Error message

  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

Feed aggregator

New forum topics

Best Internet Providers in College Station, Texas

CNET News - Fri, 01/10/2025 - 14:15
College Station residents have access to several providers offering cable, fiber and fixed wireless options. Here are CNET's top picks.
Categories: Technology

Here's What You Need to Know if TikTok Does Get Banned in the US

CNET News - Fri, 01/10/2025 - 14:11
The law could go into effect on Jan. 19, so here's what could happen then and afterward.
Categories: Technology

This Hybrid Car Has a Personal EV Aircraft in the Trunk

CNET News - Fri, 01/10/2025 - 13:46
The setup would let you charge your own vertical take-off and landing vehicle in the trunk while you drive -- though it would all cost you almost $300,000.
Categories: Technology

X's Grok AI Chatbot Comes to iOS as a Standalone App

CNET News - Fri, 01/10/2025 - 13:30
The chatbot from Elon Musk's AI company was previously only available for users on X.
Categories: Technology

Mexican fintech company Miio exposed millions of files of sensitive customer data

TechRadar News - Fri, 01/10/2025 - 13:28
  • 2.9 million files from fintech firm Miio have been found exposed online
  • Researchers say the information has been unguarded for months
  • The company is yet to respond to the disclosure notice

Cybersecurity researchers have claimed financial technology firm Miio, which offers mobile telecoms and financial services to customers in Mexico, has suffered a huge data leak, exposing up to three million Know Your Customer (KYC) files.

Findings from Cybernews say the files were reportedly unguarded for at least several months, and contained files dating back to 2017, when the company was started. This strongly suggests that all Miio customers were impacted, with 2.9 million scans of various KYC documents found, including passports and IDs, driver’s licenses, and customer pictures.

There’s no evidence yet that malicious actors accessed the data, but since researchers were able to access it, it's probable others have too. Government issued identifications are incredibly valuable to attackers, since they can facilitate identity theft and fraud.

Unaware or unwilling

The researchers discovered the leak on September 12, 2024, and initial disclosure notice was sent on October 2, and the storage bucket has now been open for at least three months. Researcher’s attempts to reach out have been ‘met with silence’.

If the KYC documents have fallen into the wrong hands, attackers could open bank accounts, apply for loans, or take out credit cards in the victim’s names.

With the type of ID documents found and the customer selfies for verification, researchers warn that this could enable hackers to take over existing customer accounts, so victims should be ultra-vigilant in the coming months.

“In the context of Miio’s role as a telcobank serving a wide base of customers, such a leak would undermine trust in their ability to safeguard sensitive data, exposing their users to severe financial and personal risks,” the researchers said.

You might also like
Categories: Technology

The TikTok Ban Would Be Social Media’s First Extinction-Level Event

WIRED Top Stories - Fri, 01/10/2025 - 13:16
TikTok transformed everyday users into influencers and made entrepreneurs rich via its Shop feature. With the US ban looming, they could lose everything—and many don’t know where to go next.
Categories: Technology

Climate Change in 2024 Hit a Warming Mark Scientists Hoped We Would Avoid

CNET News - Fri, 01/10/2025 - 13:04
During the hottest year on Earth since records began in 1850, temperatures crossed a key threshold, rising more than 1.5 degrees Celsius above preindustrial levels.
Categories: Technology

Swing For a Hole-in-One With the PGA Tour on Apple Arcade in February

CNET News - Fri, 01/10/2025 - 12:56
Subscribers can play that, and other games, soon.
Categories: Technology

2024 was the hottest year on record. The reason remains a science mystery

NPR News Headlines - Fri, 01/10/2025 - 12:51

The official numbers are in: 2024 is the hottest year on record. Climate change is the main culprit. But there might be something else going on, too.

(Image credit: Selcuk Acar)

Categories: News

NATO wants to build an alternative satellite-based internet to be used in case of emergency

TechRadar News - Fri, 01/10/2025 - 12:33
  • Project HEIST wants to mitigate physical sabotaging of underwater cables
  • HEIST is expected to use laser optics rather than radio
  • Exabytes of data flow in more than 1 million Km of fiber across the globe

NATO is reportedly developing a satellite-based backup for global internet communications to address vulnerabilities exposed by recent undersea cable disruptions.

The project, known as HEIST (hybrid space-submarine architecture ensuring infosec of telecommunications), comes in response to the February 2024 incident when the cargo ship Rubymar, struck by a Houthi missile attack, dragged its anchor across the Red Sea floor, severing three fiber-optic cables.

