Error message

  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

Feed aggregator

New forum topics

Secure by design: the MOD's honest take

TechRadar News - Tue, 05/27/2025 - 03:51

The Ministry of Defence (MOD) recently published a document on 'Secure by Design' challenges that represents something we rarely see in government cybersecurity: a transparent acknowledgment of the complexities involved in implementing security from first principles.

Secure by design is a fundamental approach that embeds security into systems from the very beginning of the design process as opposed to treating it as a bolt-on feature later in development.

Having spent years advocating for the human element in security, it's refreshing to see an official recognition that technical controls are only as effective as the people implementing them.

Addressing the Security Skills Challenge

The MOD's first identified problem is "How do we up-skill UK defense in 'Secure by Design'?"

Their acknowledgment that effective implementation requires a "one team" approach across UK defense reflects the reality that security cannot be siloed within technical teams.

This aligns perfectly with what I've observed in organizations with mature security cultures—security becomes everyone's responsibility, not just the security department's concern.

The Knowledge Distribution Problem

Perhaps most intriguing is problem two: "How does 'Secure by Design' account for unevenly distributed information and knowledge?"

The MOD correctly identifies that information asymmetry exists for various legitimate reasons. What makes this assessment valuable is the recognition that not all information-sharing barriers stem from poor security culture; some exist by design and necessity.

Imagine a family planning a surprise birthday party for their grandmother. Different family members have different pieces of information that they intentionally don't share with everyone:

The daughter knows the guest list and has sent invitations directly to each person, asking them not to discuss it openly on family group chats,

The son has arranged the venue and catering, with specific dietary requirements for certain guests,

The grandchildren are handling decorations and have a theme they're working on,

And most importantly—nobody tells grandmother anything about any of this.

This isn't because the family has poor communication skills or doesn't trust each other. These information barriers exist by design and necessity to achieve the goal of surprising grandmother. If everyone shared everything with everyone else, the surprise would be ruined.

The MOD's approach

In the MOD's security context, this is similar to how:

Certain threat intelligence can't be shared with all suppliers because doing so might reveal intelligence-gathering capabilities,

Suppliers can't share all their proprietary technology details even with clients like the MOD, as they need to protect their competitive advantage,

Specific security controls might be kept confidential from general staff to prevent those controls from being circumvented.

These aren't failures of security culture—they're intentional compartmentalization that sometimes make security work possible in the first place. The challenge isn't eliminating these barriers but designing systems that can function effectively despite them.

This reflects the nuanced reality of human behavior in security contexts. People don't withhold security information solely due to territoriality or negligence; often, legitimate constraints prevent the ideal level of transparency. The challenge becomes developing systems and practices that can function effectively despite these inherent limitations.

The Early Design Challenge

The third problem addresses a familiar paradox: how to implement security at the earliest stages of capability acquisition when the capability itself is barely defined.

In other words, it's like trying to build a high-tech security system for a house when you only have a rough sketch of what the house might eventually look like - you know you need protection, but it's difficult to plan specific security measures when you're still deciding how many doors and windows there will be, what valuables will be stored inside, or even where the house will be located. As the MOD puts it, at this stage a capability might be "little more than a single statement of user need."

This connects directly to how humans approach risk management. When primary objectives (delivering military capability) compete with secondary concerns (security), practical compromises inevitably emerge. The MOD's candid acknowledgment that "cyber security will always be a secondary goal" reflects a pragmatic understanding of how priorities function in complex organizations.

Through-Life Security

Problem four addresses perhaps the most demanding human aspect of security: maintaining security rationale and practice across decades of a capability's lifespan. With defense platforms potentially remaining operational for 30+ years, today's security decisions must make sense to tomorrow's engineers.

The question of continuous risk management becomes particularly relevant as organizations encounter new threats over their extended lifespans. How human operators interpret and respond to evolving risk landscapes determines the long-term security posture of these systems.

Building a Collaborative Security Culture

The MOD recognizes that 'Secure by Design' implementation isn't merely a technical challenge but fundamentally about collaboration among people across organizational, disciplinary, and national boundaries.

The MOD's approach suggests a shift toward a more mature security culture — one that acknowledges limitations, seeks external expertise, and recognizes the complex interplay between human factors and technical controls. Their openness about needing help from academia and industry demonstrates a collaborative mindset essential for addressing complex security challenges.

