If you’re a fan of multitasking on any of the best iPads, you were probably heartened to see all the new features Apple brought to iPadOS 26 at its Worldwide Developers Conference (WWDC). But while those additions are sure to make a splash for productivity power users, the company is also extending the existing Stage Manager feature to even more iPads.
In case you missed it, Stage Manager lets you group apps into sets and then switch between those sets as needed. It’s designed to help you focus on one task and all the windows you need to complete it, then change to a different task and group of apps after. It’s available on both iPadOS and macOS.
With iPadOS 26, Stage Manager will be available on more iPads than before. Previously, it only worked on the 13-inch iPad Pro with M4 chip, the 12.9-inch iPad Pro (third generation or later), the 11-inch iPad Pro (first generation or later), and the iPad Air (fifth generation or later).
As noted on Reddit, in addition to those tablets, Stage Manager now also works with the third-generation iPad Air or later (not just the fifth-generation model), the iPad mini (fifth generation or later), and the entry-level iPad (eighth-generation or later). In essence, Stage Manager works with any iPad that can run iPadOS 26.
Better than Stage Manager(Image credit: Apple)Stage Manager has proven to be a somewhat divisive feature since it was released – not helped by a buggy launch – and it’s struggled to establish itself as a must-have element of iPadOS. Although I was intrigued by it at first, I quickly found Stage Manager to be a little half-baked, and it never became a regular part of my setup on either my iPad or my Mac.
What looks to be far more interesting is the range of productivity tools Apple has added to iPadOS 26. That includes a Mac-like menu bar, full overlapping app support, window resizing, and even the “traffic light” buttons used to close, minimize or maximize app windows. Window tiling in particular is an excellent addition to the iPad, as you get a lot more window position options than just using an older feature like Split View.
Being able to use an iPad like a Mac offers much more appeal to me than Stage Manager. That’s partly because the Mac-like interface is just much more familiar to anyone who has used a computer before – there’s no new system to learn, as there is with Stage Manager. And gaining these new tools now makes it much more comfortable to work on the go with my iPad, as I no longer need to sacrifice capability in the name of portability.
Still, with Stage Manager coming to more iPads than before, it could still find an audience among Apple fans who have never had access to it. In any case, combined with iPadOS 26’s new multitasking features, it’s clear that Apple is taking productivity and user interface management a little more seriously.
You might also likeFollowing the recent reports of over 16 billion records being leaked in an ‘unimaginable’ major data breach, further research has claimed the reality of the incident might not be as disastrous as first thought.
Following significant speculation about the effects and origins of the breach, new findings from BleepingComputer suggest this “breach” may not be new, or even a breach - but instead just a compilation of existing leaked credentials.
The inital datasets discovered by the researchers included hordes of personal information, with each of the 30 datasets containing between tens of millions, to over 3.5 billion data points - totaling 16 billion records. It now looks likely this was a series of datasets simply containing breached credentials assembled by a cybersecurity firm (or by criminals) which was then exposed online.
Save up to 68% on identity theft protection for TechRadar readers!
TechRadar editors praise Aura's upfront pricing and simplicity. Aura also includes a password manager, VPN, and antivirus to make its security solution an even more compelling deal.
Preferred partner (What does this mean?)View Deal
Infostealers to blame“Despite the buzz, there's no evidence this compilation contains new or previously unseen data,” BleepingComputer confirms.
The information from these datasets has likely been circulating for a while, and the layout of the breached information suggests that it was collected using infostealers - a type of malware that has become one of the most prolific threats to security teams and internet users alike.
The information found in these datasets is formatted in such a way that points the finger firmly at infostealers, with credentials appearing in a one per line format (URL:username:password) all compiled in one ‘log’.
One attack from an infostealer can exfiltrate all of the credentials stored on a browser, and the logs are then uploaded and usually sold on the dark web.
Criminals will often upload samples of their stolen data as a ‘taster’ to prove the information is legitimate.
Since these breaches can sometimes contain billions of records, these samples frequently hold tens of thousands of credentials - and this data breach is most likely a compilation of these tasters.
What to do nextNew or not, leaked credentials pose a huge threat to those affected. If your information has been leaked, make sure to take a look at some identity theft protection software, as criminals can use your name, address, and details to take out credit cards or loans in your name.
HaveIBeenPwned? is probably the best resource only to check if your details have been affected, offering a run-down of every big cyber incident of the past few years.
As a business, enabling multi-factor authentication (MFA) and ensuring all staff are thoroughly trained on the dangers and signs of social engineering attacks is key. Using business password managers can also help ensure all user passwords are secure.
And if you save passwords to a Google account, you can use Google's Password Checkup tool to see if any have been compromised, or sign up for one of the best password manager options we've rounded up to make sure your logins are protected.
"If this news frightens you, then your security program probably has some fundamental gaps,” argues James Shank, Director of Threat Operations at Expel.
“Let this be the fuel you need to position yourself and your department for solving the problem systematically, rather than defending against the news du jour. There will always be another breach, with even more passwords, and emergency handling will continue if you don't have systematic defenses in place."
You might also likeA few months ago, we heard that the iPhone 17 series could gain a vapor chamber to help prevent overheating, and now another source has echoed these claims – and even provided some evidence.
Leaker Majin Bu (via MacRumors) claims to have learned from an “internal source” that both the iPhone 17 Pro and iPhone 17 Pro Max will have a vapor chamber. This will supposedly be a Pro-exclusive upgrade, which is at odds with that earlier leak, which pointed to all four models getting a vapor chamber.
In any case, we’d take this latest tip with a pinch of salt, as Bu has a mixed track record, but they’ve supplied an image of what they claim is part of a vapor chamber intended for these upcoming phones (below).
A leaked image of a vapor chamber component (Image credit: Majin Bu)That supposedly leaked image – coupled with the fact that multiple sources have now mentioned a vapor chamber – suggests that at least some iPhone 17 models may well be getting this upgrade.
Keeping it coolIn layman's terms, a vapor chamber should be able to cool these phones more effectively than the graphite sheets used for heat dissipation in current iPhones.
A vapor chamber is a small metal chamber full of liquid, and that liquid turns to vapor when it heats up, allowing the heat to dissipate across the chamber’s surface area. It works as a way of pulling heat away from internal components, which has several advantages.
For one thing, this prevents damage to components from overheating, but it should also reduce the need for thermal throttling – that is, performance reductions to cool the phone down. So, even if you’re pushing the iPhone 17 Pro hard with gaming or other demanding applications, it should be able to stay relatively cool and maintain its performance better.
