• NEWS.XBOX.COM
    Dynasty Warriors: Origins Truly Reinvents a Decades-Long Series
    Dynasty Warriors is comfort food for me Omega Forces long-running series tells the same kingdom-spanning tale in with each instalment, always aiming to deliver on its 1v1000 combat conceit with each new game. Discovering the series with Dynasty Warriors 2, Ive returned again and again over the last 25 years to see this huge cast of characters play their part in the same epic tale developing favorites (hello, Guan Yu) along the way by sheer weight of time spent with them.So it was with some curiosity that I started playing the 10th mainline instalment. The title tells you what you need to know Dynasty Warriors: Origins is going back to basics, a reinvention that goes beyond the incremental changes fans have been used to from most new versions of this series.For a start, Origins tells a deeper, more focused story in fact only telling the first half of the tale were used to, but with far more detail added along the way. Dynasty Warriors games series typically begin with players crushing the Yellow Turban Rebellion, a battle that sets the Romance of the Three Kingdoms the semi-fictionalized historical tale of ancient China the games are based on in motion. But Origins first chapter shows us the Yellow Turbans faction forming, becoming corrupted, and then being taken down. Its an origin story for, well, the series traditional origin story.As part of that, were also introduced to a brand new protagonist (who you can name); an amnesiac travelling warrior with a past thats slowly revealed as you play. Youll spend the majority of Dynasty Warriors: Origins playing as this character perhaps the biggest marker that this game is making a major change. Where Dynasty Warriors games have previously had players pick from dozens of officers from across the many factions in this tale, youre now leading this single character through a story that puts you on path to meet those familiar faces (some of whom will be playable along the way).Its a bold choice, worthy of a game looking to shake things up, and it certainly lends a different feeling to proceedings. While Origins drops the open world format of 2018s Dynasty Warriors 9, having a single main character allows the developers to craft a more mutable Story Mode. Rather than moving from battle to battle with cutscenes in between, youre now placed in an overworld between main levels, able to explore, find secrets, tinker with your loadout, meet and befriend officers, and take part in skirmishes to level up.All of this speaks to a renewed focus on how combat works in Dynasty Warriors. While fans will be pleased to know that the bones of its classic hack n slash action remain in place, theres far more nuance on show here. Blocks, parries, and evades are far more necessary when taking on enemy bosses, miniature puzzle elements have been introduced to certain battles, and customizable Battle Art special abilities let you tinker with your playstyle for every weapon type. This feels less like an experiment for an experiments sake, and more like a confident step forward Im still getting the familiar feeling of being, effectively, a 2nd-Century superhero, but the added level of thought required for each one-on-one fight along the way is meaningfully different.And its that balance between old and new that defines Origins approach this is recognizably Dynasty Warriors, but with new ideas slotted in place among that familiar framework. To put it another way its still my comfort food, but with new ingredients.DYNASTY WARRIORS: ORIGINSKOEI TECMO AMERICA$69.99Pre-orderPre-order bonus: Protagonist's costume "Nameless Warrior Garb"A "Wo Long: Fallen Dynasty" collaboration costume that can be worn in the game.Note: Please be aware that this bonus may become available for purchase or for free at a later date.Early purchase bonus: Early Works Soundtrack Collection (Digital Edition)A soundtrack featuring a total of 191 original music tracks from the series, including background music from titles spanning from "DYNASTY WARRIORS 2" to "DYNASTY WARRIORS 5 Empires," as well Omega Force's first title, "DYNASTY WARRIORS." The soundtrack can be played by accessing the main menu, Special Content, and then Music, and selecting "Early Works Soundtrack Collection."Note: The early purchase bonus will be available for those who pre-order or who purchase the game by January 30, 2025. The soundtrack includes content that is also available for purchase on music streaming sites. Please be aware that the bonus may become available for purchase or for free as add-on content for this title at a later date.Become immersed in exhilarating battles as a nameless hero in the Three Kingdoms. The most exhilarating action in the series' historyTension-filled battlefields where you clash against massive armies stretching as far as the eye can see. How will you handle the onslaught of enemies? Your military prowess will serve you well as you fight in tandem with your allies in tactical battles unique to the "DYNASTY WARRIORS" franchise and experience the most exhilarating action in the series' history. A new version of the Three Kingdoms from the perspective of an original protagonistThe story of the Three Kingdoms is set in the vast mainland of China where the convictions of different heroes intersect. Experience this magnificent and alluring world through the eyes of the original protagonist, a "nameless hero."Note: The product "DYNASTY WARRIORS: ORIGINS Digital Deluxe Edition" is also being sold. Please confirm that you have selected the correct product before making your purchase.Note: Images are taken from an in-development build. The final product may differ from the footage shown.Note: If an add-on finishes installing while the game is running, it will become available after you return to the title screen.
