A team of researchers at the University of Hong Kong has designed and tested an advanced aerial robot capable of navigating complex environments at high speeds of up to 20 meters per second while maintaining precise control.
Named SUPER, the quadcopter drone uses cutting-edge LiDAR technology to detect and avoid obstacles, even thin wires that have posed challenges for traditional drones.
In research published on Science Robotics (via Techxplore), the team noted while SUPER has potential applications in search and rescue, its ability to operate autonomously in unknown environments suggests it could also be used for law enforcement and military reconnaissance.
The power of LiDAR for precision flightUnlike conventional aerial robots that rely on cameras and sensors, SUPER uses 3D light detection and ranging (LiDAR) to map its surroundings and process spatial data in real time, allowing it to function in low-light conditions.
With a detection range of up to 70 meters, the LiDAR system feeds data to an onboard computer that continuously analyzes the environment.
This system enables SUPER to chart two distinct flight paths, one prioritizing safety and another allowing for exploratory movement.
To demonstrate its capabilities, the research team tested SUPER against a commercial drone, the DJI Mavic 3.
While the DJI model avoided larger obstacles, it struggled to detect thin wires of smaller diameters. In contrast, SUPER successfully avoided all obstacles, including 2.5-mm thin wires, thanks to its high-resolution point cloud processing.
The test result also reveals the drone glided through dense forests, tracking moving targets without colliding with trees or branches.
You may also likeGoogle has dropped a major upgrade to the Gemini app with the release of the Gemini 2.0 Flash Thinking Experimental model, among others. This combines the speed of the original 2.0 model with improved reasoning abilities. So, it can think fast but will think things through before it speaks. For anyone who has ever wished their AI assistant could process more complex ideas without slowing its response time, this update is a promising step forward.
Gemini 2.0 Flash was originally designed as a high-efficiency workhorse for those who wanted rapid AI responses without sacrificing too much in terms of accuracy. Earlier this year, Google updated it in AI Studio to enhance its ability to reason through tougher problems, calling it the Thinking Experimental. Now, it’s being made widely available in the Gemini app for everyday users. Whether you’re brainstorming a project, tackling a math problem, or just trying to figure out what to cook with the three random ingredients left in your fridge, Flash Thinking Experimental is ready to help.
Beyond the Thinking Experimental, the Gemini app is getting additional models. The Gemini 2.0 Pro Experimental is an even more powerful one, albeit a somewhat more cumbersome version of Gemini. It's aimed at coding and handling complex prompts. It’s already been available in Google AI Studio and Vertex AI.
Now, you can get it in the Gemini app, too, but only if you subscribe to Gemini Advanced. With a context window of two million tokens, this model can simultaneously digest and process massive amounts of information, making it ideal for research, programming, or rather ridiculously complicated questions. The model can also utilize other Google tools like Search if necessary.
Lite speedGemini is also augmenting its app with a slimmer model called Gemini 2.0 Flash-Lite. This model is built to improve on its predecessor, 1.5 Flash. It retains the speed that made the original Flash models popular while performing better on quality benchmarks. In a real-world example, Google says it can generate relevant captions for around 40,000 unique photos for less than a dollar, making it a potentially fantastic resource for content creators on a budget.
Beyond just making AI faster or more affordable, Google is pushing for broader accessibility by ensuring all these models support multimodal input. Currently, the AI only produces text-based output, but additional capabilities are expected in the coming months. That means users will eventually be able to interact with Gemini in more ways, whether through voice, images, or other formats.
What makes all of this particularly significant is how AI models like Gemini 2.0 are shaping the way people interact with technology. AI is no longer just a tool that spits out basic answers; it’s evolving into something that can reason, assist in creative processes, and handle deeply complex requests.
How people use the Gemini 2.0 Flash Thinking Experimental model and other updates could show a glimpse into the future of AI-assisted thinking. It continues Google's dream of incorporating Gemini into every aspect of your life by offering streamlined access to a relatively powerful yet lightweight AI model.
Whether that means solving complex problems, generating code, or just having an AI that doesn’t freeze up when asked something a little tricky, it’s a step toward AI that feels less like a gimmick and more like a true assistant. With additional models catering to both high-performance and cost-conscious users, Google is likely hoping to have an answer for anyone's AI requests.
You might also likeiOS 18.3 is here – and contrary to rumors being spread on TikTok and elsewhere, it doesn’t install Elon Musk’s Starlink tech on your iPhone. So, there’s no reason not to get the latest iOS update on your iPhone and ensure that you’re up to date.
iOS 18.3 is a relatively minor update, which mostly impacts Apple Intelligence – enabling the AI features by default and rolling out some fixes for Notification Summaries – and fixing several bugs. It does, however, make a change for T-Mobile customers by allowing the iPhone 14, iPhone 15, and iPhone 16 lineups to potentially connect to the Starlink-powered terrestrial network of the carrier.
It is not, however, allowing that connection by default, and T-Mobile’s partnership with Starlink is still in beta for a select few customers who opt to join it and then get selected to participate. Apple doesn’t have a partnership with Starlink, but T-Mobile does, and you need to opt in a few ways. Let’s unpack this ahead.
The myth: iOS 18.3 installs Starlink on your iPhone (Image credit: Future/Jacob Krol)The concern in the now viral TikToks is that the latest version of iOS basically adds a direct connection to Starlink to your iPhone. The main point of concern is that ‘Starlink can now work with iPhone and access it’ without any formal announcement from Apple on if it’s a mandatory connection.
Apple initially launched its Emergency SOS via Satellite service alongside the iPhone 14 – with support for the iPhone 15 and 16 – so the smartphones could connect to a satellite. However, it’s not on by default and is only engaged when no LTE or Wi-Fi network is available.
Since then, some carriers have offered satellite networks alongside a typical phone network. T-Mobile is doing that, and it initially announced its partnership with Starlink in August 2022.
Apple also updated a support page detailing how to turn off carrier-powered satellite features. To do this, open Settings, navigate to Cellular, select your carrier, and turn off ‘Satellite.’
Simply, though, iOS 18.3 does not install Starlink on the iPhone. Essentially, it is packaged within iOS 18.3 as a carrier network settings update for T-Mobile that allows for the connection. It is not on by default, though, and you need to be selected to join the beta after requesting a spot.
The reality: T-Mobile has a partnership with Starlink that is currently in beta and iOS 18.3 is safe to install (Image credit: Apple)So no, iOS 18.3 does not add a direct line to the Starlink network – forced or unforced – as some viral TikToks claim. It makes network settings changes that allow T-Mobile-connected iPhone 14, 15, or 16 to connect to T-Mobile 1900MHz spectrum, accessed through antenna ‘band 25’ on the iPhone to access the Starlink network.
Even for that network connection to happen, you need to have an eligible T-Mobile plan, register for the beta, and be selected to participate in it. Then, you need to be in an area where that network is supported and when a typical cellular network or Wi-Fi is unavailable. You’ll know that is the case when you see “SAT” replace the standard cellular bars and “4G,” “5G,” or “5G UW” in the top right corner of your iPhone.