This should also make the phone more energy efficient, so battery life could be improved too.
Clearly, there are a lot of potential advantages to a vapor chamber, so we hope this leak proves accurate. We should find out in September, as that’s when the iPhone 17 series is likely to launch.
You might also likeNew research from Ataccama has claimed a considerable proportion of businesses still don't trust the output of AI models - but this could simply be because their data isn't in order yet.
The study found two in five (42%) organizations don't trust their AI/ML model outputs, yet only three in five (58%) have implemented or optimised data observability programs.
Ataccama says this could be a problem, because traditional observability tools are not designed to monitor unstructured data, such as PDFs and images.
Don't trust AI? A lack of suitable data could be the problemThe report also revealed the ad-hoc approach that businesses often take, with observability often implemented reactively, resulting in fragmented governance and silos across the organization.
Ataccama defined an effective program as proactive, automated and embedded across the data lifecycle. More advanced observability could also include automated data quality checks and remediation workflows, which could ultimately prevent further issues upstream.
"They’ve invested in tools, but they haven’t operationalized trust. That means embedding observability into the full data lifecycle, from ingestion and pipeline execution to AI-driven consumption, so issues can surface and be resolved before they reach production," CPO Jay Limburn explained.
However, ongoing skills shortages and limited budgets are still presenting challenges along the way. Ataccama also noted that unstructured inputs continue to grow as a result of increased generative AI and RAG adoption, yet currently, fewer than one in three organizations feed unstructured data into their models.
The report goes on to explain: "The most mature programs are closing that gap by integrating observability directly into their data engineering and governance frameworks."
With proper observability in place, businesses can expect improved data reliability, faster decision-making and reduced operational risk.
You might also likeThe recent cyberattacks against Marks and Spencer (M&S) and the Co-op supermarket have been combined into a single incident by a major UK investigatory group.
The Cyber Monitoring Centre (CMC), an independent, non-profit body established to categorize major cyber events by the insurance industry, has declared it is treating the two incidents as one event by the same attacker - Scattered Spider.
"Given that one threat actor claimed responsibility for both M&S and Co-op, the close timing, and the similar tactics, techniques, and procedures (TTPs), CMC has assessed the incidents as a single combined cyber event," the CMC said.
Save up to 68% on identity theft protection for TechRadar readers!
TechRadar editors praise Aura's upfront pricing and simplicity. Aura also includes a password manager, VPN, and antivirus to make its security solution an even more compelling deal.
Preferred partner (What does this mean?)View Deal
Combined attackThe CMC says it has categorized the attacks as a "Category 2 systemic event," and estimated the security breaches will have a total financial impact of between £270 million to £440 million ($363 million to $592 million) on the two firms.
It added the effects of the attacks had been classified as "narrow and deep", with "significant implications" not only for the two retailers, but their suppliers, partners and service providers as well.
This definition is opposed to “shallow and broad” events such as the 2024 CrowdStrike incident, which affected a large number of businesses across the economy, but the impact to any one company was much smaller.
"Although both of the targeted companies suffered business disruption, data loss, and costs for incident response and IT rebuild, business disruption drives the vast majority of the financial cost," the CMC added.
"Most of the estimated disruption cost is faced by the two companies, but our analysis seeks to estimate the wider cost to partners, suppliers and others."
Despite happening around the same time, the CMC has said the cyberattack on Harrods, another major British retailer, will not been included at this stage, citing a lack of adequate information available about the cause and impact.
M&S was apparently hit by the attack on April 22, revealing news of the incident several days later. The Co-op revealed news of its event on April 30, saying it had been forced to take down parts of its IT systems in an attempt to mitigate the effects.
M&S has forecast the attack could cost it around £300 million in lost operating profit in its financial year.
M&S has not confirmed whether it has paid a ransom to the hackers, but did admit some customer data was stolen in the attack. This did not include any passwords or card or payment details, but home addresses, phone numbers and dates of birth may have been affected.
Anyone concerned their data may have been taken, we recommend using a dark web monitoring service, or using a breach monitor such as Have I Been Pwned to check for potential exposures.
Via InfoSecurity
You might also likeThe hype around generative AI (GenAI) is impossible to ignore in most industries, and cybersecurity is no exception. The potential for cybercriminals enhancing their attacks with AI looms large in industry discussions. At the same time, the security world is gripped by the promise of faster, smarter defenses, from AI-powered EDR to co-pilot-enabled SOC teams.
But here’s the uncomfortable truth: none of it matters if your patching is months out of date, your cloud assets are misconfigured, or your employees freeze under pressure. The security fundamentals are still what really makes the difference in preventing a breach.
While security teams race to bolt on the latest GenAI tools, basic cyber hygiene is in danger of being overlooked.
So how can organizations ensure their cyber skills are up to the challenge in the age of AI?
GenAI is making the basics more urgent - not obsoleteIt’s easy to assume that the widespread use of GenAI requires an entirely new approach to security and it’s undeniable that AI-assisted threats are evolving fast. But the real danger isn’t that GenAI changes the game, it’s the way it accelerates the same tactics that already work.
Attackers are primarily using GenAI to scale up familiar playbooks. Social engineering, reconnaissance, and privilege escalation aren’t new, they’re just happening faster and at greater volume.
In many cases, using AI tools can also be a security risk in and of itself. Immersive’s research found that 88% of users could fool a GenAI system into leaking sensitive information, with the machines being surprisingly vulnerable to human psychological tricks. As with any other software tool, misconfigurations and poor access controls also expose GenAI to greater exploitation.
Rather than replacing hygiene, GenAI makes it more essential. If anything, organizations need to double down on the fundamentals.
Cyber hygiene is still the frontline defenseThe security landscape may be changing rapidly, but the fundamentals aren’t. Most breaches today still stem from issues that are entirely preventable: an unpatched server, a poorly configured firewall, an admin account with excessive privileges. These aren’t sophisticated zero-days that require experienced threat actors to exploit. They’re hygiene failures.
Yet too many organizations treat cyber hygiene as a legacy concern, something solved once they’ve rolled out the latest AI-powered tools. That mindset is dangerous because hygiene fundamentals aren’t something you graduate from; they’re the baseline that allows advanced defenses to function effectively.
If core defenses such as access permissions and configurations are weak, AI-powered tools are just watching the breach happen in high definition. Security starts with doing the basics well and doing them consistently.
Why poor training is the real weak linkIf your security fundamentals are slipping, it’s worth asking: is the problem your tools, or your training?
