Error message

  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

TechRadar News

New forum topics

Subscribe to TechRadar News feed
Updated: 45 min 3 sec ago

Google Maps and Android Auto are making it easier for you to find the right lane

Tue, 09/24/2024 - 04:46

Sometimes it's the small changes that are the most useful, and an update being pushed out to Google Maps and Android Auto could well be a case in point: navigation is being updated to improve lane guidance when you're driving.

As spotted by 9to5Google, the update has been rolled out without much fanfare, and expands the lane guidance panel that pops up at the top of the screen – the white arrows that show up on a green background when multiple lanes are involved.

That panel has now been expanded so it's easier to see the arrows, and how many lanes you're dealing with. As long as you're currently navigating to a destination, you'll be put in the right lane for your next turn or exit.

It's nothing major, but it means a better user experience for one of the trickier aspects of navigating around in a vehicle – especially when you're in an unfamiliar city, with traffic all around you that does seem to know which lane is which.

More Google Maps enhancements

It's been a busy few months for Google Maps updates (Image credit: Google)

Google has been pushing out a steady trickle of upgrades in recent months – sometimes alongside an official announcement of the changes, and sometimes not. It still seems to be a priority for Google (though perhaps not as much as artificial intelligence).

Back in May, updates were rolled out that made it easier for drivers to find electric vehicle charging stations, and improved how roads were highlighted in searches – giving users a better idea of the layout and the context on the map.

Then in July, the Google Maps app was upgraded to show more information about suitable parking spots near a destination, and better directions to those parking spots. Like lane changing, finding parking is often one of the more stressful parts of driving.

Other minor tweaks we've seen recently include a redesign for the pins that mark spots on the map, plus glanceable directions that show up on the lock screen of Android phones and iPhones so you can carry on navigating.

You might also like
Categories: Technology

Apple just declared a bunch of Macs obsolete – these are the affected MacBook and iMac models

Tue, 09/24/2024 - 04:38

Apple has just declared a fresh bunch of Macs obsolete, and some other models have been moved to the vintage category, including MacBooks from as recently as 2018 in the latter case.

9 to 5 Mac spotted that Apple has updated its comprehensive list of both obsolete and vintage Macs, with the following new additions.

The Macs now designated as obsolete are:

  • MacBook Air 13-inch (Early 2015)
  • MacBook Pro 13-inch (2016, with 2 Thunderbolt 3 ports)
  • MacBook Pro 13-inch (2016, with 4 Thunderbolt 3 ports)
  • MacBook Pro 15-inch (2016)
  • MacBook Pro Retina 13-inch (Early 2015)
  • MacBook Retina 12-inch (Early 2016)
  • iMac 21.5-inch (Late 2015)
  • iMac Retina 4K 21.5-inch (Late 2015)
  • iMac Retina 5K 27-inch (Late 2015)

And the Macs which are now classified as vintage are:

  • MacBook Air Retina 13-inch (2018)
  • MacBook Pro 13-inch (2017, with 2 Thunderbolt 3 ports)
  • MacBook Pro 13-inch (2018, with 4 Thunderbolt 3 ports)

As a quick refresher, Apple regularly moves Macs into these two categories, with obsolete meaning that the product in question stopped shipping to shelves over seven years ago. In this case, Apple (or its official servicing partners) will no longer provide parts for repairs on the obsolete Macs.

The vintage classification isn’t as serious, and applies to hardware that’s five years old – in this case, repairs and parts are available, but the latter may be limited. It’s essentially a warning that the Mac is on its way out, and at seven years, the machine reaches obsolete as noted.

(Image credit: Getty Images) Analysis: Progress – and profits – versus sustainability

Obsolete does not, of course, mean that your Mac needs to immediately be binned. It does, however, mean that if something goes wrong with a component, you’ve pretty much had it. (We should note that some obsolete MacBooks might be eligible for battery repairs for an extended period, as Apple reminds us on its support page linked above).

Even with a vintage Mac, you may find that a needed part isn’t available, or that you have to hunt for it. We’ve said it before, and we’ll say it again – it feels like Apple moves a bit too soon in pushing these Macs out of the ‘fully supported for repairs’ category, in a world where ideally we’re looking to give hardware more longevity in an effort to achieve better sustainability.

Of course, Apple shoves older machines out of the door on the software side of the equation, too. The latest macOS Sequoia means that in the case of a MacBook Air, you need a model from 2020 to run the operating system. Or an iMac from 2019 or later, to pick another example – far from every relatively modern Mac can run macOS 15 (check here for a full compatibility list).

You might also like
Categories: Technology

Evaluating embedded vulnerabilities and cybersecurity risks in procurement

Tue, 09/24/2024 - 03:39

When you purchase a car, would you trust it if it hadn't gone through extensive crash safety testing? Of course not. The safety and reliability of the vehicle are paramount and knowing that it has been rigorously tested gives you peace of mind.

Similarly, would you take a new prescription drug that hadn't gone through rigorous FDA safety and effectiveness testing? Absolutely not! We rely on these safety measures to protect our health and well-being.

So why is it that so many enterprises buy software and hardware without thoroughly evaluating the cybersecurity risks associated with these products? In today’s world, where cyber threats are increasing in frequency and sophistication, this blind trust in software security is not just risky—it’s unacceptable.

Why Should Software Security Analysis Be Part of the Enterprise Purchasing and Procurement Process?

In the modern enterprise, software is the backbone of every enterprise. It powers business processes, connects companies with customers and partners, automates back-office tasks, and even builds market presence. Today’s world is built on software – 3rd party software, open-source software, in-house developed software, operating system software, applications, containers, and device firmware to name a few.

However, this reliance on software comes with hidden dangers. Many companies operate under the assumption that the software they purchase is inherently secure. Unfortunately, recent high-profile software supply chain breaches have very much proven otherwise. The reality is that every piece of software, no matter how reputable the source, poses risks.

Despite this, current software procurement processes rarely include quantifiable methods to evaluate the cybersecurity risk of the products being considered. According to NetRise software analyses, there can be up to a 300% difference in software risk levels between similar software asset classes from different vendors. This means that some products may be significantly more secure than others, even if they appear similar on the surface.

The recognition that cybersecurity should be a key consideration in purchasing decisions isn’t new. Since at least 2018, there has been growing awareness that purchasing departments should evaluate the cybersecurity of a vendor’s software alongside traditional factors such as quality and delivery performance. The question is no longer whether to include cybersecurity in procurement processes, but why now more than ever.

Why Now?

Supply chain security cyber-attacks are very much on the rise, consider these alarming statistics:

According to Capterra’s “2023 Software Supply Chain Survey,” 61% of companies were impacted by a software supply chain cyber-attack in the 12 months preceding the survey.

Software supply chain attacks have become a global challenge, growing dramatically in scope and frequency. Yet, proactive efforts to mitigate these risks are still rare—only 7% of respondents to Sonatype’s ninth annual State of the Software Supply Chain report have made efforts to review security risks in their supply chains.

Clearly, the enterprise purchasing and procurement process is where these evaluations should begin.

But Isn’t Security Already Part of the Enterprise Procurement Process?

One might assume that security is already baked into the enterprise procurement process. To some extent, this is true. Many organizations do include supply chain security measures as part of their procurement practices. However, these measures typically do not include direct testing or evaluation of the cybersecurity risks of the software products being considered.

