• Top 14 Social Engineering Attack Types And Their Subcategories
    www.forbes.com
    Text sign showing Social Engineering. Conceptual photo Psychological Manipulation Gain Access thru ... More Fraud.gettyHackers are not always technical wizardsoften, they exploit human nature. Social engineering attacks rely on psychological manipulation to trick people into revealing sensitive info or taking harmful actions. These scams often create a false sense of urgency or trust, bypassing even the strongest digital defenses.From phishing emails to deepfakes, tactics are evolving fastmaking it easier than ever for attackers to fool both individuals and businesses. What makes these threats especially dangerous is that they target the weakest link in your cybersecurity posture: human error.14 Social Engineering Attack Types Explained1) PhishingPhishing is one of the most common types of social engineering attacks. There are many variations of phishing attacks. Some of the most widespread ones include:Mass PhishingAttackers impersonate trusted sources to steal data. They send mass emails containing fake links or attachments, using fear or urgency to trick victims into revealing personal information.Spear PhishingSpear phishing takes a more focused approach. Attackers start by researching their targetgathering specific details such as the persons name, role, and other personal information. With this intel, they create tailored messages designed to appear familiar or trustworthy, increasing the chances that the victim will fall for the trap.CEO Fraud\BECThis attack involves a cybercriminal posing as a top executiveoften the CEOto deceive an employee, usually in finance or HR, into sending money or sharing sensitive data. It typically relies on urgent, convincing messages as part of a business email compromise scam.WhalingIn whaling attacks, the targets are high-level executivesoften referred to as whales. This form of phishing is explicitly aimed at influential figures like CEOs or politicians, with the goal of stealing sensitive information or getting them to approve large financial transactions.PharmingPharming is a more advanced type of phishing that silently redirects users to a fake website to steal their personal information. This is done by tampering with the victims computer settings or exploiting flaws in DNS servers. Unlike typical phishing, users do not need to click a linkthey are taken to the fake site automatically, where attackers can capture sensitive data like passwords or credit card numbers.SmishingSmishing is a type of phishing that uses text messages to deceive victims into giving up personal information. These texts often appear to come from trusted sources, like banks or well-known companies and may include links or urgent requeststaking advantage of the recipients trust to carry out fraud.VishingVishingshort for voice phishingis a scam where attackers use phone calls to manipulate people into sharing private or financial details. Posing as legitimate entities, like banks or government agencies, they rely on sounding convincing to earn the victims trust and extract sensitive information.2) PretextingPretexting is when an attacker makes up a fake story or situation to trick someone into giving away sensitive information or doing something that puts their security at risk. They usually pretend to be someone trustworthylike a bank representative or a company employeeto gain the victims confidence. The fake scenario is often designed to tap into the victims instinct to be helpful or follow authority. To make the lie more believable, the attacker frequently does some homework on the victim beforehand and uses persuasive, well-crafted tactics to manipulate them.3) BaitingBaiting plays on basic human impulsescuriosity, temptation, and the lure of getting something for nothing. Think of it as a trap disguised as a gift. An attacker might drop a mysterious USB drive in a parking lot with a label like Company Layoffs 2025 or post an irresistible download link offering a blockbuster movie for free. Whether it is a physical item or a digital file, the goal is the same: spark enough interest for someone to take the bait. The moment that curiosity wins and the bait is opened, hidden malware springs into actioninfecting the device, stealing information, or opening the door for deeper attacks.4) Tailgating \ PiggybackingTailgating, or piggybacking, is a social engineering trick where someone sneaks into a secured arealike an apartment building or gated communityby closely following a resident. They exploit everyday politeness, such as holding the door open for a delivery person or someone who says they forgot their key. By appearing harmless and blending in, these individuals bypass security and gain access to private spaces, putting residents and personal property at risk.5) Diversion TheftDiversion theft happens both online and