    0 Comments 0 Shares
  • THEHACKERNEWS.COM
    THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [13 January]
    The cyber worlds been buzzing this week, and its all about staying ahead of the bad guys. From sneaky software bugs to advanced hacking tricks, the risks are real, but so are the ways to protect yourself. In this recap, well break down whats happening, why it matters, and what you can do to stay secure.Lets turn awareness into action and keep one step ahead of the threats. Threat of the WeekCritical Ivanti Flaw Comes Under Exploitation A newly discovered critical security vulnerability in Ivanti Connect Secure appliances has been exploited as a zero-day since mid-December 2024. The flaw (CVE-2025-0282, CVSS score: 9.0) is a stack-based buffer overflow bug that could lead to unauthenticated remote code execution. According to Google-owned Mandiant, the flaw has been exploited to deploy the SPAWN ecosystem of malware the SPAWNANT installer, SPAWNMOLE tunneler, and the SPAWNSNAIL SSH backdoor as well as two other previously undocumented malware families dubbed DRYHOOK and PHASEJAM. There is a possibility that multiple threat actor groups, including the China-linked UNC5337, are behind the exploitation. Top NewsMicrosoft Pursues Legal Action Against Hacking Group Microsoft said it's taking legal action against an unknown foreign-based threat-actor group for abusing stolen Azure API keys and customer Entra ID authentication information to breach its systems and gain unauthorized access to the Azure OpenAI Service with the goal of generating harmful content that bypasses safety guardrails, as well as monetizing that access by offering it to other customers. It accused three unnamed individuals of creating a "hacking-as-a-service" infrastructure for this purpose.Exploitation Attempts Recorded Against GFI KerioControl Firewalls Threat actors are actively attempting to exploit a recently disclosed security flaw impacting GFI KerioControl firewalls that, if successfully exploited, could allow malicious actors to achieve remote code execution (RCE). The vulnerability, CVE-2024-52875, is a carriage return line feed (CRLF) injection that could result in a cross-site scripting (XSS) attack. Attempts to exploit the vulnerability commenced around December 28, 2024.Updated EAGERBEE Malware Targets the Middle East Internet service providers (ISPs) and governmental entities in the Middle East have been targeted using an updated variant of the EAGERBEE (aka Thumtais) malware framework. The new variant is capable of deploying additional payloads, enumerating file systems, and executing command shells. It can also manage processes, maintain remote connections, manage system services, and list network connections.Southeast Asia Comes Under Mustang Panda Attacks Several entities in Mongolia, Taiwan, Myanmar, Vietnam, and Cambodia have been targeted by the China-nexus Mustang Panda threat actor to deliver a customized version of the PlugX backdoor between July 2023 and December 2024. The attacks involve the use of Windows Shortcut (LNK), Windows Installer (MSI), and Microsoft Management Console (MSC) files, likely distributed via spear-phishing, as the first-stage component to trigger the infection chain, ultimately leading to the deployment of PlugX using DLL side-loading techniques.U.S. Government Formally Unveils Cyber Trust Mark The U.S. government announced the launch of the U.S. Cyber Trust Mark, a new cybersecurity safety label for Internet-of-Things (IoT) consumer devices that details the support period as well as the steps users can take to change the default password and configure the device securely. Eligible products that come under the purview of the Cyber Trust Mark program include internet-connected home security cameras, voice-activated shopping devices, smart appliances, fitness trackers, garage door openers, and baby monitors. Trending CVEsYour favorite software might be hiding serious security cracksdont wait for trouble to find you. Update now and stay one step ahead of the threats!This weeks list includes CVE-2024-8474 (OpenVPN Connect), CVE-2024-46981 (Redis), CVE-2024-51919, CVE-2024-51818 (Fancy Product Designer plugin), CVE-2024-12877 (GiveWP Donation Plugin and Fundraising Platform), CVE-2024-12847 (NETGEAR DGN1000), CVE-2025-23016 (FastCGI fcgi2), CVE-2024-10215 (WPBookit plugin), CVE-2024-11350 (AdForest theme), CVE-2024-13239 (Drupal), CVE-2024-54676 (Apache OpenMeetings) CVE-2025-0103 (Palo Alto Networks Expedition), CVE-2024-53704 (SonicWall SonicOS), CVE-2024-50603 (Aviatrix Controller), CVE-2024-9138, and CVE-2024-9140 (Moxa). Around the Cyber WorldPastor Indicted for "Dream" Solano Fi Project Francier Obando Pinillo, a 51-year-old pastor at a Pasco, Washington, church, has been indicted on 26 counts of fraud for allegedly operating a cryptocurrency scam that defrauded investors of millions between November 2021 and October 2023. Pinillo is said to have used his position as pastor to induce members of his congregation and others to invest their money in a cryptocurrency investment business known as Solano Fi. He claimed the idea for the scheme had "come to him in a dream." According to the U.S. Department of Justice (DoJ), "rather than investing funds on victims' behalf as he had promised, Pinillo defrauded victims into making cryptocurrency transfers into accounts he designated, then converted the victims' funds to himself and his co-schemers." Pinillo has also been accused of convincing investors to recruit other investors in exchange for additional returns for each new investor they recruited. The fraud charges carry a maximum sentence of up to 20 years in prison. The defendant is estimated to have targeted at least 1,515 customers in the U.S., netting him $5.9 million in illicit profits. The development comes as a Delaware man, Mohamed Diarra, pleaded guilty to his participation in a widespread international sextortion and money laundering scheme from May 2020 and through December 2022. "Diarra conspired with co-conspirators in Cte d'Ivoire who sextorted victims and utilized a network of Delaware-based 'money mules,' including Diarra, to assist with laundering the victims' illegally obtained funds," the DoJ said. He faces a maximum penalty of 20 years in prison. In recent months, the DoJ has also prosecuted Robert Purbeck; Kiara Graham, Cortez Tarmar Crawford, and Trevon Demar Allen; and Charles O. Parks III in connection with extortion, SIM-swapping, and cryptojacking operations, respectively.Washington State Sues T-Mobile Over 2021 Data Breach The U.S. state of Washington has sued T-Mobile over allegations the phone giant failed to secure the personal data of more than 2 million state residents prior to an August 2021 data breach, which went on to affect more than 79 million customers across the country. The lawsuit asserted that "T-Mobile knew for years about certain cybersecurity vulnerabilities and did not do enough to address them" and that the company "misrepresented to consumers that the company prioritizes protecting the personal data it collects." The complaint noted that T-Mobile "used weak credentials" on accounts for accessing its internal systems and did not implement rate-limiting on login attempts, thus allowing the attackers to brute-force the credentials without locking the employee accounts in question. A year after the incident, T-Mobile agreed to pay $350 million to settle a class-action lawsuit. John Binns, an American citizen living in Turkey, took credit for the attack. He was subsequently arrested in May 2024 for his participation in the Snowflake extortion campaign.Telegram Complies With More User Data Requests Following CEO Arrest Telegram has been increasingly sharing user data at the request of law enforcement authorities following the arrest of its CEO Pavel Durov last year, according to information