So, what does the typical enterprise procurement process include? According to the Cybersecurity and Infrastructure Security Agency (CISA), standard practices often involve:

  • Vendor questionnaires and assessments 
  • Reviews of the vendor's security policies and practices 
  • Audits of third-party certifications (e.g., ISO 27001) 
  • Contractual security requirements 
  • Supplier performance management

These steps are important, but they rely heavily on self-reporting by vendors. While we entrust third-party organizations like the National Highway Traffic Safety Administration (NHTSA) and the Food and Drug Administration (FDA) to conduct independent safety tests for cars and drugs, we often rely on software vendors to self-report their cybersecurity status. This is a critical gap in the process, and it’s where the principle of “trust but verify” must come into play.

Trust, But Verify: Knowing the Exact Vulnerability and Risk State of the Software You Purchase

Enterprises should take a proactive approach by directly analyzing the business software they are considering for purchase as part of their procurement process.

However, many organizations don’t realize this is even possible. But it is possible. And it can be done in minutes! Some may struggle to believe it when they first encounter the idea. But it is possible, and it can be done efficiently and effectively.

This is where “trust but verify” comes in. Blind trust in software can lead to devastating consequences—from data breaches to operational disruptions. Comprehensive visibility into all software components and dependencies is not just advisable; it’s necessary. And this level of visibility can be seamlessly integrated into every enterprise purchasing and procurement process.

Steps to Incorporate Software Analysis in Procurement

To address these challenges, organizations must prioritize integrating software analysis into their procurement workflows. The findings from the NetRise study underscore the critical importance of having a detailed understanding of all software components and risks. Here are some basic steps companies should consider:

Generate Comprehensive SBOMs: Creating detailed Software Bills of Materials (SBOMs) is the foundation of effective supply chain security. SBOMs provide a clear inventory of all software components, including third-party libraries and dependencies. This inventory is essential for identifying and managing risks effectively. In a recent Netrise study, we generated detailed SBOMs for 100 tested networking equipment devices and saw that each device contains 1,267 software components on average.

Implement Automated Software Risk Analysis: Using detailed software risk analysis methods, companies can uncover a complete risk picture of each software or firmware package, ensuring a thorough risk assessment. In the NetRise study, We find that the average network equipment device has 1,120 known vulnerabilities in the underlying software components.

Prioritize and Compare Software Risks: Once comprehensive visibility is achieved, organizations should prioritize vulnerabilities based on factors beyond CVSS scores, such as weaponization and network accessibility. This approach ensures that the most critical threats are identified. Using this prioritized list of critical threats, teams can compare and contrast the risk state of different considered software products. For example, in the NetRise study, we find that there are only 20 weaponized vulnerabilities per networking device on average, and looking closer there are only 7 weaponized vulnerabilities that are also network accessible.

Responsible Vulnerability and Risk Disclosure: Once implemented into purchasing and procurement processes, companies should establish processes for the responsible disclosure of vulnerability and risk assessment information to the considered software vendors. This information should be considered confidential and not shared outside the organization.

By focusing on these steps, organizations can significantly enhance the cybersecurity of their supply chain security processes and software and/or hardware purchases.

Conclusion

In today’s rapidly evolving cyber threat landscape, it’s no longer enough to trust that the software you purchase is secure. The risks are too great, and the consequences of a breach are too severe. By incorporating software analysis into the procurement process, organizations can ensure that they are making informed, secure choices when acquiring new software and hardware.

Comprehensive software visibility, automated risk analysis, and responsible risk disclosure are not just best practices—they are essential steps for any organization looking to protect its digital assets. It’s time to move beyond trust alone. It’s time to verify. By adopting these practices, organizations can build a robust foundation for their cybersecurity efforts and safeguard their operations against the growing wave of software supply chain attacks.

Now is the time to act. Integrate software analysis into your procurement process today and take control of your software supply chain security.

We feature the best patch management software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Enhancing automotive security to prepare for the EV revolution

Tue, 09/24/2024 - 01:36

Following Labour’s victory in the recent 2024 general election, they have recommitted to bringing forward the deadline for phasing out new gas and diesel cars back to 2030.

The UK Government’s Zero Emission Vehicle (ZEV) mandate requires 80% of new cars and 70% of new vans sold in the UK to be zero emission by 2030, increasing to 100% by 2035.

However, the UK is set to significantly miss current targets for electric vehicle (EV) sales by both 2030 and 2035. Fluctuating sales data and an overall decline of sales in the UK emphasizes that there is work to be done to meet Labour’s deadline.

This upcoming EV revolution also brings a breadth of cybersecurity concerns, some being their reliance on local power grids and the growing interconnectedness of vehicles worldwide. As all new cars sold will be connected by 2026, protecting drivers and repairers will be a core to nurturing the growth needed.

One way of supporting the industry’s preparedness for the introduction of EVs and other innovations is through clear and secure access to security related repair and maintenance information.

Not only does this assure protection for manufacturers sensitive repair information but it also ensures garages can streamline their processes to meet the demand and diversity of vehicles on our roads.

The critical role of secure information sharing in automotive

Secure information sharing is central to maintaining the integrity and reliability of vehicle systems in our highly interconnected and digital automotive environment.

The importance of such security measures is underpinned by a number of data breaches, notably the 2022 Arnold Clarke ransomware attack, during which an unauthorized third party accessed the personal data, including contact details, bank details, national insurance numbers, vehicle information, and more, of over 10,000 customers of the car dealership. In the following weeks and months, numerous victims reported evidence of identity theft attempts, as well as instances of successful fraud, leading to legal action which is suggested to have cost the dealership millions in damages.

The incident highlights how digital vulnerabilities can, beyond significant financial losses, quickly halt business operations, impede customer service, and increase concerns over data security, ultimately eroding trust between drivers and dealerships.

Security measures in automotive are increasingly critical as the connective nature of cars increases, due to the onset of advanced driver-assistance systems, driver monitoring systems, e-commerce, pay-by-car parking, digital key systems, and more. These innovations require greater regulation to navigate the growth in connectivity, brands, and models of vehicles, as well as vehicle types.

How SERMI streamlines information sharing

Previously, sharing data amongst independent operators (IOs), remote service suppliers (RSSs) and vehicle manufacturers was disjointed.

Each vehicle manufacturer required independent certifications, creating a cumbersome and time-consuming system for them to talk to others in the vehicle life cycle.

SERMI, the scheme for accreditation, approval and authorization to access security-related repair and maintenance information, is a standardized and single access point for everyone across the sector. It’s a framework for accreditation, approval, and authorization - ensuring secure access to critical vehicle data. This enables quicker, more accurate repairs, reducing wait times for customers.

The SERMI scheme has already been introduced in Europe across 29 countries and is set to be rolled out in the UK later this year, giving independent repair shops access to the same repair information as dealerships. Prior to SERMI, the information asymmetry between dealerships and independent garages placed independent shops at a disadvantage. Consumers often perceived dealerships to have a higher level of expertise due to their exclusive access to manufacturer information.

Not only is this scheme about accessibility, but also about maintaining security. Digital identity companies play a crucial role in enabling a smoother experience for all stakeholders involved safe from bad actors and compromise.

Importance of a Trust Centre

The Trust Centre within the SERMI scheme plays a crucial role in maintaining the integrity, security, and trustworthiness of the scheme. The Trust Centre acts as a certification authority, issuing digital certificates to authorized IO and RSS employees. These certificates authenticate the identity of the operators’ employees and enable secure access to the vehicle manufacturer’s security-related repair and maintenance information.