offline, targeting deliveries. Online, attackers trick customers into changing shipping addresses or hijack accounts to reroute packages. They may intercept tracking updates to redirect goods before delivery. Offline, thieves pose as couriers, using fake uniforms or IDs to grab packages mid-route or steal them from doorsteps. In both cases, the goal is the same: deceive, divert, and steal goods during the delivery process for personal gain.6) Romance Scams \ Honey TrapsA romance scam or honey trap attack uses emotional or romantic manipulation to deceive victims. The attacker pretends to be romantically interested, often using fake profiles and flattery to build trust. Over time, they aim to extract money, personal details, or access to sensitive data. These scams often involve seductive messages, convincing backstories, and prolonged online communication designed to emotionally hook the target before exploiting them.7) ExtortionCriminals use fake extortion schemes to scare victims into paying. These scams rely on fear and threats, often convincing targets to act quickly. Many fall for them, fearing imagined consequences. Below are typical examples:ScarewareScareware is fake security software that tricks users into thinking their device is infected. Alarming pop-ups or fake scans create panic, urging victims to buy bogus antivirus tools or share personal info. It exploits fear and limited tech awareness.SextortionSextortion is blackmail using threats to expose sexual content. Attackers demand more explicit material or money, exploiting fear and shame. Victims are manipulated psychologically, with threats to share compromising content unless demands are met.DoxingDoxing is the act of publicly exposing someones personal detailslike home address, phone, email, or workplacewithout consent, often as a threat.DDoS ThreatsCybercriminals threaten Distributed Denial of Service attacks to disrupt personal websites unless payment is made.Reputation Damage ThreatsExtortionists threaten to ruin reputations with false or damaging info unless demands, like payment, are met.Extortion With Threat To KillExtortion scams involving death threats prey on deep fears. Scammers demand money, claiming theyll harm the victim or their family if payment isnt made. These threats are meant to pressure and terrify victims into compliance.8) Watering HoleA watering hole attack is a social engineering method where hackers compromise websites their targets frequently visit. By injecting malicious code into these trusted platformslike industry news sites or forumsthey infect users devices without direct interaction. This tactic exploits user trust in familiar sites, allowing attackers to silently breach systems of specific individuals or organizations.9) Quid Pro QuoQuid pro quo is a social engineering tactic where cybercriminals offer a benefit or favor in exchange for sensitive information or access. They may pose as IT technicians or service providers, offering help, quick fixes, discounts, or exclusive services. The attacker exploits the victims trust and willingness to reciprocate, using the offer to gain confidential data.10) TyposquattingTyposquatting, or URL hijacking, is a cybercrime tactic that exploits typing mistakes in website addresses. Attackers register domains nearly identical to popular sites, relying on users to mistype URLs. These fake sites often mimic the look and feel of the real ones, tricking users into entering login credentials or downloading malware.11) Social Media MentionsAttackers exploit the @username feature on social media to appear credible. By tagging real users or organizations, they make their posts seem trustworthy, tricking others into engaging with deceptive content or falling for scams disguised as legitimate interactions.12) HoaxesA hoax spreads false information to mislead targets, often using alarming messages to create fear or warn about fake threats, manipulating victims into unnecessary actions or panic.Tech Support ScamA well-known hoax is the tech support scam, in which fraudsters falsely claim the victims computer has a problem. They impersonate support staff from trusted companies to gain remote access or pressure the user into paying for bogus services they do not actually need.Charity ScamCharity scams often appear after disasters, pandemics, or during holidays, asking for donations to fake causes. Exploiting empathy, scammers trick people into acting emotionally, leading to unsafe actions and potential security risks.Lottery ScamScammers claim you have won money, then demand personal info or a fee to claim the fake prize.13) Dumpster DivingDumpster diving is a low-tech tactic where scammers rummage through household trash to find discarded documents containing sensitive information. Items like bank statements, medical bills, or personal letters can reveal names, account numbers, or login details. With