Error message

  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

Feed aggregator

New forum topics

Microsoft Teams is finally fixing one of its most annoying pop-ups - so I might be more productive at work at last

TechRadar News - Mon, 06/23/2025 - 05:24
  • Microsoft Teams is working on variable notification sizes
  • The new addition should hopefully minimize disruption while working
  • All Microsoft Teams users should benefit upon launch

Being distracted by unruly Microsoft Teams pop-ups could soon be a thing of the past, thanks to a new update coming to the service soon.

The video conferencing platform has revealed it is working on adding a feature which will allow users to tweak the size of Teams notifications.

Once released, this tool should mean users are safe from having distracting pop-ups catch the corner of their eye when working - something I know I've definitely fallen victim to in the past.

Microsoft Teams notification sizes

In a Microsoft 365 roadmap post, the company explained the feature will, quite simply, give users the chance to "change the size of Teams notifications".

This includes a new "compact" size, which the company says, "takes up less space on the user's screen and offers a clean, minimalist design."

That's all the detail we currently have on the feature itself, which we're guessing will be accessible from the Settings menu or preferences list.

The feature is listed as being "in development", but has a scheduled rollout start date of July 2025, so users don't have too long to wait. When released, it will be available to users across the world using Teams on Windows, Mac, Android, and iOS.

The launch is the latest in a series of recent improvements to Microsoft Teams announced by the company as it looks to improve the experience for users.

This includes a tweak that will allow multiple people to control slides being presented in a meeting or call.

Microsoft says the addition will mean that presenters are able to maintain "a smooth flow during meetings or webinars" - hopefully meaning the end of manual slide changes - and hopefully, the phrase "next slide please".

It also recently announced it would be adding noise suppression for participants dialing in to a call, which should spell an end to potentially ear-splitting call interruptions, or participants being deafened by background noise from another person on the call.

The platform also revealed it is rolling out "enhanced spell check", giving users the tools to make sure their messages are as accurate as possible.

You might also like
Categories: Technology

Apple’s Mac-like multitasking feature is coming to these iPads soon – but I prefer these handy tools

TechRadar News - Mon, 06/23/2025 - 05:22
  • iPadOS’s Stage Manager feature is coming to more iPads
  • That could improve multitasking capabilities for iPad users
  • But iPadOS 26 brings even better features to iPad than Stage Manager

If you’re a fan of multitasking on any of the best iPads, you were probably heartened to see all the new features Apple brought to iPadOS 26 at its Worldwide Developers Conference (WWDC). But while those additions are sure to make a splash for productivity power users, the company is also extending the existing Stage Manager feature to even more iPads.

In case you missed it, Stage Manager lets you group apps into sets and then switch between those sets as needed. It’s designed to help you focus on one task and all the windows you need to complete it, then change to a different task and group of apps after. It’s available on both iPadOS and macOS.

With iPadOS 26, Stage Manager will be available on more iPads than before. Previously, it only worked on the 13-inch iPad Pro with M4 chip, the 12.9-inch iPad Pro (third generation or later), the 11-inch iPad Pro (first generation or later), and the iPad Air (fifth generation or later).

As noted on Reddit, in addition to those tablets, Stage Manager now also works with the third-generation iPad Air or later (not just the fifth-generation model), the iPad mini (fifth generation or later), and the entry-level iPad (eighth-generation or later). In essence, Stage Manager works with any iPad that can run iPadOS 26.

Better than Stage Manager

(Image credit: Apple)

Stage Manager has proven to be a somewhat divisive feature since it was released – not helped by a buggy launch – and it’s struggled to establish itself as a must-have element of iPadOS. Although I was intrigued by it at first, I quickly found Stage Manager to be a little half-baked, and it never became a regular part of my setup on either my iPad or my Mac.

What looks to be far more interesting is the range of productivity tools Apple has added to iPadOS 26. That includes a Mac-like menu bar, full overlapping app support, window resizing, and even the “traffic light” buttons used to close, minimize or maximize app windows. Window tiling in particular is an excellent addition to the iPad, as you get a lot more window position options than just using an older feature like Split View.

Being able to use an iPad like a Mac offers much more appeal to me than Stage Manager. That’s partly because the Mac-like interface is just much more familiar to anyone who has used a computer before – there’s no new system to learn, as there is with Stage Manager. And gaining these new tools now makes it much more comfortable to work on the go with my iPad, as I no longer need to sacrifice capability in the name of portability.

