The good news? Cybersecurity is witnessing a steady evolution. Organizations across EMEA are sharpening their abilities to detect and respond to cyber attacks. In 2023, ransomware intrusions in EMEA were detected in just 8 days, a substantial improvement from the 33 days it took in 2022.
Which, unfortunately, brings us to the bad news: cybercriminals are also evolving. Hacker groups, once characterized by disparate individuals operating from basements, have transformed into highly sophisticated and well-funded organizations. Their tactics, techniques, and procedures (TTPs) are evolving at a rate which now presents a formidable challenge to traditional security measures.
The group takedowns we’ve seen in recent months by international authorities have underscored the strides made in knowledge-sharing and cooperation between countries and law enforcement. However, this case also lays bare the agility of cybercriminals, who can promptly reassemble and reappear elsewhere.
It’s therefore vital that organizations are also continually evolving, building a robust cybersecurity posture to protect themselves from this increasingly sophisticated threat landscape.
Proactive threat detection through technologyEvolving threats means pressure is increasing on cybersecurity teams to keep pace. Proactivity is more vital than ever.
Threats range from exploits to ransomware, custom malware to sophisticated phishing scams. All of which are on the rise. This year, exploits continued to dominate as the top method of intrusion, closely followed by phishing campaigns. The substantial commitment of time and resources towards uncovering these vulnerabilities underscores their undeniable value to threat actors. This emphasizes the need for organizations to regularly reassess and fine-tune their defense strategies.
Proactive detection should be undertaken to root out any potential hidden breaches within a network. Investigations could include proactive scanning of devices, reviewing network logs and applying malware signatures to appliance images.
One area of cybersecurity where Gen AI holds huge potential is in proactive threat hunting. Mandiant Red Teams have been leveraging Gen AI to assist in the development of custom tooling and enhance their understanding of various platforms and their security aspects. Organizations can utilize red teams to simulate realistic attack scenarios and help improve the overall security of their environments.
Building a cyber-aware cultureThe uncomfortable truth is that all organizations are at risk of attack. Mandiant tracks more than 4,000 threat groups, 719 of which were newly tracked in 2023, as well as 626 new malware families.
However, those with especially sensitive data are even more attractive to attackers. In the past year, Mandiant were called to respond to intrusions most commonly at financial services organizations (17.3%), business and professional services (13.3%), high tech (12.4%), retail and hospitality (8.6%), healthcare (8.1%), and government (8.1%).
It’s clear why – the data from these sources is worth more to threat actors, and so they are more vulnerable to targeting.
Creating a cyber-aware culture can help to protect sensitive information by limiting the risk of a breach. It’s getting increasingly common that attackers exploit trusted relationships and communications using techniques such as conversation hijacking, or by masquerading as internal users. Teaching staff what signs to watch for provides a basic, but important, layer of cybersecurity.
Especially when considering that stolen credentials - which pose a serious security risk to organizations - were the fourth most notable initial intrusion vector in 2023. Though there’s evidence that education works. In 2023, 10% of intrusions began with evidence of stolen credentials, compared to 14% observed in 2022.
Enhancing preparednessWe’ve seen notable improvements in dwell time over the past few years. Dwell time describes the number of days an attacker is on a system from compromise to detection, and in 2023 the global median dwell time is 10 days, down from 16 days in 2022.
This is a testament to how proactive cybersecurity can limit the harm from a breach. Encouraging this kind of preparedness within teams is key to ensuring that those teams are ready to respond to threats with a robust, organized and clear strategy when the time comes.
Employing tactics such as regular exercises to test security teams, continual reviews of incident response plans, and adopting an attitude of least privilege can ensure that the effects of a cyberattack are limited.
It’s also vital to consider involving teams outside of your cybersecurity experts. Bringing in outside groups such as comms, legal and other relevant teams in tabletop exercises can help to test incident response plans and ensure there is no weak link in your response process.
Implementing positive changeThe more prepared a company culture, the better placed it is to respond when the worst happens. It’s a basic - but true - tenet of cybersecurity.
As malicious actors leverage larger resources to create evermore complex and dangerous cyberattacks, it’s vital that organizations keep their fingers on the pulse and respond accordingly. New technologies, regular process reviews and a vigilant, cyber-aware culture will all go some way to protecting sensitive data.
And, as international authorities increasingly start working together, we can build stronger responses to mitigate the formidable challenge at hand.
We've featured the best identity theft protection.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Atlus has released a new patch for Metaphor: ReFantazio, which brings main menu changes and bug fixes.
Update 1.11 for PlayStation, although for Xbox its 1.112.0, Windows 1.0.112.0, and Steam 1.0.11.0, is now live and a fairly small patch primarily aimed at fixing a bunch of gameplay bugs while also improving upon the game's main menu.
The main takeaway is that the patch has introduced a new way for players to change their party formation and now allows them to swap members on the main menu and equip screen.
"Now able to change party formation and configuration in Main Menu > Equipment," the patch notes read.