T-Mobile opened its Starlink network beta program in December 2024, and interested customers have been able to register for it. It was first available to Android smartphones, and then the capability for the iPhone rolled out with iOS 18.3.
The partnership and the ability for T-Mobile devices to connect to Starlink’s direct-to-cell technology aims to reduce dead zones and allow users to stay connected. T-Mobile is also the only cellular network in the United States to have this partnership with Starlink.
Apple’s satellite connectivity for its iPhone under the ‘Emergency SOS’ feature is not Starlink and is done through a partnership with Globalstar.
Furthermore, it’s also best practice to keep your iPhone and other devices up to date, as using older software can make them more susceptible to security and privacy issues. iOS 18.3, like most iOS updates, brings some new features but also, at times, critical bug fixes and important security patches.
So, long story short, iOS 18.3 does not add a direct connection to Starlink to your iPhone. It simply allows a T-Mobile-connected iPhone to use that network when you're outside of traditional coverage if you’ve opted into the beta and have been selected. It’s also a partnership between T-Mobile and Starlink – Apple isn’t involved there and it doesn't have any impact or change to Apple's Emergency SOS via Satellite functionality. That service has been using Globalstar satellites since its inception.
If you’re on T-Mobile and want to opt out of using Starlink, open Settings on your iPhone, click Cellular, select your Carrier (in this case, T-Mobile), and turn off Satellite.
You might also likeChipmaking giant AMD has confirmed it recently patched a high-severity vulnerability affecting its Zen 1 to Zen 4 CPUs.
The company published a new security advisory, detailing the bug and its potential for exploitation, noting, “Researchers from Google have provided AMD with information on a potential vulnerability that, if successfully exploited, could lead to the loss of SEV-based protection of a confidential guest."
SEV is short for Secure Encrypted Virtualization - a hardware-based security feature designed to enhance the confidentiality and integrity of virtual machines (VMs) running on AMD EPYC processors. It encrypts the memory of individual VMs using unique encryption keys, ensuring that neither the hypervisor nor other VMs can access their data.
Mitigations availableThe vulnerability is tracked as CVE-2024-56161, and has a severity score of 7.2/10 (high). It is described as an improper signature verification flaw in AMD CPU ROM microcode patch loader, which could allow threat actors with local admin privileges to load malicious CPU microcode. As a result, the confidentiality and integrity of a confidential guest running under AMD SEV-SNP would be lost.
“AMD has made available a mitigation for this issue which requires updating microcode on all impacted platforms to help prevent an attacker from loading malicious microcode,” the company concluded.
“Additionally, an SEV firmware update is required for some platforms to support SEV-SNP attestation. Updating the system BIOS image and rebooting the platform will enable attestation of the mitigation. A confidential guest can verify the mitigation has been enabled on the target platform through the SEV-SNP attestation report.”
The company only publicly disclosed the flaw recently, but the patch was actually released in mid-December 2024. AMD decided to delay the announcement to give its customers enough time to mitigate the problem.
You might also likeAt least two workstation specialists have put supercharged PCs with Nvidia RTX 5090 GPUs on sale over the past few days. The most impressive of them all is the Bizon ZX5500 which packs up to seven (yes, seven) water-cooled 32GB RTX 5090 GPUs in a tall tower casing. This is the best GPU ever built and buying it through system builders seems to be the only way to avoid months-long wait.
While BizonTech's solution will probably feature in our best workstation guide, it is not as expansive as Comino’s Grando server, which has eight RTX 5090 GPUs, but the latter has yet to get a launch date (I contacted Comino for more details).
The ZX5500 doesn't come cheap at just under $102,000 with the GPUs accounting the lion share (more than 83%) of the total cost. That’s almost 3x the price of MIFCOM’s Big Boss which has seven liquid-cooled RTX 4090 GPUs.
A beefier 6Kw power supply unit plus and the cards cost an extra $85,000 compared to the same system with a pair of RTX 5080 (with 16GB VRAM each). As a reminder, the suggested retail price of the RTX 5090 is ‘just’ $2000.
An RTX 5090 on its retail packaging on a desk (Image credit: Future)The ZX5500 can be updated to a 96-core ThreadRipper Pro CPU with 1TB of DDR5 RAM, almost 1PB of PCIe 4.0 SSDs (15 x 61.44TB SSD) and seven liquid-cooled Nvidia H200 AI GPU; such a configuration pushes the price above half a million US Dollars.
Where to find RTX 5090? Ask Pro system buildersBizontech is a niche boutique vendor that specializes in servers, workstations and clusters for AI, deep learning and HPC. The RTX 5090 is sold out pretty much everywhere and it seems that Nvidia is prioritizing business and creative outlets like Bizontech, Puget Systems and Punch Technology, with workstations seemingly ready to be shipped within days rather than week.
Jon Bach, President, Puget Systems told me, “Supply for the 5090 (and the 5080) is very limited, and we expect that to be the case for at least through March. Puget Systems has a good number of cards in hand at the moment because of our OEM relationships, but we appear to be somewhat unusual in that respect. Overall, we are filling orders, but expect our lead times to be affected until supply improves."
The creative crowd will love the RTX 5090 as it obliterates absolutely everything in its path but at a price. Puget Systems and Storagereview benchmarked it across a wide range of AI and creative tests and found that it performed significantly better than previous generations (and AMD’s finest cards) albeit with a much higher power station.
TechRadar’s John Loeffler published a review of the RTX 5090 recently, calling it the supercar of graphics cards and asking whether it was simply too powerful, suggesting that it is an absolute glutton for wattage. He continues, “It's overkill, especially if you only want it for gaming, since monitors that can truly handle the frames this GPU can put out are likely years away.”
This, of course, will be irrelevant to Nvidia’s plans to launch an even more powerful version of the RTX 5090, one with a rumored 96GB GDDR7 memory which will replace the RTX 6000 ADA in due time. If this card follows the same inflationary trajectory as its consumer version then I won’t be surprised if its ticket price reaches $15,000, making it the most expensive graphics card of all time.
You might also likeApple has delivered a new patch on Xprotect, its on-device malware removal tool, intended to block several variants of the macOS ‘Ferret’ family of threats.
As reported by AppleInsider, the new update will counter several issues, including Ferret variants FRIENDLYFERRET_SECD, FROSTYFERRET_UI, and MULTI_FROSTYFERRET_CMDCODES.
These malware variants are reportedly used by North Korean hackers in what has been dubbed the ‘Contagious Interview’ campaign, in which criminals would create fake job openings, primarily targeting software developers or high–profile industries like defense, government departments, or aerospace. The new updates to Xprotect will help block this family of malware from Mac devices, here’s everything we know so far.
The Ferret FamilyThese fresh Ferret family variants have been observed by researchers to be associated with the ‘Contagious Interview’ campaign. This attack prompts targets to communicate with an interviewer through a link which would show an error message - urging victims to install or update a communication software for virtual meetings.
These ‘updates’ would be disguised as Chrome or Zoom installers, like ChromeUpdate and CameraAccess persistence modules (really FROSTYFERRET_UI). These apps install a malicious persistence agent which runs in the background and steals sensitive data from the victim.