Still, with Stage Manager coming to more iPads than before, it could still find an audience among Apple fans who have never had access to it. In any case, combined with iPadOS 26’s new multitasking features, it’s clear that Apple is taking productivity and user interface management a little more seriously.

You might also like
Categories: Technology

"No evidence" - here's why the massive 16 billion record data breach may not be as bad as first thought

TechRadar News - Mon, 06/23/2025 - 05:22
  • The recent 16 billion record breach may not be as bad as it sounds
  • The datasets most likely contain previously leaked information
  • Nevertheless, those affected could still be at risk, so be on your guard

Following the recent reports of over 16 billion records being leaked in an ‘unimaginable’ major data breach, further research has claimed the reality of the incident might not be as disastrous as first thought.

Following significant speculation about the effects and origins of the breach, new findings from BleepingComputer suggest this “breach” may not be new, or even a breach - but instead just a compilation of existing leaked credentials.

The inital datasets discovered by the researchers included hordes of personal information, with each of the 30 datasets containing between tens of millions, to over 3.5 billion data points - totaling 16 billion records. It now looks likely this was a series of datasets simply containing breached credentials assembled by a cybersecurity firm (or by criminals) which was then exposed online.

Save up to 68% on identity theft protection for TechRadar readers!

TechRadar editors praise Aura's upfront pricing and simplicity. Aura also includes a password manager, VPN, and antivirus to make its security solution an even more compelling deal.

Preferred partner (What does this mean?)View Deal

Infostealers to blame

“Despite the buzz, there's no evidence this compilation contains new or previously unseen data,” BleepingComputer confirms.

The information from these datasets has likely been circulating for a while, and the layout of the breached information suggests that it was collected using infostealers - a type of malware that has become one of the most prolific threats to security teams and internet users alike.

The information found in these datasets is formatted in such a way that points the finger firmly at infostealers, with credentials appearing in a one per line format (URL:username:password) all compiled in one ‘log’.

One attack from an infostealer can exfiltrate all of the credentials stored on a browser, and the logs are then uploaded and usually sold on the dark web.

Criminals will often upload samples of their stolen data as a ‘taster’ to prove the information is legitimate.

Since these breaches can sometimes contain billions of records, these samples frequently hold tens of thousands of credentials - and this data breach is most likely a compilation of these tasters.

What to do next

New or not, leaked credentials pose a huge threat to those affected. If your information has been leaked, make sure to take a look at some identity theft protection software, as criminals can use your name, address, and details to take out credit cards or loans in your name.

HaveIBeenPwned? is probably the best resource only to check if your details have been affected, offering a run-down of every big cyber incident of the past few years.

As a business, enabling multi-factor authentication (MFA) and ensuring all staff are thoroughly trained on the dangers and signs of social engineering attacks is key. Using business password managers can also help ensure all user passwords are secure.

And if you save passwords to a Google account, you can use Google's Password Checkup tool to see if any have been compromised, or sign up for one of the best password manager options we've rounded up to make sure your logins are protected.

"If this news frightens you, then your security program probably has some fundamental gaps,” argues James Shank, Director of Threat Operations at Expel.

“Let this be the fuel you need to position yourself and your department for solving the problem systematically, rather than defending against the news du jour. There will always be another breach, with even more passwords, and emergency handling will continue if you don't have systematic defenses in place."

You might also like
Categories: Technology

Miss the Volume Bar on Your iPhone's Lock Screen? Here's How to Bring It Back

CNET News - Mon, 06/23/2025 - 05:00
Apple removed the bar from the iPhone's lock screen in 2022, but you can bring it back in a few easy steps.
Categories: Technology

This flexible rope light made it easy for me to create a color-curated neon sign, and I can’t get enough of it

TechRadar Reviews - Mon, 06/23/2025 - 05:00
Govee Neon Rope Light 2 review

The Govee Neon Rope Light 2 is a fun and flexible RGB light strip that’s easy to use and yet another example of why Govee remains a go-to when many people are shopping for smart lights.

TechRadar Smart Home Week

This article is part of TechRadar's Smart Home Week 2025. From lighting and switches to robot window cleaners and smart thermostats, we're here to help you pick the right devices to make your life easier, and get the most out of them.

