Error message

  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

TechRadar News

New forum topics

Subscribe to TechRadar News feed
All the latest content from the TechRadar team
Updated: 2 hours 42 min ago

The Hollow Knight: Silksong appearance at Opening Night Live 2025 was disappointing, but thankfully there's more information on the way

Tue, 08/19/2025 - 13:51
  • Hollow Knight: Silksong had a brief appearance at Gamescom Opening Night Live 2025, with a few seconds of gameplay
  • Host Geoff Keighley also reaffirmed that the game is officially launching this year
  • A special Silksong livestream will air this week

Gamescom Opening Night Live 2025 has officially kicked off, and the first announcement of the night assured us that Hollow Knight: Silksong is definitely real.

It's been a long time since Team Cherry announced the Hollow Knight sequel, and it has made appearances at several live presentations throughout the past few years, with no news of a release date each time.

Unfortunately, Opening Night Live 2025 didn't share the long-awaited release date, but host Geoff Keighley did reaffirmed the fact that the game is officially launching this year.

We also received a very brief glimpse of new gameplay, though sadly, it wasn't quite a full new trailer.

However, Team Cherry has confirmed that a "special announcement" will be shared during a broadcast on August 21, 2025, which will offer a brand new look at Silksong and (hopefully) a proper release date.

There was also confirmation that the game will be playable on the Gamescom show floor.

You might also like...
Categories: Technology

The Lossless Scaling plugin is the best thing that could happen for SteamOS handhelds, and performance results prove it

Tue, 08/19/2025 - 13:30
  • The new Decky Lossless Scaling plugin improves performance in Elden Ring at 18W
  • Frame rates went from 40fps to 75fps in tests on the Lenovo Legion Go S, as shown by YouTuber ETA Prime
  • We've not seen how this works on AMD Ryzen Z2 Extreme handhelds yet

The SteamOS modding community continues to make sure Valve's platform offers the best handheld games console experience around, thanks to new plugins like Decky Loader for enhancing performance – and that's right, we're focusing on Lossless Scaling again.

As showcased by YouTuber ETA Prime (via Notebookcheck),the new Decky Lossless Scaling plugin, which is available on GitHub, increases Elden Ring's frame rate from 40fps to 75fps at a TDP (or power consumption) of 18W on the Lenovo Legion Go S. This is the AMD Ryzen Z1 Extreme model, featuring 32GB of RAM and officially powered by SteamOS, rather than Windows.

The performance boosts sound like they may be too good to be true, but it's all possible thanks to Lossless Scaling's frame generation capabilities. It's also worth noting how impressive this is at 18W in games like Elden Ring and Cyberpunk 2077 (both moving close to triple-digit frame rates). It goes a long way towards significantly improving battery life from using less power, all without a major compromise on performance.

Most frame generation models come with the caveats of ghosting and input lag, with Nvidia and AMD taking measures to diminish those issues.

Fortunately, when base frame rates in games are high enough, ghosting, artifacts, and input lag become less apparent. And this is what the Ryzen Z1 Extreme processor (also likely with the help of 32GB of RAM) can help gamers achieve. Microsoft's Windows 11 also isn't being used here, which has weaker performance for games compared to SteamOS.

I've tested this Decky Lossless Scaling plugin on my Asus ROG Ally, and it's easily given my handheld a new lease of life. Games like the Resident Evil 4 remake, which are slightly difficult to run above 40 or 50fps, can now reach above 100fps. Yes, input lag is present, but I can say it isn't significant or noticeable, since the base frame rates aren't too low.

Analysis: It will be interesting to see how this fares on the Ryzen Z2 Extreme handhelds

Lossless Scaling 2x enabled in RE4 remake on the Asus ROG Ally... (Image credit: Future / Isaiah Williams)

I've already stated how handheld gaming PCs are becoming far too expensive when considering the performance boosts over previous generation processors. Spoiler alert, the upgrades are not very significant, as shown in the MSI Claw A8's benchmarks. However, I'm intrigued to see how Decky Lossless Scaling works with a Z2 Extreme-powered handheld.

While the new plugin is great for all handhelds, including the Steam Deck, certain games that are poorly optimized, like Dragon's Dogma 2 or Monster Hunter Wilds, need an extra push from more powerful processors. The Ryzen Z2 Extreme doesn't have a huge leap over its predecessor, but it's likely going to have a huge impact when using a tool like Lossless Scaling.

Unfortunately, the MSI Claw A8 is nowhere to be found in most regions right now and is seemingly only available in Germany and other European retailers. I've got my eye on the Lenovo Legion Go S, using the Z1 Extreme, but stock and pricing are the two main issues.

Until those problems are addressed, Decky Lossless Scaling on my Asus ROG Ally running Bazzite is perfectly fine for me.

You might also like...
Categories: Technology

Google Messages is rolling out an essential embarrassment saving feature to Android users

Tue, 08/19/2025 - 13:30
  • Google Messages now has a delete for everyone option
  • The feature is rolling out now to Android phone users
  • It'll only work for your RCS messages

Ever sent a text you regret instantly and wish it could be erased? Well, Google Messages is finally giving users the ability to delete messages from everyone’s devices – including the phones that received it.

This feature has been in the hands of Google Messages beta testers since May – and it actually was first spotted in the app’s code back in February (via Android Authority) – but now it’s coming to the global full release of the app.

What that means for Google Messages users is when you want to delete a message you’ve sent – and you’re chatting with someone using the app over RCS – you’ll see two options: Delete for me or Delete for everyone.

To find this menu, press and hold on a message, then select the trash can icon at the top of your screen. You’ll also see the option to copy or star the message if you’d rather highlight your error.

(Image credit: Future)

The app does note that messages might still be seen by people running older versions of the app, and texts sent to someone not over RCS won’t be deletable.

I’ve quickly given the feature a test on my Samsung Galaxy Z Fold 7, texting and deleting messages to my fiancée, and it works like a charm.

Just like with other services, both of our timelines show a “Message deleted” bubble where my text used to be.

Though someone may still see the text if they react faster than you can delete it – you’ll see my messages were replied to before I could erase them – so while deleting a message can be handy, it doesn’t beat never making a mistake in the first place.

You might also like
Categories: Technology

LG TVs are the first to get 4K 120Hz Nvidia GeForce NOW game streaming – anyone want RTX 5080 power without the cost?

Tue, 08/19/2025 - 13:00
  • 4K 120Hz cloud gaming on LG TVs from September 2025
  • GeForce Now also upgraded on LG monitors, on PCs and on Steam Deck
  • Requires a GeForce NOW Ultimate subscription

Nvidia has announced a massive gaming upgrade for LG TVs: they'll be able to deliver cloud-based 4K 120Hz gaming via GeForce NOW – provided you have a subscription to GeForce NOW Ultimate and a compatible TV.

That's not all. The same upgrade that's powering those TVs is also bringing cloud gaming at up to 5K 120Hz on LG monitors, and up to 360fps at 1080p on PCs.

The high-performance streaming is thanks to the powerful combination of Nvidia's Blackwell architecture and its GeForce RTX 5080-class GPUs in the company's streaming servers: they do the heavy lifting and stream the data directly to and from your TV, monitor or PC.

GeForce Now is getting a performance upgrade across multiple platforms (Image credit: NVIDIA)GeForce Now offers upgrades for everyone

As FlatpanelsHD reports, GeForce Now will also up the frame rates on Steam Deck from 60fps to 90fps, will deliver "high-performance gaming" on Macs by offering access to the new-gen GPUs, and will stream at up to 360fps on PCs at 1080p.

The Blackwell architecture and RTX 5080-class GPUs are enormously powerful: Nvidia says that they outperform the PlayStation 5 Pro by over three times, delivering a whopping 62 teraflops.

The updated service also promises better color accuracy, smoother streaming thanks to the use of the AV1 codec at up to 100Mbps, and AI-powered video filters "for select games" to reduce on-screen blur and noise.