The latest Xprotect update will block most known variants which are disguised as macOS system files - including com.apple.secd (FRIENDLYFERRET). However, not all FlexibleFerret variants can be detected, as the malware landscape evolves so quickly.
The campaign has been observed as far back as 2023, and has been attributed to the well known Lazarus hacking group, which has been observed running several malicious job campaigns to trick jobseekers into downloading malware or trojanized remote access tools.
The data these attackers can access is dependent on the device they infect. Aaron Walton, Threat Intelligence Analyst at Expel points out anyone who falls victim to an attack using their work device, unwittingly puts their organization at risk.
"Though these bad actors typically target people through job offers, it’s fairly common that the individual will run the malware on a corporate device," he notes. "The attackers often know this and use it as a means to gain information from their target organization."
Malware protectionAt its origin, this is a social engineering campaign, so staying safe from these attacks is much easier if you can spot the signs. Social engineering attacks like phishing are often personalized, sometimes using information obtained from the dark web - obtained in a data breach, for example.
In this instance, the victims handed their information over as part of the ‘job application’ process, so thoroughly vetting any sites and companies you submit job applications to is really important.
Companies can't stop phishing attacks, and human error will always put organizations at risk, so to mitigate the risks every company, no matter what size, needs a robust cybersecurity strategy. Take a look at our SMB cybersecurity checklist to make sure you're covered.
"For organizations, it is important to have a strong defense-in-depth strategy—think of it as a multi-layered security fortress, where if one defense fails, another may stop the activity. That is, to defend the environment from many different angles. Employ endpoint detection, monitor networks, and empower employees to report suspicious activities", Walton comments.
As with most cyberattacks, vigilance is key. New malware threats are rising faster than ever, so being able to spot the signs can help limit the damage. If your device is suddenly much slower than normal, frequently crashes, or randomly reboots those are all signs that your device may be infected.
Another tell-tale sign is persistent pop-ups. These often bogus ads are pretty harmless themselves, but clicking on them might take you to a malicious site, and the ads are often a sign your device is infected. For a more detailed explanation of what to look for, check out our guide here.
For anyone who thinks this may apply to them, check out our list for the best antivirus software, which can be really helpful in locating and removing malware, as well as protecting against repeat infections.
If you do find malware on your device, make sure to remove the infected program immediately. Alongside this, it’s a good idea to disconnect from the internet to prevent the malware from spreading.
You might also likeChina is advancing its broadband infrastructure with its rollout of 50G-PON, a next-generation fiber technology capable of delivering speeds of up to 50Gbps (50,000 Mbps) downstream.
A newly published report by Dell’Oro Group, which gathers information from conversations with equipment vendors and publicly released tender award notifications, projects that PON equipment revenue will grow from $10.5 billion in 2024 to $12.1 billion by 2029.
While this growth will be driven largely by 10Gbps XGS-PON deployments in North America, EMEA, and CALA, China’s 50G-PON deployments place it ahead of the rest of the world. Last year, Omdia forecast that China will be the only commercial market for 50G-PON in 2024 and 2025, accounting for 93 percent of the global market and generating $1.55 billion in revenue by 2027.
Fiber to the RoomPON, or Passive Optical Network, is a fiber-optic technology that enables multiple users to share a single fiber connection using passive optical splitters. This design reduces the need for active electronic components between the provider and end users, lowering infrastructure costs, reducing power consumption, and improving network efficiency.
The 50G-PON ITU-T standard supports theoretical speeds of up to 50 Gbps downstream and up to 25 Gbps upstream, though current real-world deployments in China - led by China Telecom, its regional branch Shanghai Telecom, and ZTE - typically provide 10 Gbps all-optical access.
Beyond 50G-PON, China is also expanding Fiber to the Room (FTTR), which extends fiber-optic connectivity to individual rooms within homes and businesses. Unlike traditional fiber-to-the-home (FTTH) setups, which typically deliver fiber to a central modem and then rely on Ethernet or Wi-Fi for distribution, FTTR brings fiber-optic cables directly to each room, ensuring faster speeds, lower latency, and more stable connections.
Other highlights from Dell’Oro Group’s report include that cable distributed access equipment revenue will peak at $1.3 billion in 2028 as operators continue DOCSIS 4.0 and early fiber deployments.
Fixed wireless CPE is expected to reach its highest revenue in 2025 and 2026, driven by 5G sub-6 GHz and millimeter wave units, while Wi-Fi 7 residential routers and broadband CPE with WLAN are projected to generate $8.9 billion by 2029 as adoption grows among consumers and service providers.
“Quietly, broadband access networks are evolving into large-scale edge compute platforms, with the ability to enable service convergence far more quickly and easily than ever before,” said Jeff Heynen, Vice President at Dell’Oro Group.
“This evolution means that the revenue mix for broadband equipment is shifting over the next five years, with spending on traditional hardware and software now being supplemented by spending on AI and machine learning tools to facilitate convergence and service reliability.”
You might also likeChinese hackers have been seen targeting network appliances with malware which gave them persistent access and the ability to run all sorts of actions.
A new report from cybersecurity researchers Fortiguard (part of Fortinet) dubbed the campaign “ELF/SShdinjector.A!tr”, and attributed the attack to Evasive Panda, also known as Daggerfly, or BRONZE HIGHLAND, a Chinese advanced persistent threat (APT) group active since at least 2012.
The group primarily engages in cyberespionage, targeting individuals, government institutions, and organizations. In the past, it was seen running operations against entities in Taiwan, Hong Kong, and the Tibetan community. We don’t know who the victims in this campaign were.
Analyzing with AIFortiguard did not discuss initial access, so we don’t know what gave Evasive Panda the ability to deploy malware. We can only suspect the usual - weak credentials, known vulnerabilities, or devices already infected with backdoors. In any case, Evasive Panda was seen injecting malware in the SSH daemon on the devices, opening up the doors for a wide variety of actions.
For example, the hackers could grab system details, read sensitive user data, access system logs, upload or download files, open a remote shell, run any command remotely, delete specific files from the system, and exfiltrate user credentials.
We last heard of Daggerfly in July 2024, when the group was seen targeting macOS users with an updated version of their proprietary malware. A report from Symantec claimed the new variant was most likely introduced since older variants got too exposed.
In that campaign, the group used a piece of malware called Macma, a macOS backdoor that was first observed in 2020, but it's still not known who built it. Being a modular backdoor, Macma’s key functionalities include device fingerprinting, executing commands, screen grabbing, keylogging, audio capture, and uploading/downloading files from the compromised systems.
Fortiguard also discussed reverse engineering and analyzing malware with AI. While it stressed that there were usual AI-related problems, such as hallucinations and omissions, the researchers praised the tool’s potential.
"While disassemblers and decompilers have improved over the last decade, this cannot be compared to the level of innovation we are seeing with AI," the researchers said. “This is outstanding!”
Via BleepingComputer
You might also likeThe big features of Sonos' upcoming streaming box have leaked, and they sound pretty damn great, actually. The key elements are that it will have multiple HDMI passthrough ports and will act as an HDMI switch, that it will have a comprehensive range of streaming services in a unified interface, and that it will be able to send wireless audio to Sonos speakers in home theater configurations that don't involve a soundbar at all (or can still include one, but also wirelessly).