this data, attackers can steal identities, access accounts, or commit fraud. Some home users unknowingly make themselves targets by tossing out unshredded papers, making proper disposal of personal information essential for protecting privacy and security.14) Shoulder SurfingShoulder surfing is a tactic where someone watches another person type or view sensitive information, like passwords, PINs, or credit card numbers. It does not always require close proximityattackers can use cameras, binoculars or even spy during video calls. This simple but effective method allows cybercriminals to gather valuable personal data without hacking.How Home Users Can Fight Back Against Social Engineering: 11 TipsHere is how home users can safeguard themselves from social engineering attacks:Shrink your digital footprint. Be thoughtful about what you post onlineespecially on social mediato make it harder for cybercriminals to gather personal details about you.Protect your devices with trusted antivirus tools. A strong antivirus program is your first line of defense against malware and other cyber threats.Stay calm and collected when online. Do not rushwhether you are clicking links, filling out forms, or responding to messages. A level-headed approach can prevent costly mistakes.Handle unexpected emails and links with care. Avoid opening attachments or clicking on links from unknown senders. Always double-check URLs and email addresses to spot fakes.Monitor your bank accounts and credit reports regularly. Fraudsters often go after your financescatching suspicious activity early can make all the difference.Avoid plugging in unfamiliar USB drives or gadgets. External devices can carry hidden malware. If you do not know where it came from, do not connect it.Keep your devices and accounts private. Never let anyone else log into your phone, computer, or online accounts.Use a VPN when browsing or shopping online. A Virtual Private Network adds a layer of encryption that helps shield your activity from prying eyes.Turn on Multi-Factor Authentication. Adding an extra step to your logins greatly improves your security.Watch for leaked personal data on the dark web. If your info ends up there, you will want to knowand actfast.Consider signing up for identity theft protection. These services can help detect suspicious activity and guide you through recovery if needed.
    0 Comments ·0 Shares ·89 Views
  • Microsoft Office apps will soon preload on Windows boot for faster launch
    www.techspot.com
    WTF?! Microsoft is rolling out a clever tweak to help Office apps launch faster on Windows. Dubbed "Startup Boost," this new feature quietly runs in the background as soon as you log in the operating system, preloading "performance enhancements" so apps like Word, Excel, and PowerPoint open more quickly when you need them. The announcement comes from the Microsoft 365 Message Center. The feature works by preloading parts of Office apps into memory after Windows startup and keeping them in a paused state until you actually launch them. If the system needs those resources back, it will automatically clear them. The goal is to shave off a few seconds of waiting when you open an Office app.However, there are a few caveats. Startup Boost won't run on every PC it requires at least 8GB of RAM and 5GB of free disk space to avoid slowing down your system. It also turns itself off when Energy Saver mode is enabled, so battery life won't take a hit.If you're not a fan of background processes, Microsoft allows users to disable the feature under Options > General in Office settings.Here's the catch, though: even if you turn it off, the next Office update will turn it back on. Microsoft confirmed that the installer will recreate the scheduled task each time it applies an update, meaning you'll have to disable it manually again if you prefer to keep it off.Here's the catch, though: even if you turn it off, the next Office update will turn it back on. // Related StoriesIf the feature sounds familiar, that's because Microsoft pulled a similar move with its Edge browser back in 2021. Edge's Startup Boost keeps background processes running at login to reduce launch times a trick that apparently worked well enough to justify bringing it to Office."Please note that Office Installer will automatically recreate all scheduled tasks when it applies an update, so users who disable this task will need to disable it again after an Office update," the company notes.The rollout begins in mid-May, with global availability expected by the end of the month. The feature will launch with Word first, with other Office apps to follow.All in all, if you spend a lot of time in Office, you might notice things feeling a bit snappier assuming your PC meets the requirements. And if not, at least Microsoft is giving you the option to opt out (even if you'll have to keep doing it after updates).