Atlus has also added a category jump function to specific locations on the main menu and item screen, as well as fixed a bug that was stopping players from progressing further when performing certain operations on the main menu. You can read the full patch notes below.
Metaphor: ReFantazio version 1.11 patch notes:All Platforms
Windows and Steam versions
What began as a battle between Israel and Hamas morphed into a much wider regional conflict that has reshaped much of the Middle East.
(Image credit: Abed Rahim Khatib)
Severance star Patricia Arquette has teased what fans can expect to see as part of Harmony Cobel's character arc in season 2.
Chatting to TechRadar before the highly-rated Apple TV Plus show returns on January 17, Arquette suggested that Cobel will embark on a coming-of-age journey of sorts. Not only that, but she'll also spend much of this season questioning her allegiance to Lumon Industries, the clandestine biotechnological megacorporation that she's loyally served for throughout her adult life.
Major spoilers immediately follow for Severance season 1's final two episodes. Turn back now if you haven't watched them.
Harmony Cobel is metaphorically lost at sea after being fired by Lumon (Image credit: Apple TV Plus)In Severance season 1 episode 8, titled 'What's for Dinner?', Cobel was suspended as Lumon's Severed Floor manager. That's because she withheld information about Helly R's (Helena Egan's 'innie' persona) suicide attempt and her extracurricular activities using the alias Mrs Selvig from Lumon's board. The latter included Cobel spying on Mark Scout by posing as his absent-minded neighbor and being hired as the nanny for Mark's newborn nephew.
Last season's finale, though, saw Cobel spare Lumon's blushes – and some potentially spare it some devastating press coverage – when its Macrodata Refiners, including Helly and Mark's 'innie' (known simply as Mark S) temporarily escaped into the real world. That almost led to them blowing the whistle on Lumon's nefarious working practices, and they would have succeeded had it not been for Cobel's last-minute intervention. Indeed, it's Cobel who realizes that the 'innies' have utilized Lumon's Overtime Contingency program to break out and, at a Lumon gala, tries to stop Helly from revealing what goes on at the heinous organization.
You would expect, then, Cobel's sinister employers to thank her for saving their skin, and potentially reinstate her as Severed Floor manager, right? Not so. I won't spoil what happens in this season's early episodes – my Severance season 2 review contains some very light spoilers for its first four episodes, though, if you're interested. Arquette was similarly keen not to ruin anything significant about Cobel's character arc in the Apple mystery-thriller series' sophomore outing, but she did tease where Cobel's mindset is at heading into Severance season 2.
"I think she doesn't like the direction [that] the corporation is going in," Arquette told me. "She's an old-school devotee, and I feel like even though she's been doing things that were outside the purview of the company, her agenda was to do it for Lumon [and] for the greatness of care, and she's very frustrated that the corporation doesn't value that at all, or value her at all.
It's like a kid who has a parent that will never really acknowledge or love them
Patricia Arquette, Severance actor"She sees how much she's done and how pivotal she's been to the growth and trajectory of that corporation," Arquette added. "It's like a kid who has a parent that will never really acknowledge or love them, so she's always trying to get that kind of approval. At the same time, in this kind of teenage vortex of her emotional growth, she's also kind of hating them, so there's a desire to be loved by them and also punish them that she's grappling with."
For more on one of the best Apple TV Plus shows' next installment, including details on its cast, plot, and trailers, read my Severance season 2 hub. Alternatively, read more of my exclusive coverage of the show's next entry in the section below.
You might also likeOne of the most common challenges we hear is that organizations believe connecting their legacy and modern systems is nearly impossible. Well, that’s not true.
Legacy systems, often seen as outdated and deeply embedded, contrast sharply with modern systems designed for flexibility, scalability, and innovation. Despite these differing perceptions, both legacy and modern systems remain crucial in today’s business environment. The real challenge? Bridging the gap between the two, enabling seamless integration and unlocking the full potential of each.
Challenges with legacy technologyLegacy systems can seem like the dinosaurs of the tech world: powerful but not agile. While they were once the backbone of an organization's IT, some companies now lean towards modernized approaches. However, overhauling infrastructure entirely may not always be feasible due to the costs and time involved. Integrating the modern with the legacy is challenging but achievable with the right approach.
Legacy systems are rarely straightforward. What may appear as a simple interface can hide multiple layers of interconnected components. Over time, various fixes can add complexity, making integration daunting. Understanding and addressing each layer is essential for successful integration.
The democratization of artificial intelligence (A)I has also led to many organizations rush to implement it into their operations. The evolution in AI and machine learning (ML) models presents a unique challenge when integrating these technologies with legacy systems. Outdated architectures can make this integration difficult, but it’s a necessary step for businesses looking to leverage AI's full potential.
Moreover, systems just a few years old can feel outdated. Integrating them with modern cloud architecture is essential for future-proofing operations. To do this successfully, your businesses must develop robust cloud strategies that facilitate smooth integration while safeguarding data, enabling legacy systems to interface effectively with the cloud.