This collaborative approach to security culture stands in stark contrast to the traditional government tendency toward self-sufficiency. By explicitly inviting external perspectives, the MOD demonstrates an understanding that diverse viewpoints strengthen security posture rather than compromising it.

Security isn't about having all the answers—it's about creating the conditions where people can collaboratively develop appropriate responses to ever-changing threats.

We've compiled a list of the best identity management software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Unlocking intelligent agents through connected data

TechRadar News - Tue, 05/27/2025 - 01:50

Agentic AI is one of the latest concepts in artificial intelligence, now gaining real traction beyond its early buzz. Ongoing advancements in Agentic AI are accelerating the development of autonomous business systems, building on the achievements of machine learning.

Operating as an independent ‘agent’, this technology is equipped to make informed decisions based on the multimodal data and algorithmic logic, and can then ‘learn’ and evolve through experience.

Even more exciting is its capacity to act independently. It’s this unique ability to adapt, plan, and carry out complex tasks without human oversight that distinguishes Agentic AI from earlier generations of AI tools.

In supply chains, for instance, AI agents can track market activity and historical demand trends to forecast inventory needs and implement measures to avoid shortages, such as by automating parts of the restocking processes. These agents shift their behavior in response to changing market conditions, boosting efficiency and performance. It's therefore no surprise that 26% of business leaders report their organizations are beginning to shape strategic approaches around Agentic AI.

However, as great as it sounds to outsource such tasks to Agentic AI, we also need to err on the side of caution. For all its autonomous power, how can the actions and outputs of AI agents be fully trusted? If we rely on Agentic AI to complete sophisticated tasks on its own, how do we ensure its decisions are truly grounded in what’s happening in the real world, or in the enterprise’s view of the world?

In the same way our brains use observation and extra inputs to draw conclusions, AI agents need to rely on a lot of external sources and signals to enhance their reasoning capabilities.

This need can be met by solutions and platforms that collect and present data in a way that’s accessible and retrievable. Here’s how:

The trust challenge in autonomous AI systems

As discussed, what sets Agentic AI apart from other AI systems is its ability to act autonomously, not just engage in a linear conversation. The complexity of the tasks agents complete typically requires them to refer to multiple, dynamic external sources. As a result, the risk of something going wrong automatically increases. For example, you might trust a chatbot to provide you with an update on the status of a claim or refund, but would you feel as trusting when giving an AI agent your credit card details to book a flight for you?

Away from conversational AI, task-based agents plan and change actions depending on the context they’re given. They delegate subtasks to the various tools available through a process often referred to as “chaining” (the output of one action becomes the input for the next). This means that queries (or tasks) can be broken down into smaller tasks, with each requiring access to data in real-time, processed iteratively to mimic human problem-solving.

The chain effect (in which decisions are made) is informed by the environment that’s being monitored, i.e., the sources of data. As a result, explainable and accurate data retrieval is required at each step of the chain for two reasons. Firstly, users need to know why the AI agent has landed on a particular decision and have visibility of the data source it’s based on.

They need to be able to trust that the action is, in fact, the most effective and efficient. Secondly, they need to be able to optimize the process to get the best possible result each time, analysing each stage of the output and learning from any dissatisfactory results.

To trust an agent to complete sophisticated tasks based on multiple retrieval steps, the value of the data needed to support the decision-making process multiplies significantly.

The need to make reliable enterprise data available to agents is key. This is why businesses are increasingly recognising the power of graph database technology for the broad range of retrieval strategies it offers, which in turn multiply the value of the data.

How graph technology strengthens AI reasoning

As Agentic AI drives decisions from data, the insights underpinning these decisions must be accurate, transparent, and explainable – benefits that graph databases are uniquely optimized to deliver. Gartner already identifies knowledge graphs as an essential capability for GenAI applications, as GraphRAG (Retrieval Augmented Generation), where the retrieval path includes a knowledge graph, can vastly improve the accuracy of outputs.

The unique structure of knowledge graphs, comprised of ‘nodes’ and ‘edges’, is where higher-quality responses can be derived. Nodes represent existing entities in a graph (like a person or place), and edges represent the relationship between those entities – i.e., how they connect to one another. In this type of structure, the bigger and more complex the data, the more previously hidden insights can be revealed. These characteristics are invaluable in presenting the data in a way that makes it easier for AI agents to complete tasks in a more reliable and useful way.

