Error message

  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

Feed aggregator

New forum topics

What is the best PCIe NVMe SSD for my needs?

TechRadar News - Wed, 07/30/2025 - 03:02

PCIe NVMe (Peripheral Component Interconnect Express Non-Volatile Memory Express) SSDs represent a major advancement in data storage because of the speed and efficiency they deliver along with a direct connection to the CPU.

A quick comparison with older technologies like SATA SSDs or traditional HDDs, shows that improved read/write speeds allow tasks like booting an OS, launching applications, file transfers and large data processing to take place much faster. But there is another inherent advantage because NVMe is designed for flash memory and allows parallel I/O operations which drastically reduces latency, ensuring smoother performance for high-end applications or any task that requires real-time data access.

There are now multiple generations of PCIe NVMe SSDs available which can make choosing the most suitable solution challenging. The best approach is to look at the needs of the organization and align these with the different options. In this article, we will explore the differences between Gen 3, Gen 4 and the new Gen 5 SSD’s, to determine what can be expected from each one, and what an upgrade will deliver in terms of benefits.

Unpacking the different PCIe generations

PCIe is the interface standard that allows SSDs to connect to the motherboard. With every new generation of PCIe there is an improvement in bandwidth and speed. NVMe is a communication interface and driver that has been designed specifically for high-speed data transfer between the computer's solid-state drive (SSD) and its processor, leveraging the PCIe interface.

Looking at Gen 3, Gen 4 and Gen 5 SSD’s in terms of maximum bandwidth, maximum read speed and the applications for which they are most suitable, we can see clearly how they stack up:

PCIe Gen 3: This offers a maximum bandwidth of 16GB/s across 16 lanes, with up to 3,500MB/s sequential read speeds on NVMe SSDs. This generation is ideal for general computing needs.

PCIe Gen 4: This generation doubled the bandwidth of Gen 3 to 32GB/s across 16 lanes, enabling SSDs to reach sequential read speeds of over 7,000MB/s. For users who need support for PC and console gaming, or for content creation.

PCIe Gen 5: Once again this doubles the bandwidth, offering up to 64GB/s across 16 lanes. Gen 5 SSDs have set outstanding new standards in when it comes to achieving sequential read speeds exceeding 14,000MB/s. The newest generation is designed for high-performance workloads and PC gaming.

It’s important to note that theoretical speeds are calculated without external factors such as NAND speed, controller limitations and optimization for real world efficiency and cooling.

Each generational leap offers not just marginal improvements, but foundational shifts in data transfer rates, capacity, and interactions with modern CPUs and software. On top of this is continually improved efficiency, which further benefits high-performance workloads, or intensive compute activity such as gaming.

The PCIe NVMe adoption landscape

Most computers are still using Gen 3 or even SATA SSDs, which are common in older systems and budget builds. Adopting Gen 4 over Gen 3 provides the kind of performance boost that matters amongst users whose needs are specific and demanding, such as content creators, and professionals working with large amounts of data.

Gen 5 is much newer to the market and is currently more expensive but is sought after by users with data-intensive tasks. Gen 5 SSDs are suitable for supporting 8K video editing, top-end gaming and large-scale simulations, but with the rapid growth of AI, sales are being further boosted. Because they more than double the read and write speeds of Gen 4, they are being widely used for AI model training.

One of the advantages of PCIe Gen 5 is that it provides futureproofing. Users are investing in a technology that will remain relevant for many years, as software and hardware continue to demand higher performance. Even if there are some applications and hardware that are unable to utilize Gen 5 just yet, it is backwards compatible.

Is PCIe Gen 5 needed for gaming on PlayStation 5 or Xbox series X?

We are often asked this question, and it applies to other gaming systems too. PCIe Gen 5 SSDs are the best on the market, but that doesn’t mean that all users need them right now. The Sony PlayStation 5 and Xbox Series X are designed to support Gen 4 SSDs with a heatsink. A Gen 4 NVMe SSD with heatsink, will be more than capable of providing the speed required to optimize load times and gameplay performance on these games consoles.

For most gamers and everyday users, Gen 4 SSDs strike an ideal mix of speed and cost-effectiveness. Unless a user is tackling high-end tasks that require top-tier performance, Gen 4 drives are more than capable of handling the demands.

