Sending text messages between an iPhone and an Android device has long been a pretty poor experience, with features like typing indicators and read receipts missing for years. That’s shifted in recent years thanks to the use of Rich Communication Services (RCS), and it’s bringing another benefit to your cross-platform chats.
In this case, that’s the ability to edit texts sent from an Android phone to an iPhone (via Android Authority). This feature appears to be rolling out gradually to Android users, so it’s not available to everyone just yet. But if it’s working for you, all you’ve got to do is long press on a sent message, then tap the pencil icon, make your adjustments and save your message.
Unfortunately, this doesn’t work the other way around – that is, texts sent from an iPhone to an Android device cannot be edited. Presumably, Apple will need to update its Messages app to add support for this functionality.
You’ve been able to edit texts sent between iPhones for years, and messages going from one Android device to another have been editable when using RCS for about twelve months. But although editable messages are now part of RCS, companies like Apple and Google need to support the feature – which is why it’s not available in iOS right now.
Slowly adding support(Image credit: Shutterstock / Tada Images )Apple has been reluctant to support RCS for a long time, partly because it previously offered much weaker encryption than Apple’s iMessage platform, which is end-to-end encrypted. However, the change that introduced editable texts to RCS has now also brought forth end-to-end encryption, which might help to smooth things over with Apple.
The rollout of editable messages also hasn’t been entirely pain-free. While edited messages appear as normal on Android (with a small “Edited” timestamp underneath them), they behave differently in iOS. There, iPhone users see a second message preceded by an asterisk, doubling up the number of texts on their screen.
Both Apple and Google gave their support to cross-platform RCS messages earlier this year, so we’re hoping that these bugs and oddities will be ironed out in due course. For now, though, the situation when texting across phone platforms has been improved, even if only in one small way.
You might also likeThe iPhone 17 Air is a rumored phone that – no matter what else might be good or bad about it – will in large part be judged on how slim it is. After all, being slim appears to be its entire USP. And on that front, it could be a success.
In a new YouTube video, FrontPageTech (via NotebookCheck) has claimed that the iPhone 17 Air will be just 5.5mm thick, which would make it even slimmer than the 5.8mm thick Samsung Galaxy S25 Edge. While that’s only a 0.3mm difference, this could still be a big win for Apple, since the S25 Edge would be this rumored phone’s main competitor, and is also sold on being slim.
Of course, we’d take this thickness claim with a pinch of salt, especially as FrontPageTech has a mixed track record. But lately they’ve been right more often than they’ve been wrong, and this leak is broadly in line with previous iPhone 17 Air leaks – though one puts it at a slightly slimmer 5.44mm and another at a marginally thicker 5.65mm. In all cases though, leaks suggest it will have Samsung’s rival phone beat on that front.
Compromised cameras and a Plus-level priceHowever, the iPhone 17 Air probably won’t have the Samsung Galaxy S25 Edge beat in every other way, as this latest leak – among many others – suggests the iPhone 17 Air will have just a single 48MP camera. That’s in contrast to a dual-lens camera on the S25 Edge, consisting of both a 200MP main sensor and a 12MP ultra-wide camera. So it seems Apple is probably prioritizing thinness over photography.
Other specs have also been leaked here, and again largely echo what we’ve heard before. This includes an A19 – but not A19 Pro – chipset, 12GB of RAM, and a 6.6-inch screen with a 120Hz refresh rate.
The video also highlights the battery, saying that Apple will use one with a silicon anode, in order to achieve a higher density than would otherwise be possible, and that this – coupled with an efficient modem and chipset – could mean the iPhone 17 Air will last almost as long as the base iPhone 17, despite the limited space for a battery.
Finally, the video touches on price, stating that the iPhone 17 Air will cost roughly the same amount as the iPhone 16 Plus – a phone that starts at $899 / £899 / AU$1,599. This too is in line with multiple previous leaks.
We should find out whether this is all correct or not in September, as that's when the iPhone 17 Air is expected to launch – alongside the rest of the iPhone 17 series.
You might also likeThe Dalai Lama said he will be reincarnated after he dies, and no one can interfere with the matter of succession. The Chinese government, however, claims authority over the his succession.
(Image credit: Ashwini Bhatia)
It's the nation's semiquincentennial! July 4, 2026, is the 250th anniversary of the signing of the Declaration of Independence. Here's how the United States of America is planning to party.