According to Nvidia CEO Jensen Huang, "Bringing the Nvidia Blackwell architecture, one of the world’s most important computer graphics innovations, to GeForce Now represents the biggest leap in cloud gaming ever. With Blackwell, GeForce Now offers even more stunning graphics, the fastest frame rates and negligible latency to turn any device into a high-quality gaming rig that rivals nearly every other product on the market today."

The GeForce NOW upgrade with the NVIDIA Blackwell architecture will start rolling out to subscribers in September. You can see LG's list of GeForce NOW-compatible TVs here – it's not yet clear if they'll all support 4K 120Hz from GeForce NOW even if they can support it over HDMI.

But we'd say it's pretty safe to assume that if you have a newer and more premium LG TV – especially an OLED – it should be safe to assume that you're supported. We already rate LG OLEDs among the best gaming TVs, so this just solidifies it (at least, until others catch up).

You might also like
Categories: Technology

Want a cheap Tesla? EV giant slashes its monthly UK leasing prices – and offers enticing US deals to boost sales

Tue, 08/19/2025 - 13:00
  • The Times reports that a lack of storage has led to discounts
  • UK customers can lease a Tesla for 40% less than last year
  • In the US, Tesla is offering enticing bundles to help boost sales

Tesla has slashed the monthly leasing cost of its vehicles in the UK in a bid to boost sales and clear excess inventory, The Times has reported, with discounts of up to 40% offered to car leasing firms to help shift stock – while the EV giant is also offering new deals in the US to boost sales.

The hefty UK discounts apply to both the recently refreshed Model 3 and Model Y vehicles, with The Times claiming the former can be leased for £252 a month plus tax, or around $410 / AU$630. Rewind a year and the exact same lease could cost between £600 and £700 per month.

Although the £60,000 Model Y hasn’t had its retail price reduced, it has been advertised for around £400 (around $540 / AU$830) per month on some of Tesla’s trusted leasing partner sites.

In the US, the company has attempted to shake up its pricing strategy and position its aging Model S and Model X vehicles as more premium propositions by making a new $10,000 ‘Luxe Package’ standard across the range.

This sees the Model S now starting at $94,990 and the Model X costing an eye-watering $99,990, but the package bundles in high levels of autonomous driving via Full Self-Driving (Supervised), Premium Connectivity and a four-year ‘Premium Service’ that covers routine maintenance costs.

It also sees the return of free Supercharging, which has been dangled as an incentive numerous times over the past few years but no longer lasts the lifetime of the vehicle.

Tesla is losing control of the EV market

(Image credit: BYD/Denza)

According to the most recent data from the Society of Motor Manufacturers and Traders (SMMT), Tesla’s sales in the UK dropped by 60% in the UK in July, pushing its overall market share to just 0.7%.

BYD, on the other hand, accounted for 2.3% of all new registrations during the same period, with the Chinese company piling on the pressure in numerous other European markets.

Tesla makes it difficult to work out exactly how well Model S and Model X are doing in the US, with its quarterly delivery reports accounting for Model 3 and Model Y sales, with everything else bundled into an ‘other models’ category that includes the Cybertruck and its Semi.

But it appears overall sales are struggling, with Electrek estimating that the company was down by around 15% in the first quarter of this year compared to the same period in 2024.

With BYD increasing its foothold in Europe, and an increasing number of Chinese rivals seemingly springing up monthly, Tesla is facing the toughest competition yet.

It’s not a great time to be a Tesla shareholder, but the big discounts are good news for anyone considering leasing a Tesla.

You might also like
Categories: Technology

Apple Messages is finally getting a feature it’s needed for years in iOS 26

Tue, 08/19/2025 - 13:00
  • Draft messages are much easier to find in iOS 26
  • Leaked code also suggests iOS 26 will bring a huge security boost
  • Apple is apparently testing end-to-end encryption for RCS messages

How many times have you started to write a text in iOS’s Messages app and then left it for later, only to forget who you were messaging and what you were saying a few hours down the line?

It’s a common occurrence, but iOS 26 includes a new feature that will make it much easier to find those unfinished texts – and it’s almost shocking Apple hasn’t implemented it sooner.

If you’re running the iOS 26 public beta, you’ll now be able to filter your texts by draft status. All you need to do is open the messages app, tap the hamburger menu in the top-right corner, then select Drafts under the Filter By header. Your Messages inbox will now show only draft texts and nothing else, saving you a bunch of time tapping into all your existing threads in a vain attempt to find the elusive draft.

There are filters for other situations, too. If you’ve scheduled messages for another time, you’ll see a Send Later filter, for example, while there’s an Unread filter for any message you haven’t gotten around to reading yet.

Note that these filters only show up if there is a relevant message to filter. If you don’t have any drafts, for example, you won’t see the Drafts filter. And these filters work regardless of whether you’re using Apple’s iPhone-to-iPhone iMessage standard or RCS/SMS messages sent to Android devices. Blue bubbles or green bubbles, it works.

Stronger security

(Image credit: Shutterstock)

Speaking of RCS messages, iOS 26 might include a significant security boost when it comes to sending texts between an iPhone and an Android device, and it could address a flaw that’s gone unaddressed for too long.

According to Apple code reportedly discovered by Android Authority, iOS 26 will implement end-to-end encryption when sending messages using the RCS protocol between iOS and Android. Although you can currently send RCS messages between these two platforms (something that Apple finally brought about in iOS 18), the standard is not end-to-end encrypted. While iMessage has featured this security technology for years, the GSM Association (GSMA) – which implements and updates RCS – has taken a while to add this toughened-up encryption.

That changed in March of 2025, when the GSMA said end-to-end encryption would be added to RCS. And although Apple has previously outlined that end-to-end encryption would be coming to RCS on the iPhone in “future software updates,” it didn’t set a date for the change.

Yet Android Authority says it’s seen code that includes the string “GisRCSEncryptionEnabled,” which suggests that RCS encryption is undergoing internal testing at Apple. Further code snippets also include the string “mls-rcs-server,” which could imply Apple is assessing the MLS encryption that Google has added to Google Messages.

Despite the promising signs, there’s no guarantee that iOS 26 will implement RCS encryption. Apple took a long time to implement RCS in the first place – partly due to its weaker security compared to iMessage – and it might simply be testing its updated functionality. But the fact that these strings are present in iOS 26 code gives us hope that RCS encryption could be on the way, making cross-platform texting safer for iOS and Android users alike.

You might also like
Categories: Technology

This 2-bay NAS can accommodate up to 60TB of hard drive storage and supports up to 50 user accounts

Tue, 08/19/2025 - 12:34
  • TerraMaster launches new 2-bay NAS with an Intel x86 N5095 processor replacing older ARM models
  • New F2-425 supports up to 60TB storage with strong security and RAID options
  • Device includes AI photo management, 50 user accounts, and multimedia streaming

TerraMaster has launched the F2-425, a new 2-bay NAS device designed to replace the company’s earlier F2-210 and F2-212 devices.

The system marks a shift away from ARM processors, instead introducing an Intel x86 N5095 quad-core chip that delivers up to 40 percent better performance.

With 4GB of memory and a 2.5GbE port, the F2-425 offers support for 4K video encoding and decoding and is designed for storing and streaming multimedia files, while also handling routine data backups.

Affordably priced

It offers up to 60TB capacity, spread across two drives of up to 30TB each, enough for millions of documents or thousands of hours of video.

Data security features are built in, with support for RAID 0, RAID 1, JBOD, Single, and TRAID/TRAID+. It offers 256-bit TLS encryption, two-factor authentication, and snapshots, as well as a Security Isolation Mode to protect data against ransomware and other cyber threats.

Although the F2-425 is being marketed at home and small business owners, it should also appeal to professionals storing sensitive work files.