The downsides are that the software is being developed by an ad-tech company (and Sonos has a rocky reputation around software over the last year), and that it's predicted to cost $200-$400, which is a lot if you're looking at a living-room setup, since you then need to add all those speakers, and probably stands for the speakers, and all that jazz.
But there's a very interesting potential use case where the price downside really goes away, and the new speaker system could come into its own even more: custom home theater installs.
Not everyone realizes that Sonos is actually a significant name in the world of in-wall speakers and in-ceiling speakers. These aren't wireless, alas, but they're designed to work seamlessly with the Sonos Amp, which knows exactly how to drive them for peak output, and can drive six speakers (three pairs) per Amp box. In the past, their use for home theater has been limited to Sonos regular Amp options: they can act as stereo TV front speakers only, or rear TV speakers when paired with a soundbar.
But if the new streaming box enables more flexible speaker configurations, and can work with Sonos' in-wall speakers connected to multiple Sonos Amps, things could get interesting.
The Sonos Amp could be a secret weapon for the streaming box.Imagine one of the best projectors (which probably won't have its own streaming tech built in) connected to a Sonos streaming box, which wirelessly sends audio out to two Sonos Amps. One is powering four in-ceiling speakers and a pair of front left and right in-wall speakers; the other is powering a pair of side in-wall speakers and a pair of rear ones. Hopefully the streaming box could also wirelessly connect to a pair (at least!) of Sonos Subs at the same time. That would be quite the Dolby Atmos setup.
Is this superior to connecting an AV receiver to a load of in-wall speakers? Perhaps not, but the installation might be easier if you only need to run cabling a shorter distance to a nearby box, rather than all the way to wherever your AV receiver is.
And you have the ease of use of Sonos' TruePlay tuning, which works excellently to get everything calibrated for your room.
To be clear, this is all speculation on my part – the original leaks about the ability to use speakers for wireless home theater sound said that Sonos is still evaluating exactly which options to include, and we don't know what configurations will be available. But if Sonos makes the Sonos Amp part of the system, the Sonos streaming box could be popular for installations, where price is way less sensitive a topic than most living-room setups.
But what about DTS?However, there's something else that might put home theater enthusiasts off this whole project, and that's Sonos' on-going rejection of the DTS sound format. The only real competitor to Dolby (sorry Eclipsa Audio, call me when you're supported by some actual movies!) is a big deal to home theater enthusiasts, because it's the format of choice for so many 4K Blu-rays, and it's also now featured on the Disney Plus streaming service.
If you've gone to the effort of outfitting a projector and all these in-wall speakers, are you going to risk hearing the Oppenheimer soundtrack in anything less than full-power, maximum-impact DTS-HD? No, of course not, you're not a barbarian.
My Sonos Arc Ultra soundbar review would have scored it higher if it supported DTS; when it's so common among the competition, it's so frustrating that it's missing. And it lacking from that soundbar worries me that it's not coming to the streamer either.
I'm worried that the Sonos streaming box could end up falling into a valley between the two different sets of people who might love it: living-room users might be put off by the price; home theater users might be put off by the lack of DTS support.
Fortunately, everything we know so far is based on leaks. Perhaps the price will be a bargain in the end, perhaps it'll support DTS and every wireless configuration known to humankind, perhaps it'll be a total dud. I'm hoping Sonos will realize its potential for custom installs, at the very least.
You might also like…Nintendo president Shuntaro Furukawa has shared some insight into the potential cost of the Nintendo Switch 2.
Following the release of Nintendo's Q3 financial results on February 4, a Q&A was held where Furukawa was asked to comment on the price of Nintendo hardware and if inflation and exchange rates have played a role in deciding the cost of the Switch 2 (via Nintendo Everything).
Furukawa said that Nintendo is aware of rising inflation and that the exchange rate has also changed since the launch of the original Switch, but acknowledged that the price of the upcoming console would be in line with the "affordable prices customers expect".
"We are aware that inflation is currently rising and that the exchange rate environment has changed significantly since the launch of the Nintendo Switch in 2017," Furukawa said.
"We also need to consider the affordable prices that customers expect from Nintendo products. When considering the price of our products, we believe that it is necessary to consider these factors from multiple angles..."
The president went on to say that he couldn't announce the price of the Switch 2 at this time, "but we are considering it taking into account various points."
However, Furukawa did confirm that Nintendo has no plans to change the current cost of the original Switch, so customers shouldn't expect a price drop after the Switch 2 eventually releases.
After officially announcing the Switch 2 last month, Nintendo confirmed that the console will launch in 2025 and that a new Nintendo Direct showcase will be broadcast on April 2.
During the live stream it's likely we'll finally learn the release date, as well as the cost of the hardware. TechRadar Gaming predicts that the cost of the Switch 2 will be around $399.99 / £349.99 / AU$699.95, or lower.
You might also like...According to former PlayStation executive Shuhei Yoshida, the unreleased Nintendo PlayStation's first game would have been a space shooter.
Following his departure from Sony last month, Yoshida sat down with MinnMax to reminisce on his 31 years at the company, as well as his very first day on the job where he got to play the unreleased Nintendo PlayStation's first game.
For some context, there was initially a partnership between Sony and Nintendo to develop a CD-ROM add-on for the Super Nintendo Entertainment System (SNES) called the SNES-CD. However, the collaboration ultimately failed, and the project later resulted in the creation of the original PlayStation.
Yoshida explained that he joined Sony in 1993 after the collaboration was over and became part of Ken Kutaragi's team to work on the PS1, and that is where he was first shown a prototype of the hardware.
"The first thing they showed us was that Nintendo-Sony PlayStation, a prototype already working, and also they had almost finished a game on it, and I got to play it on the system the day I joined," Yoshida revealed.
"It was like a shooter. Do you remember on the Sega CD system, there’s an amazing game from Game Arts, a space shooter, and all the assets are streamed from the CD… so lots of assets coming in..."
The game Yoshida is referencing is the Sega CD version of Silpheed, which was a space shooter that placed polygon ships over FMV backgrounds, and because these videos were pre-rendered, he explained that the unreleased game had "richer graphics than the standard of that time."
Yoshida said he doesn't remember who created it, but it could have been developed in the US or Japan, adding he "wouldn't be surprised" if Sony had the game in its archive.
Elsewhere, Yoshida recently spoke on the Nintendo Switch 2 announcement, which he thought "could have been a larger reveal", and hopes that "something that people wouldn't anticipate" will be shared later on.
You might also like...Ten years after the company was founded, OpenAI has revealed a total rebrand with updated logos and fonts .
Its update includes a fresh brand identity with a new typeface, wordmark, symbol and color palette, but there have been no drastic changes to keep everything familiar.
The Al research and deployment company has issued full guidance to the updates online to keep partners, resellers, customers, developers, consultants, publishers, and any other third parties in the loop.