(Image credit: Eric Baradat)
Even with today’s vast arsenal of cybersecurity tools and AI-enhanced threat detection, attackers continue to succeed – not because the technology is failing, but because the human link in the defensive chain remains exposed. Cybercriminals almost always take the path of least resistance to execute a breach, which often means targeting people rather than a system.
According to McKinsey, a staggering 91% of cyberattacks have less to do with technology, and more to do with manipulating and taking advantage of human behavior. In other words, despite technologies like AI advancing at break-neck speed, cybercriminals are still more likely to hack people than machines.
From a cybercriminal’s perspective, this makes sense. It’s the path of least resistance. Why spend resources hacking your way through a high-tech, AI-secured front door when there’s an open window around the back? This isn’t news to CISOs – according to a 2024 IBM survey, almost three-quarters (74%) now identify human vulnerability as their top security risk. They’re aware of the open window, and now they’re trying to secure it.
Easier said than doneThat’s easier said than done, however. Whether it’s a well-timed phishing email, a spoofed call, a deepfake video, or a barrage of authentic-seeming push notifications designed to wear down a user’s judgment, attackers are adapting faster than defenses can compensate.
The reality is that while security vendors race to outpace attackers with smarter algorithms and tighter controls, the tactics that most reliably lead to breaches are psychological, not technical. Threat actors are exploiting trust, fatigue, social norms, and behavioral shortcuts – tactics far more subtle and effective than brute-force code.
It’s not a lack of technology leaving organizations vulnerable to these techniques, it’s a lack of alignment between those tools and the way people actually think and operate. In fast-paced, high-pressure environments, employees don’t have the bandwidth to second-guess every request or scrutinize every prompt.
They rely on instincts, familiarity, and patterns they’ve learned to trust. But those very instincts are what attackers hijack, turning help desk tickets into access exploits, or mimicked CFOs into multi-million-dollar heists. As generative AI accelerates the realism and reach of these tactics, organizations face a critical question: not just how to keep the bad actors out, but how to better equip their people within. Because when breaches hinge on human decisions, cybersecurity isn’t just a technology issue – it’s a human one.
Trust, bias, and the psychology of security breachesHuman behavior is a vulnerability, but it’s also a predictable pattern. Our brains are wired for efficiency, not scrutiny, which makes us remarkably easy to manipulate under the right conditions. Attackers know this and design their exploits accordingly. They play on urgency to override caution, impersonate authority figures to disarm skepticism, and drip-feed small requests to trigger consistency bias. These tactics are ruthlessly calculated, and they work not because people are careless, but because they’re human.
In early 2024, a finance worker at a Hong Kong firm was tricked into transferring $25 million after attending a video call with what appeared to be the company’s CFO and other colleagues – each one a convincing AI-generated deepfake. The attackers used publicly available footage to clone faces and voices, creating a seamless illusion that exploited trust and familiarity with devastating effect.
The eye-opening part is that these deepfake tools are now readily available. Modern social engineering doesn’t rely on obvious red flags. The emails aren’t riddled with typos, and the impersonations don’t sound robotic. Thanks to generative AI, deepfake technology, and access to vast training data, attackers can now create incredibly convincing personas that mirror the tone, behavior, and language of trusted colleagues. In this environment, even the most well-trained employee can fall victim without fault.
Heuristics – mental shortcuts – are frequently exploited by attackers who know what to look for. “Authority bias” leads people to follow instructions from perceived leaders, like a spoofed email from a CEO. The “scarcity principle” ramps up pressure by creating false urgency, making employees feel they must act immediately.
And “reciprocity bias” plays on basic social instincts – once someone has received a seemingly benign gesture, they’re more likely to respond positively to a follow-up request, even if it’s malicious. What so often looks like a lapse in judgment is often just an expected outcome of cognitive overload and the common, everyday use of heuristics.
Where policy meets psychologyTraditional identity and access management (IAM) strategies tend to assume that users will behave predictably and rationally – that they’ll scrutinize every prompt, question every anomaly, and follow policy to the letter. But the reality inside most organizations is far messier. People work quickly, switch contexts constantly, and are bombarded with notifications, tasks, and requests.