compiled from its periodic transparency reports. India, Germany, the U.S., France, Brazil, South Korea, Belgium, Spain, Poland, and Italy accounted for the top 10 countries with the most number of requests. Days after his arrest, Telegram promised to make significant improvements in an effort to tackle criticisms about the lack of oversight and the abuse of the platform for illicit activities. It also pledged to provide the IP addresses and phone numbers of users who violate rules in response to valid legal requests. Despite the policy changes, Telegram continues to be a major hub for cybercriminals to carry out their operations due to its "established" user base and functionality. "While Signal, Discord, and other alternative platforms are used by cybercriminals, it doesnt appear they will fully replace Telegram in the future, and rather serve as additional methods for threat actors to perform malicious activities," KELA said last month.MLOps Platforms Could Become a New Attack Target As companies rush to leverage artificial intelligence (AI) applications, MLOps platforms used to develop, train, deploy and monitor such applications could be targeted by attackers, allowing them to not only gain unauthorized access, but also impact the confidentiality, integrity and availability of the machine learning (ML) models and the data they provide. Such actions could permit an adversary to perform a model extraction attack, poison or access training data, and bypass AI-based classification systems. "The increased usage of MLOps platforms to create, manage and deploy ML models will cause attackers to view these platforms as attractive targets," IBM X-Force said. "As such, properly securing these MLOps platforms and understanding how an attacker could abuse them to conduct attacks such as data poisoning, data extraction and model extraction is critical."Popular Windows Applications Vulnerable to WorstFit Attack Several Windows-based applications such as curl.exe, excel.exe, openssl.exe, plink.exe, tar.exe, and wget.exe have been found susceptible to a brand-new attack surface called WorstFit, which exploits a character conversion feature built into Windows called Best-Fit. Taiwanese cybersecurity company DEVCORE said the Best-Fit conversion is designed to handle situations where the operating system needs to convert characters from UTF-16 to ANSI, but the equivalent character doesn't exist in the target code page. That said, this "unexpected character transformation" could be harnessed to achieve path traversal and remote code execution via techniques such as filename smuggling, argument splitting, and environment variable confusion. "As for how to mitigate such attacks, unfortunately, since this is an operating system-level problem, similar issues will continue to reappear until Microsoft chooses to enable UTF-8 by default in all of their Windows editions," researchers Orange Tsai and Splitline Huang said. In the meantime, developers are recommended to phase out ANSI and switch to the Wide Character API. Expert WebinarFuture-Ready Trust: Manage Certificates Like Never Before Managing digital trust shouldnt feel impossible. Join us to discover how DigiCert ONE transforms certificate managementstreamlining trust operations, ensuring compliance, and future-proofing your digital strategy. Dont let outdated systems hold you back. Reserve your spot today and see the future of trust management in action!..AI in CybersecurityGame-Changer or Hype? Is AI the future of cybersecurity or just another buzzword? Find out as 200 industry experts share real-world insights on AI-driven vulnerability management and how it can strengthen your defenses. Cut through the noise and gain strategies you can use right now. Secure your spot today. Cybersecurity ToolsMLOKit Its a MLOps attack toolkit that leverages REST API vulnerabilities to simulate real-world attacks on MLOps platforms. From reconnaissance to data and model extraction, this modular toolkit is built for adaptabilityempowering security pros to stay ahead.HackSynth It's an AI-powered agent designed for autonomous penetration testing. With its Planner and Summarizer modules, HackSynth generates commands, processes feedback, and iterates efficiently. Tested on 200 diverse challenges from PicoCTF and OverTheWire. Tip of the WeekKnow Your Browser Extensions Your browser is the heart of your online activityand a prime target for cyber threats. Malicious extensions can steal sensitive data, while sneaky DOM manipulations exploit vulnerabilities to run harmful code in the background. These threats often go unnoticed until its too late. So, how do you stay protected? Tools like CRXaminer and DOMspy make it simple. CRXaminer scans Chrome extensions to uncover risky permissions or dangerous code before you install them. DOMspy helps you spot hidden threats by monitoring your browsers behavior in real-time, and flagging suspicious activities like DOM clobbering or prototype pollution. Stay safe by reviewing your extensions regularly, only granting permissions when absolutely necessary, and keeping your browser and tools up to date.ConclusionEvery click, download, and login contributes to your digital footprint, shaping how secure or vulnerable you are online. While the risks may feel overwhelming, staying informed and taking proactive steps are your best defenses.As you finish this newsletter, take a moment to assess your online habits. A few simple actions today can save you from significant trouble tomorrow. Stay ahead, stay secure.Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.
    0 Comments 0 Shares
  • THEHACKERNEWS.COM
    Ransomware on ESXi: The mechanization of virtualized attacks
    Jan 13, 2025The Hacker NewsThreat Detection / Network SecurityIn 2024, ransomware attacks targeting VMware ESXi servers reached alarming levels, with the average ransom demand skyrocketing to $5 million. With approximately 8,000 ESXi hosts exposed directly to the internet (according to Shodan), the operational and business impact of these attacks is profound.Most of the Ransomware strands that are attacking ESXi servers nowadays, are variants of the infamous Babuk ransomware, adapted to avoid detection of security tools. Moreover, accessibility is becoming more widespread, as attackers monetize their entry points by selling Initial Access to other threat actors, including ransomware groups. As organizations are dealing with compounded threats on an ever-expanding front: new vulnerabilities, new entry points, monetized cyber-crime networks, and more, there is ever-growing urgency for enhanced security measures and vigilance.The architecture of ESXiUnderstanding how an attacker can gain control of the ESXi host begins with understanding the architecture of virtualized environments and their components. This will help identify potential vulnerabilities and points of entry.Building on this, attackers targeting ESXi servers might look for the central node that manages multiple ESXi hosts. This will allow them to maximize their impact.This brings us to the vCenter, which is the central administration for VMware infrastructure and is designed to manage several ESXi hosts. The vCenter server orchestrates ESXi host management with the default "vpxuser" account. Holding root permissions, the "vpxuser" account is responsible for administrative actions on the virtual machines residing on the ESXi hosts. For example, transferring VMs between hosts and modifying configurations of active VMs.Encrypted passwords for each connected ESXi host are stored in a table within the vCenter server. A secret key stored on the vCenter server facilitates password decryption, and, consequently, total control over each and every one of the ESXi hosts. Once decrypted, the "vpxuser" account can be used for root permissions operations, including altering configurations, changing