    0 Comments ·0 Shares ·91 Views
  • Dolbys future uncertain as free options grow
    www.digitaltrends.com
    Table of ContentsTable of ContentsRoyalties must be paidThe video format death matchAtmos under attackA free future?For decades, Dolby Labs has been the undisputed leader in audio and video formats. Even when people cant necessarily describe why a movie sounds better in Dolby Atmos or looks better on their TV when its presented in Dolby Vision, they know that these are the labels to look for when buying a new TV or soundbar, or when signing up for a streaming service like Netflix. Dolbys near ubiquity is a testament to its technological innovation and masterful marketing. Its hard to find another example of a company that makes no physical products, yet commands such instant brand recognition.But Dolbys days as the audio/video format king look increasingly numbered as companies ramp up their adoption of free alternatives.Recommended VideosThe lions share of Dolby Labs profits comes from licensing its technologies to manufacturers and service providers. The sale of every TV, streaming device, or soundbar compatible with content created using a Dolby format results in a small payment to the company. The exact amount per unit is known only to Dolby and its licensees, but cumulatively its worth hundreds of millions.Please enable Javascript to view this contentSince the majority of the consumer electronics industry is built on razor-thin margins, every penny counts. This has created incentives for players to band together to develop royalty-free alternatives to Dolbys formats.Dolby LabsIn the world of video, Dolby Vision is the most popular flavor of dynamic HDR a version of high dynamic rangetechnology that allows for more brightness than standard HDR, in addition to scene-by-scene grading of color and contrast.Its widely used on 4K UltraHD Blu-ray discs, and virtually every HDR-compatible streaming service includes titles presented in Dolby Vision.However, not long after Dolby Vision debuted, a consortium led by Samsung developed HDR10+, an open-source and royalty-free alternative. Adoption of HDR10+ was slow at first, but with Netflixs recent announcement that it intends to offer HDR10+ for all HDR titles by the end of 2025, Dolby Visions dominance is coming to an end.Its an especially important victory for Samsung. Not only did the Korean juggernaut spearhead the creation of HDR10+, it also steadfastly refused to license Dolby Vision for any of its TVs.Digital TrendsDolby Atmos is Dolbys other key content technology. Atmos is a spatial audio format that enjoys massive adoption across movies, TV shows, and most recently, music recordings under the Dolby Atmos Musicbrand.Since audio content, devices, and services far outnumber their video counterparts, and since Atmos has thoroughly beaten its main rivals (DTS:X and Sony 360 Reality Audio) in the adoption race, Dolby Atmos has become synonymous with spatial audio.A few years ago, Samsung decided to take aim at Dolby Atmos, hoping to repeat its HDR10+ success.This time, Samsung enlisted the support of Google and the Alliance for Open Media, whose members include tech heavyweights like Apple, Amazon, Microsoft, THX, and Nvidia. The result is a new open-source spatial audio format known formally as IAMF. But since thats a terrible label, IAMF was given a catchy new brand name at CES 2025. Going forward, it will be known as Eclipsa Audio.Open Media AudioEclipsa Audio, according to Samsung and Google, lets anyone create spatial audio for free. If youre a professional who uses industry-standard software like AVID Pro Tools DAW, there will soon be free Eclipsa plugins. But perhaps more importantly, any manufacturer can support Eclipsa royalty-free on their audio products.As with HDR10+, you can expect Eclipsa adoption to be slow at first. And, once again, Samsung is leading the charge on the hardware front. Its latest flagship soundbar, the HW-Q990F, is the first with Eclipsa compatibility.Despite these threats to Dolbys dominance, dont expect to see Dolby Vision or Dolby Atmos disappear anytime soon. These formats have a big head start, and as I indicated earlier, public awareness of Dolbys brands cant be underestimated. The presence of those brands on a products box (or the product itself) is now seen as a promise of audio or video quality, even when buyers dont have access to the content needed to experience the benefits those technologies offer. Thats a big reason for companies to continue licensing Dolbys tech.It will be years before folks associate that same level of quality with HRD10+ and Eclipsa, if in fact they ever do. And for that to happen, some serious marketing firepower will need to be employed. If Apple, for instance, were to back these technologies the way it has done so far with Dolby Vision and Dolby Atmos, it could be a game changer.Dolby is also a savvy player. Even as free alternatives threaten to erode its market share, its continuing to innovate. One of those innovations is Dolby Atmos Flex Connect, a new way for TV manufacturers to provide wireless speakers that can be placed anywhere in a room without the need for a connected soundbar and still provide an immersive experience.The good news is that competition appears to be doing what its supposed to do: increase choice for buyers while acting as both a carrot and a stick to drive the next set of technical achievements even if you may have to learn a few new tech terms before you buy your next TV.Editors Recommendations