I tested the 16.4ft / 5m model of the Govee Neon Rope Light 2, which is available to purchase on the Govee website for $99.99 /£99.99, as is the 9.8ft / 3m length, which has a list price of $69.99 / £79.99. At the time of writing, Govee US is offering the 9.8ft model for $49.99, and the 16.4ft for $84.99, and there’s a 20% discount off the five-meter model at Amazon UK, lowering the price to just £79.99, so it’s worth checking which retailer has the best offer before purchasing. I got to test the white model, but it’s also available in black, so it should blend in whether you’re making a statement in your living room or adding another element to your RGB-heavy gaming setup.

(Image credit: Future)

The material of the Neon Rope Light 2 looked good quality and was as smooth and soft to the touch as you'd expect from any of the best smart lights on the market. However, due to the nature of the material, it proved to be a bit of a magnet for dust and lint. It was flexible and easy to shape, but it still took two of us to recreate one of the example designs on the app – mostly because 16.4 feet / five meters was a lot to wrestle with on my own. The step-by-step process given by the app was blissfully easy to follow, with the rope light showing red sections to indicate where it should be curved or fixed.

I found the bendable metal clips really easy to work with, as I just needed to slot them over the base of the rope light and bend them into the required shape, before peeling off the backing of the 3M adhesive pad and sticking it in place. There were 10 of these bendable clips included, along with 15 plastic mounting clips, which were more than enough to recreate the design of the woman's face, but more are available to purchase for more complex designs, or if replacements are needed.

Image 1 of 4

(Image credit: Future)Image 2 of 4

(Image credit: Future)Image 3 of 4

(Image credit: Future)Image 4 of 4

(Image credit: Future)

I’ve tested quite a few Govee products to date, and I still can’t help but fan girl a little over the Govee Home app every time. It’s satisfyingly easy to navigate, and pairing it to the Neon Rope Light 2 was almost effortless, as the app detected it mere moments after I connected the rope light’s adapter to an outlet.

Even without connecting to the app straight away, I could easily cycle through warm and cold whites and kinetic color scenes using the control box wired into the power cord, with which I could also control the brightness level and turn the light on or off. There was a whole lot more to play with in the Govee Home app, with a pleasing number of ready-made color palettes and scenes to choose from, plus the option to create my own color sequences.

The level of customization available goes far beyond this, however, with settings such as Segment Management allowing me to fine-tune the color combinations to create satisfying gradients, complementary color combinations, and more. I could easily generate colorful effects using the AI generator too, and the Finger sketch function, which was one of my favorites to use with the Neon Rope Light 2, as it allowed me to simply pick a color and apply it to a very small or large segment, illuminating my creation on the rope light in real time. The only things I felt this feature was missing were a recently used color palette and the ability to undo, as I found it was easy to add color accidentally when trying to scroll down the page.

(Image credit: Future)

I’ve encountered most of these customizable settings before when reviewing other Govee smart lights, such as the Govee RGBIC LED Strip Light, but the shape mapping feature was a new one for me, and I’ve got to say, I was very impressed. The idea behind it is that the shape of the Neon Rope Light 2 is mapped from a photograph, allowing for better lighting customization, plus enabling the lighting effects to display accurately across the design as a whole.

To test this feature out, I created a large swirl pattern and took a photo when prompted by the app. I learned quickly that there needs to be a clear gap between each rope light section for it to map correctly, so I loosened the spiral ever so slightly, and it picked it up straight away on my second attempt. I tried out a couple of the Scenes to test how good the resulting effect was, and the Color Painting scene in particular made it clear how well this feature works, as colors strobed across the whole of the swirl.

Image 1 of 3

(Image credit: Future)Image 2 of 3

(Image credit: Future)Image 3 of 3

(Image credit: Future)

I’m a sucker for anything bright and colorful, but the Neon Rope Light 2 took my appreciation to another level. The wide variety of effects makes it perfect for highlighting existing features with a solid color, or making a statement as a neon sign with some kinetic lighting, adding instant wow-factor to any room. It’s a pricey purchase, undoubtedly, but if you’re someone who’s always coveted a neon sign, or are looking for something a little different to zhoosh up your decor, then you’ll be quite happy with the Govee Neon Rope Light 2.

Govee Neon Rope Light 2 review: Price and specs

Price

$99.99 / £99.99

Model

H61D5

Colors

RGBIC

Number of light sources

420

Connectivity

2.4GHz WiFi, Bluetooth

App

Yes

Voice control

Yes

Additional features

Matter compatible, shape mapping

Should I buy the Govee Neon Rope Light 2?Buy it if...