passwords of other accounts, SSH login, and executing ransomware.Encryption on ESXiRansomware campaigns are intended to make recovery exceedingly difficult, coercing the organization toward paying the ransom. With ESXi attacks, this is achieved by targeting four file types that are essential for operational continuity:VMDK Files: A virtual disk file that stores the contents of a virtual machine's hard drive. Encrypting these files renders the virtual machine completely inoperable.VMEM Files: The paging file of each virtual machine. Encrypting or deleting VMEM files can result in significant data loss and complications when attempting to resume suspended VMs.VSWP Files: Swap files, which store some of the VM's memory beyond what the physical memory of the host can provide. Encrypting these swap files can cause crashes in VMs.VMSN Files: Snapshots for backing up VMs. Targeting these files complicates disaster recovery processes.Since the files involved in ransomware attacks on ESXi servers are large, attackers typically employ a hybrid encryption approach. They combine the rapidity of symmetric encryption with the security of asymmetric encryption.Symmetric encryption - These methods, such as AES or Chacha20, allow speed and efficiency in encrypting large volumes of data. Attackers can quickly encrypt files, reducing the window of opportunity for detection and mitigation by security systems.Asymmetric encryption - Asymmetric methods, such as RSA, are slower since they involve a public key and a private key and require complex mathematical operations.Therefore, in ransomware, asymmetric encryption is primarily used for securing the keys used in symmetric encryption, rather than the data itself. This ensures that the encrypted symmetric keys can only be decrypted by someone possessing the corresponding private key, i.e the attacker. Doing so prevents easy decryption, adding an extra layer of security for the attacker.4 Key Strategies for Risk MitigationOnce we've acknowledged that vCenter security is at risk, the next step is to strengthen defenses by putting obstacles in the path of potential attackers. Here are some strategies:Regular VCSA Updates: Always use the latest version of the VMware vCenter Server Appliance (VCSA) and keep it updated. Transitioning from a Windows-based vCenter to the VCSA can improve security, as it's designed specifically for managing vSphere.Implement MFA and Remove Default Users: Don't just change default passwordsset up strong Multi-Factor Authentication (MFA) for sensitive accounts to add an extra layer of protection.Deploy Effective Detection Tools: Use detection and prevention tools directly on your vCenter. Solutions like EDRs, XDRs or third-party tools can help with monitoring and alerts, making it harder for attackers to succeed. For example, setting up monitoring policies that specifically track unusual access attempts to the vpxuser account or alerts for encrypted file activity within the vCenter environment.Network Segmentation: Segment your network to control traffic flow and reduce the risk of lateral movement by attackers. Keeping the vCenter management network separate from other segments helps contain potential breaches.Continuous Testing: Strengthening Your ESXi SecurityProtecting your vCenter from ESXi ransomware attacks is vital. The risks tied to a compromised vCenter can affect your entire organization, impacting everyone who relies on critical data.Regular testing and assessments can help identify and address security gaps before they become serious issues. Work with security experts who can help you implement a Continuous Threat Exposure Management (CTEM) strategy tailored to your organization.Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter and LinkedIn to read more exclusive content we post.SHARE
    0 Comments 0 Shares
  • WWW.INFORMATIONWEEK.COM
    Addressing the Security Risks of AI in the Cloud
    Carrie Pallardy, Contributing ReporterJanuary 13, 20257 Min ReadKittipong Jirasukhanont via Alamy Stock PhotoThe majority of organizations --89% of them, according to the 2024 State of the Cloud Report from Flexera --have adopted a multicloud strategy. Now they are riding the wave of the next big technology: AI. The opportunities seem boundless: chatbots, AI-assisted development, cognitive cloud computing, and the list goes on. But the power of AI in the cloud is not without risk.While enterprises are eager to put AI to use, many of them still grapple with data governance as they accumulate more and more information. AI has the potential to amplify existing enterprise risks and introduce entirely new ones. How can enterprise leaders define these risks, both internal and external, and safeguard their organizations while capturing the benefits of cloud and AI?Defining the RisksData is the lifeblood of cloud computing and AI. And where there is data, there is security risk and privacy risk. Misconfigurations, insider threats, external threat actors, compliance requirements, and third parties are among the pressing concerns enterprise leaders must addressRisk assessment is not a new concept for enterprise leadership teams. Many of the same strategies apply when evaluating the risks associated with AI. You do threat modeling and your planning phase and risk assessment. You do security requirement definitions [and] policy enforcement, says Rick Clark, global head of cloud advisory at UST, a digital transformations solutions company.Related:As AI tools flood the market and various business functions clamor to adopt them, the risk of exposing sensitive data and the attack surface expands.For many enterprises, it makes sense to consolidate data to take advantage of internal AI, but that is not without risk. Whether it's for security or development or anything, [youre] going to have to start consolidating data, and once you start consolidating data you create a single attack point, Clark points out.And those are just the risks security leaders can more easily identify. The abundance of cheap and even free GenAI tools available to employees adds another layer of complexity.It's [like] how we used to have the shadow IT. Its repeating again with this, says Amrit Jassal, CTO at Egnyte, an enterprise content management company.AI comes with novel risks as well.Poisoning of the LLMs, that I think is one of my biggest concerns right now, Clark shares with InformationWeek. Enterprises aren't watching them carefully as they're starting to build these language models.Related:How can enterprises ensure the data feeding the LLMs they use hasnt been manipulated?This early on in the AI game, enterprise teams are faced with the challenges of a managing the behavior and testing systems and tools that they may not yet fully understand.What's new and difficult and challenging in some ways for our industry is that the systems have a kind of nondeterministic behavior, Mark Ryland, director of the Office of the CISO for cloud computing services company Amazon Web Services (AWS), explains. You cant comprehensively test a system because it's designed in part to be critical, creative, meaning that the very same input doesn't result in the same output.The risks of AI and cloud can multiply with the complexity of an enterprises tech stack. With a multi-cloud strategy and often growing supply chain, security teams have to think about a sprawling attack surface and myriad points of risk.As an example, we have had to take a close look at least privilege things, not just for our customers but for our own employees as well. And, then that has to be extended not to just one provider but to multiple providers, says Jassal. It definitely becomes much more complex.AI Against the CloudWidely available AI tools will be leveraged not only by enterprises but also the attackers that target them. At this point, the threat of AI-fueled attacks