If security controls feel too rigid or burdensome, users will find workarounds. If prompts are too frequent, they’ll be ignored. This is how good policy gets undermined – not out of negligence, but because the design of the system clashes with the psychology of its users. Good security mechanisms shouldn’t add friction; they should seamlessly guide users towards better choices.
Applying principles like Zero Trust, least privilege, and just-in-time access can dramatically reduce exposure, but only if they’re implemented in ways that account for cognitive load and context. Automation can help here: granting and revoking access based on dynamic risk signals, time of day, or role changes without requiring users to constantly make judgment calls.
Done right, identity management becomes an invisible safety net, quietly adapting in the background, rather than demanding constant interaction. Humans shouldn’t be removed from the loop, but they should be freed from the burden to catching what the system should already detect.
Building a security cultureTechnology may enforce access policies, but culture determines whether people follow them. Building a secure organization has to be about more than simply enforcing compliance. That starts with security training that goes beyond phishing drills and password hygiene to address how people actually think and react under pressure. Employees need to recognize their own cognitive biases, understand how they’re being targeted, and feel empowered – not penalized – for slowing down and asking questions.
Equally important is removing unnecessary friction. When access controls are intuitive, context-aware, and minimally disruptive, users are more likely to engage with them properly. Role-based and attribute-based access models, combined with just-in-time permissions, help reduce overprovisioning without creating frustrating bottlenecks in the form of pop-ups and interruptions. In other words, modern IAM systems need to support and empower employees rather than make them constantly jump through hoops to get from one app or window to another.
The human firewall isn’t going anywhereThe biggest takeaway here is that cybersecurity isn’t just a test of systems, AI-driven or not – it’s a test of people. The human firewall is arguably an organization’s biggest weakness, but with the right tools and policies in place, it can become its greatest strength. Our goal should not be to eliminate human error or change the innate nature of humans, but to design identity systems that make secure behavior the default – easy, intuitive, and frictionless.
We list the best employee recognition software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Barbecue is as American as apple pie — but the origins of the word "barbecue" is in the Caribbean.
(Image credit: Miles Willis/Getty Images)
DOGE staffers have been working on changes at the ATF that would roll back dozens of gun restrictions. The DOJ wants to downsize the agency — a move some fear will hinder criminal investigations.
(Image credit: ROBYN BECK)
With spending cuts poised to hit medical providers, Medicaid recipients and Affordable Care Act enrollees, here's how the bill will affect health care access for millions in the U.S.
(Image credit: J. Scott Applewhite)
Full spoilers immediately follow for Ironheart.
Ironheart has disengaged its thrusters. Its final three episodes landed on July 1 or 2 (depending on where you live), with the trio's arrival marking the end of the Marvel TV show's run on Disney+.
Or does it? The last Marvel Phase 5 project's finale is full of unresolved plot threads that suggest Riri Williams (Dominique Thorne) and Parker Robbins' (Anthony Ramos) stories have only just begun in the Marvel Cinematic Universe (MCU). Throw in the debut of a long-awaited Marvel villain and other interesting tidbits that might impact the MCU moving forward, and Ironheart could be more important to the MCU than we realized.
But enough babbling. Let's take a look at the biggest questions you have about Ironheart's ending and I'll do my best to answer them.
Who plays Mephisto in Ironheart? And what is he, exactly?The demon lord known as Mephisto in Marvel Comics has finally made his MCU debut (Image credit: Marvel Studios/Disney+)Let's address the second question first because it's easier to answer: Mephisto is played by Sacha Baron Cohen – he of Borat, Ali G, and The Trial of the Chicago 7 fame – in the MCU.
Cohen's appearance won't shock some MCU devotees. He was first linked with the role of Mephisto in October 2022 – those reports arriving 18 months after Marvel fans had convinced themselves Mephisto would be unveiled as primary antagonist of WandaVision. As it happened, Agatha Harkness was that show's Big Bad. Nonetheless, fans have longed for the day that Mephisto would finally make his bow in Marvel's cinematic juggernaut.
As for who (or what) Mephisto is: he's Marvel Comics' takes on Mephistopheles, the demon lord who appears in the Germanic fable Faust. Mephisto is also an alias of The Devil, aka the mythical personification of evil who lauds it over the realm known as Hell in many religions.