Users have been finding that GraphRAG answers are not only more accurate but also richer, speedier, more complete, and consequently more useful. For example, an AI agent addressing customer service queries could offer a particular discounted broadband package based on a complete understanding of the customer, as a result of using GraphRAG to connect disparate information about said customer. How long has the customer been with the company? What services are they currently using? Have they filed complaints before?

To answer these questions, nodes can be created to represent each aspect of the customer experience with the company (including previous interactions, service usage, and location), and edges to show the cheapest or best service for them. A fragmented and dispersed view of the data could lead to the agent offering up a discounted package when it was not due, leading to cost implications for the business.

As mentioned by the CEO of Klarna, “Feeding an LLM the fractioned, fragmented, and dispersed world of corporate data will result in a very confused LLM”. But the outcome is very different when data is connected in a graph: Positive results have been reported by the likes of LinkedIn’s customer service team, who have reduced median per-issue resolution time by 28.6% since implementing GraphRAG.

Why connected data is key to Agentic AI readiness

With every iteration, the LLMs behind AI agents are advancing quickly, and agentic frameworks are making it easier to build complex, multi-step applications. The next vital move is to make enterprise data as rich, connected, and contextually aware as possible, so it's fully accessible to these powerful agents.

Taking this step allows businesses to unlock the full value of their data, enabling agents that are not only more accurate and efficient but also easier to understand and explain. This is where the integration of Agentic AI and knowledge graphs proves transformational. Connected data gives agents the context they need to think more clearly, generate smarter outputs, and have a greater impact.

We've compiled a list of the best survey tools.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Swimmer circumnavigates Martha's Vineyard ahead of 'Jaws' 50th anniversary

NPR News Headlines - Tue, 05/27/2025 - 00:26

Lewis Pugh wants to change public perceptions and encourage protections for sharks — which he said the film maligned as "villains, as cold-blooded killers."

(Image credit: Robert F. Bukaty)

Categories: News

3 more escapees from a New Orleans jail are caught, leaving 2 at large, officials say

NPR News Headlines - Tue, 05/27/2025 - 00:21

Three more of the 10 inmates who escaped from a New Orleans jail earlier this month were re-arrested Monday in two different states after more than a week on the lam, authorities said.

(Image credit: Hilary Scheinuk/The Advocate)

Categories: News

Today's NYT Connections: Sports Edition Hints and Answers for May 27, #246

CNET News - Mon, 05/26/2025 - 23:54
Hints and answers for the NYT Connections: Sports Edition puzzle, No. 246, for May 27.
Categories: Technology

Today's NYT Mini Crossword Answers for Tuesday, May 27

CNET News - Mon, 05/26/2025 - 23:49
Here are the answers for The New York Times Mini Crossword for May 27.
Categories: Technology

27 hospitalized, including 4 children, after car plows into Liverpool FC parade

NPR News Headlines - Mon, 05/26/2025 - 19:08

A 53-year-old man is in police custody. He is from the Liverpool area and is believed to be the driver, police said.

(Image credit: Getty Images)

Categories: News

FBI reexamining Dobbs opinion leak, D.C. pipe bombs and White House cocaine cases

NPR News Headlines - Mon, 05/26/2025 - 18:04

Dan Bongino, the deputy director of the FBI, says the bureau is refocusing on cases that pointed to "potential public corruption."

(Image credit: Brendan Smialowski/AFP)

Categories: News

What Trump's cuts to intelligence could mean for national security

NPR News Headlines - Mon, 05/26/2025 - 16:59

It's a classic Washington power move — the late-on-Friday news dump.

This past Friday, at 4:30pm, start of a long holiday weekend, about half the staff of the National Security Council got emails asking them to leave by 5pm. Dozens of people abruptly dismissed.

The restructuring of the NSC as Secretary of State and National Security advisor Marco Rubio has characterized it — continues a trend in this second term for President Trump, of radical downsizing.

The Trump administration plans to cut thousands of intelligence and national security jobs across the government.

The US Government has long relied on scores of intelligence officials across the government to keep America safe. Trump wants many of them gone – what could that mean for security at home and abroad?

For sponsor-free episodes of Consider This, sign up for Consider This+ via Apple Podcasts or at plus.npr.org.