on cloud environments is moderately low, according to IBMs X-Force Cloud Threat Landscape Report 2024. But the escalation of that threat is easy to imagine.Related:AI could exponentially increase threat actors capabilities via coding-assistance, increasingly sophisticated campaigns, and automated attacks.We're going to start seeing that AI can gather information to start making personalized phishing attacks, says Clark. There's going to be adversarial AI attacks, where they exploit weaknesses in your AI models even by feeding data to bypass security systems.AI model developers will, naturally, attempt to curtail this activity, but potential victims cannot assume this risk goes away. The providers of GenAI systems obviously have capabilities in place to try to detect abusive use of their systems, and I'm sure those controls are reasonably effective but not perfect, says Ryland.Even if enterprises opt to eschew AI for now, threat actors are going to use that technology against them. AI is going to be used in attacks against you. You're going to need AI to combat it, but you need to secure your AI. It's a bit of a vicious circle, says Clark.The Role of Cloud ProvidersEnterprises still have responsibility for their data in the cloud, while cloud providers play their part by securing the infrastructure of the cloud.The shared responsibility still stays, says Jassal. Ultimately if something happens, a breach etcetera, in Egnytes systems Egnyte is responsible for it whether it was due to a Google problem or Amazon problem. The customer doesn't really care.While that fundamental shared responsibility model remains, does AI change that conversation at all?Model providers are now part of the equation. Model providers have a distinct set of responsibilities, says Ryland. Those entities [take] on some responsibility to ensure that the models are behaving according to the commitments that are made around responsible AI.While different parties -- users, cloud providers, and model providers -- have different responsibilities, AI is giving them new ways to meet those responsibilities.AI-driven security, for example, is going to be essential for enterprises to protect their data in the cloud, for cloud providers to protect their infrastructure, and for AI companies to protect their models.Clark sees cloud providers playing a pivotal role here. The hyperscalers are the only ones that are going to have enough GPUs to actually automate processing threat models and the attacks. I think that they're going to have to provide services for their clients to use, he says. They're not going to give you these things for free. So, these are other services they're going to sell you.AWS, Microsoft, and Google each offer a host of tools designed to help customers secure GenAI applications. And more of those tools are likely to come.We're definitely interested in increasing the capabilities that we provide for customers for risk management, risk mitigation, things like more powerful automated testing tools, Ryland shares.Managing RiskWhile the risks of AI and cloud are complex, enterprises are not without resources to manage them.Security best practices that existed before the explosion of GenAI are still relevant today. Building an operation of an IT system with the right kinds of access controls, least privilege making sure that the data's carefully guarded and all these things that we would have done traditionally, we can now apply to a GenAI system, says Ryland.Governance policies and controls that ensure those policies are followed will also be an important strategy for managing risk, particularly as it relates to employee use of this technology.The smart CISOs [dont] try to completely block that activity but rather quickly create the right policies around that, says Ryland. Make sure employees are informed and can use the systems when appropriate, but also get proper warnings and guardrails around using external systems.And experts are developing tools specific to the use of AI.There're a lot of good frameworks in the industry, things like the OWASP top 10 risks for LLMs, that have significant adoption, Ryland adds. Security and governance teams now have some good industry practices codified with input from a lot of experts, which help them to have a set of concepts and a set of practices that help them to define and manage the risks that arise from a new technology.The AI industry is maturing, but it is still relatively nascent and quickly evolving. There is going to be a learning curve for enterprises using cloud and AI technology. I don't see how it can be avoided. There will be data leakages, says Jassal.Enterprise teams will have to work through this learning curve, and its accompanying growing pains, with continuous risk assessment and management and new tools built to help them.About the AuthorCarrie PallardyContributing ReporterCarrie Pallardy is a freelance writer and editor living in Chicago. She writes and edits in a variety of industries including cybersecurity, healthcare, and personal finance.See more from Carrie PallardyNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also LikeWebinarsMore WebinarsReportsMore Reports
    0 Comments 0 Shares
  • WWW.INFORMATIONWEEK.COM
    Ensure Your Organizations Cloud Is Ready for AI Innovation
    Sekhar Koduri, Senior Director, Enterprise Offerings, DMIJanuary 13, 20255 Min ReadAleksia via Alamy StockGlobal spending on public cloud services will reach $805 billion this year and double by 2028. This exponential growth is being driven, in part, by a growing interdependence between artificial intelligence innovation and cloud infrastructure.AI systems demand tons of computational power and data. Generating this data in an on-premises data center is extremely expensive and impractical for most organizations. Conversely, the cloud provides a scalable and adaptable environment for AI to thrive.For instance, cloud platforms provide on-demand, fixed, and ephemeral compute resources for advanced AI processing. These resources are crucial for rapid prototyping and experimentation in AI innovation.However, unexpected costs, security, and regulatory concerns prevent cloud investments from reaching their full potential. Without a solid, sustainable cloud infrastructure, strong data foundation, and enterprise governance, organizations will not be able to reap the many benefits that AI has to offer.Fortunately, many prevalent challenges surrounding data management, cybersecurity, enterprise governance, cost containment, and change management are solvable.Strong Data Foundation Drives Business OutcomesAI applications demand vast amounts of data for training, testing, and validation, necessitating robust data storage solutions. As such, organizations must strengthen their data governance, integration, preparation, scalability, and financial policies to prepare a cloud environment for AI innovation.Related:Cloud platforms provide scalable computing power for AI workloads, eliminating the need for physical servers. With cloud-native object storage and distributed frameworks, organizations can efficiently process and store large datasets to ensure scalability and optimize performance. Also, modern semantic databases can provide the data foundation for ever-growing generative AI workloads.Organizations can use the pay-as-you-go model to eliminate upfront costs and dynamically scale resources based on demand. Additionally, multi-tier storage options optimize costs by storing data based on access patterns, and serverless platforms can provide cost-effective solutions for storing and analyzing petabytes of data.A robust data foundation not only supports scalability and cost-efficiency but also ensures ethical alignment and operational excellence.Security at the CoreFor organizations looking to incorporate AI-powered tools into their cloud environments, it's