This helps prevent unauthorized access and potential misuse of sensitive vehicle information.

Digidentity, the Trust Centre for SERMI, have developed a secure virtual token that is stored as a digital SERMI certificate in the Digidentity Wallet on the users’ mobile phone, granting IOs and RSSs access to security related repair and maintenance information on every vehicle manufacturer’s website. This not only simplifies access but also enhances security by eliminating the need for storing or managing multiple credentials.

In addition to eliminating the need for multiple logins and passwords, and streamlining the information retrieval process, it also ensures that sensitive information from both parties remains secure.

Securing car manufacturers’ information is vital to preventing unauthorized access to diagnostic data, ensure accurate and safe vehicle repairs, and protect intellectual property. If left vulnerable to breaches, it could lead to faulty repairs, vehicle hijacking, and overall loss of consumer trust.

Strengthening this automotive security is increasingly important as the push to meet Labour’s deadline accelerates EV sales over the coming decade.

A Trust Centre plays a critical role in this, ensuring that both technicians and drivers of these vehicles can maintain trust and safety, while still supporting industry growth in line with the greater goal of achieving a successful transition to a zero-emission future.

We list the best cloud antivirus.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Citing security concerns, the US is now looking to ban Chinese and Russian-made vehicles

Mon, 09/23/2024 - 23:49

Electric vehicles made in China could be banned in the US from 2027 if a proposed new rule is passed. The US Bureau of Industry and Security (BIS) has published a Notice of Proposed Rulemaking that would prohibit the import and sale of vehicles and components made by manufacturers "with a sufficient nexus" to the People's Republic of China or Russia. 

The proposed rule focuses on specific elements in electric vehicle (EV) hardware and software, and the potentially malicious use of the information and data required by them. The Vehicle Connectivity System (VCS) allows cars to communicate externally through Bluetooth, cellular, satellite or Wi-Fi modules, while the Automated Driving System (ADS) allows a car to operate without a driver. This ban would encompass any parts imported for use in American-made cars, as well as those built into vehicles from China and Russia.

If passed without change, the only vehicles that would be exempt are those related to agricultural or mining purposes. And, while a senior Biden administration official says “[Chinese] and Russian automakers do not currently play a significant role in the US auto market", they believe it’s a necessary preventative strike given the sophistication of today's electric cars and their growing centrality.

(Image credit: Volvo)

A statement from the White House clarifies that, "These technologies include computer systems that control vehicle movement and collect sensitive driver and passenger data as well as cameras and sensors that enable automated driving systems and record detailed information about American infrastructure."

"While connected vehicles yield many benefits, the data security and cybersecurity risks posed by software and hardware components sourced from the PRC and other countries of concern are equally clear,” said National Security Advisor Jake Sullivan.

It was only this month that the US increased tariffs on Chinese EV imports to 100%, and this rule comes as China's auto exports have boomed, increasing by more than 30% in the first six months of 2024 according to the Associated Press.

Though the proposal could still see change, if passed in its current state the new software ban would take effect on all vehicles with the model year 2027, with hardware provisions beginning with model year 2030.

More privacy, fewer options

This new rule can equally be viewed as a way to protect American electric vehicle manufacturing (and its considerably more expensive vehicles) as much as being about protecting Americans’ privacy and security.

Despite heavy tariffs, cars like the Volvo EX30 undercut the Tesla Model Y in some markets, and according to The Atlantic, the average price for an EV in China is about $18,000 cheaper than the United States. Lei Xing, former Chief Editor at China Auto Review, says "If the 100 percent tariffs on made-in-China EVs were a wall, the proposed ban on connected vehicles would be a death sentence for China EV Inc."

That's not to say these new rules aren’t without merit. With the cameras, GPS tracking, microphones and other technologies of modern EVs, “It doesn't take much imagination to understand how a foreign adversary with access to this information could pose a serious risk to both our national security and the privacy of US citizens" said Gina Raimondo, Secretary of Commerce.

However, Raimondo's speculation of China causing mayhem by shutting down "hundreds of thousands of Chinese connected vehicles" aren’t likely to occur any time soon, given the insignificant role Chinese and Russian automakers play in the US. According to Statista as of August 2024, Tesla makes up 82.5% of the U.S. EV market, with the American-owned Ford (3%) and Chevrolet (2.9%), South Korean Hyundai (2.2%), and German BMW (1.8%), Volkswagen (1.7%) and Mercedes-Benz (1.4%) leaving only 4.5% split between Nissan, Kia and other manufacturers.

(Image credit: Tesla)

This obviously isn't the first tech-related legal run-in between China and America. In 2022 equipment from Huawei and ZTE was banned, and Bytedance is still fighting the forced divesting of TikTok in court.

While the potential malicious use of American data is certainly something to be wary of, if this proposition becomes law the impact on EV pricing in the US could be significant. So, while this rule will see citizens remain protected against "countries of concern" using their data, they’d also miss out on some of the world’s cheapest electric vehicles.

Categories: Technology

Alibaba's new AI video generator joins growing crowd of Sora competitors

Mon, 09/23/2024 - 22:30

It's a day ending in Y, so a new AI video generator is joining the ever-growing mass of similar tools. Alibaba is the latest to join the field with its new text-to-video model, part of its Tongyi Wanxiang portfolio. Announced at the Alibaba Cloud Apsara Conference, the AI video tool was only part of an avalanche of new AI options from the Chinese tech giant, including more than 100 new large language models (LLMs), 

Tongyi Wanxiang is Alibaba's collection of synthetic media generation models, starting with an AI image creator last year. The new tool will produce high-quality videos from text prompts in both Chinese and English and still images. Alibaba's executives bragged that the company has some of the most advanced diffusion transformer (DiT) architecture, enabling it to make videos that maintain their quality regardless of the style requested by the user, including realistic live-action and many animation styles.

Alibaba didn't spend too much time on how they envision users employing the AI video maker, but the company's emphasis on third-party partnerships is suggestive. The technology might be employed in a range of marketing and entertainment videos. It might also end up in video games, producing visual references or even entire introductory videos.

Seen Sora?

The sheer number of AI video generators out or coming soon is astonishing, considering there weren't any at the consumer level not long ago. OpenAI drew a lot of attention to the idea with its Sora model. Still, the company's decision to limit Sora to certain partners left a lot of people hunting for alternatives, and companies like Alibaba are happy to fill in some of the gaps. 

Runway, Stability AI, Pika, Hotshot, and Luma Labs' Dream Machine are only some of the most prominent examples. And Alibaba isn't alone among Chinese competitors. Kling and TikTok owner Bytedance's Jimeng are in the same race. Alibaba has said action, but the final cut with final winners and losers has yet to be filmed.

You might also like...
Categories: Technology

AI just made a mockery of CAPTCHA and that’s bad news for real people

Mon, 09/23/2024 - 20:00

Filling out CAPTCHA puzzles is tedious, but using them as (imperfect) shields against malicious bots made sense, at least until now. Artificial intelligence can now defeat those puzzles every time, according to new research from ETH Zurich. CAPTCHA, an acronym for "Completely Automated Public Turing test to tell Computers and Humans Apart," is employed across an enormous range of websites. 

However, the tool may need renaming based on how well the AI model created by the Swiss researchers solved the security measure's word and object identification puzzles.

The AI puzzle solver is built on a widely used AI model for processing pictures called You Only Look Once (YOLO). The scientists adjusted YOLO to take on Google's popular reCAPTCHAv2 version of CAPTCHA. You'll immediately recognize reCAPTCAv2 from every time you've had to click on a car, bicycle, bridge, or traffic light to prove your humanity. 