Generational standard improvements

Any upgrade needs careful consideration, and practical matters such as motherboard compatibility and thermal management needs are important. PCIe NVMe SSDs have evolved rapidly, and each new generation has raised the bar for speed and efficiency, but the first question should be, what do I need this for?

PCIe Gen 3 is a reliable choice for everyday computing, and Gen 4 steps up with noticeably faster performance; while at the top of the spectrum, PCIe Gen 5 delivers cutting-edge speeds for power users. Cost versus performance gain and long-term efficiency are key factors to add into the decision mix when upgrading or investing in this storage technology.

We've listed the best portable SSDs.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Hybrid cloud vs ransomware: why resilience starts with the right data strategy

TechRadar News - Wed, 07/30/2025 - 01:50

Ransomware has become a defining cybersecurity threat, increasing in scale, sophistication, and cost. In the UK alone, recent months have seen a wave of high-profile incidents disrupting everything from retail and logistics to public services – with consequences that reach far beyond the IT department.

Take the case of Marks & Spencer. A major breach in April 2025 exposed customer data, triggered widespread operational disruption, and is already slated to have cost the company £300 million – apart from the billion pounds or more the incident has wiped from the retailer’s stock market value.

At Co-op, a ransomware-linked outage halted critical systems. The Legal Aid Agency suffered a breach of sensitive legal and financial records. Meanwhile, even Harrods and logistics firm Peter Green Chilled weren’t spared. These are not isolated events - they’re signals of a broader shift.

The UK retail industry alone lost over £2.2 billion to shoplifting last year, according to the British Retail Consortium. And while theft may be an age-old problem, ransomware has become its digital cousin - often just as costly, but far harder to trace and recover from.

As businesses count the cost of downtime, data loss, and reputational fallout, one thing is clear: ransomware isn’t just a cybersecurity issue. It’s a business issue. In a digital world, ransomware has become nothing more than the cost of doing business online, just as shoplifting is to its bricks-and-mortar equivalent.

Realistically, the best cybersecurity efforts are more deterrent than panacea these days. And besides ensuring they do the necessary to secure the perimeter, the most logical thing for organizations to focus on is how to recover from the inevitable cyberattack - this, however, is a stumbling block for many businesses.

It now takes organizations an average of five weeks to fully recover from a cyberattack. In sectors where every hour offline can cost hundreds of thousands of pounds, that rate of loss is simply no longer sustainable. Yet, many still over-index on prevention, when it’s recovery speed, not perimeter defense, that ultimately defines the business impact of an attack. The question is no longer if you’ll be targeted, but how fast you can bounce back.

The reality of recovery: why time is the new risk factor

The longer data recovery takes, the more damage is done, and yet 72% of organizations take more than a week to restore operations after an attack. Manufacturing and healthcare average over six weeks.

These delays are not merely inconvenient. According to ITIC’s 2024 Hourly Cost of Downtime Report, more than 90% of mid-size and large enterprises say one hour of downtime now costs more than £220,000. Recovery timelines that stretch into days or weeks can translate into millions in lost revenue, disrupted services, and long-term damage to brand trust and shareholder confidence.

What hybrid cloud really means and why it matters

Hybrid cloud storage combines the performance of on-premises systems with the scalability and durability of the cloud. For instance, in hybrid cloud models, data can be cached locally for fast access, and every change can be stored in immutable cloud object storage in real time.

This architecture supports AI-readiness, multi-site collaboration, and petabyte-scale growth – but critically, it also bakes in ransomware resilience. Where traditional file servers and backups can be encrypted or deleted, hybrid cloud platforms maintain a centralized, tamper-proof record of every file version, stored securely and out of reach from attackers.

It’s why hybrid cloud storage is no longer a fringe technology – it’s becoming the standard for modern IT resilience.

Hybrid cloud’s secret weapon: file versioning and immutability

Ransomware attacks typically encrypt critical data and demand payment. More aggressive attackers now double down, leaking or selling sensitive data to increase leverage. But if your organization can roll back files to their clean state before the attack – in minutes – the threat loses its sting.