Email us at considerthis@npr.org.

(Image credit: Anna Moneymaker)

Categories: News

This dangerous new phishing scam spoofs a top Google program to try and hack Facebook accounts

TechRadar News - Mon, 05/26/2025 - 16:27
  • KnowBe4 is warning of a new phishing campaign leveraging Google AppSheets' workflow automation
  • The emails are spoofing Facebook and harvesting login credentials
  • The attackers can grab session tokens, as well

Cybercriminals are abusing a legitimate Google service to bypass email protection mechanisms and deliver phishing emails straight to people’s inboxes.

Cybersecurity researchers KnowBe4, who first spotted the attacks, have warned the crooks are using Google AppSheet, a no-code application development platform for mobile and web apps, and through its workflow automation were able to send emails using the "noreply@appsheet.com" address.

The phishing emails are mimicking Facebook, and are designed to trick people into giving away their login credentials, and 2FA codes, for the social media platform.

Get Keeper Personal for just $1.67/month, Keeper Family for just $3.54/month, and Keeper Business for just $7/month

​Keeper is a cybersecurity platform primarily known for its password manager and digital vault, designed to help individuals, families, and businesses securely store and manage passwords, sensitive files, and other private data.

It uses zero-knowledge encryption and offers features like two-factor authentication, dark web monitoring, secure file storage, and breach alerts to protect against cyber threats.

Preferred partner (What does this mean?)View Deal

2FA codes and session tokens

The emails, which were sent in-bulk and on a fairly large scale, were coming from a legitimate source, successfully bypassing Microsoft and Secure Email Gateways (SEGs) that rely on domain reputation and authentication checks (SPF, DKIM, DMARC).

Furthermore, since AppSheets can generate unique IDs, each email was slightly different, which also helped bypass traditional detection systems.

The emails themselves spoofed Facebook. The crooks tried to trick victims into thinking they infringed on someone’s intellectual property, and that their accounts were due to be deleted within 24 hours.

Unless, of course, they submit an appeal through a conveniently placed “Submit an Appeal” button in the email.

Clicking on the button leads the victim to a landing page impersonating Facebook, where they can provide their login credentials and 2FA codes, which are then relayed to the attackers.

The page is hosted on Vercel which, KnowBe4 says, is a “reputable platform known for hosting modern web applications”. This further strengthens the entire campaign’s credibility.

The attack has a few additional contingencies. The first attempt at logging in returns a “wrong password” result - not because the victim typed in the wrong credential - but in order to confirm the submission.

Also, the 2FA codes that are provided are immediately submitted to Facebook and in return - the crooks grab a session token which grants them persistence even after a password change.

You might also like
Categories: Technology

Hughesnet Satellites Are Bringing Faster Internet to Rural America

CNET News - Mon, 05/26/2025 - 15:20
A new satellite, known as Jupiter 3, allows Hughesnet to provide better speed and data offerings across the US.
Categories: Technology

Today's NYT Strands Hints, Answers and Help for May 27, #450

CNET News - Mon, 05/26/2025 - 15:00
Here are hints and answers for the NYT Strands puzzle No. 450 for May 27.
Categories: Technology

Today's NYT Connections Hints, Answers and Help for May 27, #716

CNET News - Mon, 05/26/2025 - 15:00
Hints and answers for Connections for May 27, #716.
Categories: Technology

Today's Wordle Hints, Answer and Help for May 27, #1438

CNET News - Mon, 05/26/2025 - 15:00
Here are hints and the answer for today's Wordle No. 1,438 for May 27.
Categories: Technology

Best Internet Providers in Boulder, Colorado

CNET News - Mon, 05/26/2025 - 14:19
Internet providers in Boulder offer fiber and cable, high speeds and affordable prices. Our experts have found the best choices for residents depending on their needs.
Categories: Technology

Canada welcomes King Charles against a backdrop of tensions with Trump

NPR News Headlines - Mon, 05/26/2025 - 13:16

The king's visit is being seen in Canada as an opportunity for the nation to bolster its sovereignty amid threats by President Trump to turn the United States' northern neighbor into the 51st state.

(Image credit: Ben Stansall)

Categories: News

Trump calls Putin 'absolutely crazy' following Russia's latest barrage on Ukraine

NPR News Headlines - Mon, 05/26/2025 - 11:23

Trump's remarks were a rare rebuke of the Russian president and followed a storm of drone and missile attacks on Ukrainian cities on Sunday evening.