Reengineering complex integration challengesAt the core of successful integration lies a deep understanding of both legacy and modern systems, and how they can be engineered to work together seamlessly.
The integration process begins with thoroughly analyzing your system architecture to identify the root of the problem. This is followed by discovery workshops to uncover integration challenges and pinpoint the specific business processes that need addressing. Collaboration is key during this phase; working closely with your team ensures that all stakeholders are aligned, and the integration solution is tailored to your unique needs.
Next, develop a business process map, which serves as a blueprint for how data and processes flow through the system. A proof of concept should then be developed to test the integration on a smaller scale, identifying any issues before full implementation.
Integration is not a one-time event but an ongoing process. Once the systems are integrated, continually monitor performance, gather feedback, and make necessary adjustments. This continuous improvement cycle ensures that the integrated system remains efficient, reliable, and adaptable to future changes.
Taking the retail industry as an example, with its fast-paced environment and complex technology stacks, it’s a prime example of how legacy and modern systems can be successfully integrated to enhance operations. Retailers often face the challenge of managing vast amounts of data across multiple touchpoints, from order management to payment processing. Integrating legacy systems with modern technology is essential for streamlining these operations and staying competitive in the market.
Pitfalls to avoid when integrating legacy and new systemsDon’t underestimate the complexity – Legacy systems often involve multiple layers of code, outdated programming languages, and undocumented dependencies. Assuming integration will be straightforward can lead to costly delays and project failures. Conducting a thorough assessment of the system architecture and anticipating potential challenges early on is crucial.
Inadequate testing –Rushing through this phase can result in significant issues down the line. Rigorous testing in a controlled environment ensures that any potential problems are identified and addressed before they impact live operations.
Poor data quality – Legacy systems house vast amounts of data, but the quality of that data can vary significantly. Poor data quality can severely impact the success of integration efforts, leading to inaccurate outputs and inefficient processes. Addressing data quality issues through cleansing and validation before integration is vital to ensure that the new system operates smoothly and effectively.
Organization resistance – Balancing legacy and the modern is as much about the people in your business as it is about the tech stack. Employees who are accustomed to legacy systems may be reluctant to adopt new technologies, fearing that it will disrupt their workflow or require extensive retraining. Engaging stakeholders early, providing adequate training, and clearly communicating the benefits of the integration can help mitigate this resistance and ensure a smoother transition.
We've featured the best IT management tool.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Hackers have been discovered stealing payment and personally identifiable information (PII) from customers of printing giant Avery for over half a year, experts have claimed.
Tens of thousands of people may have been affected by the incident affecting Avery Products Corporation, a major manufacturer of printable labels, name tags, dividers, and other customizable office supplies.
In a data breach notification letter sent to affected customers, Avery said it became aware of a “ransomware attack” on December 9 2024.
Files abused in the wild“Our investigation determined that an unauthorized actor inserted malicious software that was used to “scrape” credit card information used on our website between July 18, 2024, and December 9, 2024,” the letter reads.
The company added the scraper most likely exfiltrated people’s full names, billing and shipping addresses, email addresses and phone numbers, payment card information (including CVV numbers and expiration dates), and purchase amounts.
Social Security numbers (SSN), driver’s license numbers and other government-issued ID numbers, birth dates, and other sensitive personal information, were not taken, Avery said.
At first, the company did not see any evidence of in-the-wild abuse of the stolen information, but now it warns that it might have been the case.
“Initially, we had no evidence that any of the information was acquired (e.g., downloaded or exfiltrated from the website)," it added, "nor did we have any indication that the information had been used in any way – such as to make fraudulent purchases. We do not know if fraudulent charges are related to our website incident, but it now appears possible that payment-card (and other) information may have been acquired as we received two emails from customers who indicated that they incurred a fraudulent charge and/or phishing email. We received a number of similar reports this month.”
A separate report filed with the Maine Office of the Attorney General, Avery said that 61,193 people were affected by this attack. To mitigate the risks, the company is offering 12 months of free credit monitoring and identity theft protection services through Cyberscout.
Via BleepingComputer
You might also likeAmerican web hosting provider, ScalaHosting, released an update to SPanel allowing it to be used on shared hosting plans. The update gives shared hosting customers (and resellers) on any of the best web hosting providers more flexibility and choice on hosting panels for their hosting as cPanel increases prices for 2025.
SPanel has largely been viewed as one of the best alternatives to cPanel, and provides a variety of features for people wanting to move away from cPanel.
SPanel is developed by ScalaHosting to manage servers, websites, and email accounts efficiently. It offers enhanced security, resource management, and user-friendly tools. There are other panels out there but they have always struggled to compete with cPanel due to either being locked into a hosting provider or lacking features and value for money.
The final step in creating a viable cPanel/WHM alternativeChris Russev, CEO and Co-founder of ScalaHosting & SPanel.io, told TechRadar Pro, "Making SPanel available to shared hosting customers was the final step in transforming it into a full-scale cPanel/WHM alternative. What truly sets our control panel apart is its community-driven development approach." He added, " Instead of creating functionalities based on our preferences, we took a different path - allowing web developers and hosting users to shape it according to their real needs."