A report by IEEE Spectrum claims these cables carried about a quarter of all internet traffic between Europe and Asia, forcing data rerouting and highlighting the fragile nature of global internet infrastructure.

Ready for testing

Over 95% of intercontinental internet traffic relies on undersea fiber-optic cables, with more than 1.2 million kilometers of them stretching across the planet. These thin cables lie unburied across deep-sea floors, making them vulnerable to accidental damage and sabotage.

The Rubymar incident was unintentional, but Western officials have evidence of deliberate undersea cable sabotage by state actors, such as Russia and China. NATO has already announced plans to prevent this happening in the future using undersea drones.

HEIST aims to address such threats by ensuring critical internet pathways remain operational even when fiber lines are compromised.

The project has two key objectives: to rapidly detect cable damage and precisely locate breaks, and to expand the capacity to reroute data through alternative channels, including satellites. The focus will be on diverting high-priority data to satellites, reducing reliance on vulnerable seabed cables.

The project will begin testing in 2025 at the Blekinge Institute of Technology in Sweden. Researchers from multiple countries, including the US, Sweden, Iceland, and Switzerland, will work to develop faster break detection systems capable of pinpointing damage with accuracy to within one meter.

The researchers will also explore satellite-based failsafes using higher-bandwidth laser optics, which can transmit far more data than current radio-based satellite systems.

While satellite throughput is limited compared to fiber, the HEIST team is focusing on expanding bandwidth through technologies like infrared lasers, already in use on Starlink satellites.

Although no single solution currently exists, NATO’s goal is to create a diverse and resilient network, ensuring secure global communications in emergencies.

You may also like
Categories: Technology

TikTok's US Supreme Court Trial: Here's What Was Said Today

CNET News - Fri, 01/10/2025 - 12:24
The Supreme Court appeal is Tiktok's last chance to stop a ban from happening through litigation. Here's what happened.
Categories: Technology

There is one major gift Trump is inheriting from Biden: A good job market

NPR News Headlines - Fri, 01/10/2025 - 12:08

U.S. employers added more than a quarter-million jobs in December, according to the Labor Department. That's far more than forecasters were expecting.

(Image credit: Anna Rose Layden)

Categories: News

Researcher nets major reward for finding Facebook bug able to unlock the gates to its internal systems

TechRadar News - Fri, 01/10/2025 - 12:02
  • A security flaw found in Facebook's ad platform has been fixed by Meta
  • The researcher who discovered the flaw was awarded a $100,000 bug bounty
  • The flaw allowed the researcher to effectively take control of a Facebook server

Meta has awarded cybersecurity researcher Ben Sadeghipour a bug bounty of $100,000 after he discovered a security vulnerability on Facebook’s ad platform in October 2024.

The flaw allowed Sadeghipour to run commands on the internal Facebook server which housed the platform, giving him control of the server.

According to Sadeghipour, the unpatched bug allowed him to hijack the server using a headless Chrome browser, which is a version of the browser users run from the computer’s terminal, to interact with Facebook’s internal servers directly.

Part of wider researcher

The flaw in the platform was connected to a server that Facebook used to create and deliver ads, which was vulnerable to a previously fixed flaw found in the Chrome browser, which Facebook uses in its ad system.

Sadeghipour told TechCrunch online advertising platforms are attractive targets because “there’s so much that happens in the background of making these ‘ads’ — whether they are video, text, or images.”

“But at the core of it all it’s a bunch of data being processed on the server-side and it opens up the door for a ton of vulnerabilities,” Sadeghipour said.

The researcher confirms he didn’t test out everything he could have once he was inside the server, although “what makes this dangerous is this was probably a part of an internal infrastructure.”

After reporting the vulnerability to Meta, the bug took just an hour to fix, Sadeghipour said, noting his discovery was part of ‘ongoing research on a specific application with a specific purpose’. This flaw in particular took him a few hours to identify, but Meta worked with him to quickly patch the bug and offered a bounty that was ‘way beyond’ expectations, he confirmed in a LinkedIn post.

Bug bounties have been on the rise recently, with Google drastically increasing its rewards for researchers who participate in the program, so security research is getting more lucrative.