This ‘point-in-time’ recovery isn’t theoretical. A growing number of organizations are entrusting their file data to platforms that capture continuous, immutable snapshots, allowing them to restore affected files instantly. Some enterprises are now recovering in minutes, not weeks.

Legacy backup processes, with their reliance on daily or weekly windows, can’t keep pace with modern threats. That’s why many organizations are moving to continuous file versioning, with snapshot intervals as short as five minutes – enabling near-instant recovery, eliminating ransom payments, and removing the need for days of manual restoration.

IT teams no longer need to rebuild entire environments; they simply select a clean point in time and restore affected files with just a few clicks.

Recovery starts with readiness – and the right tools

Recovery speed matters, but containment is just as important. Modern hybrid cloud platforms often include built-in ransomware detection, monitoring for abnormal file activity, quarantining threats, and enabling surgical recovery.

It’s not surprising, then, that hybrid cloud users are 29% more likely to recover within a week than their non-hybrid peers. More importantly, they can isolate and restore only the affected regions or datasets – avoiding full outages and business-wide shutdowns.

But the technology alone isn’t enough. IT teams must be equipped with the right tools, processes, and authority to act fast when it matters. Hoping they’ll manage with legacy backups and wishful thinking is no longer tenable, and risks turning a contained incident into a company-wide crisis.

As one IT leader recently shared, having successfully restored operations after an attack: “The recovery was so fast, the conversation shifted entirely. It was no longer about recovering data – it was about cleaning affected endpoints and containing disruption.” In other words, recovery becomes a coordination exercise, not a catastrophe.

Cyber resilience gaps and how hybrid cloud bridges them

Despite ongoing modernization efforts, many organizations still face critical gaps in their ransomware response:

  • Data security and privacy concerns are significant barriers to adopting new technologies
  • There’s a stark lack of in-house skills to manage and secure transitions, and
  • Organizations themselves admit their data isn’t backed up, immutable, or easily recoverable

That’s a dangerous trio, and one that increases the risk of prolonged, expensive downtime.

Hybrid cloud platforms help close these gaps. They automate protection, centralize file versioning, and simplify recovery, even for lean IT teams. With immutable cloud snapshots and integrated monitoring, organizations can move from reactive crisis management to confident, controlled recovery.

Resilience is the real differentiator

Ransomware is now a fact of life – as inevitable as death and taxes, as the saying goes. And it’s becoming more targeted, more professional, and more destructive. The UK has already seen the consequences this year.

Hybrid cloud storage offers a practical and proven way to reduce both the risk and the impact of an attack. It turns recovery into a competitive differentiator – the difference between days of downtime and business as usual.

And let’s be honest: whether you’re protecting customer data or the availability of Percy Pigs, you can’t afford to get recovery wrong.

Check out out rankings of the best cloud backup platforms.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

From presence to purpose in the hybrid era

TechRadar News - Wed, 07/30/2025 - 00:41

In today’s hybrid workplaces, productivity is often mistaken for busyness. It sounds like clacking keyboards, looks like back-to-back video calls, and pings endlessly with notifications. But most of the time, these are just indications of activity, not achievement, and the pressure to be constantly visible has quietly overtaken the drive to be effective and productive.

But real work isn’t always ‘observable’. Some of the most valuable thinking happens away from the keyboard, in deep focus and genuine creative collaboration. If we want to drive better outcomes for both people and businesses, it’s time to shift our benchmark from hours logged to energy invested.

This isn’t a call for a new metric to be tracked and reported. It’s a mindset shift. It asks leaders to look inwardly, to examine where their teams’ energy is going and then consider whether it’s moving them forward as a company, or just simply keeping things in motion.

The rise of performative productivity

In many modern workplaces, especially where employees work remotely, it’s easy to confuse motion with progress. When people aren’t physically present, they often feel as though they the need to show they're working in other ways, such as being constantly available, joining every meeting or sending a steady stream of updates.

This creates a culture of performative productivity, where time and visible activity become substitutes for effectiveness. As a result, teams can end up trapped in a cycle of reactive work: attending unnecessary calls, replying to messages, jumping between tasks – all while struggling to find time to fit in the work that is truly impactful.

This constant context-switching can be both inefficient and mentally exhausting. It splits attention and reduces creative thinking and also obscures a deeper problem: we’ve designed systems that reward visibility instead of outcomes.