Russev went on to say, “At features.spanel.io, anyone can suggest new features and vote on existing ones. We prioritize and develop the user requests that receive the most votes, ensuring the platform evolves to meet the needs of its community."
Turn any self-managed hosting into fully managedA key feature is support directly integrated into the panel. Russev explained, "Another major difference is the 24/7 live technical support included with every SPanel license, making it the first-ever fully managed hosting control panel. This unique feature can transform any self-managed hosting service into a fully managed one.”
For existing ScalaHosting shared hosting customers the option to switch to SPanel will be offered between now and March 1st. Technical support can handle the migration seamlessly and without downtime. Those who want to remain with cPanel can do so.
You might also likeNvidia has released some more game benchmarks for its next-gen Blackwell GPUs, and we’ve caught a couple of results that don’t use DLSS 4 and its Multi Frame Generation (MFG) feature.
The trouble with the in-game benchmarks that use MFG – which is a big upgrade on Nvidia’s original frame generation, inserting more artificial frames to up the frames per second count – is that they aren’t a fair apples-to-apples comparison with RTX 4000 graphics cards using DLSS 3 frame generation (the latter can’t use DLSS 4 MFG, as it’s exclusive to RTX 5000). And that’s the case for most of the benchmarks aired thus far.
So, PC gamers are hungry to see generational comparisons that don’t use DLSS 4, avoiding this skewing of the results, and we’ve got two games where this has happened in this fresh benchmarking – reported by ComputerBase (via VideoCardz) – namely Horizon Forbidden West and Resident Evil 4.
Resident Evil 4 doesn’t use DLSS at all – but does have ray tracing turned on – and Horizon Forbidden West gives us a glimpse of rasterized (non-ray tracing) gen-on-gen performance, but with DLSS on (with no frame generation, though, crucially, so MFG is removed from the equation).
Going by the bars in the bar chart provided – estimating their relative lengths, as Nvidia doesn’t provide hard figures – it looks like the RTX 5090 is about a third (33%) faster than the RTX 4090 in these two games. However, there’s a much leaner 15% or thereabouts jump with the RTX 5080 versus the RTX 4080.
With the RTX 5070 and its 5070 Ti sibling, we’re looking at more like a 20% jump compared to their respective predecessors, again just in those two games.
(Image credit: Future) Analysis: Fake frames outcry part umpteen“See. Nvidia’s new graphics cards are a big con – without ‘fake frames’ they are going to be rubbish!”
Fake frames meaning frame generation, and this is the kind of vitriolic comment that’s popping up a fair bit following this revelation (and indeed before it, to be fair). But we do have to bear in mind that this is just a couple of games, in certain specific configurations.
Still, I concede the general point. On the one hand, Nvidia will obviously want to show off DLSS 4 and MFG as it’s a big leap forward (well, in theory at this point for all of us outside Team Green) for its GPUs. But on the other hand, it doesn’t feel great that most of the benchmarks shown thus far use MFG, and as noted, aren’t fair or direct comparisons with RTX 4000 graphics cards. These benchmarks show at least 30% to 40% gains (in previous airings), or a doubling of frames rates (as seen here with some games, and indeed a 2.9x gain with Indiana Jones and the Great Circle). Of course, this isn’t what you’ll see outside of games that support DLSS 4 with MFG.
Gamers would like to see a broader range of benchmarks, including pure rasterized performance without any DLSS – which we haven’t seen at all, as Resident Evil 4 above, the only game not to have DLSS turned on in Nvidia’s testing, is ray-traced performance.
Nvidia’s job is, at the prerelease stage, to stoke excitement for its graphics cards, obviously enough, but the slant towards that aim feels too skewed for gamers (and myself, I should add) in the way the RTX 5000 GPUs have been shown off so far.
Even so, the shakier-looking gen-on-gen performance of Horizon Forbidden West and Resident Evil 4 should not be used as a springboard to reach a conclusion along the lines of the (fake) fake frames rant I introduced this section with – that’s unfair, and going too far in the other direction
That said, to some extent, a lesser generational uplift is expected with Blackwell compared to Lovelace (RTX 4000), outside of the software plus AI tricks (neural texture compression) and the new trump card of MFG. After all, RTX 5000 is made on the same process as RTX 4000 (TSMC 4N, albeit an improved version, 4NP, for Blackwell), and so there’s no process drop to facilitate beefy generational gains there – that side of the equation relies purely on architectural enhancements.
Before we get too bogged down in the details here, one thing is clear enough – we need to wait for reviews before we get anything approaching a fully rounded picture of RTX 5000 performance. Which, of course, is always the case.
Still, there remains an inescapable feeling Nvidia is hiding something with the heavy slant towards MFG in this generation’s prerelease buildup – a lesson for Team Green to be more even-handed with its marketing efforts next time, perhaps. And of course, we don’t know how MFG is going to pan out in its execution and smoothness yet, either, for those PC games that do use the shiny new tech.