The device runs on TerraMaster’s own TOS 6 operating system, which gains new management features and integrates with both cloud services and local networks.

For offices, the TNAS PC client allows NAS files to appear as local drives, simplifying daily use. Real-time file synchronization with up to 32 historical versions supports efficient backups and recovery.

As well as data storage, the F2-425 can act as a multimedia hub, streaming to smart TVs, phones, and tablets, with support for Plex, Emby, and TerraMaster’s own applications.

The companion mobile app allows for AI photo categorization, automatic backups, and sharing tools with customizable permissions.

The NAS supports up to 50 user accounts, offering both private storage and shared spaces.

The TerraMaster F2-425 is available now via the company’s website and authorized resellers priced at $249.99. Buyers get a 2-year warranty and lifetime technical support.

You may also like
Categories: Technology

Volkswagen wants you to pay a Netflix-style subscription to unlock extra EV power – and that could be a slippery slope

Tue, 08/19/2025 - 12:00
  • Volkswagen offers an "optional power upgrade for a fee" on two cars
  • The performance upgrade increases power by 27bhp
  • Subscription packages have previously attracted criticism from buyers

Volkswagen will make customers pay an additional fee to unlock the full power of the ID 3 Pro and ID3 Pro S models it has been revealed, with £16.50 (around £22 / AU$34) per month required to gain access to the vehicle’s full 228bhp.

Auto Express uncovered that both models were listed as producing 150kW or 201 horsepower on the company’s UK configurator, with the small print revealing that owners could only access the full 228hp (170kW) factory capability via an "optional power upgrade for a fee.”

Buyers can choose to pay monthly, in which case the vehicle would return to its lower power setting when sold, or part with £649 (around $880 / AU$1,350) for a one-time lifetime fee that stays with the vehicle.

In a statement provided to Auto Express, a Volkswagen spokesperson said that offering more power to customers is “nothing new” and that those looking to purchase an ID 3 can choose to have a "sportier driving experience" without having to commit to a more expensive vehicle from the outset.

Volkswagen is also not the first or only manufacturer to offer additional performance that can be unlocked for a fee, as the Polestar Engineered Optimization program can improve the power delivery of both Polestar and Volvo models.

Essentially, the software upgrade 're-maps' the engine, tweaks throttle response and improves the speed of automatic gear changes for a more aggressive drive, but does so without the risk of voiding the manufacturer’s warranty.

Gearing up for a subscriptions-based future

(Image credit: Volkswagen)

Unlocking a little extra performance is nothing new, as there are hundreds of aftermarket companies that will tease a few more horses out of an engine if you are willing to void your manufacturer warranty.

That said, we are entering a new era of the Software Defined Vehicle where a number of upgrades and improvements are now available over a simple over-the-air update.

Tesla allows its customers to take advantage of its highly autonomous driving modes for a fee, for example, while Polestar offers performance upgrades on Polestar 2 models.

Many industry experts I have spoken to openly admit that offering both digital and physical features via a subscription presents a lucrative business case to manufacturers that are looking to claw back losses from tepid EV sales and ensure future profitability.

But the approach hasn’t gone down well with sectors of the paying public, as BMW drew heavy criticism when it asked its customers to pay an additional fee for features like heated seats.

The company said it would allow owners to only take advantage of the technology when required (for example, in the depths of winter) but customers demanded access to a feature that they felt should have been part of the list price.

While unlocking a little extra performance on-demand sounds like fun, some buyers will be wary of automakers charging a recurring fee for features that would have previously come as standard (or a one-off optional payment) on a new vehicle.

It could also be the case that paying a small fee each month to unlock a feature becomes more expensive than it was when customers could option it outright, with Netflix-style incremental price increases making motoring more expensive than it needs to be.

You might also like
Categories: Technology

How to watch The Great British Sewing Bee season 11 for free online from anywhere

Tue, 08/19/2025 - 11:39

It's Children’s week on The Great British Sewing Bee, and fashion designer Victoria Jenkins is joining Patrick Grant and Esme Young in the workroom to put the seven remaining contestants through their paces. Some exacting miniature models are set to run riot too.

You can watch The Great British Sewing Bee season 11 online from anywhere with a VPN and potentially for free.

Date and time: Premiered at 9pm BST on Tuesday, July 15 (UK)

Watch free: BBC iPlayer (UK)

Use NordVPN to unblock BBC iPlayer (try risk-free)

A reality TV show with heart and purpose, GBSB lays bare just how wondrously talented, resourceful and creative humans can be, while gently pushing back against fast fashion and all of its ills. If GBSB doesn't capture your imagination and make you think – really think – about the real-world impacts of your sartorial choices, nothing will.

So judges Patrick and Esme, champions of high-quality clothing that lasts, may have one or two things to say about Kit's pet passion. The Mancunian digital marketer espouses "pointless fashion", encompassing garments that are "utterly useless" but "so camp" and "fabulous". Things like string hoodies and deconstructed coats barely held together by chains. That should spark some interesting conversations.

R&D scientist Yasmin always joked that she'd apply for The Great British Sewing Bee as a dad/daughter duo, however her father, an engineer and self-taught tailor, passed away two years ago. As was the case with head of communications Jess, she was raised to make things well and fix them, instead of taking the cheap and nasty route.

Starting with 12 contestants, one-by-one GBSB whittles them down to three finalists, via a triple-threat of weekly challenges: pattern, transformation, and made to measure. While one title hopeful is awarded the Garment Of The Week award, another is eliminated.

Read on as we explain how to watch The Great British Sewing Bee season 11 online from anywhere.

How to watch The Great British Sewing Bee season 11 for free in the UK

(Image credit: Future)

Viewers in the UK can watch The Great British Sewing Bee season 11 FREE on BBC Three and via the BBC iPlayer streaming service.

All you need is an account, a TV license and a UK postcode (e.g.HA9 0WS). Sign up here!

What if you're abroad? Grab this VPN to unblock BBC iPlayer and watch your usual free stream from anywhere.

How to watch The Great British Sewing Bee season 11 streams with a VPN

If you're keen to watch The Great British Sewing Bee season 11 but you're away from home and access to the show is geo-blocked, you can always use a VPN to access it instead (assuming you're not breaching any broadcaster T&Cs, of course). You may be surprised by how simple it is to do.

Use one of the best VPNs to watch The Great British Sewing Bee from anywhere:

Editors Choice

NordVPN – try the world's best VPN risk-free
We regularly review all the biggest and best VPN providers and NordVPN is our #1 choice. It unblocked every streaming service in testing and it's very straightforward to use. Speed, security and 24/7 support available if you need – it's got it all.

The best value plan is the two-year deal which sets the price at $3 per month, and includes an extra 3 months absolutely FREE. Customers can also get an Amazon gift card worth up to $50 included right now. There's also an all-important 30-day no-quibble refund if you decide it's not for you.

So, try NordVPN 100% risk-free for 30 daysVIEW DEAL ON

Can I watch The Great British Sewing Bee season 11 in the US?

Any plans to make The Great British Sewing Bee available to watch in the US are yet to be announced.

Brits currently away from home can use a VPN to watch The Great British Sewing Bee season 11 on BBC iPlayer from abroad.

Can I watch The Great British Sewing Bee season 11 in Canada?

(Image credit: Other)

As with the US, The Great British Sewing Bee is yet to find a home in Canada.

However, UK nationals currently traveling in Canada can use a VPN to unblock BBC iPlayer and watch the show from anywhere in the world. We recommend NordVPN.

How to watch The Great British Sewing Bee season 11 in Australia

Binge is home to The Great British Sewing Bee in Australia. However, seeing as season 10 only landed on Thursday, November 21, it's likely to be a while before season 11 arrives. Binge starts from AU$10 a month after a 7-day FREE trial.

Not in Australia? Anyone from Oz who wants to watch their usual streaming service from abroad can do so by using a VPN.