OpenAI reveals subtle rebrandSpeaking with Wallpaper, OpenAI stated the rebrand was driven by the need for a unified and cohesive identity. Head of Design Veit Moeller and Design Director Shannon Jager admitted that, until now, OpenAI has presented itself haphazardly by using an inconsistent range of fonts, marks and colours.
Moeller disclosed the rebrand has been in the works for more than a year, and was initiated by CEO Sam Altman who wanted a “more organic and more human” look.
Apart from launching its own OpenAI Sans font, the company has also updated its stock imagery with photos from established photographers and abstract graphics rendered by its very own Sora model.
ChatGPT has gained huge traction in the years since its first public preview launch. Despite OpenAI’s intention for it to be a research experiment, it gained a million users within the first five days. By the end of 2024, it had more than 300 million active weekly users.
Addressing the elephant in the room, the designers confirmed a company sentiment that, “technology should amplify, not replace, the depth of human creativity,” adding the updated imagery evokes memory and that the typography carries tone. They were designed by an in-house team rather than getting influence from a third-party agency, the pair confirmed.
Finally, the so-called ‘blossom’ logo, which resembles a flower blossom and is made up of three intertwined triangles, is set to be used more sparingly, with the ‘OpenAI’ wordmark getting more use instead.
And for creatives worried about the threat that AI poses to their livelihoods, the designers confirmed that the redesign process was mostly handled in traditional ways, though ChatGPT was used to inform calculations for different type weights.
You might also likeThe Samsung Galaxy Z Flip 7 could be one of the best-selling foldable phones of 2025 going by past form, as Samsung’s foldable flip phones combine a compact form factor with a more reasonable price than its Z Fold line, making them a popular choice. So will this trend continue into 2025?
Well, nothing about the Samsung Galaxy Z Flip 7 has been confirmed just yet, but it sure is starting to leak. So below, you’ll find all the news, leaks, and rumors we’ve heard about this foldable contender so far.
We’ll also update this article whenever any new rumors emerge, so make sure to check back soon if you want to stay informed.
Cut to the chaseOur best guess for when the Samsung Galaxy Z Flip 7 will launch is July, as the previous two models had July announcements, and the Samsung Galaxy Z Flip 6 also shipped in July.
That said, the Galaxy Z Flip 5 shipped in August of its release year, and the Z Flip 4 wasn’t even announced until August. Still, if not July then we’ll probably see the Samsung Galaxy Z Flip 7 in August.
There isn’t much in the way of release date rumors yet, but @PandaFlashPro has claimed that production of Samsung’s upcoming foldables will start in May, which probably works for a July or August announcement.
And sources have also spotted both a Galaxy Z Flip 7 codename (specifically ‘B7’) and a Galaxy Z Flip 7 model number (SM-F751), which at the very least suggests that this phone is in the works.
We’ve also heard that the Samsung Galaxy Z Flip 7 might have the same starting price as the Galaxy Z Flip 6. That would mean a starting price of $1,099.99 / £1,049 / AU$1,799.
Can you trust these rumors?The source that claims production will start in May and prices will be unchanged doesn’t have much of a track record, so we’d take this with a pinch of salt. Either way though, we’d think a launch in July or August is likely.
Bigger screens and a better hinge The Samsung Galaxy Z Flip 6 (Image credit: Future / Axel Metz)We don’t have to rely purely on rumors when it comes to the design of the Samsung Galaxy Z Flip 7, as Samsung itself has said during an earnings call (via @Jukanlosreve) that this year “we will release new foldable products with improved form factors, durability,” so while the Z Flip 7 wasn’t named, it’s likely one of the devices the company is referring to.
Beyond that, we’ve heard that the Galaxy Z Flip 7 might have bigger screens than its predecessor, with a source claiming the foldable display will be 6.85 inches (up from 6.7 inches), and the cover screen will be around 4 inches (up from 3.4 inches).
Also on the design front, leaker @PandaFlashPro claims that the Samsung Galaxy Z Flip 7’s hinge mechanism will be more smooth and durable, and that the button placement will be the same as last year.
Can you trust these rumors?So far, the design leaks all only come from one source each, so we’d take them with a dose of skepticism. Though the claims of larger screens come from a source with a good track record, so that much may well be true.
If nothing else though, Samsung’s own comments strongly suggest we’ll see some changes to the design.
Copying the cameras The Samsung Galaxy Z Flip 6 (Image credit: Philip Berne / Future)There’s only one Samsung Galaxy Z Flip 7 camera leak so far and it’s not a very promising one, as apparently this phone will have exactly the same cameras as the Z Flip 6. That would mean a 50MP main camera, a 12MP ultra-wide one, and a 10MP front-facing one.
If so, that would be rather disappointing, so we hope that subsequent camera leaks will disagree with this.
Still, if nothing else the software will probably be improved, and we’d expect to see new AI photography tools too.
Can you trust these rumors?As we’ve only heard camera claims from one source so far, we’d take them with a pinch of salt. That said, it’s believable that Samsung wouldn’t improve the cameras, especially as the Samsung Galaxy S25’s cameras weren’t upgraded from the Samsung Galaxy S24’s.
An Exynos chipset and no change to RAM The Samsung Galaxy Z Flip 6 (Image credit: Philip Berne / Future)There’s potentially bad news when it comes to the Samsung Galaxy Z Flip 7’s chipset, as according to one rumor, it will have an Exynos 2500.
That’s set to be Samsung’s most powerful in-house smartphone chipset of 2025, and is almost certainly going to outperform the Snapdragon 8 Gen 3 used by the Samsung Galaxy Z Flip 6. But based on past form it probably won’t quite be a match for the Snapdragon 8 Elite, which is used by the Samsung Galaxy S25 series, and is what we were hoping would power the Galaxy Z Flip 7.
Beyond that, we’ve elsewhere heard that the Samsung Galaxy Z Flip 7 could have 12GB of RAM, and a choice of 256GB or 512GB of storage – specs which are identical to the current model.
Finally, leaker @PandaFlashPro has posted on X, saying that the Samsung Galaxy Z Flip 7 will have a bigger vapor chamber than the Z Flip 6, which could help it keep cool and therefore avoid throttling.
That might also aid the battery life, though as yet we haven’t heard anything about the phone’s battery. For reference though, the Samsung Galaxy Z Flip 6 has a 4,000mAh battery, so we’d expect the Z Flip 7’s would be at least that size.
Can you trust these rumors?All of these specs have each only been stated by one source, so we’d take them all with a pinch of salt for now, though there’s nothing unbelievable here.
Hopefully though Samsung will either equip the phone with a Snapdragon 8 Elite chipset or give it more than 12GB of RAM – or both. But that’s just our hope, not a prediction.
You might also likeAnyone working in security will be all too familiar with the increasing dangers of ransomware and its disastrous consequences, but new research from ChainAnalysis has claimed 2024 actually saw a 35% decrease year-on-year in the number of firms who paid the ransom.
Ransomware attacks reportedly hit a new high in 2024, but the revenue ransomware attackers received declined for the first time since 2022. That being said, the numbers are still quite eyewatering.