You might also like
Categories: Technology

Watch FA Cup Soccer: Livestream Aston Villa vs. West Ham From Anywhere

CNET News - Fri, 01/10/2025 - 12:00
Graham Potter takes charge of the Hammers for the first time in this third-round cup clash.
Categories: Technology

Top 7 Disappointments of CES 2025

CNET News - Fri, 01/10/2025 - 11:58
CES 2025 is in the books and certainly had its share of innovative and eye-catching new products and concepts. But here's a look at some of things that we found lacking.
Categories: Technology

Even Trump Can’t Stop America’s Green Transition, Says Biden’s Top Climate Adviser

WIRED Top Stories - Fri, 01/10/2025 - 11:30
As he prepares to leave the White House, Ali Zaidi is sober about what’s coming—but says too much has already been built and invested for Donald Trump to undo it.
Categories: Technology

DJI's Mic Mini might just have met its match: the tiny, logo-free Hollyland Lark M2S wireless mic

TechRadar News - Fri, 01/10/2025 - 11:20
  • Hollyland announces new Lark M2S wireless mic to rival DJI and Rode
  • The M2S is available in twin mic / receiver kits for around $139 / £130
  • It features a discreet logo-free design and weighs just 7g

There's no shortage of wireless mics for content creators in 2025, with the likes of the DJI Mic Mini and the Rode Wireless Micro being two fine examples. So how is it possible to stand out in an increasingly saturated market? By being practically invisible, as it turns out.

The new Hollyland Lark M2S has a feature set to rival the DJI Mic Mini, but with the design that DJI wishes it had: the Lark M2S is not only the smallest wireless mic we've seen yet when clipped to clothing, but it's also logo-free.

A discreet and logo-free mic that weighs a mere 7g and won't tug on clothing is a win in our book – too many wireless mics are all too visible in content that floods social media. You only have to look at the wireless mics we use on TechRadar's TikTok channel to appreciate where we're coming from.

Just because the Lark M2S is tiny, however, that doesn't mean that Hollyland has scrimped on features. You get smartphone-beating 24-bit audio, a single push environmental noise cancellation feature (ENC), a 70dB signal-to-noise ratio (SNR), plus a 116dB maximum Sound Pressure Level (SPL).

Battery life is rated at up to 9 hours of record time for each mic, which can be extended with the charging case to 30 hours, while the maximum transmission range is up to 300m.

(Image credit: Hollyland)

Those are solid specs for a wireless mic system that can be purchased as a kit comprising two transmitters (mics), two receivers (a basic one for USB-C smartphones, the other for cameras with a 3.5mm port), plus charging case, for just $139 / £130 – that's a fraction less than the Mic Mini. Oh, and a Lightning cable for older iPhones is chucked in for good measure – see all that's included in the Max combo in the image above.

The best of both DJI and Rode in a single package?

So how does the Hollyland Lark M2S stack up against DJI and Rode rivals? Specs-wise, favorably; it seemingly offers the best of both the DJI Mic Mini and Rode Wireless Micro models in a single package.

You get a small receiver for use with smartphones and a larger one with manual controls for use with cameras. Rode's package only offers the former and only works with smartphones, while DJI's only offers the latter which works with both cameras and phones, but is clunky when attached to a smartphone.

We can't comment on the actual audio quality of the Lark M2S yet, but our in-depth review is in the pipeline so do look out for that. What we can say off the bat is that the Lark M2S design and overall package looks stellar. You can pre-order now using the links above.

You might also like
Categories: Technology

What is the flame retardant that planes are dropping on the LA fires?

NPR News Headlines - Fri, 01/10/2025 - 11:08

As fire crews and air tankers work to block the wildfires' explosive growth, images of red clouds of fire retardant falling onto trees are common. What is it — and what's in it?

(Image credit: David Swanson)

Categories: News

I saw wireless earbuds that are also air purifiers, and they claim to be a maskless mask

TechRadar News - Fri, 01/10/2025 - 11:05

Like many world-changing events, new applications of existing technology can lead to some interesting concepts. For example, the Covid-19 pandemic led to the creation of masks featuring audio components. The controversial Razer Zephyr had external speakers, will.i.am’s Xupermask Honeywell collaboration had earbuds, and there was Dyson's air purifier mask headphones combo, of course. Once the pandemic and the lockdown eventually concluded, the idea of wearable air filtration devices with audio listening devices sorta died down.

That idea is being revived by Ible, which is a Taiwanese company established in 2015. The company is currently known for its Airvida line of wearable air purifiers that look like necklaces. During CES 2025, Ible revealed its upcoming E1 & T1 wireless earbuds that double as air purifiers. Users can listen to music and take phone calls while the purifiers claim to provide something akin to an invisible face mask.