The Great British Sewing Bee season 11 Q+A

(Image credit: BBC)Who is in The Great British Sewing Bee season 11 cast?

Caz, 59, retired, Staffordshire
Dan, 37, stage performer, Durham
Gaynor, 72, retired office manager, Port Talbot
Glendora, 59, bus driver, Luton – eliminated
Jess, 33, head of communications, London – eliminated
Kit, 24, digital marketer, Manchester
Novello, 66, business owner and magistrate, London – eliminated
Orla, 19, cafe worker/student, Inverness
Peter, 45, senior pre-construction manager, Devon – eliminated
Saffie, 32, lecturer, London – eliminated
Stuart, 53, premises manager, Herefordshire
Yasmin, 30, scientist, Gateshead

Can I watch The Great British Sewing Bee season 11 for free?

Yes. BBC One is home to The Great British Sewing Bee season 11 in the UK, with all episodes available to stream for free on the BBC iPlayer platform.

How many episodes of The Great British Sewing Bee season 11 are there?

The Great British Sewing Bee season 11 comprises 10 episodes. They're released weekly on Tuesdays, starting July 15.

How can I watch The Great British Sewing Bee's previous seasons?

All 10 previous seasons, plus special episodes, are available on BBC iPlayer in the UK.

We test and review VPN services in the context of legal recreational uses. For example:1. Accessing a service from another country (subject to the terms and conditions of that service).2. Protecting your online security and strengthening your online privacy when abroad.We do not support or condone the illegal or malicious use of VPN services. Consuming pirated content that is paid-for is neither endorsed nor approved by Future Publishing.

Categories: Technology

Germany's possible ad blocker ban could threaten user freedom and privacy, says Mozilla

Tue, 08/19/2025 - 11:27
  • Germany's top court has revived a legal case that could lead to a ban on ad blockers over copyright violations
  • The case originates from a lawsuit brought by a major German publisher against the firm behind Adblock Plus
  • If this comes to pass, Germany will be the second country in the world, after China, to ban ad blockers

The German Federal Supreme Court (BGH) has put into question the very legitimacy of ad blockers. The court is now investigating whether these programs – which, by default, block certain elements of a website – can be qualified as copyright infringement.

The case originates from a lawsuit brought by Axel Springer, a major German publisher, against Eyeo GmbH. Eyeo is the company behind Adblock Plus, which is one of the best ad blockers according to TechRadar's reviewers.

If ad blockers get banned in Germany, the consequences could be far wider than they seem at first glance. It's not just ad blockers that could be in danger, warns Mozilla, as "such a precedent could embolden legal challenges against other extensions that protect privacy, enhance accessibility, or improve security."

The legal battle between publishers and ad blockers is heating up

(Image credit: Adblock Plus)

Axel Springer SE, which is one of the biggest media publishers in Europe, has been locked in a decade-long legal battle against Eyeo GmbH, meaning Adblock Plus. The publisher argues that ad blockers interfere with its right to control how its copyrighted content is rendered and displayed, potentially violating German copyright law – CyberInsider reported.

For a long time, Adblock Plus has seemingly emerged victorious from these legal battles, but that might not be the case this time around. Germany's Federal Court of Justice has overturned parts of a 2023 decision by a Hamburg appeals court, stating that further fact-checking was needed.

The question comes down to whether ad blockers truly break copyright laws. The BGH is exploring the interaction between ad blockers and various structures of a website, including the browser's Document Object Model (DOM) and CSS Object Model (CSSOM). The DOM is responsible for all the content to include on a page, and the CSSOM determines what it looks like.

The key legal question here is: Does modifying how a website displays through browser-side tools like ad blockers count as breaking the law? If the German courts rule that yes, it is copyright infringement, Germany could be the second country in the world to ban ad blockers, second only to China.

Why this matters for ad blockers — and beyond

Ad blockers are one thing. Many of us use them, and they help us get rid of pesky ads on a daily basis. However, if the German courts decide that any kind of browser-side alterations is copyright infringement, many similar browser extensions or tools may end up being banned too.

For instance, some of the best VPN software also comes with ad-blocking capabilities. There are also extensions or browser features that improve accessibility or offer additional privacy and security protection, like against phishing. All of those tools could potentially be banned right alongside ad blockers.

Given the potential danger, it's no wonder that Mozilla, the developer behind Firefox, took a strong stance on the matter.

In a blog post published earlier this month, Mozilla's Senior IP & Product Counsel, Daniel Nazier, notes that user freedom, privacy, and security are at risk if this court ruling comes to pass and Germany indeed bans ad blockers.

"We sincerely hope that Germany does not become the second jurisdiction (after China) to ban ad blockers. This will significantly limit users’ ability to control their online environment and potentially open the door to similar restrictions elsewhere," wrote Nazier.

The case will now be reviewed by the court in Hamburg, which might take a year or two. Until then, the future of ad blockers in Germany will remain uncertain, as will data privacy in the country and throughout Europe. If other countries decide to take a page out of Germany's playbook, we could have a bigger legal battle on our hands.

You might also like
Categories: Technology

BYOD in the hybrid era: rethinking “bring your own device” policies for a secure, flexible workplace

Tue, 08/19/2025 - 09:20

Once considered a hallmark of flexible working, bring your own device (BYOD) policies are now under renewed scrutiny. While BYOD was initially hailed as a productivity booster, offering convenience and cost savings, it is increasingly viewed as a potential liability.

Recent research shows that over half of UK businesses are now considering banning personal devices altogether. Laptops, smartphones, tablets, and even webcams are being re-evaluated in light of rising security risks.

Yet a blanket ban may do more harm than good. In reality, BYOD is not inherently the problem; outdated security frameworks are. Rather than reverting to rigid device controls, IT leaders should focus on modernizing their approach to managing personal devices in the workplace.

The goal must be to strike a balance: securing sensitive data without compromising employee flexibility or efficiency.

How BYOD became a risk

The rapid adoption of BYOD policies was largely driven by necessity. During the pandemic, organizations needed to maintain continuity while enabling remote work at scale. Encouraging, or simply allowing employees to use personal devices, was a practical solution - in many cases, it was the only viable one.

However, speed often came at the expense of governance. In the rush to maintain operations, security controls were not always properly enforced. Many personal devices lacked basic protections such as encryption, up-to-date antivirus software, or mobile device management tools. As businesses migrated to the cloud and digital workflows accelerated, these unmanaged devices began accessing increasingly sensitive systems and data.

This has significantly expanded the attack surface. Personal devices are more likely to be shared within households, connected to unsecured networks, or left unpatched. IT teams often lack the visibility or control to respond to incidents in real time. The result is a growing risk profile that many organizations now find untenable.

Where traditional policies fall short

Conventional BYOD policies have not kept pace with the complexity of hybrid work. Static, one-size-fits-all rules may have sufficed when office attendance was the norm. Today, however, employees operate across multiple locations, roles, and sometimes even organizations. Legacy policies rarely account for this level of fluidity.

Moreover, the proliferation of “shadow IT” (where staff bypass official channels to access tools or services) further complicates matters. Employees often turn to personal email accounts or unauthorized file-sharing platforms when corporate systems feel restrictive. While often well-intentioned, this behavior can introduce significant security vulnerabilities.

This growing sense of lost control is prompting some organizations to consider eliminating BYOD entirely. But such measures risk driving issues underground rather than resolving them. Prohibiting personal device use without offering viable alternatives may frustrate employees and hinder productivity, particularly in fast-paced or mobile-first roles.

A modernized approach to BYOD

Rather than eliminating BYOD, organizations should focus on enabling it securely and sustainably. A Zero Trust framework offers a strong foundation, built on the principle that no user or device should be inherently trusted.

This model emphasizes identity-based access controls, multi-factor authentication, and the continuous assessment of device health and context before granting access to systems or data. It enables a more dynamic and risk-aware security posture that is far better suited to hybrid environments.