You want to make a statement
This flexible rope light offers the opportunity to create a colorful neon sign that can be based on one of the many example designs, or your imagination, if you like to get creative.

You want an abundance of options
The Govee Home app offers 64 preset lighting effects, 12 music sync modes, and a wide range of customizable settings, so you can fine-tune the lighting to your satisfaction.

Don't buy it if...

You want subtle and simple RGB lighting
This flexible rope light’s clever format and abundance of features could prove overkill for anyone who simply wants to add some color to their space.

You don’t want a visible controller
It’s unfortunate that the controller for the rope light is a fixed part of the power cord, as it could prove a bit of an eyesore if the chosen design or placement leads to it being visible.

Govee Neon Rope Light 2 review: Also consider

Govee RGBIC LED Strip Light
If you like the sound of the Govee Home app and its multitude of preset scenes and color customization, but want something a little simpler and a lot cheaper, then I highly recommend the Govee RGBIC LED Strip Light. It doesn’t offer WiFi connectivity or voice control, but uses the same control box as the Neon Rope Light 2, and can be controlled with the app via Bluetooth. If this sounds appealing, then I highly recommend checking out my review of the Govee RGBIC LED Strip Light.

How I tested the Govee Neon Rope Light 2
  • I assessed the material and build quality of the Govee Neon Rope Light 2
  • I tested the different features and customizable settings
  • I followed the step-by-step process to recreate one of the recommended designs

I began by checking the quality of the Govee Neon Rope Light 2 and its accessories. I tested how flexible it was and experimented by creating various shapes.

I tested the different settings and features in the Govee Home companion app to see the different effects that could be achieved, and used Segment Management, the AI generator, and the Finger Sketch tool to create my own effects.

I followed the step-by-step process provided on the app to recreate one of the many example artworks from start to finish to assess how easy it was to shape and how well the fixings worked.

I created a swirl with the rope light to see how easy it was to use the shape mapping feature and how well it performed.

Categories: Reviews

iPhone 17 Pro again tipped to get a vapor chamber – here's why that'd be a big deal

TechRadar News - Mon, 06/23/2025 - 04:48
  • The iPhone 17 Pro and Pro Max are again rumored to have a vapor chamber
  • However, the base iPhone 17 and iPhone 17 Air might not have one
  • A vapor chamber could prevent overheating, allowing for better sustained performance and improved battery life

A few months ago, we heard that the iPhone 17 series could gain a vapor chamber to help prevent overheating, and now another source has echoed these claims – and even provided some evidence.

Leaker Majin Bu (via MacRumors) claims to have learned from an “internal source” that both the iPhone 17 Pro and iPhone 17 Pro Max will have a vapor chamber. This will supposedly be a Pro-exclusive upgrade, which is at odds with that earlier leak, which pointed to all four models getting a vapor chamber.

In any case, we’d take this latest tip with a pinch of salt, as Bu has a mixed track record, but they’ve supplied an image of what they claim is part of a vapor chamber intended for these upcoming phones (below).

A leaked image of a vapor chamber component (Image credit: Majin Bu)

That supposedly leaked image – coupled with the fact that multiple sources have now mentioned a vapor chamber – suggests that at least some iPhone 17 models may well be getting this upgrade.

Keeping it cool

In layman's terms, a vapor chamber should be able to cool these phones more effectively than the graphite sheets used for heat dissipation in current iPhones.

A vapor chamber is a small metal chamber full of liquid, and that liquid turns to vapor when it heats up, allowing the heat to dissipate across the chamber’s surface area. It works as a way of pulling heat away from internal components, which has several advantages.

For one thing, this prevents damage to components from overheating, but it should also reduce the need for thermal throttling – that is, performance reductions to cool the phone down. So, even if you’re pushing the iPhone 17 Pro hard with gaming or other demanding applications, it should be able to stay relatively cool and maintain its performance better.

This should also make the phone more energy efficient, so battery life could be improved too.

Clearly, there are a lot of potential advantages to a vapor chamber, so we hope this leak proves accurate. We should find out in September, as that’s when the iPhone 17 series is likely to launch.