For most organizations, it’s the latter. Legacy training still dominates, often reduced to short videos and multiple-choice quizzes that check boxes but fail to build capability.
The issue isn’t that people don’t care about security. It’s that they’ve been taught to memorize, not to respond. Training is too often generic, passive, and disconnected from the reality of a live incident. As a result, critical cyber hygiene habits like patch management or recognising phishing attempts fall apart in the moments they matter most.
These issues are intensified when a crisis rears its head. It’s no surprise that teams struggle to respond under pressure, because most have never been given the chance to prepare in a meaningful way.
If we want better outcomes, we need to stop blaming individuals and start fixing the systems that fail to prepare them. No amount of AI will compensate for a team that doesn’t know what to do when the alert goes off.
Drills build muscle memory and enforce hygieneWe wouldn’t expect someone to be ready to fight a fire or fly a plane just because they’d watched a video and taken a quiz, and the same is true for responding to a cyberattack.
This is where cyber drills come in. Unlike traditional training, drills place people in realistic, high-pressure scenarios where they must act, not just observe. They test judgment, coordination, and the ability to follow protocols under stress. Crucially, they reinforce both crisis handling and the importance of essential cyber hygiene through repetition and lived experience.
Cyber drills also expose weaknesses that would otherwise remain hidden. A playbook that looks perfect on paper might collapse under real-time pressure. A confident team might struggle when roles blur in the heat of an incident.
Real cyber readiness isn’t achieved through once-a-year compliance exercises, it’s built into the daily rhythm of how teams work, communicate, and make decisions. That requires more than technology. It takes culture.
Don’t bet everything on the shiniest toolsGenAI is continuing to change the security landscape in unpredictable ways, but it hasn’t changed the fundamentals. Most breaches still come down to human error and poor hygiene, regardless of the tools surrounding them.
Advanced tools won’t protect you if your team isn’t ready. True cyber resilience means training for the basics, testing under pressure, and building a culture where readiness is second nature.
We list the best endpoint protection software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
The newest update to Kali Linux, version 2025.2, introduces over a dozen new tools alongside enhancements to user experience and platform support.
Offensive Security, the developers behind the Debian-based distribution, announced its general availability with a clear focus on aligning the system with the MITRE ATT&CK framework.
The restructured Kali Menu is now tailored to make tool discovery more intuitive, but whether this structural change leads to meaningful workflow improvement remains to be seen.
Thirteen new tools for advanced offensive capabilitiesIncluded in the new release are 13 additional tools, many of which are specialized for advanced offensive operations.
Tools like azurehound for Azure directory data collection and bloodhound-ce-python, a Python ingestor for BloodHound CE, appear to target complex enterprise environments.
Meanwhile, binwalk3 expands firmware analysis capabilities, and bopscrk enables custom wordlist creation based on intelligent algorithms.
Some additions, such as crlfuzz, which is “a fast tool to scan CRLF vulnerability written in Go,” and donut-shellcode, which lets users “generate position-independent shellcode from memory and run it,” suggest the release continues to cater to skilled practitioners.
Kali Linux 2025.2 also adds chisel-common-binaries and ligolo-ng-common-binaries, both of which offer prebuilt binaries aimed at tunneling and pivoting, activities common in red teaming.
In terms of enumeration and lateral movement, tools like ldeep, described as “an in-depth LDAP enumeration utility,” and rubeus, focused on “raw Kerberos interaction and abuses,” contribute further.
While these tools may appeal to ethical hackers, the level of expertise required to operate them effectively can act as a limiting factor for beginners.
Among the most visible quality-of-life improvements is the integration of the new GNOME VPN IP extension, which allows direct viewing of the VPN IP address from the panel.
Though this feature is convenient, it is not spectacular, and it best remains a fringe addition.
This new update also supports GNOME 48 and KDE Plasma 6.3 desktop environments.
Raspberry Pi users now have a new update that combines some Raspberry Pi OS images, eliminating the need for a separate image for the Raspberry Pi 5.
This update also introduces Kali NetHunter CARsenal, a dedicated suite for automotive security analysis.
While it remains one of the best Linux distros for ethical hacking, some users may still prefer Linux alternatives that lean more toward security or integrate more seamlessly with network monitoring tools.
Via 9to5linux
You might also likePopular AI tools such as ChatGPT, Gemini, and Claude are increasingly replacing traditional search engines in how people discover content and make purchasing decisions.
Adobe is attempting to stay ahead of the curve by launching LLM Optimizer, which it claims can help businesses improve visibility across generative AI interfaces by monitoring how brand content is used and providing actionable recommendations.
The tool even claims to assign a monetary value to potential traffic gains, allowing users to prioritize optimizations.
Shift from search engines to AI interfaces(Image credit: Adobe)With a reported 3,500% increase in generative AI-driven traffic to U.S. retail sites and a 3,200% spike to travel sites between July 2024 and May 2025, Adobe argues that conversational interfaces are no longer a trend but a transformation in consumer behavior.
“Generative AI interfaces are becoming go-to tools for how customers discover, engage and make purchase decisions, across every stage of their journey,” said Loni Stark, vice president of strategy and product at Adobe Experience Cloud.
The core of Adobe LLM Optimizer lies in its monitoring and benchmarking capabilities, as it claims to give businesses a “real-time pulse on how their brand is showing up across browsers and chat services.”
The tool can help teams identify the most relevant queries for their sector and understand how their offerings are presented, as well as enabling comparison with competitors for high-value keywords and uses this data to refine content strategies.
A recommendation engine detects gaps in brand visibility across websites, FAQs, and even external platforms like Wikipedia.
It suggests both technical fixes and content improvements based on attributes that LLMs prioritize, such as accuracy, authority, and informativeness.
These changes can be implemented “with a single click,” including code or content updates, which suggests an effort to reduce dependency on lengthy development cycles.
It is clear the best SEO tool tactics may need to adapt, especially as AI chat interfaces do not operate with the same crawling and ranking logic as standard web browsers.
For users who already rely on the best browser for private browsing or privacy tools to avoid data profiling, the idea that businesses are now optimizing to appear inside chatbots could raise questions about how content is sourced and attributed.
Adobe insists that the tool supports “enterprise-ready frameworks” and has integration pathways for agencies and third-party systems, though the wider implications for transparency and digital content ethics remain to be seen.
You might also likeA new NYT Connections puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Sunday's puzzle instead then click here: NYT Connections hints and answers for Sunday, June 22 (game #742).
Good morning! Let's play Connections, the NYT's clever word game that challenges you to group answers in various categories. It can be tough, so read on if you need Connections hints.