With 14,000 labeled photos of streets as training data and a little time, however, the scientists could teach YOLO to recognize the objects as well as any human. Exactly as well as a human, in fact, since the AI didn't solve every puzzle perfectly the first time. But, you may recall how you get more than one chance, assuming you don't totally mess up the puzzle. YOLO was able to perform well enough that even if it made an error in one puzzle, it would make up for it and succeed with another CAPTCHA puzzle. 

Narrowing down the scope of objects users need to identify – often just 13 categories, such as traffic lights, buses, and bicycles – allowed for easier integration across websites.

However, this same focus on a narrow set of object types is what made it easier for the YOLO-based AI model to defeat the system. According to the ETH Zurich team, the system’s simplicity worked to the AI’s advantage, allowing it to master the image-based challenges without much difficulty. Despite attempts to make CAPTCHA more sophisticated by incorporating factors like mouse movement and browser history (known as device fingerprinting), the AI's success rate remained intact.

The Rise of CAPTCHA-Solving AI

The fact that an AI system can now bypass CAPTCHA systems with a perfect success rate is a wake-up call for the cybersecurity community. CAPTCHA systems are a critical component of web security, designed to prevent bots from engaging in activities like spamming, creating fake accounts, or launching distributed denial-of-service (DDoS) attacks. If these systems are compromised, websites could become more vulnerable to automated attacks and other malicious activities.

The success of the YOLO model in cracking CAPTCHA systems is not an isolated case. In recent years, AI models have demonstrated increasing proficiency in tasks once thought to be exclusive to humans. Solving CAPTCHA puzzles is just the latest milestone in AI advancements that have reshaped expectations around machine learning and automated systems.

Implications for Everyday Users

For the average person, CAPTCHA puzzles are an everyday encounter, whether logging into an online account, submitting a form, or making an online purchase. The security of these interactions hinges on CAPTCHA’s ability to keep bots out. With this latest AI breakthrough, there’s a real risk that CAPTCHA may no longer serve its intended purpose as an effective gatekeeper.

One immediate concern is that if CAPTCHA systems become obsolete or easy for bots to bypass, it could result in an uptick in automated activities such as spam or malicious bot-driven campaigns. For instance, CAPTCHA systems are often employed to prevent bots from creating thousands of fake accounts or automatically posting spammy content across social media platforms. If bots can easily bypass CAPTCHA, it could lead to increased fraudulent activity across websites.

Additionally, as CAPTCHA technology is defeated, websites and service providers will be forced to explore more robust security mechanisms. Some alternatives being discussed include more sophisticated behavioral analysis techniques, such as tracking user interaction patterns, and biometric-based verification systems that rely on fingerprints or facial recognition.

Am I AI?

Proving that you're not a robot isn't as easy as it used to be, but that doesn't mean you have to panic about being replaced any time soon. It's simply evidence that cybersecurity needs to account for the rapidly evolving capabilities of AI models. CAPTCHA might end up phased out in favor of different puzzles to prove your humanity. 

It would have to be more intensive than simply picking the right image. A security setup might have to monitor your behavior in solving a puzzle, like how fast and well you type and scroll. Or it might take a combination of multiple tests and verifications. In other words, cybersecurity will need to be stricter, though hopefully without slowing down web browsing too much. If things get really tough, perhaps we'll all have to submit a tear after watching Mufasa die in The Lion King.

You might also like
Categories: Technology

The ChatGPT Advanced Voice mode rollout is starting, and you might be one of the lucky ones

Mon, 09/23/2024 - 19:25

A new leak on X.com seems to confirm that a select group of ChatGPT Plus users will be getting access to Advanced Voice mode today, Tuesday, September 24, 2024.

Advanced Voice mode, which OpenAI demoed back in May this year, allows you to talk to ChatGPT on your smartphone and have a human-like conversation, complete with the ability to interrupt the chatbot if its answers are going on too long. You can also ask it complex questions with the expectation of getting a detailed answer.

The leak appears to be an email from the ChatGPT team telling a user that Advanced Voice mode is “being rolled out in a limited alpha to a select group of users”. Access to the advanced mode alpha on September 24, 2024, it says, “will depend on a variety of factors including but not limited to participation invitations and the specific criteria set for the alpha testing phase.” All of which sounds like a very convoluted way of saying that not everybody can expect to get it.

Advanced Voice mode alpha

Open AI originally stated that "all Plus users will have access by the end of fall," so we’re not expecting a full rollout of the technology just yet. However, if more Plus users are going to get access to the alpha version, then that’s an encouraging sign that we can expect the full release to happen on schedule.

Being a Plus user of ChatGPT requires a monthly subscription of $20 (£16, AU$30), but gives you access to a range of LLMs, including the new version 01-preview, which launched recently and proved to be much better at solving math problems and reasoning than previous versions of the chatbot.

While OpenAI was initially ahead of its competition when it demoed its Advanced Voice mode for realistic conversations, it has started to lag behind its rivals. Google has already beaten it to launch with Gemini Live, Google’s version of a conversational AI. While Apple has yet to launch Siri 2.0, its enhanced AI assistant, we’ve seen demos and have a time frame for its release , which means we might get it sooner than we think.

You might also like...
Categories: Technology

NYT Connections today — hints and answers for Tuesday, September 24 (game #471)

Mon, 09/23/2024 - 18:02

Good morning! Let's play Connections, the NYT's clever word game that challenges you to group answers in various categories. It can be tough, so read on if you need clues.

What should you do once you've finished? Why, play some more word games of course. I've also got daily Wordle hints and answers, Strands hints and answers and Quordle hints and answers articles if you need help for those too.

SPOILER WARNING: Information about NYT Connections today is below, so don't read on if you don't want to know the answers.

NYT Connections today (game #471) - today's words

(Image credit: New York Times)

Today's NYT Connections words are…

  • BALLOON
  • BOOK
  • MODEL
  • BANNER
  • NOVEL
  • AMBASSADOR
  • CONFETTI
  • STREAMER
  • SECURE
  • CREATIVE
  • RESERVE
  • FRESH
  • ORIGINAL
  • GARLAND
  • INFLUENCER
  • CHARTER
NYT Connections today (game #471) - hint #1 - group hints

What are some clues for today's NYT Connections groups?

  • Yellow: Innovative
  • Green: Lay claim to something beforehand
  • Blue: Put them up and celebrate
  • Purple: Instagrammers?

Need more clues?

We're firmly in spoiler territory now, but read on if you want to know what the four theme answers are for today's NYT Connections puzzles…

NYT Connections today (game #471) - hint #2 - group answers

What are the answers for today's NYT Connections groups?

  • YELLOW: INSPIRED
  • GREEN: PROCURE IN ADVANCE
  • BLUE: BIT OF PARTY DECORATION
  • PURPLE: ONLINE PERSONALITY

Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.