Endpoint management solutions, such as Microsoft Intune, play a central role in putting this strategy into practice. These tools enable organizations to define and enforce compliance requirements, such as device encryption, patch status, or anti-malware installation, before granting access to corporate resources.

Crucially, these controls can be applied to personal devices without infringing on the user’s privacy or personal data and include the ability to remotely wipe corporate data in case a device is lost or stolen.

Policy alone is not enough. Employees need to understand and buy into the organization's expectations. Clear, well-communicated guidance on how personal devices should be used for work, including rules on permitted applications, password management, and how to report suspicious activity, can help embed a culture of shared responsibility for security. Importantly, transparency is key: when employees understand why these rules exist, they are far more likely to comply.

Segregating personal and professional environments on the same device can also help reduce risk while maintaining user convenience. Solutions such as virtual desktops or containerized applications create clear boundaries between corporate and private data. This ensures that sensitive information is protected and auditable, while employees can continue using familiar devices and workflows.

Finally, BYOD strategies must remain agile. Security threats evolve constantly, and employee behavior shifts with changing work patterns. Organizations should monitor usage, review threat intelligence, and regularly update their policies to remain aligned with risk and business need.

Looking forward

The debate around BYOD reflects a broader challenge: how to secure the modern workplace without sacrificing the flexibility that employees now expect. Hybrid work is here to stay, and so too is the need for more sophisticated, nuanced approaches to endpoint security.

Rather than reverting to outdated policies or resorting to blanket bans, organizations should focus on implementing intelligent, scalable solutions that protect data while enabling productivity. With the right combination of technology, policy, and user engagement, BYOD can remain a viable part of a secure and resilient digital workplace.

We list the best mobile device management (MDM) software solutions.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Agentic AI’s security risks are challenging, but the solutions are surprisingly simple

Tue, 08/19/2025 - 09:06

Imagine the world’s most capable intern. Someone who can read thousands of documents overnight, make inferences from complex problems instantly, and work 24/7 without complaints. But there's a catch: this intern is also incredibly gullible and will believe almost anything you tell them, making them the perfect target for manipulation by bad actors.

This analogy perfectly illustrates the current state of agentic AI. It’s simultaneously the most sophisticated tool ever created and the most vulnerable to simple deception.

This is made more challenging by how differently people view AI. The features that excite some terrify others, creating a divide between the builders and users.

Builders – aka engineers and researchers – focus on foundational challenges like data quality, algorithmic bias, and existential risks. Their concerns dominate headlines and academic discussions.

But users, such as business leaders and operational teams who want to harness these tools practically and safely, have more practical worries. Less concerned about whether AI will end the world and more focused on whether it will expose customer data or make costly mistakes.

While builders are focused on the future, users want to know what AI can do today. And unfortunately, the gap between what they expect agentic AI to deliver and what it can is substantial.

Expectation vs reality

The narrative around agentic AI often paints a picture of fully autonomous digital workers able to alter a business overnight. While multi-agent LLMs are no longer theory, there’s more exploration that must be done before they can enable complete business transformation.

Current AI systems can deliver impressive agent-like behaviors including knowledge extraction from vast documents, accelerating the software delivery lifecycle, and empathetic customer interactions. But truly autonomous systems that work independently in complex novel environments remain out of reach.

While AI can complete structured tasks with human oversight, it struggles with open-ended problems, long-term planning and high-stakes decision making where failures have consequences.

For example, AI can identify potential vulnerabilities in code and propose wide ranging fixes, but developers must evaluate the solutions to implement and guide their application as AI can’t consistently decipher broader system context.

The danger of inflated expectations is that organizations are caught off guard by the real security risks. Lured into a false sense of readiness, they’re ill-prepared for the routine threats they’re far more likely to face.

The security challenge

As agentic AI systems become more autonomous, organizations face a critical challenge of ensuring systems act aligned with business goals. As agentic AI becomes more capable, it also becomes harder to control and therefore, easier to exploit. Unlike traditional software, which fails in predictable ways, AI systems can fail creatively, manipulated in ways their creators never anticipated.

So, what kinds of security risks should organizations actually be worried about?

While traditional IT challenges, such as data protection across systems, risk management, robust reporting and visibility remain critical, there are other novel challenges that require fresh approaches.

For example, adversarial prompt engineering, such as prompt injection where bad actors can embed malicious instructions in innocent requests, or context manipulation, where attackers provide false context, causing AI to make decisions based on incorrect assumptions.

Another significant issue is accumulation of errors: while experienced humans often spot their mistakes, AI errors can quickly snowball, especially in multi-agent systems, turning small problems into big ones; this can go unnoticed in the early stages as agentic reasoning is superficially similar to human reasoning, and then quickly spiral.

AI risks may seem daunting, but the solutions are often more familiar than organizations expect. It’s not a question of if a security problem will arise, but a matter of when, so it’s important to be prepared.

The solution

Many of the solutions for agentic AI’s specific security challenges exist in traditional cybersecurity and risk management frameworks. The approach requires companies to apply principles they’re already familiar with (or with which organizations they work with are familiar), including zero trust, human oversight, and controlled access.

Rather than assuming all AI inputs are safe, companies should treat them as potentially malicious and implement multiple validation layers. This approach works across all applications, whether customer service or financial operations.

While the principles are straightforward, successful implementation requires careful planning. To build effective agentic AI security, organizations should:

  1. Start with a small blast radius: Begin with low-risk, high-value use cases where mistakes are recoverable. For example, deploy AI for document summarization before moving onto financial transactions. This builds organizational confidence and expertise.
  2. Build governance: Don’t wait for problems to emerge. Establish clear approval processes and staff training programs so employees know what to do when things go wrong.
  3. Automate the validation process: Build and continually grow comprehensive AI-based and traditional test suites that encapsulate the worst imagined case scenarios of adversarial attacks, edge cases, and so forth, so that we are not following a moving target but measuring our improvement carefully and preventing backslides.
  4. Question everything: Train users and teams integrating AI tools to question AI outputs rather than inherently trusting them. Make verification part of company culture amongst both builders and consumers by setting up peer review processes, introducing spot-checking protocols and celebrating when someone catches a mistake.
  5. Develop protection processes: Conduct regular risk assessments, audit existing implementations for vulnerabilities, implement monitoring systems, and create AI-specific incident response procedures. Set up security policies for success.
  6. Stay ahead: Ensure employees are informed about emerging threats by providing relevant training, as well as encouraging them to participate in industry forums, discuss experiences with peers, and attend security conferences. Remember, knowledge is power.
The future

Agentic AI is a powerful tool that can transform how we work and solve problems. But like any powerful and emerging technology, it requires respect, understanding, and proper safety measures.

The key is approaching this technology with the same careful planning and risk management we should apply to any other tool. The gullible savant intern analogy reminds us that even the most capable systems need supervision, clear boundaries, and ongoing guidance.

We've featured the best AI website builder.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Microsoft warns dangerous PipeMagic backdoor is being disguised as ChatGPT desktop app - here's what we know

Tue, 08/19/2025 - 09:05
  • Microsoft saw a modified version of a GitHub project carrying malware
  • The malware can serve as both a backdoor and an infostealer
  • The group behind it was seen deploying encryptors, too

Microsoft has warned of a fake ChatGPT desktop application circulating online which actually carries a highly modular malware framework serving as an infostealer and a backdoor.

In an in-depth report, Microsoft said it observed the framework it dubbed PipeMagic, originating on GitHub.

“The first stage of the PipeMagic infection execution begins with a malicious in-memory dropper disguised as the open-source ChatGPT Desktop Application project,” the report reads. “The threat actor uses a modified version of the GitHub project that includes malicious code to decrypt and launch an embedded payload in memory.”

A handful of victims

The malware is the work of a threat actor known as Storm-2460, which Microsoft also flagged in early April 2025 abusing a zero-day vulnerability in the Common Log File System to deploy the RansomEXX encryptor.