Between January and June of 2024, ChainAnalysis reported a $459.8 million victim loss to ransom payments, which was actually 2.38% higher than the same period in 2023. This slowed in the period following though, and 2024’s total came to $813.55 million, compared to 2023’s staggering $1.25 billion.
New ransom guidelinesThere are a few likely reasons for this. As cybersecurity teams develop their tactics and adapt to threats, alternatives to blindly paying ransoms have developed. For example, the UK government has launched proposals for ransomware protection which includes a ban on ransom payments for public services, aimed at dissuading criminals and disrupting the attackers income source.
Research has shown that those who pay the ransom aren’t even particularly likely to get their data back, with only roughly 7% actually fully recovering their information, which will undoubtedly factor into the incident response for a lot of organizations.
“According to our data, around 30% of negotiations actually lead to payments or the victims deciding to pay the ransoms. Generally, these decisions are made based on the perceived value of data that’s specifically been compromised,” commented Dan Saunders, Director of Incident Response at Kivu Consulting.
Of course, as more firms experience this, and as more security teams develop their tactics against cyberattacks, the defences against ransomware will improve. Cybersecurity and cyberattacks are both constantly evolving, so the future is unpredictable.
“For years now, the cybersecurity landscape seemed hurtling towards a so-called ransomware apocalypse" notes Jacqueline Burns Koven, Head of Cyber Threat Intelligence at Chainalysis, "so this sharp decline, to levels even lower than those in 2020 and 2021 speaks to the effectiveness of law enforcement actions, improved international collaboration, and a growing refusal by victims to cave into attackers demands."
You might also likeA software supply chain attack targeting developers on the Go platform was apparently hiding in plain sight for three years to spread malware, experts have warned.
Cybersecurity researchers from Socket Security uncovered and publicly spoke about the campaign, which started back in 2021, when someone took a relatively popular database module called BoltDB on GitHub and forked it. In the fork, they added malicious code, which granted the attacker backdoor access to compromised computers.
That instance was then cached indefinitely by the Go Module Mirror service.
Abusing Go Module MirrorFor those unfamiliar with Go Module Mirror, it is a proxy service operated by Google that caches and serves Go modules to improve reliability, availability, and performance. It ensures that Go modules remain accessible even if the original source is modified, deleted, or becomes temporarily unavailable.
After the instance was cached, the attacker changed the Git tags in the source repository, to redirect visitors to the benign version, essentially hiding the malware in plain sight.
"Once installed, the backdoored package grants the threat actor remote access to the infected system, allowing them to execute arbitrary commands," security researcher Kirill Boychenko said in his report.
Speaking to TheHackerNews, Socket said this is one of the earliest recorded instances of threat actors taking advantage of the Go Module Mirror service.
"This is possible because Git tags are mutable unless explicitly protected," Socket said. "A repository owner can delete and reassign a tag to a different commit at any time. However, the Go Module Proxy had already cached the original malicious version, which was never updated or removed from the proxy, allowing the attack to persist."
The malicious version ended up permanently accessible through the Go Module Proxy, Boychenko explained. "While this design benefits legitimate use cases, the threat actor exploited it to persistently distribute malicious code despite subsequent changes to the repository."
Boychenko said that he reported his findings and awaits for the removal of the malicious content: “As of this publication, the malicious package remains available on the Go Module Proxy. We have petitioned for its removal from the module mirror and have also reported the threat actor’s GitHub repository and account, which were used to distribute the backdoored boltdb-go package.”
You might also likeIn cybersecurity, defenders are often a victim of their own success. When enough organizations adopt a successful solution, threat actors adapt. For a long time, multi-factor authentication (MFA) was seen as one of the best defenses against password-based attacks. And this is still true today. However, a sharp increase in adversary-in-the-middle (AiTM) attacks means that MFA alone may no longer be enough.
Our annual State of the Threat Report highlighted a notable rise in AiTM attacks. You could see this as a positive step, resulting from wider use of MFA. But another driver for this growth is the ease and availability of access to the necessary software.
AiTM explainedAiTM attacks are a sophisticated method of intercepting and potentially altering communication between two parties, carried out without their knowledge. Increasingly we're seeing these attacks take the form of AiTM phishing attacks. This uses email or a messaging service to create the conditions for an attacker to intercept and manipulate communications between a user and a legitimate service in order to steal credentials and authenticated access tokens.
We’re used to seeing traditional phishing attacks which trick people into visiting fraudulent websites, where entered credentials are then stolen. But AiTM attacks level up on these phishing attacks, taking them a step further. Adversaries use sophisticated but easy-to-use frameworks to set up a server to sit between the person targeted and a real service. Luring victims to authenticate through this server, threat actors can steal the resulting access token. The attacks use reverse proxy servers to intercept the communication, break SSL/TLS encryption, and spy on the data exchange.
In practice, it looks like this – an individual will receive a phishing email that looks legitimate. And in fact, the link provided will take them to the actual website they are expecting, not a fraudulent site as you might expect. However, victims are taken to this website via a malicious reverse proxy server. When the authentication process takes place, the legitimate website provides the user with an authenticated token, or authenticated session cookie, to enable ongoing persistent access. And this is where AiTM attacks really differ from traditional phishing. In the case of AiTM, the malicious proxy server sees both the token and user credentials. Taking this token enables the threat actor to have continued access, bypassing any MFA and without having to reauthenticate.
Access enables attackThere are a number of sophisticated solutions available for free on the Internet and phishing kits can be hired on underground marketplaces and Telegram. Popular kits include Evilginx3, EvilProxy and Tycoon 2FA. These kits not only facilitate attacks, but also automate some parts, making it much easier and cost effective for threat actors to execute attacks.
Credentials form a crucial part of our online identities – both for high-value personal services, like banking, and also our work. Often these are protected by MFA, so even if a threat actor has the credentials, they can’t get any further. However, AiTM enables the theft of authenticated session cookies. These can be used directly in additional fraud and extortion including business email compromise, data theft extortion and ransomware.
Preventing AiTM threatsBefore anyone panics, this isn’t a reason to get rid of MFA. Several of the major cyberattacks in 2024 could have been prevented if MFA was in place and it remains a crucial part of necessary defenses against cyberattacks.
However, it's important to have tools in place that are robust enough for changing threats. Phishing-resistant MFA is built on standards like FIDO2 and goes deeper than traditional MFA. This technology ensures tokens are only associated with the person and computer who completed the authentication process, effectively making the AiTM attack fruitless.
For individuals, it can be harder to spot these attacks due to the legitimate original service being passed through to the user. The attack infrastructure is essentially transparent. But there are strategies that can help employees remain secure. Encourage them to think about the initial interaction: Did they receive an email that prompted an urgent action? If they are being asked to follow links and authenticate, they should question whether the context is normal. If there’s any doubt, they should feel empowered to raise it with the internal team. Above all, encourage employees to always be cautious and curious.
We've featured the best authenticator app.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
CES 2025 showcased what to expect regarding this generation’s GPUs, with Nvidia taking the spotlight at the convention with its new RTX 5000 series GPUs (currently sold out) - and now, AMD is finally about to join the race after the initial reveal of its new GPUs.