NYT Connections today (game #471) - the answers

(Image credit: New York Times)

The answers to today's Connections, game #471, are…

  • YELLOW: INSPIRED CREATIVE, FRESH, NOVEL, ORIGINAL
  • GREEN: PROCURE IN ADVANCE BOOK, CHARTER, RESERVE, SECURE
  • BLUE: BIT OF PARTY DECORATION BALLOON, BANNER, CONFETTI, GARLAND
  • PURPLE: ONLINE PERSONALITY AMBASSADOR, INFLUENCER, MODEL, STREAMER
  • My rating: Easy
  • My score: 1 mistake

Though I did make one mistake today, I'm not beating myself up about it – because really there was no way I could have known which answer was the genuine one. This is a common theme in Connections: the inclusion of answers that act as red herrings due to their possible inclusion in multiple categories. Today I assembled three-quarters of the ONLINE PERSONALITY group, which ended up being the purple one, in the form of INFLUENCER, MODEL and STREAMER. I added in CREATIVE – because that very much is another type of online personality – but it turned out the final one was the slightly more tenuous AMBASSADOR. CREATIVE instead went in the INSPIRED yellow group, which also made sense.

None of this unduly troubled me, because this was another relatively easy Connections game, and I ticked off the others with no real problems.

How did you do today? Send me an email and let me know.

Yesterday's NYT Connections answers (Monday, 23 September, game #470)
  • YELLOW: NOT SMOOTH, AS TERRAIN BUMPY, ROUGH, RUGGED, UNEVEN
  • GREEN: BIT OF LAND FOR GROWING BED, PARCEL, PATCH, PLOT
  • BLUE: MEMBER OF A CARTOON DUO CHIP, ROCKY, SCRATCHY, STITCH
  • PURPLE: ___ PARK AMUSEMENT, NATIONAL, PARALLEL, SOUTH
What is NYT Connections?

NYT Connections is one of several increasingly popular word games made by the New York Times. It challenges you to find groups of four items that share something in common, and each group has a different difficulty level: green is easy, yellow a little harder, blue often quite tough and purple usually very difficult.

On the plus side, you don't technically need to solve the final one, as you'll be able to answer that one by a process of elimination. What's more, you can make up to four mistakes, which gives you a little bit of breathing room.

It's a little more involved than something like Wordle, however, and there are plenty of opportunities for the game to trip you up with tricks. For instance, watch out for homophones and other word games that could disguise the answers.

It's playable for free via the NYT Games site on desktop or mobile.

Categories: Technology

NYT Strands today — hints, answers and spangram for Tuesday, September 24 (game #205)

Mon, 09/23/2024 - 18:02

Strands is the NYT's latest word game after the likes of Wordle, Spelling Bee and Connections – and it's great fun. It can be difficult, though, so read on for my Strands hints.

Want more word-based fun? Then check out my Wordle today, NYT Connections today and Quordle today pages for hints and answers for those games.

SPOILER WARNING: Information about NYT Strands today is below, so don't read on if you don't want to know the answers.

NYT Strands today (game #205) - hint #1 - today's theme What is the theme of today's NYT Strands?

Today's NYT Strands theme is… Spacing out

NYT Strands today (game #205) - hint #2 - clue words

Play any of these words to unlock the in-game hints system.

  • TRAM
  • RAIN
  • SNORE
  • BORE
  • BONE
  • CUMIN
NYT Strands today (game #205) - hint #3 - spangram What is a hint for today's spangram?

Time and space

NYT Strands today (game #205) - hint #4 - spangram position What are two sides of the board that today's spangram touches?

First: top, 4th column

Last: bottom, 6th column

Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.

NYT Strands today (game #205) - the answers

(Image credit: New York Times)

The answers to today's Strands, game #205, are…

  • MARTIAN
  • CYBORG
  • DROID
  • MUTANT
  • ROBOT
  • ALIEN
  • SPANGRAM: SCIENCEFICTION
  • My rating: Easy
  • My score: Perfect

I probably found this Strands game to be even easier than most given that I've been reading SCIENCEFICTION, as the spangram would have it, for about four decades. But even if I hadn't I doubt I would have struggled too much here. Some of the words are slightly, well, basic for the topic – as I said, I read a lot of sci-fi and MUTANTS and MARTIANS really don't crop up that much compared to plenty of other themes, such as time-travel, space flight, AI and the cyberverse. But as a child's guide to the genre, it just about works.

How did you do today? Send me an email and let me know.

Yesterday's NYT Strands answers (Monday 23 September, game #204)
  • HAMSTER
  • MUSKRAT
  • SQUIRREL
  • CHINCHILLA
  • PORCUPINE
  • SPANGRAM: RODENTS
What is NYT Strands?

Strands is the NYT's new word game, following Wordle and Connections. It's now out of beta so is a fully fledged member of the NYT's games stable and can be played on the NYT Games site on desktop or mobile.

I've got a full guide to how to play NYT Strands, complete with tips for solving it, so check that out if you're struggling to beat it each day.

Categories: Technology

Quordle today – hints and answers for Tuesday, September 24 (game #974)

Mon, 09/23/2024 - 18:02

Quordle was one of the original Wordle alternatives and is still going strong now nearly 1,000 games later. It offers a genuine challenge, though, so read on if you need some Quordle hints today – or scroll down further for the answers.

Enjoy playing word games? You can also check out my Wordle today, NYT Connections today and NYT Strands today pages for hints and answers for those puzzles.

SPOILER WARNING: Information about Quordle today is below, so don't read on if you don't want to know the answers.

Quordle today (game #974) - hint #1 - Vowels How many different vowels are in Quordle today?

The number of different vowels in Quordle today is 3*.

* Note that by vowel we mean the five standard vowels (A, E, I, O, U), not Y (which is sometimes counted as a vowel too).

Quordle today (game #974) - hint #2 - repeated letters Do any of today's Quordle answers contain repeated letters?

The number of Quordle answers containing a repeated letter today is 1.

Quordle today (game #974) - hint #3 - uncommon letters Do the letters Q, Z, X or J appear in Quordle today?

• No. None of Q, Z, X or J appear among today's Quordle answers.

Quordle today (game #974) - hint #4 - starting letters (1) Do any of today's Quordle puzzles start with the same letter?

The number of today's Quordle answers starting with the same letter is 2.

If you just want to know the answers at this stage, simply scroll down. If you're not ready yet then here's one more clue to make things a lot easier:

Quordle today (game #974) - hint #5 - starting letters (2) What letters do today's Quordle answers start with?

• S

• I

• S

• B

Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.

Quordle today (game #974) - the answers

(Image credit: Merriam-Webster)

The answers to today's Quordle, game #974, are…

  • SPACE
  • INNER
  • SPAWN
  • BEGAT

No uncommon letters today, but a couple of tricky words. BEGAT, in particular, caused me a lot of mental anguish; I stared at the board for about 10 minutes, unable to find anything that fit, until finally I got it. Neither INNER or SPAWN were that easy either, so I again struggled a little, while escaping with my streak intact.

How did you do today? Send me an email and let me know.