In this case, while the group abused the same flaw - CVE-2025-29824, Microsoft did not state which encryptor was deployed. PipeMagic seems to have evolved, since in the earlier report, it was described as a simple backdoor trojan.

Now, it’s described as a highly modular malware framework which allows threat actors to execute payloads dynamically, maintain persistent control, and communicate stealthily with command-and-control servers. It can manage encrypted payload modules in memory, perform privilege escalation, collect extensive system information, and execute arbitrary code through its linked list architecture.

PipeMagic also supports encrypted inter-process communication via named pipes and can self-update by receiving new modules from its C2 infrastructure.

While Microsoft said the number of victims was “limited”, it did not discuss concrete numbers. The targets were observed in the United States, across Europe, South America, and the Middle East. Most targeted industries include IT, financial, and real estate.

To mitigate the threat, Microsoft recommended a layered defense strategy, which include enabling tamper protection and network protection in Microsoft Defender for Endpoint, and running endpoint detection and response in block mode, among other things.

You might also like
Categories: Technology

NYT Strands hints and answers for Wednesday, August 20 (game #535)

Tue, 08/19/2025 - 09:00
Looking for a different day?

A new NYT Strands puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Tuesday's puzzle instead then click here: NYT Strands hints and answers for Tuesday, August 19 (game #534).

Strands is the NYT's latest word game after the likes of Wordle, Spelling Bee and Connections – and it's great fun. It can be difficult, though, so read on for my Strands hints.

Want more word-based fun? Then check out my NYT Connections today and Quordle today pages for hints and answers for those games, and Marc's Wordle today page for the original viral word game.

SPOILER WARNING: Information about NYT Strands today is below, so don't read on if you don't want to know the answers.

NYT Strands today (game #535) - hint #1 - today's themeWhat is the theme of today's NYT Strands?

Today's NYT Strands theme is… Mint condition

NYT Strands today (game #535) - hint #2 - clue words

Play any of these words to unlock the in-game hints system.

  • NOSEY
  • LORD
  • PURE 
  • WALL
  • GLOB
  • DUNE
NYT Strands today (game #535) - hint #3 - spangram lettersHow many letters are in today's spangram?

Spangram has 14 letters

NYT Strands today (game #535) - hint #4 - spangram positionWhat are two sides of the board that today's spangram touches?

First side: top, 4th column

Last side: bottom, 2nd column

Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.

NYT Strands today (game #535) - the answers

(Image credit: New York Times)

The answers to today's Strands, game #535, are…

  • EURO
  • PESO
  • RAND
  • POUND
  • RUPEE
  • DOLLAR
  • SPANGRAM: GLOBAL CURRENCY
  • My rating: Hard
  • My score: 2 hints

I struggled today, but that could have more to do with me, rather than the difficulty of the search.

My first thought when I saw the theme was that we were looking for something to do with collecting. I thought of stamps, furniture and comics first – a world where mint-condition items are worth a tremendous amount more than comics you may have actually read.

I needed several hints to get me going and after being given EURO and PESO I made slow work of getting the rest of the board, including the spangram.

Like, I suspect the majority of players, KWANZA was my final GLOBAL CURRENCY. I've since discovered three facts about Angola's currency, in case it ever comes up in casual conversation: 1) it is named after a river 2) it replaced the escudo in 1977, and 3) all of the notes feature Agostinho Neto, the poet and leader who helped fight for Angola’s independence from Portugal. Every day’s a school day with Strands.

Yesterday's NYT Strands answers (Tuesday, August 19, game #534)
  • HOITYTOITY
  • PELLMELL
  • HOCUSPOCUS
  • WILLYNILLY
  • SPANGRAM: HYPHENATED
What is NYT Strands?

Strands is the NYT's not-so-new-any-more word game, following Wordle and Connections. It's now a fully fledged member of the NYT's games stable that has been running for a year and which can be played on the NYT Games site on desktop or mobile.

I've got a full guide to how to play NYT Strands, complete with tips for solving it, so check that out if you're struggling to beat it each day.

Categories: Technology

Quordle hints and answers for Wednesday, August 20 (game #1304)

Tue, 08/19/2025 - 09:00
Looking for a different day?

A new Quordle puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Tuesday's puzzle instead then click here: Quordle hints and answers for Tuesday, August 19 (game #1303).

Quordle was one of the original Wordle alternatives and is still going strong now more than 1,100 games later. It offers a genuine challenge, though, so read on if you need some Quordle hints today – or scroll down further for the answers.

Enjoy playing word games? You can also check out my NYT Connections today and NYT Strands today pages for hints and answers for those puzzles, while Marc's Wordle today column covers the original viral word game.

SPOILER WARNING: Information about Quordle today is below, so don't read on if you don't want to know the answers.

Quordle today (game #1304) - hint #1 - VowelsHow many different vowels are in Quordle today?

The number of different vowels in Quordle today is 3*.

* Note that by vowel we mean the five standard vowels (A, E, I, O, U), not Y (which is sometimes counted as a vowel too).

Quordle today (game #1304) - hint #2 - repeated lettersDo any of today's Quordle answers contain repeated letters?

The number of Quordle answers containing a repeated letter today is 2.

Quordle today (game #1304) - hint #3 - uncommon lettersDo the letters Q, Z, X or J appear in Quordle today?

• No. None of Q, Z, X or J appear among today's Quordle answers.

Quordle today (game #1304) - hint #4 - starting letters (1)Do any of today's Quordle puzzles start with the same letter?

The number of today's Quordle answers starting with the same letter is 0.

If you just want to know the answers at this stage, simply scroll down. If you're not ready yet then here's one more clue to make things a lot easier:

Quordle today (game #1304) - hint #5 - starting letters (2)What letters do today's Quordle answers start with?

• D

• M

• B

• W

Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.

Quordle today (game #1304) - the answers

(Image credit: Merriam-Webster)

The answers to today's Quordle, game #1304, are…

  • DOLLY
  • MERRY
  • BUGLE
  • WORST

This was one of those wonderful games of Quordle for me where every guess was correct and I zoomed through in under a minute – the puzzling equivalent of driving through a city and every light turning green.

Of course, there is also the fact that today’s round was quite easy with just three vowels, no rare words or odd words and two words ending in the same letter.

Daily Sequence today (game #1304) - the answers

(Image credit: Merriam-Webster)

The answers to today's Quordle Daily Sequence, game #1304, are…

  • SHRUB
  • LADEN
  • TATTY
  • ADORE
Quordle answers: The past 20
  • Quordle #1303, Tuesday, 19 August: KNAVE, SMART, CARRY, MAMMA
  • Quordle #1302, Monday, 18 August: FIBER, TRADE, RAYON, TEASE
  • Quordle #1301, Sunday, 17 August: FUNGI, AMITY, DRIER, CHECK
  • Quordle #1300, Saturday, 16 August: OWING, QUAKE, SLIDE, ELITE
  • Quordle #1299, Friday, 15 August: WHALE, PRISM, DRAKE, TEPEE
  • Quordle #1298, Thursday, 14 August: LAPEL, IDIOM, RENEW, LIVER
  • Quordle #1297, Wednesday, 13 August: CACTI, HOMER, EMAIL, ALBUM
  • Quordle #1296, Tuesday, 12 August: SPOOL, TITLE, JAUNT, OVINE
  • Quordle #1295, Monday, 11 August: ADULT, BROOM, PURER, CRUEL
  • Quordle #1294, Sunday, 10 August: SCRUM, PIPER, TROLL, SPORE
  • Quordle #1293, Saturday, 9 August: NOOSE, INLET, ELEGY, VIRUS
  • Quordle #1292, Friday, 8 August: KNEEL, KINKY, RALPH, BOOZY
  • Quordle #1291, Thursday, 7 August: PLUNK, PROXY, CURVY, PEARL
  • Quordle #1290, Wednesday, 6 August: RISKY, APART, FAUNA, HANDY
  • Quordle #1289, Tuesday, 5 August: ROAST, SLICK, AUDIT, BILLY
  • Quordle #1288, Monday, 4 August: MACAW, SINCE, COLON, CHIRP
  • Quordle #1287, Sunday, 3 August: MOTIF, LEERY, LOFTY, BURST
  • Quordle #1286, Saturday, 2 August: WARTY, PUPAL, CLEAR, SLICE
  • Quordle #1285, Friday, 1 August: ACTOR, MEALY, WIDTH, ADOBE
Categories: Technology

NYT Connections hints and answers for Wednesday, August 20 (game #801)

Tue, 08/19/2025 - 09:00
Looking for a different day?