There are still a lot of unknowns, although all these questions will be answered soon enough. In theory the RTX 5090 review is coming next week, if the rumors prove to be correct.
You might also likeYes, it's finally official. The next Nintendo console will be called the Nintendo Switch 2, as was demonstrated in its new reveal trailer.
If you haven't managed to catch the trailer yet, you can check it out below. And don't forget to also head over to our Nintendo Switch 2 live page for up-to-the-minute news.
The branding looks very similar to that of the original Nintendo Switch, albeit with a big, bold number two slapped alongside it. This matches up perfectly with the countless Nintendo Switch 2 leaks and rumors over the last few months, but honestly I was hoping for something a little more exciting.
For me, Nintendo has always been ahead of the game when it comes to branding across console generations. The shift from the Nintendo DS to the Nintendo 3DS, for example, not only conveyed that the Nintendo 3DS was a new, more powerful console but also highlighted one of its most significant and exciting features.
Even the more conventionally named console successors, like the Super Nintendo Entertainment System, still felt unique. As an adjective, Super conveys a real sense of whimsy that, to me, just screams Nintendo.
The Nintendo Switch 2, in contrast, feels sterile, following the age-old naming scheme established by competitors such as Sony with the PlayStation. It does nothing to tell me why I should be excited, or make clear any of its interesting features, including the apparent ability to use the new Joy-Con as a mouse, for instance.
Still, it's not the end of the world. Excitement around the upcoming system seems high and I would be shocked if it's not a hit. I'm just hoping that whatever comes next has a moniker that's bit more thrilling.
You might also like...Every tech enthusiast has opinions about the latest devices and services, whether a shiny new iPhone or an update to Netflix – and now you can tell us exactly what you think. That's because TechRadar now has a commenting section – and we can't wait to hear what you have to say.
The goal for our comment section is for it to become the best place to chat about the topics raised in the article. Excited about a rumor? Tell us so. Got a question about a new device? Ask us? Want to debate the merits of Steam Deck vs Asus ROG Ally X? Go for it!
We only ask that you keep it respectful. We all like a good debate from time to time, but we never want that to stray into argument for the sake of it, and there's nothing wrong with agreeing with someone. That said, if a debate does arise we hope that you'll all approach it in a spirit of openness and tolerance.
Whenever someone joins the comment section here at TechRadar they should find them welcoming and insightful. We want to build a community that you’re proud to recommend to others and we can only do that together.
So how do you get started?Commenting on TechRadar is easy. Firstly, please read our community guidelines before commenting; these set out the baseline rules and expectations for commenting. After that, either click to sign in at the top-right of the page or below the article.
Once you’ve done this you can add your thoughts, and if your comment follows our guidelines it will be posted to the site.
In order to leave comments on TechRadar, all users must be registered and logged in to comment on stories, in accordance with our Terms of Use.
Please note that not all articles will have commenting available. If this is the case then do not try to discuss in other comment sections; they have been closed for a reason and may be a legal requirement.
Community guidelinesOur comment section is for thoughtful discussion of article topics. Together we’re developing a space where people share your passion and where you can enjoy conversations built on a foundation of respect and common interests.
Read the full guidelines
Our team is dedicated to providing quality content—please keep that in mind and keep disagreements respectful. Not every comment needs to be a debate – it’s fine to just talk! – but please approach all disagreements in a spirit of openness and tolerance.
If you feel like you’re getting too invested, take a deep breath and step away. You are never obligated to reply to a fellow commentator. If someone is breaching our rules or making the comments a less welcoming place then please use the report button so that our Community team can investigate further.
Whenever someone joins the comment section here at TechRadar they should find them welcoming and insightful. We want to build a community that you’re proud to recommend to others and we can only do that together.
Please read our guidelines below to understand what is allowed and how our moderation system works.
Community Guidelines
Note: If your post is removed, it's never a personal attack but a step to maintain a respectful and engaging community in line with our guidelines.
Our guidelines cannot cover every situation and our moderation team reserve the right to remove any comment at any time. The TechRadar team and Future PLC do not endorse the opinions and views shared by readers in our comment sections.
Pre-moderation: When dealing with a large volume of comments it’s impossible to handle them in real time. Comments may be pre-moderated due to their content, article settings or reports by other users. If you are finding yourself to be consistently pre-moderated then it is not targeted. How you are choosing to post is getting picked up by the system or reported by other users and can usually be fixed by following our guidelines or considering how others might read what you have posted.
Ban Appeals: If you wish to appeal a ban please contact Commentmoderation@futurenet.com. Please include the name of the site you are posting on, your username and respectfully explain why you believe the ban should be overturned.
Important informationWe’re looking forward to building our commenting community with you all. We’ll be actively working on the commenting system to make improvements and if you have any questions or feedback about the system, feel free to email us at Commentmoderation@futurenet.com!
A new Federal Trade Commission complaint has accused GoDaddy of misleading customers and failing to protect its web hosting services sufficiently.