(Image credit: Manuel Balce Ceneta)

Categories: News

The Last of Us season 3: everything we know so far about the hit HBO Max show's next chapter

TechRadar News - Mon, 05/26/2025 - 11:00
The Last of Us season 3: key information

- Officially announced in April 2025
- No release date or trailer revealed yet
- Filming yet to get underway
- Most of the main cast expected to return
- One actor has surprisingly said they won't be back for season 3
- No story synopsis unveiled
- The Last of Us Part II video game offers some clues about its plot
- A fourth and final season could wrap up the story

The Last of Us season 3 is officially in the works at HBO. The incredibly popular TV adaptation was renewed for a third season in April 2025, so we'll be treated to another season of The Last of Us TV show sometime soon.

While we wait for it, there's plenty to keep you occupied. Below, I've covered what we know about The Last of Us' third season so far, including its likely cast and story specifics. I'll also offer my prediction on its launch date and discuss whether a fourth season will be needed to tell the full story depicted in The Last of Us Part II, aka the game on which seasons 2 and 3 are based.

Full spoilers follow for The Last of Us season 2 and the second entry in Naughty Dog's post-apocalyptic video game franchise, so proceed at your own risk.

The Last of Us season 3 release date: what we know

It can’t be for nothing. Season 3 is coming. #TheLastOfUs pic.twitter.com/q5HxyvK9O6April 9, 2025

As of May 2025, The Last of Us season 3 doesn't have a confirmed release date. Considering the critically-acclaimed HBO TV Original's next season hasn't started filming yet, that isn't a huge shock.

However, I wouldn't be surprised if plenty of pre-production work has already been done. Script work, location scouting, lining up a filming schedule, and many other developmental details have likely been ongoing for months. If they have, I'd be amazed if principal photography doesn't begin in earnest before 2025 ends.

What would that mean for season 3's eventual launch? I think a mid-2027 release is most likely. Season 2 made its debut just over two years after its predecessor ended, so if the series maintains that development trajectory, a June or July 2027 arrival for season 3 isn't out of the question.

The Last of Us season 3 trailer: is there one?

We're desperate to see a trailer but, unlike Abby, we won't hold anyone at gunpoint for one! (Image credit: HBO)

No. As I said, principal photography hasn't started yet, and even when it gets underway, it'll be a long time before a trailer is released. Once one is, I'll update this section.

The Last of Us season 3 rumored cast

I expect Bella Ramsey and Isabela Merced to reprise their roles as Ellie and Dina in season 3 (Image credit: Liane Hentscher/HBO)

Big spoilers immediately follow for The Last of Us season 2.

Based on how last season ended, here are the actors (and the characters they portray) I expect to see again in The Last of Us season 3:

  • Bella Ramsey as Ellie
  • Gabriel Luna as Tommy
  • Isabela Merced as Dina
  • Young Mazino as Jesse
  • Kaitlyn Dever as Abby
  • Danny Ramirez as Manny
  • Spencer Lord as Owen
  • Tati Gabrielle as Nora
  • Ariela Barer as Mel
  • Rutina Wesley as Maria
  • Jeffrey Wright as Isaac
  • Catherine O'Hara as Gail
  • Robert John Burke as Seth

You might be surprised to see Mazino, Lord, and Barer's names among that contingent. After all, their characters – Jess, Owen, and Mel – died in the season 2 finale.

However, with season 3's early episodes set to jump back in time (read more about this in the story section below), this trio won't have met their demise when the Max show's third season premieres. The same can be said of Gabrielle's Nora, who'll still be alive during the period to be revisited in season 3's opening chapters.

Unless Joel similarly returns in flashback sequences, we definitely won't see Pedro Pascal again. Joel met his end in The Last of Us season 2 episode 2, and, while Pascal reprised his role in last season's sixth episode, that entry depicted the five years between the end of season 1 and the start of season 2. So, don't bet on the fan-favorite actor returning as Joel once more.

There's also the potential for other surprising omissions. Speaking to Variety, O'Hara said she's been told her character, Gail, won't appear in season 3, as it's not likely to spend much time in Jackson, Wyoming, aka the town where Ellie and many of the show's characters live. If Gail doesn't appear, other supporting characters, including Seth and Maria, may not do so, either.