You might also like
Categories: Technology

Many businesses still don't trust their AI systems - and that could be a major problem

TechRadar News - Mon, 06/23/2025 - 04:40
  • Businesses don't trust the accuracy of their AI/ML models, but it's due to poor data foundations, report claims
  • Only one in three have implemented or optimized data observability programs
  • Observability should be standard across the whole data lifecycle

New research from Ataccama has claimed a considerable proportion of businesses still don't trust the output of AI models - but this could simply be because their data isn't in order yet.

The study found two in five (42%) organizations don't trust their AI/ML model outputs, yet only three in five (58%) have implemented or optimised data observability programs.

Ataccama says this could be a problem, because traditional observability tools are not designed to monitor unstructured data, such as PDFs and images.

Don't trust AI? A lack of suitable data could be the problem

The report also revealed the ad-hoc approach that businesses often take, with observability often implemented reactively, resulting in fragmented governance and silos across the organization.

Ataccama defined an effective program as proactive, automated and embedded across the data lifecycle. More advanced observability could also include automated data quality checks and remediation workflows, which could ultimately prevent further issues upstream.

"They’ve invested in tools, but they haven’t operationalized trust. That means embedding observability into the full data lifecycle, from ingestion and pipeline execution to AI-driven consumption, so issues can surface and be resolved before they reach production," CPO Jay Limburn explained.

However, ongoing skills shortages and limited budgets are still presenting challenges along the way. Ataccama also noted that unstructured inputs continue to grow as a result of increased generative AI and RAG adoption, yet currently, fewer than one in three organizations feed unstructured data into their models.

The report goes on to explain: "The most mature programs are closing that gap by integrating observability directly into their data engineering and governance frameworks."

With proper observability in place, businesses can expect improved data reliability, faster decision-making and reduced operational risk.

You might also like
Categories: Technology

Climate change is boosting the risk of sleep apnea

NPR News Headlines - Mon, 06/23/2025 - 04:30

Hotter temperatures make breathing problems during sleep more likely, even when it's not extremely hot

(Image credit: Chris Hondros/Getty Images)

Categories: News

M&S and Co-op hacks publicly defined as a single attack - and could cost more than £400 million

TechRadar News - Mon, 06/23/2025 - 04:08
  • Cyber Monitoring Centre says it is treating M&S and Co-op attacks as a single, combined event
  • M&S was hit by a major cyberattack earlier in 2025, Co-op hit weeks after
  • Cost of attacks could hit as high as £440 million, CMC estimates

The recent cyberattacks against Marks and Spencer (M&S) and the Co-op supermarket have been combined into a single incident by a major UK investigatory group.

The Cyber Monitoring Centre (CMC), an independent, non-profit body established to categorize major cyber events by the insurance industry, has declared it is treating the two incidents as one event by the same attacker - Scattered Spider.

"Given that one threat actor claimed responsibility for both M&S and Co-op, the close timing, and the similar tactics, techniques, and procedures (TTPs), CMC has assessed the incidents as a single combined cyber event," the CMC said.

Save up to 68% on identity theft protection for TechRadar readers!

TechRadar editors praise Aura's upfront pricing and simplicity. Aura also includes a password manager, VPN, and antivirus to make its security solution an even more compelling deal.

Preferred partner (What does this mean?)View Deal

Combined attack

The CMC says it has categorized the attacks as a "Category 2 systemic event," and estimated the security breaches will have a total financial impact of between £270 million to £440 million ($363 million to $592 million) on the two firms.

It added the effects of the attacks had been classified as "narrow and deep", with "significant implications" not only for the two retailers, but their suppliers, partners and service providers as well.

This definition is opposed to “shallow and broad” events such as the 2024 CrowdStrike incident, which affected a large number of businesses across the economy, but the impact to any one company was much smaller.

"Although both of the targeted companies suffered business disruption, data loss, and costs for incident response and IT rebuild, business disruption drives the vast majority of the financial cost," the CMC added.

"Most of the estimated disruption cost is faced by the two companies, but our analysis seeks to estimate the wider cost to partners, suppliers and others."

Despite happening around the same time, the CMC has said the cyberattack on Harrods, another major British retailer, will not been included at this stage, citing a lack of adequate information available about the cause and impact.

M&S was apparently hit by the attack on April 22, revealing news of the incident several days later. The Co-op revealed news of its event on April 30, saying it had been forced to take down parts of its IT systems in an attempt to mitigate the effects.