The notice serves as a final warning to the company, which has been told to address security concerns that date as far back as 2018, however GoDaddy isn’t set to face any immediate consequences.
The list of mistakes reportedly made by the company has now been highlighted by the FTC in an official complaint, including violations of the FTC Act.
GoDaddy gets a telling off from the FTCThe long list accuses GoDaddy of failing to: “(a) inventory and manage assets; (b) manage software updates; (c) assess risks to its website hosting services; (d) use multi-factor authentication; (e) log security-related events; (f) monitor for security threats, including by failing to use software that could actively detect threats from its many logs, and failing to use file integrity monitoring; (g) segment its network; and (h) secure connections to services that provide access to consumer data.”
In the complaint, the FTC highlights some “major compromises” between 2019 and December 2022 which involved threat actors obtaining sensitive customer information. They include attacks in October 2019, March 2020, April 2020 and November 2021.
Redirections to malicious sites, data collection, mailer script infections, database attacks, user authentication vulnerabilities, outdated plugins and code, and DDoS attacks were all highlighted as potential implications of poor security in the FTC complaint.
Consequentially, GoDaddy has agreed to a settlement in which it is prohibited from making false or misleading security claims. It must also implement an information security program, conduct regular third-party compliance assessments and report security incidents to the FTC promptly.
GoDaddy sent us the following statement:
"GoDaddy has a long history of offering innovative products to our web hosting customers. We are focused on protecting our customers’ data and websites, and we invest significant resources in technologies, tools and talent to help safeguard systems and information. We are constantly improving our security capabilities and have already implemented a number of the requirements in the settlement agreement with the FTC.
"Notably, the resolution of this matter includes no admission of fault and no monetary penalties. We expect minimal financial impact associated with complying with the terms of the agreement with the FTC. We plan to continue to invest in our defenses to address evolving threats and help keep our customers, their websites and their data safe."
You might also likeNintendo has announced a hands-on experience for the Nintendo Switch 2, coming to select cities in April.
After months of leaks and rumors, the successor to the Nintendo Switch has finally been revealed alongside an in-depth trailer showcasing new hardware. As of right now, the Switch 2 has a launch window of 2025, but Nintendo is offering fans the opportunity to get a closer look at the console early with its Nintendo Switch 2 Experience this spring.
The hands-on events will be held in select cities in North America, Europe, Asia, and Oceania from April through June 2025. You can check out the specific dates for each region below.
Registration opens tomorrow from January 17 at 12 PM PT / 2 PM CT / 3 PM ET / 8 PM GMT until January 26 at 11:59 PM local time for each event location.
According to the website, "Tickets will be made available through a free-to-enter, randomly selected drawing" and those wishing to participate must sign up during the registration period for a chance to attend.
A Nintendo Account is required to enter and registrants will later be notified of the drawing results when sign-ups end.
Nintendo Switch 2 Experience dates:
North America
Europe
Oceania
Asia
Leica has announced the new Leica SL3-S, a follow-up to the high-resolution 61MP Leica SL3 – which we rated as Leica's best L-mount camera in our review – and a speedier package for hybrid shooters, capable of 24MP stills up to 30fps, and 6K open gate 10-bit video.
Many of its core specs are similar to those of the Panasonic Lumix S5 II / S5 IIX, which tops our list of best video cameras; the key differences are that the SL3-S is made in Germany, and offers a minimalist design and premium handling, plus a few unique features that impact the shooting experience.
You'd expect the SL3-S to feel premium – the full-frame mirrorless camera enters the market today for $5,295 / £4,500 (AU$ price TBC), which is roughly double what you'd expect to pay for the Lumix S5 II / S5 IIx. So is the new SL3-S worth it?
(Image credit: Leica) A long-standing alliance, but are these Lumix-inspired models worth it?Leica and Panasonic's alliance is well established, whether it's the Leica D-Lux 8 premium compact with Micro Four Thirds sensor, which has the same photo and video capabilities as the Lumix LX100 II, or the new full-frame L-mount SL3-S, which is a premium-feel Lumix S5 II / S5 IIx.
The latest camera, the SL3-S, only fuels rumors of a high-resolution Panasonic Lumix S1R II, which could be based on Leica's SL3 and would likely be around half the SL3's $6,995 / £5,920 / AU$11,690 cost.
So, if you can pick up a comparable Lumix model for around half the price, are Leica's red-dot cameras worth it? We're currently carrying out our in-depth review of the Leica SL3-S, so we can't comment directly. However, having used all the latest Leicas, including those with shared Lumix tech, there's definitely a case for going Leica, if you can afford it.
If you're a filmmaker who doesn't mind the rather plain Lumix S5 II / S5 IIx design and would rather save some cash, Panasonic is clearly better value. However, Leica cameras, such as the SL3-S, offer something unique, with minimalist layout and menus that simplify the shooting experience. I rated the Q3 as my favorite camera in 2023 – the premium compact is a joy to shoot with.