As reported by VideoCardz, AMD’s CEO Lisa Su confirmed the Radeon RX 9000 series GPUs will launch in March after previous reports that the lineup would, and just days after rumors of Nvidia’s RTX 5060 Ti and 5060’s potential launch began circulating. The RDNA 4 architecture for the upcoming GPUs promises to enhance ray tracing performance while utilizing Team Red’s new FSR 4 feature for greater image stabilization when upscaling.
VideoCardz also recently relayed rumors of AMD holding an RX 9070 series press conference at the end of February - considering the activity from its main rival Nvidia, it’s about time for AMD to properly enter the picture and show us all how its new lineup of graphics cards stack up against Team Green’s. From what we’ve already seen, the Radeon RX 9070 XT doesn’t appear to be a midrange GPU, supposedly providing top-tier performance at native 4K without using FSR.
Since Nvidia’s aggressive pricing for its premium GPUs could be a dealbreaker for many, AMD has the chance to gain an advantage in the GPU race with more affordable prices (especially if those initial performance results are accurate).
Time for another showdown between Lisa Su and Jensen Huang... who, just incidentally, are actually cousins. (Image credit: AMD) Is this a reaction to speculation on Nvidia’s RTX xx60-class launch rumors?While it's definitely possible that AMD had already planned for launch in March as most reports suggested, this feels like smart timing from Team Red. It’s obvious that Nvidia is in the lead with its RTX 5000 series GPU lineup (as it has been for a while now), and the rumors of an RTX xx60-class launch in March would directly rival AMD’s potential hype.
The end of this month feels like the ideal time to unveil the new Radeon RX GPU lineup, but there’s also a strong chance that Nvidia will end up doing the same thing. We’ve only seen the RTX 5090, 5080, 5070 Ti, and 5070 (with the latter launching on a currently undisclosed date later this month), so it’s only a matter of time before we see the RTX 5060 Ti and 5060.
Personally, I’m hoping AMD’s new GPUs can provide a strong alternative for gamers to Nvidia’s cards, as the GPU market is very much in need of competition - if strong competition comes in the form of high-tier performance at generous prices, it could lead to some potential RTX buyers turning their heads to reconsider. We’ll just have to wait and see what Team Red has in store for us…
You may also like...As technology evolves, cybercriminals are finding ever more sophisticated ways to exploit it. One of the most insidious developments to date is the rise of deepfakes — realistic but ultimately fake audio, video, or images created using artificial intelligence (AI). These tools are enabling bad actors to launch highly convincing impersonation scams, from imitating the voices of executives to creating fake videos that bypass verification processes.
With deepfake technology beginning to get easier and cheaper to obtain, the tools - once seen as a novelty in entertainment – are increasingly being leveraged for fraud, disinformation and cybercrime. And with AI technology evolving at breakneck speed, deepfakes are becoming increasingly convincing and accessible. In fact, Ofcom recently revealed that 43% of UK internet users believed they had experienced a deepfake in the first half of 2024.
It goes without saying that the challenge of defending against deepfakes is growing. While financially lucrative organizations were the primary targets of such attacks - thanks to the time and effort needed to deploy the tools - cyber criminals are now able to widen their net to smaller businesses.
To stay ahead, businesses of all sizes must understand how deepfake threats operate and adopt advanced technologies, training, and practices to combat them effectively.
Understanding the deepfake threatWe recently conducted research on the security stature of UK SMEs, which uncovered a number of concerning insights. Cyber breach fears were found to be on the rise for 86% of workers in UK SMEs, with AI being the primary driver of concern when it comes to cyber risks in the workplace.
Despite this growing awareness, AI-powered deepfakes manipulate audio and visual media that can dupe even the most careful viewers or listeners. For example, attackers may use deepfake audio to mimic a CEO’s voice, instructing an employee to transfer funds to a fraudulent account. In one reported case, this tactic successfully duped an organization into wiring $243,000 to a scammer.
Beyond financial scams, deepfakes can destabilize organizational trust. A deepfake impersonating a cybersecurity leader during a data breach could manipulate an organization's response, leading to unauthorized access to sensitive information. As businesses rely more on digital and remote communication, such attacks can erode confidence in the integrity of day-to-day operations.
The growing accessibility of deepfake toolsThe increasing availability of deepfake technology is compounding the threat. What was once the domain of advanced technical experts is now within reach of less-skilled attackers. Open-source AI tools and online tutorials make it easier than ever to create convincing deepfake content, offering cybercriminals a broader arsenal of attack methods.
As a result, organizations of all sizes are at risk. While large enterprises are often high-profile targets that make news headlines, smaller businesses are frequently being targeted by organized criminal networks due to their typically weaker security measures. The National Cyber Security Council recently warned that severity of the threat facing the UK is – worryingly – underestimated by organisations from all sectors. Right across the country, basic cyber security practices are too often ignored.
Fighting back: tools and strategiesAs deepfake threats become more sophisticated, organizations need to adopt a multifaceted approach to defense. Our latest research found that, alarmingly, 43% of employees in UK SMEs haven’t had any form of training regarding cybersecurity in the last year, despite the rapid emergence of new threats. Unsurprisingly, only a third of UK employees are confident that they could even spot a cyber threat.
A combination of advanced technologies, improved security protocols, and targeted employee training can significantly reduce the risks. Modern tools and techniques are advancing to counter the rise of deepfake manipulation and enhance identity verification. AI-powered detection systems use machine learning to identify tell-tale signs of manipulation, such as inconsistencies in facial shadows, unnatural pauses in speech, or irregularities in lip-syncing. Meanwhile, behavioral biometrics are redefining identity verification by analyzing dynamic actions like typing speed, mouse movements, and interaction patterns, going beyond static identifiers like fingerprints or facial recognition. To strengthen security further, dynamic multi-factor authentication (MFA) is becoming essential. Adaptive systems, such as those from Duo Security and Okta, incorporate real-time challenges like one-time PINs or live video verifications and adjust based on unusual activity. These innovations are critical in combating deepfake threats and safeguarding digital trust.
Training teams to recognize and respondWhile technology plays a crucial role in combating deepfakes, human vigilance is equally important. Awareness programs for employees are key to this. Teams should be regularly educated on the growing use of deepfakes in cybercrime, from fraudulent requests for financial transfers to phishing scams. Recognizing the signs of suspicious activity, such as unusual requests or unverified communications, can help employees – and their employer – avoid falling victim.
Businesses should also consider educating employees through real life simulations, enabling them to understand what a deepfake attack could look like in a controlled environment. We for example, we use AI tools to create social engineering simulations, helping staff identify the hallmarks of sophisticated attacks. The deepfake threat is constantly evolving, so training must be ongoing. Incorporating the latest examples and trends into educational sessions ensures employees stay informed and prepared.
Building a proactive defenseDefending against deepfakes requires more than reactive measures. Organizations must adopt a proactive approach that combines robust technology, comprehensive training, and a culture of vigilance. With deepfake tools becoming easier to use, attackers may begin focusing on companies they perceive as less prepared.