M&S has forecast the attack could cost it around £300 million in lost operating profit in its financial year.

M&S has not confirmed whether it has paid a ransom to the hackers, but did admit some customer data was stolen in the attack. This did not include any passwords or card or payment details, but home addresses, phone numbers and dates of birth may have been affected.

Anyone concerned their data may have been taken, we recommend using a dark web monitoring service, or using a breach monitor such as Have I Been Pwned to check for potential exposures.

Via InfoSecurity

You might also like
Categories: Technology

From the fringes to the mainstream: Meet the hardline anti-immigration activist who helped shape Trump's agenda

NPR News Headlines - Mon, 06/23/2025 - 04:03

The former leader of FAIR, the Federation for American Immigration Reform, Dan Stein, retired this year after more than 40 at the helm of the organization. The right-wing group has long fought to reduce immigration and for tougher border controls. Under President Trump, Stein's once-fringe ideas are now being enacted.

(Image credit: Moriah Ratner for NPR)

Categories: News

The David Lynch estate auction doubled as a caffeinated wake

NPR News Headlines - Mon, 06/23/2025 - 04:02

Most of the bidding action was online. But at a ritzy Beverly Hills hotel, hopeful bidders united by genuine affection for Lynch admired the tools of the late artist's trade. It was a mirthful wake.

(Image credit: Emma Bowman)

Categories: News

An AI video ad is making a splash. Is it the future of advertising?

NPR News Headlines - Mon, 06/23/2025 - 04:01

The over-the-top ad combines the energy of Grand Theft Auto with the drama of the NBA Finals — all created by AI. Is it a sign of things to come?

(Image credit: Kalshi via YouTube)

Categories: News

'It's such a dream': Top high school performers step out on Broadway

NPR News Headlines - Mon, 06/23/2025 - 04:00

With a billboard in Times Square and a night on Broadway, the year's top high school performers are ready for their big moment at the Jimmy Awards.

(Image credit: José A. Alvarado Jr. for NPR)

Categories: News

Tick risks vary by region. Here's where diseases have spread and how to stay safe

NPR News Headlines - Mon, 06/23/2025 - 04:00
more than a dozen different disease-causing agents, including toxins, allergens, bacteria, parasites and viruses.'/>

Tick bites are are on the rise this and they can carry some nasty illnesses. Which are most common depends where you live. Here's what to know to protect yourself.

(Image credit: Patrick Pleul/dpa/picture alliance)

Categories: News

Trump said he'd send 30,000 migrants to Guantánamo. He's sent about 500

NPR News Headlines - Mon, 06/23/2025 - 04:00

Trump vowed in January to send up to 30,000 migrants to Guantánamo, but so far about 500 have been flown to and from there. Critics say his goal appears to be frightening migrants into self-deporting.

(Image credit: Petty Officer 2nd Class Jennifer Newsome)

Categories: News

Trump loves saying 'You're fired.' Now he's making it easier to fire federal workers

NPR News Headlines - Mon, 06/23/2025 - 04:00

The Trump administration's plans to convert some 50,000 civil servants into at-will employees has some worried that essential government functions will be politicized.

(Image credit: Brendan Smialowski)

Categories: News

Ahead of this week's NATO summit, Europe is uncertain about its old ally, the U.S.

NPR News Headlines - Mon, 06/23/2025 - 04:00

This year's NATO summit opens Tuesday, attended by a disengaged United States, which seems bent on fighting its own battles, rather than helping European allies with the increased threat from Russia.

(Image credit: Peter Dejong)

Categories: News

The politics of the U.S. strike on Iran's nuclear facilities: Here's what to watch next

NPR News Headlines - Mon, 06/23/2025 - 04:00

President Trump ran on a pledge to end "forever wars," so what comes next is pivotal. Here are five things to watch.

(Image credit: Daniel Torok)

Categories: News

4 takeaways on the U.S. airstrikes on Iran — and what might come next

NPR News Headlines - Mon, 06/23/2025 - 04:00

The Trump administration said its strikes were intended to prevent Iran from developing a nuclear weapon. Now, Iran weighs a response against what it called an "outrageous" military operation.

(Image credit: Getty Images)

Categories: News

Don’t be distracted by AI – fundamental cyber skills are still key

TechRadar News - Mon, 06/23/2025 - 03:54

The hype around generative AI (GenAI) is impossible to ignore in most industries, and cybersecurity is no exception. The potential for cybercriminals enhancing their attacks with AI looms large in industry discussions. At the same time, the security world is gripped by the promise of faster, smarter defenses, from AI-powered EDR to co-pilot-enabled SOC teams.