Daily Sequence today (game #974) - the answers

(Image credit: Merriam-Webster)

The answers to today's Quordle Daily Sequence, game #974, are…

  • CREAK
  • MUNCH
  • CRASS
  • TWICE
Quordle answers: The past 20
  • Quordle #973, Monday 23 September: GUILT, STERN, ANNEX, FIELD
  • Quordle #972, Sunday 22 September: ZESTY, MEATY, ALIVE, DRAWN
  • Quordle #971, Saturday 21 September: VITAL, FRAIL, SPEAR, EERIE
  • Quordle #970, Friday 20 September: ELIDE, DITTO, SHAWL, BONUS
  • Quordle #969, Thursday 19 September: MARRY, OWING, DICEY, LUCKY
  • Quordle #968, Wednesday 18 September: CEDAR, VENOM, MIGHT, MEDIC
  • Quordle #967, Tuesday 17 September: ETHOS, COUNT, PRINT, THREE
  • Quordle #966, Monday 16 September: ROUGE, SWAMP, FUGUE, UNDUE
  • Quordle #965, Sunday 15 September: VILLA, SMOKE, BULKY, THRUM
  • Quordle #964, Saturday 14 September: ESSAY, GENRE, WIMPY, CHUTE
  • Quordle #963, Friday 13 September: LEANT, ORGAN, FILLY, PLAIT
  • Quordle #962, Thursday 12 September: ARBOR, STARK, LEAVE, GOOFY
  • Quordle #961, Wednesday 11 September: ROUGH, CACTI, SAVOY, ODDER
  • Quordle #960, Tuesday 10 September: PLUMB, SEIZE, EARLY, ASSET
  • Quordle #959, Monday 9 September: CHIRP, BEADY, THETA, MINUS
  • Quordle #958, Sunday 8 September: TEASE, AGATE, PRIDE, PLATE
  • Quordle #957, Saturday 7 September: LASSO, TILDE, BUNCH, PRONG
  • Quordle #956, Friday 6 September: FARCE, WOOLY, LOCAL, NIGHT
  • Quordle #955, Thursday 5 September: SNIDE, EGRET, AMONG, SHINY
  • Quordle #954, Wednesday 4 September: POINT, WITTY, GAFFE, ABUSE
Categories: Technology

It's not a Switch 2, but a Nintendo device just passed through this US regulatory agency

Mon, 09/23/2024 - 18:00

While we’re all awaiting an eventual unveiling of the Nintendo Switch 2, the company seems to be working on yet another device. A new wireless device made by Nintendo has been spotted making its way through the Federal Communications Commission (FCC) in the United States. 

And no, it’s not the Nintendo Switch 2, seeing that the device is tagged simply as a “wireless device,” and the word console is not mentioned. It does carry a similar ID – CLO-001 –, though, ending in 001, which is similar to the Nintendo Switch (HAC-001), Switch OLED (HEG-001), and Switch Lite (HDH-001). 

Thanks to a diagram showing where the model number and FCC label will appear, we know this gadget will take the form of a rounded square with a divot containing this information on the back. Inside, it lacks a battery and a boatload of connectivity as it only features a 24GHz mmWave sensor and a 2.4GHz Wi-Fi antenna. It also doesn’t feature a battery, meaning it needs to be plugged in via the USB-C port.

(Image credit: FCC)

However, we're left with more questions than answers aside from a diagram showing where the FCC identifying will be affixed – as a divot in the plastic on a square-shaped gadget. TheVerge notes that the onboard mmWAve sensor “could be a radar sensor to track movement,” meaning it might be more of a companion peripheral.

Their guess, like ours, is as good as yours at this point for what this mysterious Nintendo device could be. It could be a new accessory for a game, maybe a move into health or fitness like Wii Fit from many years ago, or something for more internal purposes.

After all, Nintendo partners with Universal for Super Mario World in Japan and California, and another version is set to open in 2025 in Florida. If you’re still waiting for Nintendo’s next-generation Switch, check out our guide for everything we know about the rumored console here.

Categories: Technology

An iPhone 16 Pro Max failed this drop test, but that doesn't have to be you

Mon, 09/23/2024 - 17:00

Glass is smooth, shiny, and beautiful, the perfect surface to transfer your touch and intention to your iPhone 16 Pro Max's brilliant mind. However, it's also not indestructible and sometimes does glassy things like shatter into countless pieces when dropped. That's the finding of a recent AllState drop test with Apple's latest series of iPhones.

The US-based insurance company has been dropping iPhones for 13 years and reports that the iPhone 16 Pro Max did not survive its 'Breakability' test this year. No iPhone has survived the Allstate Protection Plan's drop test in more than a dozen years.

When the company put the iPhone 16 Pro Max in a special rig, a.k.a 'Dropbot,' and dropped it from a height of 6 feet onto a concrete sidewalk surface face down, the screen shattered, the display flickered, and then went dark (See the test for yourself in the video below).

Since haptic responses could still be felt when touching the screen, there is a chance that only the display would have to be replaced. When they performed the same test with the back facing down, the glass around the camera array cracked, but the phone remained otherwise completely functional. This is a better result than the iPhone 15 Pro Max, which last year became inoperable after a drop on its back.

Obviously, AllState, which sells additional mobile device protection, has some skin in the game here. Potentially proving that the iPhone is not concrete proof might make people more open to considering a protection plan from their company for their new iPhone 16 Pro Max.

The results, though, are a bit dispiriting. During the launch, Apple said that its second-generation Ceramic Sheild, a custom glass blend co-developed with Corning (they make the Gorilla Glass on most top-tier smartphones), is not only 50% stronger than the first generation but also tougher than the glass found on most other smartphones.

I've been testing both the iPhone 16 Pro Max and iPhone 16 Pro, which are excellent Apple Intelligence-infused smartphones with slightly updated and larger designs. I don't purposely conduct drop tests, though I did accidentally drop the iPhone 16 Pro Max from a height of 3 feet onto a rugged floor.

It was, as you would expect, fine. I also put cases on both phones. The iPhone 16 Pro Max is currently in a lovely Speck case. They're hugely durable and protect the back, sides, and edges, and since edges and corners are stress points for these edge-to-edge Super Retina XDR displays, they help protect the glass on them, too.

The iPhone 16 Pro is in a silicon case, which provides good protection. However, when I looked at the screen a couple of days ago, I noticed a scratch running almost the length of the phone. I can promise you I was not carrying around the phone with a diamond or key in my pocket. I am so careful, and yet there's the scratch.

My point, and perhaps Allstate's, is that this is glass, and there is only so much you can do to protect it. As I wrote last month, "It's still far too easy to damage our precious phones." In that instance, I was writing about the new Google Pixel 9, a Gorilla glass Victus 2-covered handset that also quickly ended up with an uncountable scratch.

These tests are simply not conclusive. Allstate used two different phones to run the front and back drop tests. When the results with DropBot yielded virtually the same results as last year, Allstate opted to not run them again. There is a chance that further tests would've yielded different results. I've seen people drop their phones on the pavement from four or five feet, with the devices hitting, tumbling, and somehow surviving without a scratch.

While it's true the iPhone 16 Pro Max didn't fare well on these tests, we'll never know what hundreds of similar drops would've yielded. As far as I'm concerned, the breakability of these devices is not down to some build deficit, but I do think there is an element of luck. That's why cases are so popular – they're the one way of stacking the odds in your favor.

I did ask Apple for comment and will update this post with their response.

You might also like
Categories: Technology

I want one! MSI quietly debuts sub-1kg laptop with a killer price tag and exceptional performance — prestige 13 AI+ will appeal to businesses and no, don't get put off by its lack of RAM upgradability

Mon, 09/23/2024 - 12:33

MSI has quietly launched the Prestige 13 AI+ Evo A2VM, a super-lightweight laptop aimed at business professionals and creatives alike.

First unveiled at IFA 2024, the device is powered by up to an Intel Core Ultra 9 288V processor (offering up to 48 NPU TOPS and a total of 120 AI TOPS), paired with Intel Arc 140V graphics.

The device, available in Stellar Gray, comes equipped with 32GB of LPDDR5x-8533 memory. As with all Intel Lunar Lake processors, the RAM is packaged together with the processor and so can't be upgraded, unfortunately. The 1TB PCIe Gen4 SSD can be upgraded however, which is great news for users needing more storage.

