro costs £1,099 in the UK (Image credit: Future / Axel Metz)

The Xiaomi 14 Ultra, for example, retails for £1,299 (around $1,650) – that's even more than the most expensive globally available slab phone, the Samsung Galaxy S24 Ultra, which starts at $1,299 / £1,249 / AU$2,199.

And while other brands aren’t pushing the envelope quite as much as Xiaomi, phones like the Oppo Find X8 Pro (£1,050 / AU$1,799) and Honor Magic 6 Pro (£1,099) still approach or exceed the price of premium flagships from Apple, Google, and Samsung.

The modus operandi for Chinese flagship challengers has changed: where previously these companies sought to offer comparable performance at cheaper prices, now they're focused on delivering better performance at bigger prices.

Keep in mind, too, that we’ve yet to see the rumored Oppo Find X8 Ultra surface, which will no doubt carry an even heavier price tag than its Pro counterpart.

Similarly, while the globally available OnePlus 12 does surpass the iPhone 16, Samsung Galaxy S24, and Google Pixel 9 on many spec fronts, it also matches them all on price at $799 / £849 – meanwhile, last year’s OnePlus 11 was notably cheaper, at $699 / £729 / AU$1,199.

This is to say that the modus operandi for Chinese flagship challengers has changed: where previously these companies sought to offer comparable performance at cheaper prices, now they're focused on delivering better performance at bigger prices.

Of course, the likes of Xiaomi, OnePlus, and Honor are well within their rights to shift their strategies in such a way; after all, they're producing high-quality devices. But the fact remains that from a consumer perspective, the days of nabbing a flagship-level phone for a mid-range price could be coming to an end.

So, if you’re looking for a powerful phone, don’t mind using Android, and aren’t particularly loyal to a major brand, it might be wise to pick up a high-powered Chinese phone before the de facto discounts disappear completely.

For more on the latest smartphones from all over the world – including the tri-folding Huawei Mate XT – be sure to check out our phones coverage. And for specific advice on the best Chinese phones, we’ve got you covered with our lists of the best Xiaomi phones, best Honor phones, and best OnePlus phones.

You might also like
Categories: Technology

Hey sysadmin, this is the perfect Christmas laptop gift for you; HX 370-powered Pocket 4 has a RS232 port, KVM, RJ45, 32GB of RAM and 2TB SSD

Sat, 12/14/2024 - 12:33

The GPD Pocket 4 is an 8.8-inch laptop weighing just 770g, that is designed to combine portability with powerful performance.

GPD likens its aesthetic to that of an Apple MacBook, highlighting its sleek, lightweight build, which is small enough to carry like a mobile phone.

The Pocket 4 is powered by an AMD Ryzen AI 9 HX 370 processor with Radeon 890M/880M graphics (there’s also the option for an Ryzen 7 8840U CPU with 8840U graphics). It features a high-resolution 2.5K LTPS display with a 144Hz refresh rate and 10-point touch functionality. Its proprietary T-shaped hinge allows the screen to rotate up to 180 degrees, enabling it to be used as a tablet.

Choose your own ports

The Pocket 4 comes with up to 64GB of high-speed LPDDR5x memory and up to 2TB of PCIe Gen4 NVMe SSD storage. It sports a full-function USB-C port, USB4, HDMI 2.1, and an RJ45 network port. Wireless connectivity comes in the form of Wi-Fi 6E and Bluetooth 5.3. The device includes a 5MP front-facing camera, a QWERTY backlit keyboard, and a 45Wh battery supporting 100W PD fast charging.

Pricing for the GPD Pocket 4 starts at $829 for the model with the 8840U CPU, 16GB of RAM, and 1TB of storage.

The top-tier configuration with the HX 370 CPU, 64GB of RAM, and 2TB of storage is priced at $1,335. The Pocket 4 also supports a range of additional modules, allowing you to customize it to your needs. An RS232 port is available for $14, a single-port KVM for $48, and a 4G LTE expansion module for $110. There's also a microSD card reader with UHS-I support.

Earlier in 2024, GPD introduced the Duo, a $2,000 laptop featuring the world’s fastest mobile CPU, an OCuLink connector, and dual 13.3-inch OLED displays that are able to mirror, extend, or function independently.

That product marked a departure from GPD's usual lineup of compact gaming laptops and handheld consoles, but the company is returning to its roots with its latest creation.

The Pocket 4 is currently crowdfunding on Indiegogo, and while it offers an impressive array of features and modular options, potential backers, as always, should be aware of the risks associated with crowdfunding. Delays, changes to specifications, or project cancellations are possible, although GPD does have a proven track record of delivering backed products.

You might also like
Categories: Technology

Pages