The UK has one of the world’s most advanced digital economies which relies on having a secure digital infrastructure. By combining advanced detection tools, biometric verification, and a vigilant workforce, organizations can build a strong defense against deepfake threats, protecting both their operations and their reputation. The key is to act now and stay one step ahead of the ever-evolving cybercrime landscape.
We've featured the best encryption software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Today’s ever-evolving digital landscape, characterized by hyper connectivity and big data, has most recently made the global race for AI innovation unavoidable for organizations. Meanwhile, the agenda in the boardroom continues to evolve, shifting focus from prioritizing data accessibility to championing data confidentiality – recognizing that true innovation extends beyond mere access to cutting-edge technologies.
The growing recognition of data as a strategic asset has elevated its role in shaping national security policies and economic strategies. This evolution reflects the increasing reliance on AI-powered technologies, which are becoming integral to critical infrastructure, global competitiveness and societal development.
Amid this shift, sovereign cloud has emerged at the forefront of innovation, positioning itself as a powerful solution for those that are aiming to strike a balance between the benefits of unrestricted data flows and the imperatives of national sovereignty and security. Beyond its national significance, adopting these frameworks offers tangible benefits for end customers. In an era where customer loyalty is increasingly fragile, fostering trust through transparent data practices and empowering users with control over their personal information is paramount. Sovereign cloud equips organizations with the means to achieve these objectives while maintaining alignment with security and governance priorities.
Embracing the Sovereign Cloud eraSovereign cloud redefines cloud infrastructure and services, offering a fresh perspective on data governance. As organizations navigate the dual priorities of global connectivity and safeguarding domestic interests in the digital realm, sovereign cloud frameworks set a new paradigm. These frameworks are designed to encourage digital collaboration and innovation while safeguarding local data, protecting propriety software and ensuring compliance with local, national, and European-wide jurisdictions.
Driven by regulatory demands, this approach is already making a profound impact across Europe, not only enabling regions to harness its collective data resources for global economic advantage but also empowering nations to assert greater control over their digital futures.
Cloud Service Providers (CSPs) across the region are pivotal to the success of sovereign cloud but, getting sovereign cloud ‘right’ can be challenging – especially when trying to straddle evolving residency and sovereignty requirements, tightening budgets, siloed infrastructures, and skills challenges.
So how do CSPs set themselves up for success? Ultimately, there are three key considerations to ensure their sovereign clouds live up to their promise:
Creating a roadmap for Sovereign Cloud adoptionData sovereignty ultimately requires balancing security, privacy, and interoperability. But as GigaOm’s Jon Collins pointed out at the European Sovereign Cloud Day event in Brussels in September last year, it is essential to understand the key organizational drivers of sovereignty – including societal, regulatory, and architectural factors – when shaping your vision for successful sovereign cloud adoption.
To create a successful roadmap for sovereign cloud adoption, it’s imperative to first define what ‘sovereign success’ means in relation to data, operations and infrastructure. This clarity not only helps guide organizations but also enables customers to see the key principles of sovereignty and show how they align with their specific needs. The process should begin by assessing current practices and identifying areas that need improvement. This foundational step ensures that organizations can protect their data, leverage it for business objectives, comply with regulatory requirements and meet broader societal expectations.
Paving the way for collaborationBest practices in sovereignty can produce a significant competitive advantage, demanding the highest standards that go beyond mere regulatory compliance. It’s fundamental to evaluate frameworks against others to ensure full alignment with cloud principles. While meeting the minimum requirements may seem sufficient, it doesn't necessarily guarantee long-term success. True effectiveness stems from adopting comprehensive, well-maintained standards and ensuring that all parties are committed to the same principles. This approach should be mirrored in the sovereign cloud space, where CSPs work towards shared frameworks and standards that foster a unified European data space for innovation.
Similarly, don’t be afraid to engage with local and regional partners to build truly robust sovereign frameworks for data sharing. Interoperability and portability will be crucial to our shared success, so it’s in all of our interests to work together to test, iterate and elevate our frameworks to new heights. The most successful initiatives are those designed to develop and implement sovereign cloud solutions at national and European levels, for instance, showing the marked difference between what European Union and non-native frameworks can deliver, which are pivotal to fostering game-changing innovation.
Adapting with flexibilityLaying the foundations for success is crucial, but it’s important to remember that the principles of sovereign cloud are not fixed. As regulatory and business environments evolve, these principles must also remain adaptable. Staying informed about changing regulations and having the ability to adjust strategies accordingly, keeps the roadmap flexible to accommodate future shifts.
Above all, don’t miss the opportunity to highlight your strategic differentiation. Keep in mind, sovereign cloud is no longer just a transactional conversation. It’s about forming strategic partnerships and making long-term investments that foster ongoing excellence. While the technology stack and software remain the same, the ability to offer services through your own sovereign cloud will set you apart.
Driving value through this opportunityThe opportunity offered by sovereign cloud is both transformative and essential for creating a foundation for sustainable digital growth. As we look ahead, the role of sovereign cloud will only increase in significance, acting as a vital link between technological progress and national priorities. Achieving success will demand a clear and forward-thinking vision, a steadfast commitment to standardization and collaboration, and the agility to navigate evolving regulations and market dynamics. For businesses, governments, and individuals alike, adopting sovereign cloud represents a pivotal step toward a more secure, transparent, and innovative digital future. For CSPs, this journey toward shaping that future is only just beginning.
We've featured the best cloud storage.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Netgear has confirmed recently fixed a number of critical-severity vulnerabilities, plaguing multiple access points and routers.
Since the bugs can be exploited in attacks requiring no user interaction, and could result in remote code execution (RCE), Netgear urged its customers to apply the released fixes without delay.
A Netgear security advisory noted the two flaws are internally tracked as PSV-2023-0039 (a remote code execution flaw), and PSV-2021-0017 (an authentication bypass flaw). They affect these WiFi 6 access points and Nighthawk Pro Gaming Routers: XR1000, XR1000v2, XR500, WAX206, WAX220, and WAX214v2.
Reaching end-of-life status"NETGEAR strongly recommends that you download the latest firmware as soon as possible," the company said in the security advisory, before giving a step-by-step tutorial on how to download and install the latest firmware for Netgear routers.
"NETGEAR is not responsible for any consequences that could have been avoided by following the recommendations in this notification,” it warned.
Internet routers and WiFi access points are among the most attacked devices because they serve as the gateway between a local network and the internet. They are also often considered a “low hanging fruit” in cyberattacks, since many have default credentials, outdated firmware, or weak security configurations. In many instances, users keep their devices past their end-of-life date, losing support and exposing themselves to known vulnerabilities.
Attackers can use compromised routers for botnets, man-in-the-middle attacks, DNS hijacking, or data interception. Since routers operate 24/7 and control network traffic, an attacker who gains control can redirect users to malicious sites, steal credentials, or deploy malware across networks.
Due to its popularity, Netgear is a popular target for hackers. In June 2024, a popular budget-friendly Netgear small business router was found vulnerable to half a dozen flaws that could lead to the theft of sensitive information, and possibly even full device takeover. The device reached its end-of-life, so Netgear did not bother releasing a patch.
You might also like