MSI AI Engine

Measuring 299 x 210 x 16.9 mm and weighing just 0.99 kg (around 2.18 lbs), the Prestige 13 AI+ Evo features a magnesium-aluminum alloy chassis built using Advanced Thixomolding Technology, which MSI claims delivers both durability and portability. It has a 13.3-inch 2.8K (2880x1800) OLED display.

The Prestige 13 AI+ Evo comes with a 75Whr battery and offers a decent selection of ports, including two Thunderbolt 4 (with DisplayPort and Power Delivery 3.0), a USB 3.2 Gen1 Type-A port, an HDMI 2.1 port (supporting 8K at 60Hz and 4K at 120Hz), a 3.5mm audio jack, and a microSD card reader. Wireless connectivity comes in the form of Intel Killer BE Wi-Fi 7 and Bluetooth 5.4.

MSI says its AI Engine will automatically detect user scenarios and adjust hardware settings to optimize performance across various tasks. The laptop’s IR 5MP webcam (30fps@1944p) with a physical shutter incorporates 3D Noise Reduction+ (3DNR+) and AI Noise Cancellation Pro technology. Audio is powered by 2x 2W speakers.

EXcaliberPC is currently offering the Prestige 13 AI+ Evo A2VMG, featuring the Intel Ultra 7-258V processor, 32GB RAM, and 1TB SSD, for $1,399, with shipping expected to begin on September 24, 2024. Other configurations with the more powerful Ultra 9 processor are likely to arrive by the end of the year.

More from TechRadar Pro
Categories: Technology

Pretty Little Liars reboot canceled after two seasons on Max and I’m now not sure I can trust the show’s 90% Rotten Tomatoes score

Mon, 09/23/2024 - 11:55

School's out for Pretty Little Liars: Summer School as Max has canceled the show after two seasons.

One of the best streaming services has decided not to renew the series three months after it ended on Max. The reboot is a horror twist on the original 2010 hit mystery drama series Pretty Little Liars and was originally called Pretty Little Liars: Original Sin (2022) before being renamed to Pretty Little Liars: Summer School in the second season.

It's usually rare to see a reboot series receive higher critical praise than its predecessor, but that's exactly the case for this show. Pretty Little Liars: Summer School has 90% on Rotten Tomatoes, while the original series has 81%. Looking at this achievement, I'm at a loss on why one of the best Max shows was canceled, and can only think that it was possibly due to low viewership figures.

Similarly to AMC Networks canceling Orphan Black: Echoes, one factor could also be that it's because Pretty Little Liars: Summer School failed to gather a dedicated fanbase like the original series, with TechRadar's editorial associate Rowan Davies saying: "The last thing we needed was another Pretty Little Liars series." So maybe I can't trust that 90% Rotten Tomatoes score after all!

What is Pretty Little Liars: Summer School about? 

Set in the town of Millwood, the reboot follows five teenage girls who are being terrorised by a mysterious person wanting revenge for their mothers' sins.

After revealing the villain who had been tormenting the group, the season two finale ended on a cliff-hanger as it teased a new threat with a group of girls wearing masks resembling the 'Liars' walking the corridors of the high school. Now, their identities will remain a mystery.

Max said in a statement to Decider: “While Max will not be moving forward with a third season of Pretty Little Liars[Summer School], we are so grateful to our co-creators, Roberto Aguirre-Sacasa and Lindsay Calhoon Bring, as well as the team at Warner Bros. Television, for reintroducing fans to this new iteration of liars who band together to fight the latest creepy villain terrifying Millwood. Their unique and modern creative vision – combined with the immense talent of our cast and crew – gave the series a fun, horror-filled point of view that paid tribute to its original Rosewood roots."

The series featured Bailee Madison, Chandler Kinney, Zaria, Malia Pyles, and Maia Reficco as the next iteration of Pretty Little Liars

You might also like
Categories: Technology

Sony confirms State of Play for tomorrow, September 24th, promising "news and updates on over 20 titles"

Mon, 09/23/2024 - 11:48

Sony has confirmed that the next State of Play presentation will happen tomorrow, Tuesday, September 24, and will provide "news and updates on more than 20 upcoming PS5 and PS VR2 games from studios around the world". 

The announcement, which was made on X / Twitter, was accompanied by a new PlayStation blog post also confirming it will be a and will be a "30+ minute" show. Beyond the above, both are pretty lean on actual information about what to expect, though we know to tune in tomorrow, September 24, at 3pm PDT / 6pm EDT / 11PM BST to catch the show. It also confirms that you will be able to watch the stream via the PlayStation YouTube channel as well as Twitch.

With the PlayStation 5 Pro announcement under our belts - PS5 Pro pre-orders start this week too, remember - this State of Play must surely be about the games and what Sony has planned for the next year.

We're still waiting for, and hoping for, updates on long-rumored Marvel's Spider-Man 2 DLC, any news on Marvel's Wolverine from Insomniac Games, and more details on Hideo Kojima's next game Death Stranding 2: On the Beach, for example. 

Fans have also been pining for more information on what the heck Naughty Dog is up to after The Last of Us Part II Remastered came out earlier this year, and what Suckerpunch might be working on - Ghost of Tsushima 2 details this week, anyone? 

In fact, there's a whole host of information on blockbuster games and high-profile studios that we want to hear more on or about but we'll just have to wait and see.

With the 30th Anniversary of PlayStation on the horizon too, we might well see some more information on those celebrations - beyond the already-announced limited edition hardware and collectible products.

You might also like...
  • Best PS5 games: top PlayStation 5 titles to play right now
  • PS5 Pro vs PS5: comparing specs, design, dimensions, features, and more
  • PS5 Pro specs: how powerful the new PlayStation 5 console is, and how it compares to the PS5
Categories: Technology

'The most ambitious thing we've attempted': The Rings of Power creators on the year-long journey to bring season 2's Siege of Eregion sequence to life

Mon, 09/23/2024 - 11:00

The Rings of Power season 2's forthcoming tentpole battle sequence is the "most ambitious undertaking we've ever attempted." That's according to co-showrunner Patrick McKay, who left me in no uncertain terms about the size, scale, and scope of this season's action spectacle.

Speaking to TechRadar ahead of season 2's launch in late August, McKay opened up the amount of work that went into bringing the Siege of Eregion to life. An era-defining battle, the bloody and devastating conflict is arguably the most significant of The Lord of the Rings' iconic fights. Indeed, not only does it kick off the War of the Elves and Sauron that spans much of Middle-earth's Second Age, but it also shapes events in the Third Age, the biggest of which were covered in Peter Jackson's The Hobbit and The Lord of the Rings movie trilogies.

Some of the battles depicted in those films, such as The Two Towers' Helm's Deep and The Return of the King's Siege of Gondor, clearly influenced elements of The Rings of Power's take on the Siege of Eregion. During our chat, McKay and co-creator J.D. Payne didn't elaborate on what inspirations they took from that duo that informed the Prime Video show's latest big-budget battle. 

Nonetheless, McKay and Payne wanted to honor the multi-stage action-set pieces that Jackson and company adapted for the big screen and how the Siege of Eregion is described in Tolkien's literary works.

Elrond takes center stage during The Siege of Eregion (Image credit: Ross Ferguson/Prime Video)

"The Siege of Eregion is the most ambitious undertaking we've ever attempted on this show," McKay admitted, "Which is really saying something, because everything on this show is ambitious." 