The SL3-S is also an IP54-rated camera with stylish all-metal body, packing a few features to further set it apart from the Lumix S5 II / S5 IIx. It's Leica's first SL-series camera equipped with content credentials, which debuted in the Leica M11-P, to protect the authenticity of digital images. It also accepts the faster CFExpress Type B memory card type in addition to SD, plus of course it has Leica's own Maestro processor and latest-generation phase-detection autofocus.
If you've only shot on Leica, the SL3-S will deliver speed that you've never experienced before, plus powerful video features such as 6K open gate video recording which enables vertical shooting in 4K without loss of quality. You'll be able to find out more in our full review, coming soon.
You might also likeThe Intel Arc B570 is the kind of graphics card I desperately want to love, but my tech-addled PC gaming heart belongs to another.
I'm not talking about the recently-announced Nvidia RTX 50 series GPUs (though we'll see about those in due time). No, I've fallen for the Intel Arc B580, easily one of the best graphics cards on the market thanks to its fantastic 1440p and 1080p gaming performance. And, unfortunately, its price is so good that it's hard to really recommend the Arc B570 in good conscience.
To be fair, the Intel Arc B570's $219 / £219 (around AU$350) MSRP arguably makes it the best cheap graphics card going right now simply by default. The next cheapest current-gen GPU (as of January 2025) from AMD (the Radeon RX 7600) and Nvidia (the GeForce RTX 4060) are roughly 20% to 25% more expensive, and it's still $30 / £30 (about AU$90) cheaper than the Arc B580.
But the problem is that despite some impressive specs for a card this cheap, and solid 1080p performance, for just a little bit more you can get a far more future-proofed GPU that will let you game without compromise at a higher 1440p resolution if you go for the Arc B580. Of course, that's assuming you can get that card at its normal retail price and not the jacked-up prices being charged online by profiteering retailers and third-party sellers.
(Image credit: Future / John Loeffler)But looking at the Arc B570 strictly on its merits, ignoring any external factors that are subject to change, and it's undeniable that the Arc B570 is one of the best 1080p graphics cards you can buy, especially considering its price.
At this price price point, you really have to compare the Arc B570 against cards that are several years old, like the Nvidia GeForce RTX 1060 to really put things in perspective. For example, the Nvidia GeForce RTX 3050 had a launch price $30 higher than the Arc B570, and even though I no longer have that card to compare Intel's latest against in a head-to-head matchup like I'd like, it really wasn't that good of a card to justify its price. Say what you will about the Arc B570, but in no universe can you say that you're not getting your money's worth with this GPU.
The heartbreak, then, is just that this card is simply overshadowed by its slightly more expensive sibling. If the Intel Arc B570 was priced at $199, it would be walking away with a definitive budget win. Hell, it still is, but with so little separating the B570 and the B580, pretty much every potential buyer is better off borrowing that extra bit of cash from a friend, sibling, parent, or even a stranger, and picking up the more powerful B580.
Intel Arc B570: Price & availability (Image credit: Future / John Loeffler)The Intel Arc B570 goes on sale in the US, UK, and Australia on January 16, 2025, for $219 / £219 (around AU$350).
This puts it at just $30 / £30 (about AU$90) cheaper than the Intel Arc B580 released in December 2024. That said, it is a good deal cheaper than the competing AMD Radeon RX 7600 and Nvidia RTX 4060, both of which run at least 20% more expensive for roughly the same performance.
I'll dig into the performance-per-dollar of this card in a bit, but I can tell you now that it's one of the best you find on a modern GPU, but it still comes in a distant second to the Intel Arc B580, making it hard card to recommend unless you are seriously strapped for cash or the B580 is being scalped at too high a price.
Ultimately, what matters is performance, and the top-line numbers for the Intel Arc B570 are impressive for a card at its price point, but it is almost exclusively a 1080p graphics card unless you make a lot of compromises for 1440p resolution that frankly aren't going to be worth it in the end.
In terms of creative workloads or AI, this isn't the card for you. I'd simply go for the RTX 4060 if you're really strapped for cash but need something more than a basic cheap gaming GPU.
It also has to be noted that its 1080p gaming performance isn't going to match its more expensive competition on a lot of games, so if you're looking for a graphics card that consistently gets you 60fps at 1080p on max settings without question, you might be better off with some of this card's more expensive competitors.
That said, on average across the several games in my testing suite, including titles like Cyberpunk 2077, F1 2024, Total War: Warhammer III, and others, this card did manage an average 1080p fps of 60. with an average minimum fps of 34.
Of course, it played better on some games more than others, and some games you won't be able to play at max settings for a playable frame rate (like Black Myth Wukong), but over the course of all the titles I played, it's more than passable for 1080p, with the occasionally playable 1440p experience.
For its price, it's genuinely excellent, especially for getting you a card capable of ray-traced gameplay, but for just a little bit more, you can get a lot better with the B580.