Mephisto's true form can be seen in a easily-missed shot when he taps a teaspoon on the side of a cup of coffee (Image credit: Marvel Studios/Disney+)But back to Marvel's take on Mephisto. First introduced in comic book 'Silver Surfer #3' in December 1968, the demonic entity is a recurring adversary of The Silver Surfer, Ghost Rider, and Spider-Man in Marvel literature, although he's also crossed paths with Doctor Strange, Doctor Doom, Scarlet Witch, and myriad other Marvel heroes and villains.
He's most famous for being responsible for the demise of Peter Parker and Mary Jane Watson's marriage, too. Indeed, in the incredibly divisive 2000s comic story 'Spider-Man: One More Day', Mephisto made a deal with the pair to save Aunt May's life in exchange for the formal union of their love, which infuriated long-time fans of the webslinger.
Abilities wise, Mephisto is unsurprisingly one of the most powerful beings in the Marvel Universe. He possesses all of the usual superhuman powers, but it's his ability to shapeshift, foresee events before they transpire, and prey on people's biggest fears and/or their trauma that makes him such a threat.
It's the latter of those skills, coupled with his vast magical powers, that enables him to warp reality, and to manipulate people and bargain with them for something they want. Usually, the trade-off is the other individual's soul, which Mephisto takes ownership of once a deal is formally agreed.
Okay, so what's the deal with him first appearing in Ironheart? He's the individual who rescues Parker Robbins after the latter and Cousin John's unsuccessful break-in at the home of Parker's dad. Then, he convinces Parker to strike a deal: Mephisto will gift him a dark magic-infused hooded cloak – so Parker can commit petty crimes and make himself rich – in exchange for Parker's soul.
Who dies in Ironheart?Ironheart performs the rare feat of bringing someone back from the dead (Image credit: Marvel Studios/Disney+)Nobody. The eponymous hero survives, as do Anthony Ramos' villain in Parker Robbins/The Hood and Alden Ehrenreich's secondary antagonist Zeke Stane.
In fact, Ironheart pulls a reverse Uno card, and brings someone back from the dead. After she defeats The Hood by taking away the source of his powers (aka his cloak), Riri heads for the exit of Desperito's, aka the dilapidated pizza restaurant that The Hood turned into his hideout.
On the way, though, she bumps into Mephisto, who cajoles her into becoming his next victim. Mephisto makes a deal with Riri to revive Natalie Washington (Lyric Ross). Remember, Natalie is Riri's best friend, who was killed in a drive-by shooting years ago, and who N.A.T.A.L.I.E, the artificial intelligence Riri creates, is based on.
In return, Mephisto gets Riri's soul. Indeed, after Riri shakes hands with Mephisto, we're privy to a highly emotional reunion between Riri and the reborn Natalie. However, as the pair hug, Riri's right forearm gets covered by the same fire-esque skin markings that adorned Parker's body every time he used his cloak and/or powers.
With Riri's soul now seemingly bound to Mephisto, it'll be fascinating to see when she realizes this is the case, and if her and/or Natalie sacrifice the latter's second chance at life to free Riri of the pact that this flawed hero has made.
Does Ironheart have a mid-credits or post-credits scene?Parker and Zelma meet in Stanton's in Ironheart's mid-credits scene (Image credit: Marvel Studios/Disney+)Yes and no. Ironheart has a mid-credits stinger, but there's no end-credits scene to stick around for.
Where the former is concerned, we see the now-cloakless Parker visit Stanton's. That's the confectionary shop that's a front for the Stanton family, who deal with the mystical and the occult.
Anyway, upon entering the store, Parker is greeted by Zelma Stanton (read my Ironheart cast and character guide for more on her), who rattles off the welcome spiel we first heard in episode 4. Parker, though, immediately sees through Zelma's facade, and informs her that he knows about the stuff in the back – i.e., the magical trinkets and knowledge in the Stantons' possession. Parker then tells Zelma he's looking for someone more "experienced" and "supreme" than she is before the screen cuts to black.
Clearly, Parker is interested in finding one of two individuals: Stephen Strange, aka Doctor Strange, or the current Sorcerer Supreme/Master of the Mystic Arts in MCU fan-favorite Wong. Considering that Strange is off-world dealing with the fallout from Doctor Strange 2, I suspect Parker wants to find Wong to learn more about magic. Will it be for the right reasons because he's turned over a new leaf in his life, or does he seek more knowledge of dark magic in order to exact revenge on Riri and Mephisto? Who knows – but this isn't the last we've seen of Parker.