The irony is that some of the most impactful work is delivered quietly. It happens in moments of uninterrupted concentration and problem-solving that doesn’t always show on a calendar. If we continue to equate productivity with presence, we’ll risk overlooking the contributions that are actually driving long-term value.

The better benchmark for efficient work

Rather than counting hours, business leaders should be considering energy as a way of thinking about how work gets done. Working out which tasks require deep focus, which generate momentum and which ones are draining effort without creating any real outcome.

Looking at productivity through the lens of energy provides a more human, realistic perspective, and it considers that not every hour is equal. For example, an hour spent in concentrated thinking or constructive collaboration can be so much more valuable than three spent juggling distractions. It puts the emphasis back on quality of attention, outcomes and of the overall working experience.

Ultimately, employees don’t need another performance metric to hit. In reality, it’s about organizational awareness, where companies can assess whether they’re creating the right conditions for valuable work, and whether their systems and tools are enabling focus, or interrupting it.

When we prioritize energy, we’re more likely to invest in what really matters. This could be a case of rethinking meeting culture or simplifying processes. It also sends a message to employees that their business values their judgment and contribution, rather than just their availability.

Smarter systems and faster tools

Technology’s role is to make work more efficient, but if used incorrectly it often adds complexity. Endless notifications, multiple platforms to navigate and constant availability have created a noisy digital environment that negatively impacts energy rather than saving it.

The next generation of workplace technology, particularly artificial intelligence, should be an opportunity to reverse that trend. But the value will be in making space for better thinking, rather than just expecting faster output. Tools that summarize meetings or help prioritize tasks based on importance can be used to improve clarity and focus so there’s more time to work on less mundane tasks.

When time is spent on how technology is being used, it can reduce distractions and protect time for the work that really matters. But this requires a shift in how we adopt and design these systems, so that we’re moving away from a focus on volume and speed, and towards usefulness, clarity and wellbeing.

Ultimately the challenge is not in measuring energy, but more so respecting it, so that workflows, teams and tools are built around how people work best, not how fast they can respond. When that’s done, companies can reduce digital noise as well as create a space for better ideas, stronger collaboration and meaningful progress.

We've listed the best performance management software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Senate confirms Trump lawyer Emil Bove for appeals court

NPR News Headlines - Wed, 07/30/2025 - 00:25

The Senate confirmed former Trump lawyer Emil Bove as a federal appeals court judge as Republicans dismissed whistleblower complaints about his conduct at the Justice Department.

(Image credit: Jeehah Moon/Pool Bloomberg)

Categories: News

UCLA reaches $6 million settlement with Jewish students over campus protests

NPR News Headlines - Wed, 07/30/2025 - 00:16

The settlement comes after Jewish students and a professor argued their civil rights were violated when pro-Palestinian protesters blocked access to campus buildings during 2024 demonstrations.

(Image credit: Jae C. Hong)

Categories: News

The NTSB is set to hold a hearing on the DCA midair collision. Here's what to know

NPR News Headlines - Tue, 07/29/2025 - 23:01

The January midair collision near Ronald Reagan Washington National Airport, which killed 67 people, is the topic of a three-day investigative hearing by the National Transportation Safety Board.

(Image credit: Roberto Schmidt)

Categories: News

How to Watch Yokohama FM vs. Liverpool From Anywhere: Stream Preseason Friendly Soccer

CNET News - Tue, 07/29/2025 - 23:00
Arne Slot's Reds continue their preparations for the new season as their Asian tour hits Japan.
Categories: Technology

Today's NYT Mini Crossword Answers for Wednesday, July 30

CNET News - Tue, 07/29/2025 - 21:09
Here are the answers for The New York Times Mini Crossword for July 30.
Categories: Technology

Senators introduce resolution supporting prevention task force RFK Jr. may disband

NPR News Headlines - Tue, 07/29/2025 - 18:38

The task force makes recommendations for medical screenings that doctors' groups rely on and that guide what preventive services most insurance covers without copay.

(Image credit: Andrew Harnik)

Categories: News

The Manhattan gunman believed he had CTE. What does that mean?