What should you do once you've finished? Why, play some more word games of course. I've also got daily Strands hints and answers and Quordle hints and answers articles if you need help for those too, while Marc's Wordle today page covers the original viral word game.
SPOILER WARNING: Information about NYT Connections today is below, so don't read on if you don't want to know the answers.
NYT Connections today (game #743) - today's words(Image credit: New York Times)Today's NYT Connections words are…
What are some clues for today's NYT Connections groups?
Need more clues?
We're firmly in spoiler territory now, but read on if you want to know what the four theme answers are for today's NYT Connections puzzles…
NYT Connections today (game #743) - hint #2 - group answersWhat are the answers for today's NYT Connections groups?
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
NYT Connections today (game #743) - the answers(Image credit: New York Times)The answers to today's Connections, game #743, are…
The first thing I thought when I saw today's Connections was 'alcoholic drinks' – not because I'm obsessed (I'm not a big drinker), but because OLD FASHIONED and COLLINS could both be types of COCKTAIL. But the presence of COCKTAIL itself suggested that was misdirection, so I looked elsewhere.
HISTORICAL, LITERARY, SPECULATIVE and YOUNG ADULT all seemed like examples of FICTION CATEGORIES and indeed my hunch was correct, giving me green.
Next, I thought FLARE, SKINNY and BELL might all be related to jeans, or types of trouser style – but didn't know what the fourth would be, so kept looking.
And I kept looking. And looking.
With nothing else suggesting itself I returned to that potential group and tried a succession of words – MOM, OLD FASHIONED and OLD MAN – but got it wrong each time. Turns out BELL was wrong, and what I should have had was BOYFRIEND, FLARE, MOM and SKINNY – but I've never heard the term BOYFRIEND JEANS and so lost my fledgling streak.
With hindsight I probably should have given up on that angle sooner, but neither WORDS IN HEMINGWAY TITLES or ___ GLASS GLASSWARE were groups I would ever have got, so it wouldn't have made any difference.
How did you do today? Let me know in the comments below.
Yesterday's NYT Connections answers (Sunday, June 22, game #742)NYT Connections is one of several increasingly popular word games made by the New York Times. It challenges you to find groups of four items that share something in common, and each group has a different difficulty level: green is easy, yellow a little harder, blue often quite tough and purple usually very difficult.
On the plus side, you don't technically need to solve the final one, as you'll be able to answer that one by a process of elimination. What's more, you can make up to four mistakes, which gives you a little bit of breathing room.
It's a little more involved than something like Wordle, however, and there are plenty of opportunities for the game to trip you up with tricks. For instance, watch out for homophones and other word games that could disguise the answers.
It's playable for free via the NYT Games site on desktop or mobile.
A new NYT Strands puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Sunday's puzzle instead then click here: NYT Strands hints and answers for Sunday, June 22 (game #476).
Strands is the NYT's latest word game after the likes of Wordle, Spelling Bee and Connections – and it's great fun. It can be difficult, though, so read on for my Strands hints.
Want more word-based fun? Then check out my NYT Connections today and Quordle today pages for hints and answers for those games, and Marc's Wordle today page for the original viral word game.
SPOILER WARNING: Information about NYT Strands today is below, so don't read on if you don't want to know the answers.
NYT Strands today (game #477) - hint #1 - today's themeWhat is the theme of today's NYT Strands?• Today's NYT Strands theme is… Breaking up the band
NYT Strands today (game #477) - hint #2 - clue wordsPlay any of these words to unlock the in-game hints system.
• Spangram has 10 letters
NYT Strands today (game #477) - hint #4 - spangram positionWhat are two sides of the board that today's spangram touches?First side: left, 5th row
Last side: right, 5th row
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
NYT Strands today (game #477) - the answers(Image credit: New York Times)The answers to today's Strands, game #477, are…
Today's Strands took me to my happy place, given that I was a music journalist for years in the 2000s and spend a lot of time at concerts or on Spotify in my free time.
All three of the 'broken up' bands here have made it on to playlists of mine; I never got to see TALKING HEADS, but have seen David Byrne live, playing their songs, and can recommend that anyone who gets the chance does the same thing.
SMASHING PUMPKINS also play a part in one of the greatest of all Simpsons episodes, Homerpalooza, in which the band's frontman introduces himself with the words 'Billy Corgan, Smashing Pumpkins' and Homer replies 'Homer Simpson, smiling politely.' It works better in context, honest.
How did you do today? Let me know in the comments below.
Yesterday's NYT Strands answers (Sunday, June 22, game #476)Strands is the NYT's not-so-new-any-more word game, following Wordle and Connections. It's now a fully fledged member of the NYT's games stable that has been running for a year and which can be played on the NYT Games site on desktop or mobile.
I've got a full guide to how to play NYT Strands, complete with tips for solving it, so check that out if you're struggling to beat it each day.
A new Quordle puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Sunday's puzzle instead then click here: Quordle hints and answers for Sunday, June 22 (game #1245).
Quordle was one of the original Wordle alternatives and is still going strong now more than 1,100 games later. It offers a genuine challenge, though, so read on if you need some Quordle hints today – or scroll down further for the answers.
Enjoy playing word games? You can also check out my NYT Connections today and NYT Strands today pages for hints and answers for those puzzles, while Marc's Wordle today column covers the original viral word game.
SPOILER WARNING: Information about Quordle today is below, so don't read on if you don't want to know the answers.
Quordle today (game #1246) - hint #1 - VowelsHow many different vowels are in Quordle today?• The number of different vowels in Quordle today is 4*.
* Note that by vowel we mean the five standard vowels (A, E, I, O, U), not Y (which is sometimes counted as a vowel too).
Quordle today (game #1246) - hint #2 - repeated lettersDo any of today's Quordle answers contain repeated letters?• The number of Quordle answers containing a repeated letter today is 0.
Quordle today (game #1246) - hint #3 - uncommon lettersDo the letters Q, Z, X or J appear in Quordle today?• Yes. Two of Q, Z, X or J appear among today's Quordle answers.
Quordle today (game #1246) - hint #4 - starting letters (1)Do any of today's Quordle puzzles start with the same letter?• The number of today's Quordle answers starting with the same letter is 0.
If you just want to know the answers at this stage, simply scroll down. If you're not ready yet then here's one more clue to make things a lot easier:
Quordle today (game #1246) - hint #5 - starting letters (2)What letters do today's Quordle answers start with?• P
• F
• S
• E
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
Quordle today (game #1246) - the answers(Image credit: Merriam-Webster)The answers to today's Quordle, game #1246, are…
When I solved STEAL early on I thought this might be a simple one, but I couldn't have been more wrong. Over the next three words I had to battle multiple uncommon letters – X twice and J, and an incredibly uncommon combination of FJ at the start of FJORD.