A new NYT Connections puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Tuesday's puzzle instead then click here: NYT Connections hints and answers for Tuesday, August 19 (game #800).

Good morning! Let's play Connections, the NYT's clever word game that challenges you to group answers in various categories. It can be tough, so read on if you need Connections hints.

What should you do once you've finished? Why, play some more word games of course. I've also got daily Strands hints and answers and Quordle hints and answers articles if you need help for those too, while Marc's Wordle today page covers the original viral word game.

SPOILER WARNING: Information about NYT Connections today is below, so don't read on if you don't want to know the answers.

NYT Connections today (game #801) - today's words

(Image credit: New York Times)

Today's NYT Connections words are…

  • CANDY CANE
  • CAROUSEL
  • CEILING FAN
  • CROOK
  • ZEBRA
  • KNITTING NEEDLES
  • CROCHET HOOK 
  • BARBER POLE
  • YIN-YANG SYMBOL
  • CROWBAR
  • PIANO KEYS
  • CHOPSTICKS
  • CLAVES
  • DOMINO
  • SKI POLES
  • LAZY SUSAN
NYT Connections today (game #801) - hint #1 - group hints

What are some clues for today's NYT Connections groups?

  • YELLOW: Monochrome items
  • GREEN: Two of a kind
  • BLUE: Staring at these will make you dizzy
  • PURPLE: Bend at the end 

Need more clues?

We're firmly in spoiler territory now, but read on if you want to know what the four theme answers are for today's NYT Connections puzzles…

NYT Connections today (game #801) - hint #2 - group answers

What are the answers for today's NYT Connections groups?

  • YELLOW: BLACK-AND-WHITE THINGS
  • GREEN: PAIRS OF RODS
  • BLUE: THINGS THAT ROTATE ABOUT A VERTICAL AXIS 
  • PURPLE: RODS THAT CURVE AT ONE END

Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.

NYT Connections today (game #801) - the answers

(Image credit: New York Times)

The answers to today's Connections, game #801, are…

  • YELLOW: BLACK-AND-WHITE THINGS DOMINO, PIANO KEYS, YIN-YANG SYMBOL, ZEBRA
  • GREEN: PAIRS OF RODS CHOPSTICKS, CLAVES, KNITTING NEEDLES, SKI POLES
  • BLUE: THINGS THAT ROTATE ABOUT A VERTICAL AXIS BARBER POLE, CAROUSEL, CEILING FAN, LAZY SUSAN
  • PURPLE: RODS THAT CURVE AT ONE END CANDY CANE, CROCHET HOOK, CROOK, CROWBAR
  • My rating: Hard
  • My score: 1 mistake

Occasionally, Connections throw us a curveball – and today was one of those days, with 16 tiles of random items from a BARBER POLE to YIN-YANG SYMBOL.

As is often the case with these kinds of Connections I suffered temporary word blindness and failed to see a single link.

My mistake was putting together KNITTING NEEDLES and CROCHET HOOK with CHOPSTICKS and CANDY CANE, my thinking being they are all kinds of sticks.

Taking a deep breath I began to see some more promising patterns and got THINGS THAT ROTATE ABOUT A VERTICAL AXIS mainly because of LAZY SUSAN, an object I love as it sounds like such an insulting thing to call a revolving plate.

Magically, what was once confusing all made sense, a glorious feeling of enlightenment that is one of the biggest joys of Connections.

Yesterday's NYT Connections answers (Tuesday, August 19, game #800)
  • YELLOW: QUITE THE TALKER BLABBERMOUTH, CHATTERBOX, PRATTLER, WINDBAG
  • GREEN: FORTIFIED WINES MARSALA, PORT, SHERRY, VERMOUTH
  • BLUE: ___ ROCK CLASSIC, LITTLE, PLYMOUTH, THE
  • PURPLE: STARTING WITH WAYS TO MOVE QUICKLY DARTMOUTH, DASHBOARD, FLYWHEEL, RUSHMORE
What is NYT Connections?

NYT Connections is one of several increasingly popular word games made by the New York Times. It challenges you to find groups of four items that share something in common, and each group has a different difficulty level: green is easy, yellow a little harder, blue often quite tough and purple usually very difficult.

On the plus side, you don't technically need to solve the final one, as you'll be able to answer that one by a process of elimination. What's more, you can make up to four mistakes, which gives you a little bit of breathing room.

It's a little more involved than something like Wordle, however, and there are plenty of opportunities for the game to trip you up with tricks. For instance, watch out for homophones and other word games that could disguise the answers.

It's playable for free via the NYT Games site on desktop or mobile.

Categories: Technology

The iPhone 17e could get these 3 upgrades according to a new leak – including the super-useful Dynamic Island

Tue, 08/19/2025 - 08:57
  • The iPhone 17e will reportedly have a Dynamic Island rather than a notch
  • It could also have a new chipset and a new design
  • However, many of its other specs might remain unchanged

The iPhone 17e sounds like it might be quite a big step up from the iPhone 16e, with the key new addition possibly being the Dynamic Island.

This is according to reputable leaker Digital Chat Station (via GSMArena), and it would mean no more notch, bringing the front design in line with the latest iPhones.

The same source also claims the iPhone 17e will have an A19 chipset, which would likely mean the same chipset as the iPhone 17, but says it will once again have a 6.1-inch 60Hz screen, a single 48MP rear camera, and a 12MP front-facing camera with Face ID.

That’s unfortunate, given that plenty of mid-range Android phones – including key iPhone 'e' rivals like the Samsung Galaxy S24 FE and Google Pixel 9a – have multiple rear cameras and 120Hz screens. So this might still be a somewhat compromised handset and a tough sell, even at a price that’s likely to be a fair bit lower than other iPhone 17 models.

An intriguing new design

The iPhone 17e might look something like this iPhone 17 Air leak (Image credit: Majin Bu)

Intriguingly though, Digital Chat Station also appears to claim (going by a machine translation) that the iPhone 17e will get a third upgrade in the form of a new design. It’s not clear what they mean by that though – the move to a Dynamic Island would certainly be a change, but this seems to be a separate point they’re making, suggesting other changes.

We're expecting the rest of the iPhone 17 series to adopt a new Pixel-like camera design, so it's possible that this is what the source is referring to, in which case the iPhone 17e could look a lot like the iPhone 17 Air – which is also expected to have just one rear camera – from the back.

Alternatively, they could be referring to the addition of a Camera Control button, which is present on the main iPhone 16 line but absent from the iPhone 16e, but that’s just speculation.

We may not find out for sure which features the iPhone 17e gets or doesn't get for a while, with the only release date leak so far pointing to May of next year. But if you don’t overly care about having multiple rear cameras or a high screen refresh rate, then the iPhone 17e might be worth the wait.

You might also like
Categories: Technology

Chinese hackers are targeting web hosting firms - here's what we know

Tue, 08/19/2025 - 08:34
  • Cisco Talos spotted a new threat actor, tracked as UAT-7237
  • The group resembles the "typhoon" Chinese state-sponsored groups
  • It targeted web hosting firms in Taiwan

Chinese hacking groups are now targeting web hosting companies in Taiwan, researchers are saying.