As for newcomers to the series, there are a couple of key characters in The Last of Us Part II who didn't appear in season 2. I won't spoil who they are, but given their importance to the story that'll be told in season 3, you can expect cast announcements about this pair to be made in due course.

The Last of Us season 3 story speculation

Don't mind Ellie , she's just taking a quick peek at what's to come in season 3 (Image credit: Liane Hentscher/HBO)

Full spoilers immediately follow for The Last of Us season 2 and The Last of Us Part II.

The Last of Us season 3 doesn't have a story synopsis yet. However, based on how its forebear ended – read my article explaining The Last of Us season 2's ending for more on what happened – and The Last of Us Part II's story, we have a good idea of how things will pan out.

As I mention in my ending explainer, season 3 will shift into reverse gear and head back in time 72 hours to the period before and during its predecessor's finale. That's because season 2's final episode ends with a scene starring Abby, which takes place three days prior to her single-handedly storming the Seattle theater where Ellie and company are holed up in the seventh episode.

Season 2's final shot confirms we'll jump back in time in its follow-up season (Image credit: HBO)

For those who haven't played The Last of Us Part II, Abby is not only the deuteragonist of that story, but also a player-controlled character for around half of the game's total playtime. Events centered around Abby are integral to telling Part II's full story.

What does that mean for The Last of Us season 3? It'll be Abby-centric, with its opening chapters likely showing us what Abby was up to before Ellie and Dina arrive in Seattle, and then where Abby is during this three-day period.

Part II does this, so there's no reason to suspect HBO's live-action retelling won't take a similar storytelling approach. That being, showing Abby's side of the Seattle-based story, which runs parallel to Ellie and Dina's, before season 2 episode 7's shocking penultimate scene brings them together.

As for what Abby's side of the story entails, I won't spoil anything significant here. But, considering there are a lot of unanswered questions – not to mention narrative gaps that need filling in regarding Abby, her friends, the Seraphites, and the Washington Liberation Front – from season 2, its follow-up has some heavy lifting to do from a narrative standpoint.

Abby's perspective of season 2's Seattle-based events should be depicted throughout season 3 (Image credit: HBO)

Thankfully, it sounds like there'll be more time to cover all of the above. Interviewed by Collider in May, co-showrunner and executive producer Craig Mazin said: "I think there’s a decent chance that season 3 will be longer than season 2, just because the manner of that narrative and the opportunities it affords us are a little different."

Of course, that could mean one of the best Max shows' third season only has one more entry (eight) than its predecessor did (seven). Some fans were a little frustrated that season 2 was shorter than the show's debut outing, so an installment with more chapters should appease them. Season 2 included plenty of brand-new material that wasn't seen in the games, too, so season 3 could be approached in the same way and, by proxy, have a higher episode count.

Where can I watch The Last of Us' first two seasons?

If you want, you can relive Jesse's shocking death again and again on various streaming platforms (Image credit: HBO)

Depending on where you live, The Last of Us' first two seasons are available to stream on different platforms.

In the US, you can watch it on the cable network HBO as well as Max, aka one of the world's best streaming services. Those of you who aren't subscribed to the streamer should read our Max price guide to see how much it costs to sign up and our Max free trial article to learn if you can try it before you buy.

Meanwhile, UK audiences can catch it on Sky Atlantic and Now TV. Australian viewers can also tune into Max to watch both seasons, but if you're not signed up to Warner Bros. Discovery's super streamer, you can also catch it on Foxtel.

Will The Last of Us end with its third season?

We won't evoke our inner Isaac and torture people for information on whether a fourth season will be made, either! (Image credit: HBO)

It's not been officially confirmed yet, but The Last of Us season 3 isn't expected to be the final installment.

The Last of Us seasons 2 and 3 were supposed to tell the full story depicted in The Last of Us Part II. But, speaking in February, HBO TV chief Francesca Orsi indicated that HBO's adaptation of The Last of Us could run for four seasons.

In the same Collider article I linked to in this guide's plot section, Mazin also remarked that "there’s no way to complete this narrative in a third season. Hopefully, we’ll earn our keep enough to come back and finish it in a fourth". It sounds like another season could be in the offing after the show's third entry, then.