NPR News Headlines - Tue, 07/29/2025 - 18:27

The gunman accused of killing four people in New York City suspected he had chronic traumatic encephalopathy, or CTE — a degenerative brain disease often associated with football players.

(Image credit: Jared Wickerham)

Categories: News

In a first, the Senate confirms a new CDC director

NPR News Headlines - Tue, 07/29/2025 - 17:52

Susan Monarez is the first director of the Centers for Disease Control and Prevention to require Senate confirmation. She's also the first director without a medical degree in more than 70 years.

(Image credit: Kayla Bartkowski)

Categories: News

Like with EVs, China could flood its domestic market with affordable surplus computer power in a desperate attempt to improve data center viability nationwide

TechRadar News - Tue, 07/29/2025 - 16:28
  • China’s cloud rescue plan aims to sell leftover CPU power from idle government data centers
  • Despite massive investment, many Chinese data centers run at only 20 to 30 percent capacity
  • Old CPUs cost money even when idle, China wants to monetize them before they expire

China is shifting its approach to managing excess data center capacity by proposing a new nationwide system to redistribute surplus computing power.

Following a three-year boom in infrastructure development, many local government-backed data centers now face low utilization and high operating costs.

As data centers get older and fewer new customers need their services, the Chinese government aims to revive the sector’s viability through a coordinated national cloud service that would unify computing resources across regions.

A coordinated response to growing inefficiencies

The proposal, driven by the Ministry of Industry and Information Technology (MIIT), involves building a network that allows surplus CPU power from underused data centers to be pooled and sold.

According to Chen Yili of the China Academy of Information and Communications Technology, “everything will be handed over to our cloud to perform unified organization, orchestration, and scheduling capabilities.”

The goal is to deliver standardized interconnection of public computing power nationwide by 2028.

The glut emerged from the “Eastern Data, Western Computing” initiative, which encouraged building data centers in less populated, energy-rich western regions to serve the more developed eastern economic zones.

But many centers, despite housing some of the fastest CPUs, now sit idle, and this is a serious concern because data center hardware has a definite lifespan.

Also, CPUs and their related components are costly to acquire and can become outdated quickly, making unused infrastructure a financial liability.

Data centers are expensive to operate, and cooling systems, electricity, and maintenance consume major resources.

So when high-performance workstation CPUs are left underutilized, they still incur ongoing expenses, which is very bad for business.

Utilization rates reportedly hover between 20% and 30%, undermining both economic and energy efficiency.

Over 100 projects have been canceled in the last 18 months, a stark contrast to just 11 in 2023.

Despite the setbacks, state investment remains substantial. Government procurement reached 24.7 billion yuan ($3.4 billion) in 2024 alone, and another 12.4 billion yuan has already been allocated in 2025.

The National Development and Reform Commission (NDRC) has stepped in to impose stricter controls.

New projects must meet specific utilization thresholds and secure purchase agreements before approval.

Also, local governments are now barred from launching small-scale computing infrastructure without a clear economic justification.

On the technical front, integrating CPUs from various manufacturers, including Nvidia and Huawei’s Ascend chips, into a unified national cloud poses a serious hurdle.

Differences in hardware and software architecture make standardization difficult, and the government's original target of 20-millisecond latency for real-time applications like financial services remains unmet in many remote facilities.

That said, Chen envisions a seamless experience where users can “specify their requirements, such as the amount of computing power and network capacity needed,” without concerning themselves with the underlying chip architecture.

Whether this vision can be realized depends on resolving the infrastructure mismatches and overcoming the technical limitations currently fragmenting China's computing power landscape.

Via Reuters

You might also like
Categories: Technology

A new executive order tackles causes of homelessness. Why are some advocates worried?

NPR News Headlines - Tue, 07/29/2025 - 16:19

President Donald Trump is aiming to fundamentally shift how the country manages homelessness with a new executive order he signed last week.

It calls for changes that would make it easier for states and cities to move people living on the street into treatment for mental illness or addiction, and in some cases, potentially force people into treatment.

Consider This: The Trump administration says the federal government has spent tens of billions of dollars on housing without addressing the root causes of homelessness. But critics worry this new executive order won't solve those root causes, either.

For sponsor-free episodes of Consider This, sign up for Consider This+ via Apple Podcasts or at plus.npr.org.