This must have been one of the toughest Quordle puzzles in ages, so I was mightily relieved to eventually solve it.
How did you do today? Let me know in the comments below.
Daily Sequence today (game #1246) - the answers(Image credit: Merriam-Webster)The answers to today's Quordle Daily Sequence, game #1246, are…
It’s rare to see almost all Apple fans agree on something simultaneously, but when the Camera Control feature launched alongside the iPhone 16 line in September, hate for the additional button was swift and fierce (just take a look at some of the Reddit threads on the subject).
At the risk of angering the mob, I do not count myself among these Camera Control naysayers. In fact, Camera Control is one of my favorite features of my current iPhone, the iPhone 16 Plus.
Before I explain why I fall on that side of the debate, I will admit that Camera Control is far from perfect. I do agree that its positioning is a tad nonsensical, and it would work a great deal better if it were placed in a more natural spot, similar to a typical shutter button.
Still, I know that I’m not completely alone in my overall love for the photography-first button, with others on TechRadar having noted that it can be helpful at times, or even incredibly useful for a very specific purpose.
So, now that we’re well over half a year into Camera Control's existence, and it looks set to remain part of the iPhone’s toolkit for generations to come, I think it’s worth taking another, closer look at the feature see what it does right, and how Apple might look to improve things on the iPhone 17.
Taking iPhone’s cameras to the next level(Image credit: Apple)I know I’ll never be able to take a picture on my iPhone 16 Plus that could hold a candle to something taken on one of the best cameras, but the simplicity of smartphone photography is what wins over, time and time again.
Being able to quickly whip out your phone and take a snapshot never gets old, especially when those images are saved in the cloud for future reference or instantly available for sharing with friends on social media. Still, I'd be lying if I said that the physical experience of taking those shots feels superior on a phone.
In my efforts to try and bridge that gap, I’ve amassed a small collection of smartphone accessories over the years that try to recreate the traditional shutter button experience. I’ve got the portable ShiftCam SnapGrip, as well as the company's more robust SnapGrip Pro attachment. But as with any accessory, these tools do diminish the compact nature of a smartphone, which is why the introduction of Camera Control felt like the answer to a problem I'd been trying to fix.
No longer would I need to carry these add-ons about my person; now I could just use the wonderfully clicky button that Apple had built into the body of its latest handsets.
The introduction of Camera Control felt like the answer to a problem I'd been trying to fix.
Not only that, but part of the reason why I enjoy using a physical shutter button, as opposed to just poking the touchscreen, is that the delayed resistance between the movement of my finger and the picture being taken forces me to be a bit more considerate in the shots I take.
Holding the phone a bit more tightly in order to frame the shot and account for any movement when pressing Camera Control gives you a moment of pause to assess whether or not you’re actually taking a picture of something that interests you, or you’re simply doing so for the sake of it. With this in mind, Camera Control has helped me not only to take fewer pictures (and save my iPhone’s storage in the process), but also feel happier with the shots that I do take.
Because of the way in which Camera Control lets you jump between the photographic styles on the iPhone 16, it’s also allowed me to experiment a bit more with the types of pictures I take.
For example, an indoor shot that might look a tad mundane in color can actually look a great deal better when taken in black and white. Particularly, the Stark B&W mode is now my go-to option because of how it really saturates the monochrome palette to capture your attention.
How can Apple improve Camera Control?(Image credit: Future / Lance Ulanoff)I firmly believe that Camera Control has had a solid first outing, but looking towards how it could be used in the iPhone 17 range, I think that there are some easy wins that Apple could claim to turn around the general consensus.
As I mentioned before, the positioning of Camera Control has to change. If Apple could just move the button closer to the bottom right-hand corner of the iPhone, it would make using the feature so much easier, although I concede that it might require tweaking the resistance to avoid accidental presses.
What would really take Camera Control to the next level, however, is an app, or a set of built-in guides, that can teach folks who don’t know that much about manual photography how to properly adjust aspects like depth and exposure.
As much as I loved having quick access to those components via Camera Control, I haven’t felt confident enough to make use of them, which is why some help for beginners like myself would go a long way towards showing people how they can really maximize Camera Control to their own benefit.
Until such software comes to pass, you can always check out our list of the top five Camera Control tips you need to know, as well as our guide on how to customize Camera Control to better suit your needs.
You might also likeCapCut, widely touted as one the best free video editors by creators and marketers for its powerful editing features, has quietly made a major change to its Terms of Service which should worry users everywhere.
This change means users will be handing over rights, not just to their footage but also to their face, voice, and creative efforts - all without compensation.
This has unsurprisingly triggered concerns, with critics warning the move effectively hands over perpetual control of your content to the platform.
Your content will become their permanent property“CapCut now includes broad language granting them a worldwide, royalty-free, sublicensable, and transferable license to use, reproduce, distribute, modify, adapt, publicly perform, and create derivative works from your content,” Claudia Sandino, Director at Omnivore, says.
The revised terms don’t just apply to public posts; the company also claims rights over user-generated content, including voice, face, and likeness, whether the video is published or not.
“If you upload a video of yourself, or even just a voiceover, they can legally use that in an ad or other media without notifying or compensating you,” Sandino warns.
More troubling is the “perpetual” nature of this license; CapCut retains the rights even after a user deletes their account, as Sandino notes, “CapCut goes further than most by claiming usage rights over content that creators often assume is private or controlled."
For a tool often considered by many as the best video editing app, these terms are out of step with what users expect from creative software.
The legal position of such terms remains unclear for many - although creators technically own their likeness and voice under right of publicity laws, enforcement becomes difficult once a user agrees to these sweeping terms.
“Most creators aren’t aware that uploading a clip, even a draft, could legally waive their rights,” Sandino cautions.
The fact there is no opt-out further complicates the situation for professionals using CapCut for commercial or client work.
CapCut users currently have limited options, and anybody who uses it is agreeing to the updated terms by default, so some may want to switch to more creator-friendly platforms like Adobe Premiere or DaVinci Resolve.
CapCut, owned by ByteDance and often grouped with contenders for the best video editing software, now risks alienating its user base by shifting from a tool to a distribution engine.
Ethically, companies like CapCut should disclose terms in clear language, offer opt-outs, and compensate creators when their content is monetized.