imperative to ensure the environment is secure beforehand.Related:Concerningly, 80% of data breaches in 2023 involved data stored in the cloud. In dynamic environments like the cloud, a zero-trust philosophy is a necessity.Several key components of zero-trust can fortify an organization's cloud security. For instance, asset discovery and misconfiguration monitoring can ensure organizations maintain visibility into their cloud environment. Further, cloud identity and entitlement management can ensure users can only access the minimum resources and permissions necessary to perform their tasks.No cyber efforts are foolproof -- even with these strategies in place, threat detection and incident response tools remain critical in case a malicious actor does breach the network. These should include continuous monitoring, vulnerability scanning, and guided remediation across cloud assets, workloads, and identities. Once security is assured, organizations can focus on other pressing challenges.Robust Enterprise Governance Framework Is Essential In response to the rapidly evolving field of AI, including generative AI, organizations should establish a multidisciplinary team dedicated to integrating AI within rigid regulatory frameworks, like the NIST AI Risk Management Framework.Related:Organizations should adhere to best practices like scalability, data management, and automation to create a secure, ethical, and efficient environment for AI deployment. Luckily, cloud providers offer cloud-native capabilities to navigate compliance requirements. For instance, some providers offer model bias, explainability features, and generative AI safeguards.Overcoming governance challenges through structured frameworks ensures that AI systems align with organizational goals and societal values, paving the way for responsible AI innovation.FinOps Keeps Ballooning Cloud Costs Under ControlOne of the most prevalent cloud migration and management concerns is cost. According to a McKinsey report, the average company spends 14% more than they intend to on cloud migration each year, and 75% of organizations exceed their planned budget. Cloud financial operations, or FinOps, provide a technological and organizational solution.The technological aspect enables cost observability through dashboards, regular reporting and alerts for cost overruns. These tools provide visibility into current and future costs and enable proactive management, so organizations aren't surprised by cloud invoices. Additional FinOps procedures and policies include approval processes for resource changes that impact costs and ongoing cloud cost forecasts.Implementing FinOps solutions and procedures drives financial accountability, efficiency, and overall cost control in cloud environments. As a result, organizations can optimize resources and investments.OCM Unites People, Processes & TechnologyAny technology or procedure is only as effective as the people using it. Organizations tend to underestimate the role of their workforce in ensuring a successful and sustainable cloud deployment.Leadership must focus on the employee perspective and experience to prevent delays and ensure successful cloud deployments. Organizational change management, or OCM, is a fundamental part of the transformational journey to the cloud.Leadership can ensure a smooth transition to the cloud with effective change communication, stakeholder collaboration, transparency, and thorough education. Organizations must account for the triumvirate of people, processes and technology throughout cloud migration, deployment and management.When the three work in harmony, organizations can significantly improve their operations, maximize the value of their cloud infrastructure, and capitalize on the boundless potential of AI.About the AuthorSekhar KoduriSenior Director, Enterprise Offerings, DMISekhar Koduri, DMIs lead for the data and analytics practice under the DMI CTO/EO office, spearheads transformative initiatives by leveraging the power of advanced analytics, data science, and AI for DMIs customers. He designs and implements robust data-driven strategies and AI workloads, enhancing operational efficiency and service delivery across sectors while ensuring AI safety and transparency. He is currently engaged in initiatives that explore the practical applications of Generative AI and large language models in the rapidly evolving AI landscape. He unlocks business utility and transformative capabilities by integrating these GenAI capabilities into customers operations.See more from Sekhar KoduriNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also LikeWebinarsMore WebinarsReportsMore Reports
    0 Comments 0 Shares
  • WEWORKREMOTELY.COM
    Intellisync: Product Owner
    Time zones: UTC -4, UTC -4:30, UTC -3, UTC -2, SBT (UTC +11), GMT (UTC +0), CET (UTC +1), EET (UTC +2), MSK (UTC +3), AST (UTC -4), FKST (UTC -3), NST (UTC -3:30), CEST (UTC +2), BST (UTC +1), IRDT (UTC +4:30), CVT (UTC -1), WAT (UTC +1), SAST (UTC +2), EAT (UTC +3)At Intellisync, we offer more than just a job we provide the opportunity to make a meaningful impact. If youre passionate about turning ideas into impactful realities, we want you to lead the charge as our first Product Owner.What Youll DoDefine and articulate the product vision, ensuring alignment with company goals and the needs of clients in government, defense, and tech.Collaborate with developers, product designers, engineering managers and stakeholders to prioritize features and drive the successful delivery of high-value products.Create and maintain product backlogs, making data-informed decisions to ensure every feature adds maximum value for end-users.Act as the primary point of contact for stakeholders, keeping them informed, engaged, and inspired by the product's progress and future.Use data, feedback, and insights to continuously improve our products, ensuring they stay ahead of the curve.About YouWere looking for a leader with a blend of strategic thinking, practical execution, and a passion for innovation:Youve successfully taken products from concept to launch and have a strong foundation in product management.Your communication skills are exceptional, enabling you to inspire teams and manage stakeholders effectively.You have a deep understanding of user needs and a drive to solve real-world problems through impactful products.You rely on evidence and insights to guide priorities and actions.Background in government, defense, or tech is a plus.You can overlap with CET/CEST time zones by at least 4 hours to collaborate effectively with our distributed teams. Applicant from European time zones are preferred.Why Join IntelliSync?Work on products that serve critical industries, from government and defense to cutting-edge technology.Collaborate with brilliant, motivated developers who thrive in a supportive environment.Enjoy Euro-level salaries, over 30 days of vacation, sick pay, and additional perks.This is a permanent, full-time role. We believe investing in people leads to extraordinary outcomes.We celebrate and support diversity in the workplace. Applications are encouraged from all backgrounds, regardless of race, ethnicity, gender, orientation, age, or religion. If youre excited about this opportunity but dont meet every requirement, we still encourage you to apply wed love to hear from you. Related Jobs See more Product jobs
    0 Comments 0 Shares
  • WWW.ARCHITECTSJOURNAL.CO.UK
    Weston Williamson wins approval for Wandsworth council housing