    0 Comments ·0 Shares ·91 Views
  • Princess Mononokes U.S. distributer touts box office success in a time when technology tries to replicate humanity
    www.digitaltrends.com
    More than 25 years after its original release, Hayao Miyazakis action epicPrincess Mononokeis back in theaters across North America. The movie is currently playing on more than 330 screens and earned $1.2 million in previews ahead of its official release on March 28.That box office success led Chance Huskey, VP of distribution for GKids, to release a statement celebrating the films success.In a time when technology tries to replicate humanity, we are thrilled that audiences value a theatrical experience that respects and celebrates Hayao Miyazaki and Studio Ghiblis masterpiece in all its cinematic hand-drawn glory, Huskey said.PRINCESS MONONOKE | Official English TrailerThe statement makes oblique reference to ChatGPTs new image generation feature, which now allows paid subscribers to generate images in the style of Studio Ghibli animation. Those images quickly took over the internet, but many pointed out that Hiyazaki probably wouldnt be too pleased by these images, which were created by a computer aping the style of a human.Recommended VideosWhen Miyazaki was shown a demo of AI animation back in 2016, he was pretty clear about how he felt.Please enable Javascript to view this contentI am utterly disgusted. If you really want to make creepy stuff you can go ahead and do it. I would never wish to incorporate this technology into my work at all, he said, adding, I strongly feel that this is an insult to life itself.Miyazaki is an animator who draws much of his films himself and insists that each of his movies be hand-drawn. His films, which are about the destruction of nature and the battle for the human soul, are entirely contrary to the AI art that imitates his style.
    0 Comments ·0 Shares ·94 Views
  • Academy issues apology over its response to the attack on Oscar-winning Palestinian filmmaker Hamdan Ballal
    www.businessinsider.com
    Palestinian filmmaker Hamdan Ballal won an Oscar for the documentary "No Other Land" in early March. Hazem Bader/AFP via Getty Images 2025-03-29T17:55:26Z SaveSaved Read in app This story is available exclusively to Business Insider subscribers. Become an Insider and start reading now.Have an account? The organization behind the Oscars apologized over its response to an attack on a Palestinian director.Hamdan Ballal said earlier this week that he had been attacked by Israeli settlers.Hundreds of Academy members criticized the awards body over its initial statement on the incident.The Academy of Motion Picture Arts and Sciences has issued an apology for its response to an attack on the Oscar-winning filmmaker Hamdan Ballal following pressure from voting members.Hundreds of Academy members have criticized the awards body for not acknowledging Ballal by name in its initial statement shared after the Palestinian director said he had been attacked by Israeli settlers and detained by soldiers in the West Bank earlier this week.The Academy released the statement on March 26, condemning attempts at "harming or suppressing artists for their work or their viewpoints," but it did not directly name Ballal the co-director of "No Other Land," which took home the best documentary award at this year's Oscars.An open letter signed by more than 700 of the organization's voting members said that the Academy's statement "fell far short of the sentiments this moment calls for.""It is indefensible for an organisation to recognise a film with an award in the first week of March, and then fail to defend its filmmakers just a few weeks later," the letter read in part. It was co-signed by Mark Ruffalo, Javier Bardem, Olivia Colman, and Joaquin Phoenix, among other leading figures from the film industry. Hamdan Ballal shows his injuries after he was released from 20 hours in Israeli detention. Mamoun Wazwaz/Anadolu via Getty Images After a meeting with the Academy's board of governors, Academy CEO Bill Kramer and its president, Janet Yang, told members they regretted their failure to acknowledge the Palestinian Oscar winner.In a fresh statement released on