Though I couldn’t personally test the hardware, I visited the booth and spoke to the company, and both of these audio devices offer a different glimpse into the future where the best earbuds are health devices too, which is becoming more and more of a thing.

The Airvida E1 is a pair of neckband earbuds that merges a 25dB noise cancellation with an ionic air purifier. Weighing just 42 grams, the device is connected through Bluetooth and provides eight hours of battery life with audio or over 30 without audio. The device is charged through a magnetic charging cable. When it comes to sound quality, the E1 uses 13mm dynamic driver and multi-layer composite diaphragm for rich sound and robust bass.

Interestingly, it can be used as a desktop purifier when used with a stand, too. The Airvida Connect app offers real-time air quality updates, pollen alerts, and adjustable ion levels. This device claims to achieve 99.9% removal of PM2.5 particles and pollen allergens, along with 99.7% efficacy against Influenza A and SARS-CoV-2 viruses.

(Image credit: Future)

Meanwhile, the T1 looks to be the world’s first wearable ionic air purifier integrated with noise-cancelling earbuds. Like the T1, the audio device hopes to provide 99.9% protection against air pollutants, allergens, and viruses, while delivering superior sound quality with active noise cancellation and Bluetooth 5.3 connectivity.

Weighing 9.5g per earbud, they're certainly hefty – something like AirPods Pro 2's buds weigh around 5g – and the battery life is fairly low at five hours of usic (or around 24 hours for air purification). The USB-rechargeable charging case offers three charges for extended use.

Still, 9.5g is light (and small) for an air-purifying solution, so we can forgive that. Generating over 30 million negative ions per cm³, it promises to effectively clean the air around the facial area. It comes with replacement earbud tips in three sizes, and two color options: Space Black and Pearl White. Aiming to be serviceable for various environments, it operates efficiently in temperatures from 0°C to 40°C and relative humidity of 30–85%.

Both E1 and T1 earbuds blend innovative air purification with advanced audio technology, and I hope they can live up to their claims and prove useful for people with respiratory issues, allergies or those attempting to avoid germs – and that the music can hold up too. What's the point in breathing more clearly if the sound doesn't put you in the mood to belt out some tunes?

You might also like…

TechRadar will be extensively covering this year's CES, and will bring you all of the big announcements as they happen. Head over to our CES 2025 news page for the latest stories and our hands-on verdicts on everything from 8K TVs and foldable displays to new phones, laptops, smart home gadgets, and the latest in AI.

And don’t forget to follow us on TikTok and WhatsApp for the latest from the CES show floor!

Categories: Technology

This devious macOS malware is evading capture by using Apple's own encryption

TechRadar News - Fri, 01/10/2025 - 11:05
  • Security researchers from Check Point Research recently find new variant of Banshee malware
  • The new variant uses encryption that allows it to blend with regular macOS operations
  • The campaign went unabated for two months

Cybersecurity researchers from Check Point Research recently uncovered a new version of the Banshee infostealer, capable of bypassing Apple’s built-in malware protection to grab sensitive data.

Banshee is a macOS-focused malware which emerged in mid-2024, designed to extract sensitive information such as system details, browser data, and cryptocurrency wallet information. Initially sold as a stealer-as-a-service for $3,000 per month, its source code was leaked in November 2024, leading to its broader dissemination.

Despite the operation being shut down, Banshee continued to live, being both developed, and distributed, by various hacking collectives.

Distribution through GitHub

Now, the new version seems to be somewhat more dangerous, and is most likely built by a different threat actor. According to the researchers, Banshee now uses string encryption from Apple’s XProtect, allowing it to blend with normal device operations and avoid being detected. XProtect is macOS's built-in antivirus system that identifies and blocks known malware using regularly updated signature-based detection.

Furthermore, it no longer avoids Russian users, which could signal that it was built by a different team. This latest campaign seems to have started in September 2024, and continued unobserved for roughly two months.

While it is impossible to know exactly how many devices are infected with Banshee, we do know that it’s being distributed via GitHub repositories. Threat actors are impersonating legitimate software, and are betting on software developers being careless when downloading content from the open-source platform.

Check Point says that the same operators are also going after Windows users, but through Lumma Stealer, not Banshee. The researchers also stressed that macOS continues to gain popularity, thus becoming an increasingly attractive target.

“Despite its reputation as a secure operating system, the rise of sophisticated threats like the Banshee MacOS Stealer highlights the importance of vigilance and proactive cyber security measures,” they concluded.

Via BleepingComputer

You might also like
Categories: Technology

Pages

Subscribe to The Vortex aggregator