If you have a Google Pixel phone, make sure you’ve downloaded the latest security patch, as it includes several important updates that fix some potentially critical issues with your smartphone that you might not even be aware of.
There are a few high-level security flaws the patch solves, as well as one “critical” System vulnerability. According to Google, this flaw can be executed remotely (in combination with other bugs), and what’s more, it can be activated without any user interaction.
Yikes.
Google didn’t go into specifics about the hack beyond these details, but it doesn’t sound like one it would want to leave unaddressed.
(Image credit: Future)Beyond security improvements, Google has also seemingly solved a Back Button bug, which saw it not work at times for users.
Here's a demo of the back button randomly not working on Android 16.I grabbed a bug report and submitted it to Google engineering along with this reproduction screencast. Hopefully, they'll figure it out. pic.twitter.com/nEmifqQRvbJune 14, 2025
As you can see in the video above, users would swipe back on their Android 16 Pixel phone and nothing would happen – which isn’t ideal if you want to exit out of an app or conveniently return to a different screen.
It might have taken close to two months, but after beta users got the fix in July, the back button glitch should now be solved on all devices running Android 16’s stable version on their phone.
Are you ready to update?If you want to upgrade your Pixel device, the patch is rolling out now to all Pixel tablets and phones launched since the Pixel 6 and Pixel 6 Pro. Those two phones launched in 2021.
With automatic updates enabled, you might have already updated. However, to find it manually, you can head to your Settings app, then search for System Update and hit the Check for updates button to see if you’re up to date on your software.
If you have the August patch, then you’re all set, though it can take up to a week for updates to be made available to everyone – so if you are still on July’s update and see no option to install August’s, don’t worry, you’ll just have to wait a little longer for a fix.
You might also likeYou've been told a million times about how wonderful vinyl is, but you hear a lot less about CDs – and that's a good thing, because the relative lack of trendiness means that the cost of good-condition CDs is often a fraction of what you'd pay for the same record on vinyl. If, like me, you like saving money as much as you like listening to music, then a CD player is still a smart addition to your system.
Chinese firm Shanling makes some impressive CD players, including ones with integrated amplification. And it's just brought out a new player called the CD80 II (via Darko Audio), with high-powered headphone amplification for wired over-ears and IEMs – and with high-quality Bluetooth streaming so you can play music from your phone, computer or tablet.
(Image credit: Shanling)Shanling CD80 II: key features and pricingThe Shanling CD80 II takes the compact CD80 and delivers a new DAC system and a much improved CD loader too. The 4th-generation CD loader comes from the more advanced CD-S100 model, with an HD450 laser and a familiar tray-style mechanism.
Inside the ESS DAC of the previous model has been replaced by a Cirrus Logic CS43198, and it's teamed with dual SGM8262 headphone amps to drive the 3.5mm and 4.4mm balanced outputs. They deliver 215mW and 850mW into 32 ohms respectively, with an in-ear monitor-friendly output impedance of less than 1 ohm.
Bluetooth input is Bluetooth 5.0 with support for LDAC as well as the familiar AAC and SBC, and there's also a USB input with support for 2TB drives to play files, at hi-res audio quality up to PCM 384kHz and DSD256.
There's a lot going on here, but Shanling has managed to pack it into a very small 28 x 20 x 5cm case, so it's small enough for even the tightest setups.
The new Shanling CD80 II has a US recommended price of $359; other pricing hasn't been announced but in the UK the first-gen model had a typical price of £339.
You might also likeThe new KTC H27P3 monitor enters the market with a proposition which is hard to ignore: a 5K-resolution display priced at just $570.
The company is targeting professionals and general users who need a high-resolution panel without the premium price typically associated with 5K monitors.
The monitor is already available for preorder on KTC’s website, with shipping expected to begin in mid-August 2025.
Targeting creators with high specs at a modest priceThe H27P3, which we first flagged back in April 2025, offers a 5120×2880 resolution IPS display @60Hz, designed to cater to creative tasks such as photo editing, graphic design, and color-critical work.
It also includes a 2560×1440 mode @120Hz, allowing users to switch between high clarity and smoother motion, depending on their needs.
KTC describes this as a “dual-mode” experience, combining visual precision with responsive performance.
The panel is factory-calibrated with a Delta E of less than 2 and supports 100% sRGB, 99% Adobe RGB, and 99% DCI-P3.
These are specifications that align with the expectations for a monitor for video editing or digital content creation.
HDR400 certification, a 500-nit brightness rating, and a 2000:1 contrast ratio suggest support for high dynamic range content, at least on paper.
(Image credit: IT Home)In terms of design, the monitor features a thin-bezel frame and an aluminum stand offering tilt, swivel, pivot, and height adjustments.
At 3.75kg and with a compact form factor, it could also serve as a desktop-friendly portable monitor solution for professionals on the move or those working in tight spaces.
The stand is described as minimalist and sturdy, although its visual appeal and desk footprint may divide opinion.
Connectivity is broad, with DisplayPort 1.4, HDMI 2.0, USB-C with 65W charging, and two USB-A ports.
This gives the monitor flexibility to integrate with a wide range of setups, from desktop PCs and laptops to even gaming consoles.
A headphone jack is also included, and KTC ships the unit with the necessary cables and even a screwdriver.
Still, while the feature set is promising, it remains to be seen how the H27P3 performs in real-world scenarios - as specs like HDR400 and 8-bit+FRC can look good in marketing but often fall short in practice.
For now, the H27P3 stands out as an ambitious, budget-friendly business monitor that could appeal to a wide audience, provided it lives up to its claims once in use
You might also likeA new report from researchers at the University of Guelph and the University of Waterloo has uncovered a slight improvement in human detection of potential cybersecurity threats, but has warned we're still missing too many signs.
The small study of 36 participants (split equally between basic, intermediate and advanced PC users) had them face six separate software samples, half of which included malware, with varying levels of assistance.
The participants already successfully scored an 88% malware detection accuracy when faced with the potential threats, but this improved even more to 94% with the use of an enhanced Task Manager interface, showing details like CPU usage, network activity and file access.
Humans aren't too bad at detecting malwareDespite relatively strong detection, the researchers observed three key misconceptions.
Users commonly misinterpreted the UAC shield icon as a sign of security while also demonstrating a lack of understanding of digital certificates. They also noted an overthrust in file names and interface aesthetics.
Users' detection techniques varied depending on their experience levels, with basic users relying heavily on superficial cues like icons, typos and aesthetics.
Intermediate users were able to improve their accuracy with additional system data, but advanced users often took a backwards step by over-analyzing threats, leading to false positives.
In this particular test, the researchers were able to identify 25 separate secondary indicators users use to determine whether something is a threat or not, on top of four primary indicators.
One of the paper's limitations mentions the fact that the participants knew they were looking to identify malware – unsuspecting victims downloading files from the web aren't often so lucky to have a heads-up.
Still, the research is especially valuable for developers, who can use the findings to tweak their software "to eradicate misconceptions and improve security related interfaces and notifications."
You might also likeThe Army says that law enforcement was dispatched to the 2nd Armored Brigade Combat Team area at 10:56 a.m. local time and that the "shooter was apprehended at 11:35 a.m." No fatalities were reported.
(Image credit: Staff Sgt. Daniel Guerrero)