Fans will be hoping that they see Tommy again in season 3 and, potentially, a sequel season (Image credit: Liane Hentscher/HBO)

But how will Mazin and company stretch out The Last of Us Part II's story across three seasons Initially, I suspected that, if The Last of Us Part II's story was wrapped up in season 3, a fourth and final season might include plot elements that Naughty Dog may have been considering for The Last of Us Part III.

Right now, a third entry in Naughty Dog's incredibly popular video game franchise hasn't been announced. Naughty Dog president Neil Druckmann has also said fans shouldn't "bet on there being more" – i.e. the continuation of Ellie's story in another game – anytime soon.

Druckmann and his inner circle are the only ones who know if more than a story concept was ever devised for Part III. Nonetheless, if a third game isn't going to be made, there's no reason why its plot elements can't be fleshed out and depicted in HBO's TV adaptation instead.

That said, speaking on episode 457 of the Sacred Symbols podcast, Druckmann indicated that, if a fourth season is greenlit, it'll simply wrap up the story told in Part II. The potential inclusion of brand-new material set during events of that game (and, by proxy, its TV adaptation) aside, then, don't expect a possible fourth season to contain post-Part II narrative beats.

For more Max TV show-based coverage, check out our guides on House of the Dragon season 3, Peacemaker season 2, Creature Commandos season 2, and The White Lotus season 4.

Categories: Technology

TikTok fans beware - experts warn dangerous malware spread by AI fake videos

TechRadar News - Mon, 05/26/2025 - 10:22
  • Trend Micro saw a new malware campaign on TikTok
  • The videos demonstrate how to activate "premium" features in different software
  • The clips were AI-generated and trick the victims into downloading infostealers

Hackers are posting AI-generated videos on TikTok to trick users into downloading infostealing malware, cybersecurity researchers Trend Micro have warned.

The premise is simple: the attackers use AI to generate numerous videos demonstrating how to easily “activate” Windows and Microsoft Office, or enable “premium features” in apps such as Spotify or CapCut.

They then share these videos on TikTok, whose algorithm makes it more likely to turn the video viral, making the success of the attack more likely.

Get Keeper Personal for just $1.67/month, Keeper Family for just $3.54/month, and Keeper Business for just $7/month

​Keeper is a cybersecurity platform primarily known for its password manager and digital vault, designed to help individuals, families, and businesses securely store and manage passwords, sensitive files, and other private data.

It uses zero-knowledge encryption and offers features like two-factor authentication, dark web monitoring, secure file storage, and breach alerts to protect against cyber threats.

Preferred partner (What does this mean?)View Deal

A new spin on old tricks

In the clip, a person is shown bringing up the Run program on Windows, and then executing a PowerShell command.

While in the video the command results in the activation of special features, in reality, users running the command would download a malicious script which, in turn, deploys Vidar and StealC infostealers.

These infostealers can take screenshots, steal login credentials, grab credit card data, exfiltrate cookies, cryptocurrency wallet information, 2FA codes, and more.

"This attack uses videos (possibly AI-generated) to instruct users to execute PowerShell commands, which are disguised as software activation steps. TikTok's algorithmic reach increases the likelihood of widespread exposure, with one video reaching more than half a million views," Trend Micro said.

"The videos are highly similar, with only minor differences in camera angles and the download URLs used by PowerShell to fetch the payload," the researchers added.

"These suggest that the videos were likely created through automation. The instructional voice also appears AI-generated, reinforcing the likelihood that AI tools are being used to produce these videos."

One of the videos has roughly 500,000 views, more than 20,000 likes, and more than 100 comments, making it quite successful.

Videos were being used to deliver malware in the past, too, but this new campaign is a significant departure from earlier methods.

The difference is that before, the link to the malware was shared in the video’s description, or comment, where it could still be picked up by security solutions. By delivering the bait in a video format, the attackers successfully bypass almost all security measures.

Via BleepingComputer

You might also like
Categories: Technology

Everything new on Netflix in June 2025 – stream all episodes of Squid Game season 3 on June 27

TechRadar News - Mon, 05/26/2025 - 10:00

It's a lot of pressure to be one of the reigning best streaming services, but that never phases Netflix. When it comes to the new Netflix titles for June 2025, there are many reasons to get excited, too.