“Using their work without consent or payment isn’t just unethical, it’s exploitative… this affects the future of creative ownership as a whole,” Sandino added.
Via HelloPartner
You might also likeGolf is no stranger to tech. From the best GPS golf watches to launch monitors, the game has embraced innovation. But Robera’s latest invention might be golf’s biggest evolution to date: an autonomous cart that carries your clubs and critiques your swing while trailing you from hole to hole.
Launched on Kickstarter, the Robera Neo has raised more than $300,000 (around £225,000 / AU$470,000) – over 6000% of its original target. First delivery is slated for July 2025 and those numbers suggest plenty of golfers are ready to upgrade their trolleys.
Follow-me carts aren’t a new concept. But unlike traditional electric models, the Neo doesn’t rely on a Bluetooth handset or wireless tether. Instead, it uses an AI-powered vision system to track your position and shadow you as you chip down the fairway. That also means it can steer around hazards, whether that’s a bunker or your golf buddy.
The Neo doesn’t just take the effort out of carrying your clubs: it can also shave strokes off your score. Parked next to the tee, it uses a built-in camera to record your swing. You can then review frame-by-frame analysis on the cart’s detachable tablet, for feedback to rival a human caddy.
Teeing off with autonomyBecause golfers have enough gear to worry about, the Neo majors on hands-free control. The smart follow system supports gesture and voice commands, allowing you to summon or dispatch the cart at a distance. If you’re sure of the shot, you can even send it on ahead. You can also use the remote to hail it from 100 meters away.
With a database of 40,000 courses on-board, the Neo uses GPS mapping to dynamically plan the most power-efficient route forward. It’s not an entirely autonomous experience, though: while the consumer version can find its way along the fairway, traveling from one fairway to the next requires a manual route input. Only the commercial model supports full-course navigation.
Still, the Neo can handle tricky conditions like a pro. An IPX5 rating means it can play in the rain, while treaded wheels help it tackle inclines of up to 25 degrees. A removable 288Wh battery can also see it through a solid 27 holes. And thanks to 100W fast charging, the Neo can go for another round after lunch.
It’s all designed to be clever and convenient. It is heavier than a standard golf trolley at 15kg, but the folding design should make it easy enough to stash in the garage. It’s also significantly more expensive, with the base-level early bird package costing $1,979 (around £1,500 / AU$3,100). The tablet version starts at $2,639 (around £2,000 / AU$4,150).
That’s a lot for a trolley. But it’s cheaper than paying a pro for personalized coaching every time you play. If you want something to carry your clubs and give you feedback, without the need for small talk between swings, the Neo could well be the way forward.
Whether it replaces your caddy or simply gives your game a boost, it certainly promises to upgrade your game. The follow-me mode is nifty, but getting instant feedback without a lesson or launch monitor is what will appeal to many. Plus the fact that a robot won’t roll its eyes when you shank a shot. All of the usual crowd-funding warnings apply, but I'm looking forward to see if it's up to par.
You might also like...The RCS (Rich Communication Services) standard intended as a replacement for the older SMS (Short Message Service) is now available in Google Messages for Android and Messages on the iPhone – and Google is keen for more users to sign up for it.
As it stands, RCS is an opt-in upgrade inside Google Messages, so not everyone has it turned on. The team at Android Authority has spotted hidden text in the latest version of the app that could be used to nag people to turn on RCS.
The text strings include "invite this contact to RCS chat" and "we can share high-quality media and send secure messages when we're both on RCS", so it looks as though you'll be able to encourage your contacts to enable RCS with a couple of taps.
These messages aren't live yet, but they are included in the app code, so Google could enable them in the near future. It looks as though a prompt to invite someone to RCS will appear if Google Messages determines that they don't have it turned on.
Modern messagingHow the invites might look (Image credit: AssembleDebug / Android Authority)If you haven't yet enabled RCS in Google Messages for Android, you can do so by tapping your avatar on the chats list (top right), then Messages settings and RCS chats: There's a Turn on RCS chats toggle switch you can use.
RCS brings with it modern messaging features, like read receipts, proper group chat support, and typing indicators – but everyone inside a chat has to use RCS, otherwise everything will fall back to the old SMS standard.
We're continuing to see upgrades to RCS inside Google Messages too, with the expansion of animated Screen Effects, and media file management, for example. Earlier this month, a snooze feature for chats was rolled out as well.
With Android 16 now out in the world too, it shouldn't be too long before Google Messages gets its Material 3 Expressive update – the revamped look for Google's mobile operating system that adds more color and emotion.
You might also like- A second season was confirmed during the week of the show's premiere
- It was filmed back-to-back with the first season
- A date is yet to be confirmed for its release, but creator Steven Knight said “you won’t have to wait long"
- Most of the main cast are expected to return
- There will possibly be a small time jump forward as they take it more towards the 21st century
A Thousand Blows season 2 has not only been confirmed, but it's already been written and filmed.
Just a few weeks before the cultural juggernaut that was Adolescence was released, actors Stephen Graham and Erin Doherty partnered up in another gritty drama – but this one was set in Victorian London, and which told a tale of boxers and an all-female gang of thieves.
A Thousand Blows – which streamed on Disney+ in the UK and Hulu in the US – told the story of real life Jamaican boxer Hezekiah Moscow (Malachi Kirby), and how he rose to fame in the rough community of London’s East End, meeting Mary Carr (Doherty), leader of the Forty Elephants gang, and menacing pub owner and bare-knuckle boxer Sugar Goodson (Graham).
Unusually, though, when the show launched in February 2025 in London during a Q&A session with the actors and the writer, Steven Knight, they revealed that not only had a second season been confirmed, but it had been written and shot back-to-back with the first. So in a world where a follow-up TV series can sometimes take up to five years between seasons, we’re hopefully not in for a too long wait to find out the fate of Hezekiah, Mary, Sugar and co.
Here’s everything we know so far about A Thousand Blows Season 2, including when the release date might be, if there’s a trailer yet, who will be in the cast and what the plot’s likely to focus on:
Now we know that season 2 is already in the can – a canny decision, presumably saving money all round on set, costumes, actors etc – the decision still lies with Disney+ as to when the second season will premiere. “You won't have to wait too long,” Knight told The Playlist when asked for a release date.
There’s the option of streaming it later in 2025, or perhaps they might want to leave a more traditional year gap, in which case it would be released in February 2026. As soon as there’s confirmation on the date, we’ll let you know.
A Thousand Blows season 2: trailer, is there one?(Image credit: Disney+ / Hulu)No, although the production will have all the footage for a teaser of what’s to come, there’s been nothing officially released just yet.