"We wanted to do a classic, epic, and rip-roaring Tolkienian battle with not just two sides, but with multiple armies and multiple races colliding. Also, sieges don't take place over one day or night, but over a matter of weeks or months, so we want you to feel that time. We want you to feel the phases it moves through. We have an aerial bombardment, destruction of the city and the natural environment, [and] then there's a horse charge and a ground assault. By the eighth episode, it devolves into hand-to-hand street fighting, like [the Battle of] Stalingrad."

Adar leads his Uruk and orc forces towards Eregion as he attempts to kill Sauron once more (Image credit: Prime Video)

That sounds like a lot to pack into the Amazon prequel series' last two episodes – and that's before you even account for season 2's other storylines in Númenor, Pelargir, Khazad-dûm, and Rhûn that also need some form of resolution before The Rings of Power departs our screens once more. It's a good job, then, that McKay, Payne, and the show's thousands-strong cast and crew prepared thoroughly to ensure that filming the Siege of Eregion went as smoothly as possible.

"It took a year to prepare," McKay revealed, "And it took weeks to shoot. We had hundreds of extras, and an immeasurable amount of prosthetics made by Barrie and Sarah Gower. Then there's the stunt work performed by our amazing stunt team, the pyrotechnics, our CGI troll, and then our producing director Charlotte Brandstrom and second unit director Vic Armstrong who captured it all on camera. It's all of the things, all of the time, but we're really proud of the result."

The Siege of Eregion will aim to rival similar tent-pole battles seen in The Lord of the Rings movies (Image credit: Prime Video)

So, we can expect an episode or two akin to the 'Battle of the Bastards' and 'The Long Night' episodes in HBO's Game of Thrones, right? Not quite. As I mentioned, there are other narratives running concurrent to the Siege of Eregion, so one of the best Prime Video shows' second season won't end with an episodic pair that'll leave audiences drained by its conclusion.

"It's not wall-to-wall action," McKay admitted. "You're moving in and out of sequences of very tense action and emotional character-driven moments. The Siege of Eregion is not just the big bang at the end of the season. It is that, too, but it also the knot that binds all of these different story threads involving Galadriel, Sauron, Adar, Celebrimbor, Elrond, and Durin – it ties them together. So, you're not just getting narrative explosions; it's also emotional character explosions, epiphanies and huge changes to the course of Middle-earth's history."

As Galadriel observed in season 2 episode 4, then, you'll need to "prepare yourselves" for tragic and heroic moments alike. Before this season's penultimate chapter arrives, be sure to read some of my exclusives with the series' cast below, which tease what's to come in the final two episodes.

You might also like
Categories: Technology

Hate in-person meetings? Good, they cost thousands in lost productivity

Mon, 09/23/2024 - 11:00

A new report by Zoom has revealed that in person meetings are both the most unpopular and the least productive of all collaborative methods, with many preferring instant messages instead.

Over a third of leaders lose more than an hour per day resolving problems caused by poor teamwork, which could be costing businesses up to £12,000 per manager per year.

Perhaps the least surprising news from the report is the claim that teams who use more than 10 apps are twice as likely to spend an hour or more resolving collaboration issues than those who use fewer than five apps.

Generational differences

All generations except Baby Boomers prefer non face-to-face collaboration, such as project management software or instant messaging. However, in person sessions still top the charts for boomers. Gen Z are the most burdened by follow ups, taking over an hour per day on project statuses.

To boost efficiency, some are turning to AI, with 67% using the technology at least a few times a week, and 74% of leaders feel this makes them more productive. Asynchronous collaboration methods like shared documents are the preference for 46% of AI users, as opposed to 20% of non-AI users.

Recent studies have hailed AI as a productivity booster, with Workday estimating the UK GDP could be £119 billion better off. The study found that a potential 2.9 hours per day could be saved using AI, which equates to 92 working days per year.

However, almost 93% of UK employees and leaders share concerns about trust in AI, with 38% needing more time to educate their teams, 32% feeling there is a lack of investment, and 38% having fears over privacy, safety, or bias.

More from TechRadar Pro
Categories: Technology

Security pros are getting increasingly stressed by AI expectations from their bosses

Mon, 09/23/2024 - 10:03

Business heads are expecting AI to work miracles within their security teams, mounting the pressures faced by already shorthanded and under-skilled security pros, new research has claimed.

A report from IDC and Expereo found 60% of CIOs saying the inclusion of AI within their security strategy has boosted their personal reputation, but 47% also say that their board has unrealistic expectations of the technology.

However, while enhancing their personal reputation could be a silver lining, 39% of respondents said that their elevated profile made their job more stressful.

AI-nxiety

Some businesses are considering introducing a ‘Chief AI Officer’ to manage the implementation of AI technologies and the opportunities and advantages they offer, but 40% of those surveyed believe that the CAIO role would gradually absorb many of the CIO responsibilities within two years.

A further 38% also fear that AI could potentially replace their role, or a role within their team, and it’s not just reserved for IT roles, with 46% stating that jobs outside of the IT sector are at risk of being replaced by automation.

“Technology leaders are at the forefront of driving innovation and transformation in their organisations, but they also face significant challenges and pressures from the business and the board," noted Expereo CEO Ben Elms.

"It’s vital that CIOs align with their CEOs to ensure they are given the proper support by their stakeholders, teams and their external partners, to help them make the most of a challenging but exciting technology landscape.”

There are positive opportunities presented by AI, with business leaders remaining optimistic about the future of technology. 68% of business leaders stated that this is the most exciting time to be in their role, with an additional 71% believing that their current tech strategy will support growth and efficiency gains.

But with these opportunities, it is expected that the role of technology leaders will expand to encompass more responsibilities within businesses, such as orchestrating digital transformation and discovering ways of generating digital revenue in order to justify ROI for budget increases. The report also found that currently, just 7% of respondents have to justify the ROI on budget increases, but this is expected to rise to 12% within two years.

More from TechRadar Pro
Categories: Technology

Disney is ditching Slack for Microsoft Teams following data breach

Mon, 09/23/2024 - 10:03

Disney is reportedly phasing out its use of Slack following a significant data breach, with plans to migrate over to Microsoft Teams for internal communications and collaboration.

The move comes after a July incident where hackers accessed Disney’s internal Slack archives to leak 1.1TB of sensitive information, exposing confidential company messages, project details and employee information.

According to an internal memo seen by Business Insider, the California-based media and entertainment company plans to transition to Teams by the end of Q2 2025.

Disney no longer trusts Slack after data leak

The move from Slack to Teams is being branded as one that addresses cybersecurity concerns following the July incident.

NullBulge, the hacktivist group responsible for the incident, reportedly breached 10,000 Slack channels that included internal communications and sensitive information like images, source code and credentials. The information dated back to 2019.

However, many staff are reportedly concerned that the move is also one designed to reduce ongoing costs. Many fear the transition could be filled with complexities, including the requirement for retraining and broken integrations.

Disney, together with other big corps, has been criticized for using centralized platforms that don’t offer end-to-end encryption.

Despite complaints from staff, Disney looks to be continuing with its plan to migrate to Teams, which is end-to-end encrypted.

Disney’s incident wasn’t the only high-profile Slack-based cyberattack to have happened recently – Uber, EA Games, Grand Theft Auto, X and Slack have all fallen subject to similar attacks, raising questions about the Salesforce-owned platform’s security measures.

TechRadar Pro has asked Disney, Slack and Microsoft to comment on the reports, but none of the companies immediately responded to us.

More from TechRadar Pro
Categories: Technology

Pages