Leading the charge is one of the best Netflix shows ever made – that being, Squid Game. All episodes of Squid Game season 3 come to Netflix on June 27, which not only marks the conclusion of the incredibly popular survival drama, but also means it's a shoo-in to be one of the most-watched shows of the month.

There are plenty of new Netflix movies up the streaming giant's sleeve as well. Indeed, it's packed a large number of classic horror movies into its line-up for the month, including The Birds (1963), and modern thrillers in Us (2019) and Barbarian (2022).

There's plenty more where that came from, so read on to see what else is launching on the platform between June 1 and June 30.

Everything new on Netflix in June 2025

Arriving on June 1

The American (movie)
Barbarian
(movie)
Bee Movie (movie)
The Birds (movie)
The Blues Brothers (movie)
The Devil's Own (movie)
Dune (1984) (movie)
The Equalizer (movie)
Family Plot (movie)
Focus (movie)
Frenzy (movie)
The Great Outdoors (movie)
Hitchcock (movie)
Hop (movie)
The Legend of Zorro (movie)
The Man Who Knew Too Much (movie)
Neighbors (movie)
Now You See Me (movie)
Now You See Me 2 (movie)
The Nutty Professor (movie)
Pokémon The Series: XY (TV show)
Pokémon The Series: XY: XY: Kalos Quest
(TV show)
Pokémon The Series: XY: XYZ (TV show)
Rear Window (movie)
The Theory of Everything (movie)
The Town (movie)
U-571 (movie)
Us (movie)
Vertigo (movie)

Arriving on June 3

Sara - Woman in the Shadows (Netflix original series)

Arriving on June 4

Criminal Code season 2 (Netflix original series)
Eva Lasting season 3 (Netflix original series)
Power Moves with Shaquille O'Neal (Netflix original series)

Arriving on June 5

Barracuda Queens season 2 (Netflix original series)
Ginny & Georgia season 3 (Netflix original series)
Tires season 2 (Netflix original series)

Arriving on June 6

K.O. (Netflix original movie)
Mercy For None (Netflix original series)
TYLER PERRY'S STRAW (Netflix original movie)
The Survivors (Netflix original series)

Arriving on June 7

Boys on the Side (movie)
Piece by Piece (movie)

Arriving on June 9

The Creature Cases chapter 5 (Netflix original series)

Arriving on June 10

Families Like Ours (Netflix original series)
Trainwreck: The Astroworld Tragedy (Netflix original documentary)

Arriving on June 11

Aniela (Netflix original series)
Cheers to Life (Netflix original movie)
Cocaine Air: Smugglers at 30,000 Ft. (Netflix original documentary)
Our Times (Netflix original movie)
Titan: The OceanGate Disaster (Netflix original documentary)

Arriving on June 12

The Fairly OddParents: A New Wish season 2 (TV show)
FUBAR season 2 (Netflix original series)
Plane (movie)

Arriving on June 13

Kings of Jo'Burg season 3 (Netflix original series)

Arriving on June 14

Grey's Anatomy season 21 (TV show)

Arriving on June 16

The Last Witch Hunter (movie)

Arriving in June 17

Justin Willman: Magic Lover (Netflix original comedy)
Kaulitz & Kaulitz season 2 (Netflix original series)
Scandal seasons 1-7 (TV show)
Trainwreck: Mayor of Mayhem (Netflix original documentary)

Arriving on June 18

AMERICA'S SWEETHEARTS: Dallas Cowboys Cheerleaders season 2 (Netflix original series)
Rosario Tijeras (Mexico) season 4 (Netflix original series)
Somebody Feed Phil season 8 (Netflix original series)
YOLANTHE (Netflix original series)

Arriving on June 19

The Waterfront (Netflix original series)

Arriving on June 20

KPop Demon Hunters (Netflix original series)
Olympo (Netflix original series)
Semi-Soeter (Netflix original movie)

Arriving on June 22

The Intern (movie)

Arriving on June 24

Steph Tolev: Filth Queen (Netflix original comedy)
Trainwreck: Poop Cruise (Netflix original documentary)

Arriving on June 25

The Ultimatum: Queer Love season 2 (Netflix original series)

Arriving on June 27

Pokémon Horizons season 2 - The Search for Laqua part 3 (Netflix original series)
Squid Game season 3 (Netflix original series)

You might also like
Categories: Technology

Pages

Subscribe to The Vortex aggregator