Will there be an Ironheart season 2? And how could it set up Marvel's Strange Academy TV show?I'd be surprised if Ironheart gets a second season (Image credit: Marvel Studios/Disney+)We don't know. Unlike their big-screen offerings – read my articles on how to watch the Marvel movies in order and the best Marvel movies while you're here – Marvel rarely tells us if a show's lead character will return in a second season once its final end credits sequence has rolled. The only time I can remember the comic giant doing so was with season 1 of Loki, with a mid-credits stinger stating "Loki will return in season 2".
The Tom Hiddleston-starring series aside, Marvel has only renewed three other shows: Daredevil: Born Again, whose second season is currently in development, and animated offerings Your Friendly Neighborhood Spider-Man and What If...?. The former's sophomore season is also in active development, while the latter ran for three seasons between 2022 and 2024.
The chances of Ironheart season 2 being greenlit, then, aren't too high. Sure, its 86% critical score on Rotten Tomatoes suggest it should be, but its mixed audience rating indicates that general viewers wouldn't be devastated if a second season isn't forthcoming.
In my view, it's far more likely that Williams, Robbins, and/or Mephisto will show up in other MCU projects. Williams could be part of the cast for Marvel's long-rumored Young Avengers project. Based on Ironheart's mid-credits scene, Robbins could show up in another rumored Disney+ show called Strange Academy, which could star Benedict Wong's Sorcerer Supreme and explore the Mystic Arts in more detail. As for Mephisto, given his shared history with Spider-Man, would it be too much to ask for a cameo in Spider-Man: Brand New Day? Probably, but stranger things have happened.
You might also likeModern IT systems are awash with a constant flow of data providing information on system performance and security. This data is crucial for IT professionals looking to keep IT infrastructures running smoothly.
The snag is, with so much information available, it’s almost impossible to decipher what’s routine and what potentially could pose a threat. Trying to figure out the digital wheat from the chaff requires more than just visibility. It requires increasingly sophisticated systems that can interpret, prioritize and act—not simply collect information.
Unfortunately, most observability tools today don’t work this way. They generate alerts, log events and surface anomalies. And while technology is improving all the time, they don’t always understand what’s happening or how to respond.
Take a typical global enterprise running a hybrid architecture. It may have critical applications that are spread across multiple cloud providers, while also relying on on-premise legacy systems. Together, these systems are shepherded by dozens of monitoring tools generating thousands of alerts every day.
Some are false positives. Others are minor policy breaches. But lurking somewhere in the noise is a genuine security incident. And by the time it’s spotted… well, it could be too late.
Observability is becoming more intelligentWhat’s missing isn’t just more tools or greater visibility. It requires a new, highly sophisticated level of observability—one that works more like a human brain with the ability to filter out noise, recognize what matters and trigger the right response at the right time. What’s needed is something intelligent that can ’think’ for itself.
Part of the reason why this is needed is because IT teams have tended to invest in separate tools that often have little contextual awareness. That means it’s up to the human members of IT teams to bridge the gaps, deciding whether an alert is serious, identifying the root cause and initiating the right response. In fast-moving environments, these human assessments can take time which, in turn, adds to the risk.
An intelligent observability system, on the other hand, would do more than simply monitor for known issues. It would detect anomalies in real time using context-aware monitoring, then assess the severity and likely impact based on both the technical and business relevance and risk.
Rather than treating every signal the same, it would prioritize based on urgency and risk, helping teams focus on what truly matters.
Crucially, it would also support automation, enabling routine fixes or containment measures to be initiated. And instead of splitting insight across multiple disconnected views, it would bring together data from on-premises and cloud environments in a single, cohesive picture.
This kind of system doesn’t just monitor IT systems and networks. It has total oversight and is ready to act when needed.
So, how close are we?The good news is that progress is being made. AI-driven observability is moving from aspiration to implementation. Anomaly detection based on behavioral baselines is becoming more accessible, helping teams distinguish real issues from false alarms. Alert correlation and intelligent escalation paths are improving, reducing alert fatigue and bringing the right signals to the right people at the right time.