Friday and shared with Business Insider, the Academy said: "On Wednesday, we sent a letter in response to reports of violence against Oscar winner Hamdan Ballal, co-director of No Other Land, connected to his artistic expression. We regret that we failed to directly acknowledge Mr. Ballal and the film by name.""We sincerely apologize to Mr. Ballal and all artists who felt unsupported by our previous statement and want to make it clear that the Academy condemns violence of this kind anywhere in the world," it continues. "We abhor the suppression of free speech under any circumstances."Ballal, along with filmmakers Yuval Abraham, Rachel Szor, and Basel Adra, received the Oscar for best documentary at the 97th Academy Awards ceremony in early March.The film, which was made between 2019 and 2023, documents the displacement of Palestinians from their homes in the Masafer Yatta area of the West Bank, focusing on the developing alliance between Adra, a Palestinian activist, and Abraham, an Israeli journalist. Basel Adra, Rachel Szor, Hamdan Ballal, and Yuval Abraham, pose with their awards. Mike Coppola/Getty Images The documentary struggled to find a distributor in the US, and producers eventually opted to self-distribute the film, which one New York Times critic described as "audacious and devastating."Since its theatrical release in January, "No Other Land" has grossed almost $2 million domestically.The Academy members' open letter said the film has done particularly well given that it was not "buoyed by wide distribution and exorbitantly priced campaigns" that others enjoyed."For 'No Other Land' to win an Oscar without these advantages speaks to how important the film is to the voting membership. The targeting of Ballal is not just an attack on one filmmaker it is an attack on all those who dare to bear witness and tell inconvenient truths," the letter read.Speaking to the Associated Press about the attack, Ballal said that he was detained alongside two other Palestinians after Israeli settlers attacked his village. He told the outlet that he was then blindfolded for more than 20 hours and that he heard those guarding him saying his name and the word "Oscar."The Israel Defense Forces has said that an Israeli and three Palestinians were detained on suspicion of hurling rocks, per the AP.Recommended video
    0 Comments ·0 Shares ·87 Views
  • I'm a father who never gave much thought to toxic masculinity. I'm still figuring out how to address the topic with my sons.
    www.businessinsider.com
    The author (not pictured) is teaching his sons to avoid the values of toxic masculinity. mixetto/Getty Images 2025-03-29T17:07:02Z SaveSaved Read in app This story is available exclusively to Business Insider subscribers. Become an Insider and start reading now.Have an account? As a father raising two sons, I know I need to address toxic masculinity.I model good behavior by showing them perseverance is more important than physical strength.I also teach my sons that they can openly express their emotions.I'm not sure where I was or what I was doing the first time I heard the term "toxic masculinity," but it seems to be everywhere these days.Aside from a brief period in middle school, I never gave much thought to masculinity. I just knew there were men in my life that I wanted to emulate, and they represented a whole range of masculinity. Some didn't know how to operate a hammer, while others could light a match off their pant leg.As a father, I'm now confronted with my views of masculinity, especially as I raise two sons ages 12 and 7.After doing some research, I learned there are three main beliefs of toxic masculinity: men should be strong, men should not be emotional, and men should be in power.While I certainly don't subscribe to these beliefs, I'm trying to model good behavior for my sons so that they don't prioritize toxic values.Belief 1: Men have to be physically strong and toughOn the surface, my sons are physically strong. The oldest can lift a garbage can full of raked leaves across a yard. The youngest breaks boards in taekwondo with his forehead.Instead of just celebrating those physical strengths, I'm trying to teach my children that perseverance is more important. I'm trying to show them that toughness can be better expressed through finding the will and the ability to keep moving forward in difficult situations.For example, recently, when I lost my job, I told them that while I was disappointed, I was confident I could survive this difficult time. I modeled toughness without expressing anger and frustration about the situation.Belief 2: Men should not express emotionsBoth boys display their emotions like stage actors trying to be heard in the nosebleed. Joy, frustration, excitement, and despair are displayed like Jim Carrey on an espresso binge.While emotions can be overwhelming for a parent, my