Email us at considerthis@npr.org.

(Image credit: Mario Tama)

Categories: News

SpaceX's Crew-11 Is Heading to the ISS on July 31. Here's How to Watch

CNET News - Tue, 07/29/2025 - 16:05
After the launch, the crew will be in orbit for 39 hours before docking with the International Space Station.
Categories: Technology

All PS Plus Subscribers Can Play Lies of P and Other Games This August

CNET News - Tue, 07/29/2025 - 15:52
PlayStation Plus subscribers can access these games starting Aug. 5.
Categories: Technology

Lovense adult toy app leaks private user email addresses - what we know, and how to stay safe if you're affected

TechRadar News - Tue, 07/29/2025 - 15:02
  • Researchers found a way to extract email addresses from Lovense user accounts
  • A mitigation was released, but allegedly it's not working as intended
  • The company claims it still needs months before plugging the leak

Lovense, a sex tech company specializing in smart, remotely controlled adult toys, had a vulnerability in its systems which could allow threat actors to view people’s private email addresses.

All they needed was that person’s username and apparently - these things are relatively easy to come by.

Recently, security researchers under the alias BobDaHacker, Eva, Rebane, discovered that if they knew someone’s username (maybe they saw it on a forum or during a cam show), they could log into their own Lovense account (which doesn’t need to be anything special, a regular user account will suffice), and use a script to turn the username into a fake email (this step uses encryption and parts of Lovense’s system meant for internal use).

That fake email gets added as a “friend” in the chat system, but when the system updates the contact list, it accidentally reveals the real email address behind the username in the background code.

Automating exfiltration

The entire process can be automated and done in less than a second, which means threat actors could have abused it to grab thousands, if not hundreds of thousands of email addresses, quickly and efficiently.

The company has roughly 20 million customers worldwide, so the attack surface is rather large.

The bug was discovered together with another, even more dangerous flaw, which allowed for account takeover. While that one was quickly remedied by the company, this one has not yet been fixed. Apparently, the company still needs “months” of work to plug the leak:

"We've launched a long-term remediation plan that will take approximately ten months, with at least four more months required to fully implement a complete solution," Lovense told the researcher.

"We also evaluated a faster, one-month fix. However, it would require forcing all users to upgrade immediately, which would disrupt support for legacy versions. We've decided against this approach in favor of a more stable and user-friendly solution."

Lovense also said that it deployed a proxy feature as a mitigation but apparently, it’s not working as intended.

How to stay safe

The attack is particularly concerning as such records could contain more than enough of sensitive information for hackers to launch highly personalized, successful phishing campaigns, leading to identity theft, wire fraud, and even ransomware attacks.

If you're concerned you may have been caught up in the incident, don't worry - there are a number of methods to find out. HaveIBeenPwned? is probably the best resource only to check if your details have been affected, offering a run-down of every big cyber incident of the past few years.

And if you save passwords to a Google account, you can use Google's Password Checkup tool to see if any have been compromised, or sign up for one of the best password manager options we've rounded up to make sure your logins are protected.

Via BleepingComputer

You might also like
Categories: Technology

Trump says his falling out with Jeffrey Epstein was over spa workers at Mar-a-Lago

NPR News Headlines - Tue, 07/29/2025 - 15:00

Trump has said he kicked Epstein out of his club for hiring workers away from Mar-a-Lago. When asked Tuesday if the workers included young women, Trump responded, "the answer is yes, they were."

(Image credit: Brendan Smialowski)

Categories: News

Today's NYT Connections: Sports Edition Hints and Answers for July 30, #310

CNET News - Tue, 07/29/2025 - 15:00
Here are hints and the answers for the NYT Connections: Sports Edition puzzle for July 30, No. 310.
Categories: Technology

Today's Wordle Hints, Answer and Help for July 30, #1502

CNET News - Tue, 07/29/2025 - 15:00
Here are hints and the answer for today's Wordle for July 30, No. 1,502.
Categories: Technology

Today's NYT Strands Hints, Answers and Help for July 30 #514

CNET News - Tue, 07/29/2025 - 15:00
Here are hints and answers for the NYT Strands puzzle for July 30 No. 514.
Categories: Technology

Pages

Subscribe to The Vortex aggregator