A Thousand Blows season 2: possible castStephen Graham lashes out as the fierce Sugar Goodson (Image credit: Disney+ / Hulu)Our main trio are most likely to return, so that’s Hezekiah (Kirby), Mary (Doherty) and Sugar Goodson (Graham).
Much of the supporting cast are also likely to return are:
One character who won’t be returning is Alec Munroe (Francis Lovehall), who died in the penultimate episode. Another maybe-maybe not is Mr Lao (Jason Tobin) who escaped from jail but was forced to go to Liverpool to start a new life.
A Thousand Blows season 2: plot(Image credit: Disney Plus)The end of the first season saw Hezekiah defeat Buster Williams in the fight, but he didn’t win the prize money, as Buster died, so the fight was declared void. This meant Hezekiah and Mary didn’t have the money to flee to America; but then even worse news followed – Hezekiah found out from Sugar about her involvement in his best friend Alec’s death, and he told her that she is dead to him.
The next series will likely pick up on the fall out of this, as well as another fall out following a brutal beating that Sugar gave his brother, Treacle, who swore never to have anything to do with him again.
As for the Forty Elephants, Mary, and Jane Carr (Susan Lynch), for season 2, it’s likely to be complicated, as is the relationship with the Elephant Boys gang.
When asked at the Q&A, Knight was understandably tight-lipped: “I can't give a lot away, but it's more of the same, expect the unexpected but the stakes are higher.”
He added that there might be a little time jump forward from the 1880s, where this season is set: “But we do have the second series in the can and we all want to keep this story going and I think we will and just take it towards the 21st Century.”
A Thousand Blows season 3: what’s the future?(Image credit: Disney Plus)While no official confirmation has been given for future seasons beyond season two, it’s clear that the writers and the actors are keen to keep this universe running for a while.
Doherty told The Guardian that she wanted to keep one of Mary's rings from set that looks like an heirloom, but "as much as she thought about taking it home, she ultimately decided not to tempt fate, while waiting to see whether there will be a series three and four."
Could this be as long running a series as Peaky Blinders? Keep it ringside to find out.
For more Disney+ and Hulu TV coverage. read our guides on Daredevil: Born Again, X-Men 97 season 2, and Andor season 2.
To succeed in the digital age, businesses must not only establish a strong online presence but continuously adapt their digital strategy as the virtual landscape evolves.
While there is no one-size-fits-all solution for rapid business expansion, a practical and impactful step is the use of country code top-level domains, or ccTLDs, to build consumer trust and enhance local visibility.
Subject to some regional requirements, these domains - such as .ai for Anguilla or .au for Australia - offer a simple yet effective way to signal geographic relevance and credibility.
Despite the growing convenience of modern search tools, the value of country code top-level domains (ccTLDs) remains largely untapped.
Often perceived as minor variations at the end of a URL, ccTLDs in fact play a crucial role in branding, security, economic development, and regional search engine optimisation (SEO).
Modern registry services and registrar tools offer streamlined management, making it surprisingly efficient for businesses to expand their global digital footprint while maintaining local relevance.
Local loyalty: Building consumer trust and visibilityTo attract customers in new regions, building a trustworthy brand is essential. Without trust, business growth is unlikely.
Country code top-level domains (ccTLDs) serve as a signal of credibility, increasing the likelihood that customers will not only make a visit but also return and potentially make a purchase.
According to au Domain Administration’s (auDA) “Why .au” survey, half of Australians only buy from online businesses with a .au domain.
Moreover, three in four Australians are more likely to trust a business if its website ends in .au, underscoring the powerful role domain names play in fostering consumer confidence.
For businesses expanding into new markets, a localised domain name demonstrates long-term commitment to the region and signals an intention to build lasting customer relationships.
Customising the website to reflect local culture and language further enhances this connection, delivering a more personalised, hyperlocal experience for both new and returning visitors.
Equally important, using a relevant ccTLD can sometimes improve a site's ranking in region-specific search engine results - boosting organic visibility and driving growth. Search engines often use ccTLDs as a strong geographic signal, helping them to serve relevant content to users in specific regions.
Trend-setters: Harnessing trend-driven ccTLDsAlthough traditionally used to signal geographic relevance, ccTLDs are increasingly proving their value on the global stage.
Amid shifting global trends and surging interest in emerging technologies, certain ccTLDs have evolved into powerful marketing tools - delivering substantial economic benefits to their countries of origin. A prime example of this is Anguilla’s now-coveted .ai domain.
As artificial intelligence (AI) has gained global prominence, demand for the .ai domain has surged - growing nearly 400% over the past five years. This rapid adoption has generated substantial revenue for Anguilla.
The Independent reported that, in 2023 alone, .ai accounted for about 20% of Anguilla’s total government revenue. The same article revealed that this windfall has helped fund vital national projects, including airport expansion, improved healthcare for the elderly, and accelerated development of the island’s vocational training centre.
Anguilla is not an isolated case. Other nations have also reaped economic rewards from their ccTLDs - such as .tv for Tuvalu, .pr for Puerto Rico, and .ly for Libya.
In a crowded digital landscape, these domains allow brands to differentiate themselves and quickly convey their niche. This clarity is especially powerful when it comes to driving growth and establishing a strong, memorable presence online.
ccTLDs can also be chosen for their strategic relevance to a specific industry or offering, even if they aren't globally viral. For instance, a one-to-one business might find a .me (Montenegro) or a local artisan in Italy might prioritize a .it for credibility within their local community.
Universal acceptance: How ccTLDs preserve communityBeyond boosting national economies and enhancing consumer trust, ccTLDs also serve as digital homes for smaller communities and cultures.
While widely spoken languages like English, Spanish, and Chinese dominate the web, approximately 3,078 of the world’s 7,168 living languages are classified as endangered as of 2023.
In the effort to preserve cultural heritage, it's essential that the internet remains inclusive - free from limitations based on language or geographic origin. This is where ccTLDs play a vital role in supporting linguistic and cultural diversity online.
At the heart of this mission is the principle of Universal Acceptance - the idea that all domain names and email addresses should function seamlessly across every internet-connected device and software, without technical barriers or bias.
In this context, ccTLDs act as digital beacons, enabling diverse communities to establish an online presence that reflects their unique identity.
For small and medium-sized businesses, using a ccTLD isn't just about reaching customers - it’s about fostering a sense of belonging. By choosing a domain that resonates with a specific cultural or regional audience, these businesses can build not only a customer base, but a community.