partner and I allow the boys to experience those emotions without shame. We give our boys the safest space available for their emotions. When they express uncertainty about how to react to something, we provide the emotional space so they can figure it out for themselves.Because we allow them that safe emotional space, my wife and I sometimes forget their ages and expect them to function as older versions of themselves. After a particularly difficult time of high emotions, we, as the parents, have to step back and go, "Oh, yeah, he's only 7."Belief 3: Men need to be in powerThis one worries me the most. I've been around powerful and influential men all my professional life, and I know how awful some of them could be. I don't want my sons to grow up to be anything like them, craving power and domination.To ensure that doesn't happen, I'm starting with equality at home. Instead of relying on their mother to do household chores, I do various domestic duties like laundry and yard work without complaint.I don't expect my sons to start loving housework, but they must understand how hard it can be to keep a home habitable. They're catching on. My oldest can make a hot lunch, scrub toilets, and empty cat boxes while the youngest sweeps floors, vacuums vehicles, and occasionally dices vegetables for dinner.Beyond that, I try to point to their mother's achievements; she's a successful grade school teacher. I also highlight their grandmother, a retired surgical nurse with a history of fighting gender discrimination.I know I could be doing more, especially since they will be exposed to toxic masculinity across social media. I'm still unsure how to address every aspect of that challenge, but I've got a road map in place.Recommended video
    0 Comments ·0 Shares ·88 Views
  • Lanterns Director Teases the HBO Shows Tone and Sci-Fi Magic
    gizmodo.com
    The upcomingLanternsseries centers on John Stewart (Aaron Pierre) and Hal Jordan (Kyle Chandler) using their Green Lantern rings to investigate a mystery on Earth. Given theGreen Lanternmovie was mostly set on Earth, there was some concern among fans that the show was going to repeat that films mistakes. But according to director James Hawes, the show will do right by the heroes cosmic scope. In an interview with Collider, Hawes assured there wouldnt be any shortage of sci-fi magic amid its Nebraska setting. Its done in a world where you accept that these things just are, he said of Lanterns fantastical elements. As someone without much superhero experience before this project, he said he was bewitched by his foray into the genre. You always find a scene or two that you think, I cant wait to be beside the camera and the cast, directing this scene. You know this is something you have to take seriously, and that absolutely happened with Lanterns. Hawes continued with mentions of the shows humorits very particular and his episodes will hopefully be similar to his work onSlow HorsesandBlack Mirrorand its electric cast. Of Pierre and Chandler, he felt they brought charm and authenticity to their roles. These are two people you just want to hang out with. [.] You want to go on that journey. You get people who are just so classy and so busy inhabiting their roles, so you never doubt it. Theyre not on the outsidetheyre deep in those skins. Lanterns is scheduled to release on Max and HBO sometime in 2026. Want more io9 news? Check out when to expect the latest Marvel, Star Wars, and Star Trek releases, whats next for the DC Universe on film and TV, and everything you need to know about the future of Doctor Who.
    0 Comments ·0 Shares ·108 Views
  • China now has a 'kill mesh' in orbit, Space Force vice chief says
    www.livescience.com
    "That capability gap is significantly narrowed, and we've got to change the way we're looking at space, or that capability gap may reverse and not be in our favor anymore."
    0 Comments ·0 Shares ·95 Views
  • I made a spooky scary skeleton for my game
    v.redd.it
    submitted by /u/TeejlesDoodles [link] [comments]
    0 Comments ·0 Shares ·88 Views
  • Ghost of Yotei and The Witcher 4 Could Share an Advantage
    gamerant.com
    Both Ghost of Yotei and The Witcher 4 are breaking the mold of their predecessors by featuring female protagonists rather than the male protagonists their IPs are known for. Ghost of Yotei's predecessor, Ghost of Tsushima, was Jin Sakai, a male protagonist whose journey was one of forsaking honor in the name of responsibility. Ghost of Yotei, however, is introducing Atsu, a female protagonist whose story is one of "underdog vengeance," as Sucker Punch puts it. The Witcher 4, on the other hand, is replacing its longstanding male protagonist, Geralt of Rivia, with a female protagonist, Ciri, marking the first time the series has ever asked Geralt to step aside as the lead.
    0 Comments ·0 Shares ·78 Views