You are on a very tight budget
There aren't a lot of current-gen GPUs available at this price point, and even then, this is the cheapest so far.View Deal
You only care about basic 1080p gaming
If you are only looking for a cheap 1080p GPU with some modern extras like ray tracing, this card could be a compelling value at MSRP. View Deal
You want to game at 1440p
Despite its extra VRAM and decent memory bus, it just doesn't have the specs for consistent 1440p gaming without some serious compromises.View Deal
You have some wiggle room in your budget
If you are even slightly flexible in your budget, the Arc B580 is a much, much better option for not a whole lot more money.View Deal
Intel Arc B580
OK, so I'm going to be honest, the only other card you should be considering is the Arc B580. If you have any room in your budget, get this card instead. It's so much better for just a little more of an investment.
Read the full Intel Arc B580 review
How I tested the Intel Arc B570I tested the Intel Arc B570 using my newly revamped testing suite, including the latest 3DMark tests like Steel Nomad and Solar Bay, as well as the newest gaming benchmarks like Black Myth Wukong and F1 2024.
I used the Arc B570 as my primary GPU on my work PC, using it for basic productivity, creative, and moderate gaming in the office.
I've been testing GPUs for TechRadar for more than two years now, and have extensively benchmarked all of the latest GPUs several times over, so I am well aware of where this card's performance sits amongst its competition as well as how good of a value it is at its price point.
Popular VPN provider, ExpressVPN, has just taken a step further in its post-quantum transition, integrating the latest future-proof encryption technology across all its apps.
ML-KEM, one of the three quantum-resistant encryption standards released by the National Institute of Standards and Technology (NIST) in August last year, has replaced the Kyber algorithm on ExpressVPN's proprietary Lightway VPN protocol.
This move further consolidates the company's commitment to securing users' data against new threats posed by quantum computing. Already one of the best VPN services on the market, ExpressVPN was among the first to add post-quantum protection in October 2023. The new release now makes ExpressVPN an early adopter of the industry standard of post-quantum encryption.
From Kyber to ML-KEM: what's changed?"Encryption is always evolving, and so are we. When Kyber emerged as a trusted frontrunner in the race to secure the post-quantum world, we integrated it into Lightway to ensure your data stayed ahead of potential threats. Now, with ML-KEM – the newly minted NIST standard – we’re taking that protection even further," said Pete Membrey, Chief Research Officer at ExpressVPN, in the official announcement.
Membrey explains that ML-KEM is built on Kyber's foundation and is now the standard for cryptographic key exchanges, meaning exchanging information across a public network, like VPNs.
The new algorithm results from years of work, designed to defend against future quantum threats. ML-KEM has also managed to amass the consensus of leading cryptographers worldwide during this time. The most important, perhaps, its design integrates seamlessly into Lightway, with ExpressVPN promising that speed and reliability won't be affected.
"Lightway is built to evolve, and ML-KEM represents the next step in its journey," said Membrey, adding that the VPN protocol now uses NIST Security Level 5 key sizes for both TCP and UDP, "ensuring your connection is harder to break."
The next time you read about quantum computing being a threat to cybersecurity in the future, just know that we’ve got your back today and every day after. Find out more about Lightway's upgrade to ML-KEM: https://t.co/JsvvSZnqNr pic.twitter.com/ONSwqV2eRzJanuary 15, 2025
Upgrading to ML-KEM wasn't the only change for ExpressVPN and, well, its Lightway protocol.
ExpressVPN also decided to migrate from the Open Quantum Safe (OQS) team’s implementation of Kyber/ML-KEM to WolfSSL. For the less techie out there, WolfSSL is an open-source library used to secure digital communications between devices, among other things.
WolfSSL introduced a few advantages. For starters, it implements ML-KEM perfectly, Membrey explains, allowing Lightway to deliver solid performances across all platforms. It's also optimized for speed and power efficiency thanks to a lighter and simpler infrastructure. This will enable Lightway to keep delivering low-latency and high-speed connections
"Unlike experimental libraries, WolfSSL provides enterprise-grade support and regular updates, making it the perfect fit for Lightway’s ongoing evolution," Membrey added.
You can now benefit from ExpressVPN's new post-quantum protections simply by upgrading to the latest version of the VPN app. The update has already been rolled out across all major platforms.
The need for quantum-proof VPNsWith quantum computers believed to become fully operational as early as 2030, it's just a matter of time before current encryption methods become obsolete.
Today, VPNs often use RSA-based key exchanges to ensure that your connections remain private between you and the receiver. Quantum computers, however, can process computations that today's computers can't handle within minutes, potentially breaking current encryption protections.
This is where the NIST's quantum-safe standards come in. This work is crucial to support VPN providers, but also messaging apps, encrypted email, and any other tech company integrating some forms of encryption into their products.
While most VPN providers are still figuring out how to implement quantum-resistant algorithms into their software without losing performance, some services like ExpressVPN already offer such protection.
These are Mullvad VPN, Windscribe, and PureVPN. These providers are also in the process of replacing their current quantum-resistant protection with the new NIST standard.
"I am honored to be the first winner of the Mark Twain Prize recognized not for humor, but for my work as a riverboat pilot," O'Brien said in a release from The Kennedy Center.
(Image credit: Paul Zimmerman)