The enduring importance of ccTLDsccTLDs offer businesses a unique opportunity to build trust, enhance local visibility, and connect authentically with diverse communities.
Beyond their traditional role in indicating geographic relevance, ccTLDs have evolved into powerful tools for branding, economic growth, and cultural preservation. By strategically leveraging ccTLDs, businesses can not only stand out in a crowded digital landscape but also position themselves for sustained success both locally and globally.
To explore how a specific ccTLD can strategically enhance your brand's localized strategy and serve as a powerful asset in your digital toolkit, begin by researching the availability and relevance of domains in your target markets.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
As millions of Americans prepare for summer vacation, the US Transportation Security Administration (TSA) has issued a timely cybersecurity alert warning travelers about criminal tactics designed to steal personal information.
The risk include tampered USB charging stations at airports and fake public Wi-Fi networks.
The former, know as “juice jacking,” sees cybercriminals install malware on public USB charging stations - once a user plugs in their phone, the compromised port can silently transmit malware or extract data from the device.
Public USB ports and free Wi-Fi risksThe warning comes amid heightened concerns about identity theft and digital surveillance as more people rely on connected devices while traveling.
Though some skeptics argue that widespread, confirmed cases are rare, the theoretical risk remains a concern for cybersecurity professionals.
When a USB port serves both data and power functions, an attacker could modify the circuit or insert a small data-sniffing implant inside the terminal, allowing them to harvest contact lists, text messages, and even keystrokes, depending on the vulnerability of the device.
To reduce exposure, the TSA recommends travelers use their own wall adapters or power banks, or simply avoid direct USB connections through untrusted sources.
Another tactic flagged by the TSA involves free public Wi-Fi networks.
These so-called "honeypot" networks appear legitimate, often named after the airport or airline, but are controlled by criminals.
Once connected, the attacker can perform a man-in-the-middle attack, intercepting all the data a traveler transmits, including credit card numbers, passwords, and business logins.
In more advanced cases, they might inject fake web pages that trick users into revealing credentials.
This attack can slip through the strongest passwords and cause identity theft, therefore, it is important for users to have their virtual private networks (VPNs) and ensure their devices are protected with the best identity theft protection software.
If you must use a public Wi-Fi, the TSA warns that you should never “enter any sensitive info while using unsecure WiFi.”
This advice aligns with broader recommendations often found in best antivirus and endpoint protection guides, which frequently emphasize physical device safety in addition to digital security tools.
You might also likeCybercriminals are increasingly exploiting a lesser-known flaw in Discord’s invitation system to target unsuspecting users, particularly gamers, new research has claimed.
A report from researchers from Check Point found attackers manage to register previously valid invite links with custom vanity URLs.
The tactic involves hijacking once legitimate and trusted expired or deleted Discord invite links and redirecting them to malicious servers hosting multi-stage malware campaigns.
From trusted links to dangerous redirectsThese hijacked links, often embedded in old forum posts, community pages, or social media, are being used to silently funnel users to Discord servers operated by threat actors.
Once on these fake servers, users are greeted with what appears to be a standard verification process.
A bot named “Safeguard” prompts visitors to click a “Verify” button, which initiates an OAuth2 process and redirects them to a phishing site.
The site employs a social engineering method called “ClickFix,” where users are tricked into copying and running a PowerShell command under the guise of fixing a broken CAPTCHA.
This action silently launches the malware installation chain, with the attackers using cloud services such as Pastebin, GitHub, and Bitbucket to deliver the payloads in multiple stages, allowing them to blend into normal network traffic.
Initial scripts download executables that retrieve further encrypted payloads, which include AsyncRAT, a tool that gives attackers remote control over infected systems, and a tailored variant of the Skuld Stealer designed to extract credentials and cryptocurrency wallet data.
Gamers have become a prime target, with campaigns even disguising malware as tools like The Sims 4 DLC unlockers - one archive named Sims4-Unlocker.zip was downloaded over 350 times, highlighting the campaign's reach.
Through clever evasion techniques such as delayed execution and command-line argument checks, the malware often bypasses detection from even the best antivirus software.
The threats extend beyond typical malware infections. The Skuld Stealer used in these attacks can extract crypto wallet seed phrases and passwords, effectively granting full control over victims’ digital assets.
Considering the focus on cryptocurrency theft and credential harvesting, individuals should reinforce their defenses with robust identity theft protection services.
These tools can monitor for unauthorized use of personal information, alert users to breaches, and assist in recovering compromised digital identities.
While some might assume that endpoint protection tools would shield them from these tactics, the multi-layered, modular structure of the attack often flies under the radar.
To stay safe, users must be wary of Discord invite links, especially those embedded in old content. Also, avoid running unexpected scripts or following suspicious verification steps.
You might also likeAt its recent Advancing AI event, AMD revealed some of the first technical details about its next-generation Zen 6-based processor, code-named "Venice.”
Built on a 2nm process and packing up to 256 Zen 6 cores - a 33% increase from the current generation EPYC 'Turin' processor - AMD is seeking to raise the bar for AI-optimized compute power.
It is expected to more than double memory bandwidth compared to current EPYC CPUs, hitting 1.6TB/s per socket. Venice also supports PCIe Gen6, offering faster communication between CPUs and GPUs.
Pushing the envelope"Venice extends our leadership across every dimension that matters in the data center," said Lisa Su, AMD CEO. "More performance, better efficiency, and outstanding total cost of ownership."
"It delivers 70% more compute performance than our current generation leadership Turin CPUs," she added. "And to really keep feeding MI400 with data at full speed, at even at rack scale, we have doubled both the GPU and the memory bandwidth and optimized Venice to run at higher speeds. Now we just got Venice back in the labs and it is looking fantastic.”
While Venice headlines AMD's 2026 platform, Su also gave us a glimpse at what the chip giant is working on for 2027.
"We are already deep in the development of our 2027 rack that will push the envelope even further on performance, efficiency and scalability with our next generation Verano CPUs and Instinct MI500-series GPUs, so lots and lots of stuff to come from AMD," she revealed.
This new system builds on the "Helios" rack shown for 2026, which houses 72 MI400 GPUs across 18 racks. For 2027, AMD is planning an even more expansive setup with 36 racks.
Assuming a similar configuration, the next-gen AI rack could contain 144 GPUs. The Verano platform is expected to maintain the high bandwidth and performance efficiency established by Venice, likely with more memory and compute per rack.
AMD has not officially named its 2027 rack, but we hear it’s being informally referred to in industry circles as a larger-scale continuation of Helios.
Via Tom's Hardware
You may also like