But here’s the uncomfortable truth: none of it matters if your patching is months out of date, your cloud assets are misconfigured, or your employees freeze under pressure. The security fundamentals are still what really makes the difference in preventing a breach.

While security teams race to bolt on the latest GenAI tools, basic cyber hygiene is in danger of being overlooked.

So how can organizations ensure their cyber skills are up to the challenge in the age of AI?

GenAI is making the basics more urgent - not obsolete

It’s easy to assume that the widespread use of GenAI requires an entirely new approach to security and it’s undeniable that AI-assisted threats are evolving fast. But the real danger isn’t that GenAI changes the game, it’s the way it accelerates the same tactics that already work.

Attackers are primarily using GenAI to scale up familiar playbooks. Social engineering, reconnaissance, and privilege escalation aren’t new, they’re just happening faster and at greater volume.

In many cases, using AI tools can also be a security risk in and of itself. Immersive’s research found that 88% of users could fool a GenAI system into leaking sensitive information, with the machines being surprisingly vulnerable to human psychological tricks. As with any other software tool, misconfigurations and poor access controls also expose GenAI to greater exploitation.

Rather than replacing hygiene, GenAI makes it more essential. If anything, organizations need to double down on the fundamentals.

Cyber hygiene is still the frontline defense

The security landscape may be changing rapidly, but the fundamentals aren’t. Most breaches today still stem from issues that are entirely preventable: an unpatched server, a poorly configured firewall, an admin account with excessive privileges. These aren’t sophisticated zero-days that require experienced threat actors to exploit. They’re hygiene failures.

Yet too many organizations treat cyber hygiene as a legacy concern, something solved once they’ve rolled out the latest AI-powered tools. That mindset is dangerous because hygiene fundamentals aren’t something you graduate from; they’re the baseline that allows advanced defenses to function effectively.

If core defenses such as access permissions and configurations are weak, AI-powered tools are just watching the breach happen in high definition. Security starts with doing the basics well and doing them consistently.

Why poor training is the real weak link

If your security fundamentals are slipping, it’s worth asking: is the problem your tools, or your training?

For most organizations, it’s the latter. Legacy training still dominates, often reduced to short videos and multiple-choice quizzes that check boxes but fail to build capability.

The issue isn’t that people don’t care about security. It’s that they’ve been taught to memorize, not to respond. Training is too often generic, passive, and disconnected from the reality of a live incident. As a result, critical cyber hygiene habits like patch management or recognising phishing attempts fall apart in the moments they matter most.

These issues are intensified when a crisis rears its head. It’s no surprise that teams struggle to respond under pressure, because most have never been given the chance to prepare in a meaningful way.

If we want better outcomes, we need to stop blaming individuals and start fixing the systems that fail to prepare them. No amount of AI will compensate for a team that doesn’t know what to do when the alert goes off.

Drills build muscle memory and enforce hygiene

We wouldn’t expect someone to be ready to fight a fire or fly a plane just because they’d watched a video and taken a quiz, and the same is true for responding to a cyberattack.

This is where cyber drills come in. Unlike traditional training, drills place people in realistic, high-pressure scenarios where they must act, not just observe. They test judgment, coordination, and the ability to follow protocols under stress. Crucially, they reinforce both crisis handling and the importance of essential cyber hygiene through repetition and lived experience.

Cyber drills also expose weaknesses that would otherwise remain hidden. A playbook that looks perfect on paper might collapse under real-time pressure. A confident team might struggle when roles blur in the heat of an incident.

Real cyber readiness isn’t achieved through once-a-year compliance exercises, it’s built into the daily rhythm of how teams work, communicate, and make decisions. That requires more than technology. It takes culture.

Don’t bet everything on the shiniest tools

GenAI is continuing to change the security landscape in unpredictable ways, but it hasn’t changed the fundamentals. Most breaches still come down to human error and poor hygiene, regardless of the tools surrounding them.

Advanced tools won’t protect you if your team isn’t ready. True cyber resilience means training for the basics, testing under pressure, and building a culture where readiness is second nature.

We list the best endpoint protection software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Pages

Subscribe to The Vortex aggregator