    The council gave consent to the AJ100 practice for two sites known as plots B and C on the Ackroydon East Estate and Galleons Estate last month. Last year, WW+P won approval for nine homes on the two other estate sites - known as plots A and D.The proposals deliver a total of 27 new homes as part of the councils Homes for Wandsworth development programme.On the Galleons Estate, it will replace garages on the Plot A site with a two-storey structure containing six homes for social rent.AdvertisementOn the Ackroydon East Estate, three sites will be developed to provide 21 homes with tenures ranging from one-bed apartments to two-bed duplexes: thirteen on site B, five on site C, and three on site D.Site B includes a new community centre, which the practice says was designed with local community input.The development will also include landscaping improvements to Montfort Place public square and the adjacent Sunken Garden.WW+P said the three infill schemes at Ackroydon would offer privacy to existing and future residents through design features such as stepped and chamfered massing on site C.On site D, a gentle chamfer and inset balconies plus a folded standing seam zinc roof will give privacy and mediate the change in height between the existing and new structures, the practice added.AdvertisementWW+P head of residential and project director Beatrix Young said: We are excited to bring forward these four small-site developments alongside Wandsworth Council and the wider consultant team.We are dedicated to creating high-quality, sustainable, inclusive and vibrant communities to address the boroughs housing challenges.Under the Homes for Wandsworth programme, the local authority aims to deliver 1,000 new council homes by 2029.Current site view
    0 Comments 0 Shares
  • WWW.CNET.COM
    Vitamin E: Benefits, Drawbacks, Supplements and How to Get It in Your Diet
    When browsing the skin care aisle at the drugstore, you've probably noticed that vitamin E is included in many products. When applied topically, vitamin E can help protect your skin from UV damage. However, you also need vitamin E in your diet since it'sessential to human development and functioning. The vitamin includes eight compounds, but only one of those is used in the human body -- alpha-tocopherol.The pros and cons of vitamin E have been disputed over for many years. So, what do you need to know? We've done the research. Here are the benefits and drawbacks.What is vitamin E? Upgrade your inbox Get cnet insider From talking fridges to iPhones, our experts are here to help make the world a little less complicated. Vitamin E is a fat-soluble nutrient found in many foods and is important to the human body in various ways. Vitamin E, in the form of alpha-tocopherol, is a powerful antioxidant that works as a free-radical-fighting machine.While it is possible to meet daily vitamin E needs through food, oral and topical supplements are also available. However, supplements should be used cautiously, according to directions and after consulting a doctor.Adding vitamin E to your diet yulka3ice/iStock/Getty ImagesNuts, seeds and vegetable oils top the list of the best sources, but vitamin E can be found in many foods. Here are some excellent and versatile food choices to boost your vitamin E.AsparagusAvocadoBoiled or raw spinachDry roasted sunflower seedsDry roasted almondsDry roasted hazelnutsKiwiMangoPeanut butterPumpkinRed bell pepperTomatoBenefits of vitamin EVitamin E has been touted as offering many benefits to the human body. Some of those are inconclusive regarding showing true benefit in scientific studies. Here are some vitamin E benefits that have science to back them up.1. May lower blood pressureHigh blood pressure (hypertension) is a major risk factor for cardiovascular disease. Some studies have shown that supplementing with vitamin E can help lower blood pressure, though the results were not as favorable for those with severe high blood pressure.Although results are mixed on the relationship between vitamin E supplementation and cardiovascular disease, a study that followed 40,000 healthy women for 10 years found that those who supplemented vitamin E had a 24% lower risk of death by a cardiac event. The results were not as positive for those at high risk or who already had heart disease.2. Fights free radicalsVitamin E is known to battle free radicals and protect cells from their damage; fewer free radicals can mean several good things for the human body.Cellular damage due to free radicals increases the risk for various health issues like cardiovascular disease, inflammatory disease, cataracts and cancer. Antioxidants that fight free radicals, like vitamin E, also fight those chronic conditions.A bonus? Vitamin E's contribution to free radical reduction also reduces skin damage from UV exposure. Less skin damage means a more youthful glow, and who doesn't want that?Its anti-inflammatory effects also help to reduce symptoms in chronic inflammatory skin conditions like dermatitis.3. Can improve PMS symptomsAround 80% to 90% of women experience some degree of premenstrual syndromeduring their reproductive years. For some, PMS is painful and disruptive to daily life. Vitamin E may bring some respite if you are one of the 80% to 90%.Studies show that supplementing vitamin E with vitamin D may be an effective way to reduce PMS symptoms like cramping, anxiety and cravings. Getty Images/Mensent Photography/MomentDrawbacks to vitamin E supplementsAs with any supplement, vitamin E should be used according to instructions and with caution.Avoid too much of a good thingBeing fat-soluble is not a bad thing. But too much of a good thing can quickly turn into a bad thing. Fat-soluble vitamins like vitamin E dissolve in fat, as opposed to water-soluble vitamins like vitamin C. That means that vitamin E can be stored in your body's fat tissues and liver for up to six months.Since most of our vitamin E needs can be met through food, high doses of vitamin E are rarely needed and can cause serious health conditions.You may experience side effectsWhen taken in small doses, vitamin E rarely causes any negative side effects. However, this is not the case for everyone. Here are some side effects to watch out for:Blurred visionDiarrheaFatigueHeadacheNauseaRashStomach crampsWeaknessMay cause or worsen certain health conditionsBefore supplementing or increasing your dietary intake of vitamin E, consider the following health conditions that could be caused or worsened by vitamin E.Prostate cancer: Though further research is limited, a trial study of 35,533 healthy men concluded that dietary supplementation with vitamin E caused a significant increase in prostate cancer.Heart disease: Though there is no research to suggest vitamin E causes heart disease, some research does suggest that vitamin E may worsen the condition and increase the risk of death by heart attack or stroke.Hemorrhage: High doses of vitamin E have been shown to cause bleeding and increase the risk for hemorrhagic stroke.Diabetes: Current information supports discouraging people with diabetes from supplementing with vitamin E.May interact with certain drugsIf you are taking any prescription medications or supplements, check with your medical provider before supplementing with vitamin E. Vitamin E may counteract the effectiveness of some drugs or supplements like vitamin K, statins, niacin, blood thinners, anti-platelet drugs or even chemotherapy drugs.Can vitamin E be taken daily?For adults, the recommended daily amount of vitamin E is 15 mg. It takes only a small amount of the right foods to reach 15 mg. For example, there is 7.4 mg of vitamin E in one ounce of sunflower seeds and 7.3 mg per one ounce of almonds. Either of those will bring you to around 49% of your daily need for vitamin E.Since vitamin E is so accessible in food, and in this case, more is not better, supplementing is not often needed. However, if you're unable to get the recommended daily amount through food, you should limit your supplementation to 15 mg or less per day to achieve the full benefits of vitamin E.If you're taking any other supplements or drugs, be sure to consult with your medical provider before taking vitamin E.