Security experts from Cisco Talos said they spotted a never-before-seen group that focuses on “establishing long-term persistence in web infrastructure entities in Taiwan.”

They are tracking the miscreants under the moniker UAT-7237, and believe it to be a subgroup of UAT-5918, meaning it is still a distinct entity, and most likely a state-sponsored one, at that. While Talos does not explicitly say it, it does say that the tools the threat actors are using are quite similar to different “typhoon” hackers which are known to be state-sponsored.

Living off the land

Most of the tools are open source and somewhat customized, with a custom Shellcode loader known as “SoundBill” particularly standing out.

The group uses Cobalt Strike beacons, is quite picky with its web shells, and relies on a combination of direct remote desktop protocol (RDP) access and SoftEther VPN clients.

Talos recently observed the group breaching a Taiwanese hosting provider, and being “particularly interested” in gaining access to the victim organization’s VPN and cloud infrastructure.

“UAT-7237 used open-source and customized tooling to perform several malicious operations in the enterprise, including reconnaissance, credential extraction, deploying bespoke malware, setting up backdoored access via VPN clients, network scanning and proliferation,” the researchers explained.

For initial access, UAT-7237 exploited known vulnerabilities on unpatched servers exposed to the internet. This technique is also common for other state-sponsored groups, such as Volt Typhoon and Flax Typhoon, who usually exploit unpatched VPN appliances, firewalls, and email servers. In some cases, they abuse valid credentials for VPN, RDP, and cloud accounts.

While they occasionally drop lightweight web shells or custom loaders, their preference is to blend into normal network activity and establish persistence through compromised infrastructure rather than phishing or malware.

Via Infosecurity Magazine

You might also like
Categories: Technology

I’m loving the new Gmail and Calendar access in ChatGPT Plus - here’s how to use it

Tue, 08/19/2025 - 08:12
  • OpenAI adds Connectors for Gmail and Calendars
  • You can now access Gmail in chat and in Deep Research
  • The feature is new for Plus and Pro users

OpenAI has finally flicked the switch, and now ChatGPT Plus and Pro users globally can connect Gmail and Google Calendar to ChatGPT. This is a feature that Gemini has had for some time, so it’s great to finally get it in ChatGPT.

Since I use Gmail for just about everything, I’ve been waiting for OpenAI to hook into it for ages, and now that it’s here, I can search emails from within ChatGPT, not to mention ask it to perform some handy analysis.

For example, a few useful things to ask ChatGPT, once you’ve connected it to Gmail, are “Who emails me the most?” and “Who haven’t I replied to?” or “What recent emails require action?

Or, if you really can’t be bothered to open Gmail and you live in ChatGPT all day, you could ask it, “Who has emailed me today?

Of course, you can do the same thing with your Calendar app. Just ask ChatGPT, “What meetings have I got today?”. This works especially well when combined with ChatGPT Voice. When you activate ChatGPT Voice, you can just start a conversation and ask ChatGPT what meetings you have today, and it will tell you.

What’s more, you can also use your Gmail inbox and your Calendar as a source for a Deep Research query. So, if you want to do some serious analysis of your inbox, you can now direct ChatGPT’s most in-depth research tool straight at it.

Getting set up

(Image credit: OpenAI/Apple)

Accessing these key Google services in ChatGPT requires a bit of setting up first. You need to go to Settings (which is accessed by clicking or tapping on your user name), then choosing Settings, and then Connectors.

Here you’ll be able to link your Gmail, Google Drive, Calendar, and Contacts to ChatGPT. You’ll need to grant ChatGPT access in a few screens as you do this, but you only need to do it once.

Now that you are connected, you can just type in questions about your Gmail inbox or Calendar to ChatGPT.

Going deeper

If you want to use ChatGPT with Deep Research, then the process seems to differ between the Web version of ChatGPT and the mobile version.

In the Web version of ChatGPT, when you click on Deep Research, a Sources box appears next to it, and here you can select Gmail or Google Calendar from the drop-down menu.

On the mobile version of ChatGPT, when you tap on Deep Research, you don’t get a Sources box; however, it can still connect to your Gmail. Just ask it a question involving Gmail and you'll find that it can answer it.

Now that Gmail and Calendar are connected to ChatGPT, I can finally get it to perform more like the all-around personal assistant I want it to be.

You might also like
Categories: Technology

Peacemaker season 2 release schedule: when will episode 1 launch on HBO Max and other streaming services?

Tue, 08/19/2025 - 08:00

It's time to limber up and prepare to dance along to Peacemaker's new title sequence. Over three years after its first season arrived, the hit HBO Max show is finally set to return to our screens – and I suspect you'll want to know when and where it will.

Below, I'll tell you the date and time it'll premiere on Warner Bros. Discovery's super streamer. I'll also explain where you can watch it where HBO Max isn't available, and run you through a full release schedule for the DC Universe's (DCU) latest project. Here, then, is everything you need to know about Peacemaker season 2's forthcoming launch.

What is the launch date for Peacemaker season 2 episode 1?

We'll be smiling as much as Adrian Chase/Vigilante when Peacemaker 2 is released (Image credit: Jessica Miglio/Max)

Peacemaker's sophomore season is due out on Thursday, August 21 in North and South America. Viewers in Europe, Africa, Asia, and Oceania will need to tune in on Friday, August 22 to stream one of the best HBO Max shows' next entry.

Unsurprisingly, this installment's first chapter – 'The Ties That Grind' – will launch at different times around the world. Here's when it'll be released where you live:

  • US – Thursday, August 21 at 6pm PT / 9pm ET
  • Canada – Thursday, August 21 at 6pm PT / 9pm ET
  • UK – Friday, August 22 at 2am BST
  • India – Friday, August 22 at 6:30am IST
  • Singapore – Friday, August 22 at 9am SGT
  • Australia – Friday, August 22 at 11am AEST
  • New Zealand – Friday, August 22 at 1pm NZST
Where can I watch Peacemaker season 2?

Another season, another bar-based bare-knuckles brawl for Emilia Harcout (center) (Image credit: HBO Max)

Peacemaker season 2 comes out on HBO Max in countries where one of the world's best streaming services is available. That includes the US, Australia, and Singapore.

For countries where HBO Max is yet to launch, though, it'll make its bow on other streaming platforms. Read on to learn where you can catch the DCU Chapter One TV series where you live:

  • US – HBO Max
  • Canada – Crave
  • UK – Sky / Now TV
  • India – JioHotstar
  • Singapore – HBO Max
  • Australia – HBO Max
  • New Zealand – Neon
When do new episodes of Peacemaker season 2 come out?

You don't need to employ Rick Flag Sr or ARGUS' services to find out when new episodes will be released (Image credit: Jessica Miglio/Max)

New episodes of the John Cena-fronted TV show will arrive every Thursday in North and South America, and Friday everywhere else. If you want to know specific dates that each chapter will air weekly after this week's entry, read on:

  • Peacemaker season 2 episode 1 – Thursday, August 21 / Friday, August 22
  • Peacemaker season 2 episode 2 – Thursday, August 28 / Friday, August 29
  • Peacemaker season 2 episode 3 – Thursday, September 4 / Friday, September 5
  • Peacemaker season 2 episode 4 – Thursday, September 11 / Friday, September 12
  • Peacemaker season 2 episode 5 – Thursday, September 18 / Friday, September 19
  • Peacemaker season 2 episode 6 – Thursday, September 25 / Friday, September 26
  • Peacemaker season 2 episode 7 – Thursday, October 2 / Friday, October 3
  • Peacemaker season 2 episode 8 – Thursday, October 9 / Friday, October 10

For more on the hit show's return, read my dedicated guide to Peacemaker season 2 and my Peacemaker season 2 review. Then, check out the section below for more exclusive coverage on the DC TV series.

You might also like
Categories: Technology

Pages