Some observability platforms, including those being developed at SolarWinds, are already combining monitoring, analysis and response into more cohesive workflows. Integration across hybrid environments remains a challenge, but the building blocks for intelligent observability are now in place.
What’s still missing, though, is the kind of full-system intelligence that can replicate the nuance of human decision-making. Most observability tools still rely on thresholds, templates, or predefined rules. True context-awareness—the ability to understand why something is happening and what to do next—is still emerging. But the direction of travel is clear.
Why this matters nowAccording to a recent SolarWinds AI and Observability report focused on the public sector, three-quarters of respondents said hybrid environments were hard to manage. Top concerns included data protection, integration complexity and a lack of visibility across systems.
Managing this complexity is made harder by the reality that observability tools are often siloed—one for cloud, another for on-prem, with separate platforms for detection, logging and remediation.
Security only adds to the unpredictability. In the same report, more than half of IT professionals said insider mistakes were contributing to serious threats, while 59% highlighted increasingly sophisticated attacks from external actors. The rise of generative AI means those external threats are becoming more scalable and targeted, increasing the strain on overstretched IT teams.
Which is why the key is not to add even more tools but to reduce complexity, improve visibility and act with intelligence and speed. An observability system that functions more like a brain does exactly that, because IT systems need to do more than observe. They need to understand.
We list the best small and medium business (SMB) firewall software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
The U.S. Education Department and Penn announced the voluntary agreement of the high-profile case that focused on Lia Thomas, who last competed for the Ivy League school in 2022.
(Image credit: Mary Schwalm)
Paramount Global will pay $16 million to settle President Trump's lawsuit over 60 Minutes' interview with former Vice President Kamala Harris — a lawsuit that many legal experts considered spurious.
(Image credit: Kevork Djansezian/Getty Images)
The surge in artificial intelligence adoption has sparked comparisons to the cloud boom of the past decade, but while usage is growing rapidly, understanding remains shallow, new research has claimed.
A Hostinger report found almost 80% of companies now use or plan to use AI, but a seperate Adecco Group report claims only 10% of C-suite leaders believe their organizations are fully ready for the disruption AI brings.
Among the estimated 359 million companies worldwide, about 280 million now integrate AI into at least one function.
AI adoption accelerates, but strategy and structure lag behindA growing number of small businesses are turning to the best AI tools to handle tasks like writing emails, analyzing data, or generating content.
Larger companies may build out full teams for implementation, but smaller firms are quietly transforming operations using lean, sometimes improvised, approaches.
Still, readiness doesn’t follow adoption, and there is a worrying gap in strategy, as although 60% of leaders expect workers to update their skills, 34% of companies have no formal AI policy.
Adecco found over half of CEOs admit their teams struggle to align on priorities, and only a third of businesses are investing in data infrastructure that would help close these gaps.
However, a small group of “future-ready” companies is building more responsive strategies by supporting continuous learning and relying on enterprise-wide insight to shape their AI direction.
Adecco’s CEO, Denis Machuel, puts it plainly: “AI-driven transformation must be human-centric.”
Many companies rush into AI adoption without understanding what differentiates them, resulting in scattered or redundant projects.
“Without enterprise-wide insight, AI efforts become siloed and misaligned. Enterprise Architecture can help focus AI initiatives on what truly sets a company apart,” Stendera explains.
By mapping their unique strengths and workflows, organizations can guide AI deployments that reinforce strategic priorities rather than dilute them.
AI depends not just on investment, but on introspection, and it is not a magic fix - and if companies do not understand what they need from AI, they won’t know how to use it, and the result will be catastrophic.
You might also likeCalifornia is leading 20 state attorneys general in a lawsuit seeking to block health officials from further sharing Medicaid data and DHS from using it for immigration enforcement.
(Image credit: Jeff Chiu)
With a shaky truce between Israel and Iran holding, activists say the Iranian government is hunting for people it suspects of collaborating with Israel. Iranian state media reports hundreds have been taken into custody in the last two weeks and some are fleeing into neighboring countries, including Turkey. We hear from some.
And, during the air war with Israel, one young Iranian woman turned to Chat GPT for information and comfort.
A new study looks at lives saved by USAID in the past and what the future without the agency will look like.
(Image credit: Michel Lunanga)