    0 Comments 0 Shares
  • WWW.CNET.COM
    Jaw-Dropping Next-Gen Tech: The Most Stunning Reveals from CES 2025
    The next-gen tech from this year's CES trade showreminded us that there's always something exciting on the horizon. Like always, we kick the year off at CNET with some of the coolest and innovative releases in the tech world, culminating in ourofficial Best of CES awards and we come away with so many impressive show-stoppers that we can't ever wait to show you what we found.This year's CES tech extravaganza served scads ofAItools, tech for yoursmart home, slick newTVs, groundbreaking EVs, powerfullaptops, ingenioushealth techand a bounty of robots.Scroll down for some of the most interesting products at CES 2025. For more CES coverage, check out all of the delicious (and gross) food created by CES kitchen tech or read about the top seven biggest disappointments at CES. Lisa Eadicicco/CNET Nike x Hyperice Tech-filled "shoes" that soothe your aching feet with topical warmth and compression. Nike partnered with fitness recovery tech company Hyperice to make a tech-filled boot that can help sore feet recover. First deployed at last year's Paris Olympics, the Nike x Hyperice boot (no more official name) slips around your foot and applies heat and compression with buttons to adjust either. It's technically a "system of dual-air Normatec bladders bonded to warming elements," but there was only one word when our CNET Senior Reporter Lisa Eadicicco wore them on the Vegas show floor: relief. Nike's Prototype Shoes Squeezed and Heated Our Weary Feet at CES 2025. Here's What They Feel Like. CNET Kirin Electric Salt Spoon Soup too bland but lowering salt intake? Use this spoon to add flavor... through electric shocks. The pitfall of salt is that it tastes so good, but many of us are on low-sodium diets for our health. Rather than use an untasty alternative, why not turn to science? Japanese appliance company Kirin has a new experimental soup spoon. It's large and requires an awkward grip to engage the sensors, so you kinda look like a toddler using it. But pull it off and weak electrical current will simulate the taste of salt (varying per person), making it an imperfect but promising piece of dinnerware tech. We Tested an Electric Salt Spoon That Might Help You Stick to Your Low-Sodium Diet. James Martin/CNET LG G5 OLED TV Hey, good looking After seeing the picture quality, TV expert David Katzmaier singled this out as one of his favorite TVs of the show; he traditionally finds LG's OLED quality best-in-class (as do I for its monitors), and this year's is brighter with better contrast in ambient light. New LG OLED TVs Boost Brightness, Load Up on AI and Flirt With Going Wireless. Watch this: Best TVs of CES 2025: Among So Many New Screens, I Pick 4 05:35 Katie Collins/CNET Flint Paper Battery Sustainable, affordable, scalable power Singaporean startup Flint's technology hopes to solve the problems inherent in today's widely-used lithium-ion batteries with cellulose, a natural material that promotes ionic transfer between the positive and negative terminals of a battery. Which is another way of saying "electricity!". Cellulose, the stuff of leaves and other greenery, is flexible, compressible and possibly more important, biodegradable; the paper battery can be shrunk small enough embed in a smartwatch strap. It's one our picks for Best of CES 2025, too. These Paper Batteries -- Yes, Paper -- Are Coming For Your Tech. LG LG UltraGear 45GX990A Bend it, game it The flagship of LG's new GX9 line of UltraGear gaming monitors announced at the show is the most feature-laden of the group and more interesting than a lot of other offerings -- it's relative high resolution (5,120 x 2,160), has support for multiple picture sizes and refresh rate configurations (dual mode) and a curved-to-flat bendable screen (like theCorsair Xeneon). The Monitors of CES 2025 I Can't Wait to Try. Honda Honda 0 series EVs From prototype to production We first saw Honda's 0 ("zero") series last yearas a concept, and this year Honda has shared a closer-to-final version of the sleek line, which goes into production in 2026. It's now running Asimo OS, an operating system named after its Asimo robot of yesteryear.These EVs look like what you'd expect a future car to look like; still with some wedginess to their shapes, and referred to as "gorgeous" by automotive reporter Antuan Goodwin. Honda's Gorgeous 0 Series EVs Begin Production Next Year. Geoffrey Morrison/CNET Xgimi Ascend A roll-up projector screen on the cheap-ish It's not the LG OLED rollable screen of your dreams, but the Ascend may be more within your grasp. It's a retractable, ambient light-rejecting screen with built-in speakers and an ultra short-throw projector that looks like a piece of furniture when the screen withdraws. TV tech guru Geoffrey Morrison has been an ultrashort throw skeptic, but thinks this pair may solve some of the issues he's had with them. There's no pricing yet for the screen (the projector is $2,700), but it's bound to be less than models like the LG. Finally, A Roll-Up Projector Screen of Your Budget TV Dreams. Humetrix Humetrix AI app An upgrade that will voice-to-voice translate your symptoms and meds in the local tongue. Humetrix's AI-powered translation technology already assisted aid workers at last summer's Paris Olympic Games, but soon it'll expand to help individuals seeking medical aid in places where they don't speak the native tongue. Humetrix's advantage lies in its database of 4 million medications and info on 67,000 medical conditions; using GPS location, Humetrix will translate and speak symptoms, medications and other health info into the local language (of 25 available for now) -- just speak into your phone and the Humetrix app will explain in the right lingual and medical terminology. CES 2025: This AI Tool Lets Doctors and Traveling Patients Converse, Despite Language Barriers. AC Future AC Future AI-THu, AI-THt and AI-THd Tiny homes with big tech When you're ready to go small -- or don't have the budget to go big -- a tiny home can be an appealing alternative, especially when it's luxurious and packed with the latest smart tech. Our favorite of AC Future's designer mini residences is the AI-Thu, a modular build (as small as 400 square feet) packed with smart technology that helps control lighting, heating, cooling and appliances, plus solar panels, a water recycling system, atmospheric water generation and a lot more. Would You Pay $100,000 for a Mini Smart House? We Saw the Details at CES 2025. Antuan Goodwin/CNET Top of mind for every potential EV buyer is how inconvenient charging is -- but the Aptera Solar EV is wrapped in solar panels to recharge while you drive. Forget the cockroach-looking solar-powered cars of yesteryear, as this EV is a svelte three-wheeler with a swooped design that looks like it's about to take off into the sky (that achieves 70% less drag than EV's on the road today). Aptera expects to start producing the $40,000 vehicle later this year, so start planning if a constantly-recharging two-seater EV would fit your lifestyle. I Took a Ride in an EV That Doesn't Need to Plug In. See at Aptera Read more: We Love These Ground-Breaking EV Solutions at CES 2025 James Martin/CNET Dreame X50 Ultra A robot vacuum with tiny legs to get up ledges or cross door gaps. Roombas and other robot vacuums have been a big hit, but their little wheels can be defeated by the tiniest ledge or threshold between rooms. Enter Dreame's X50 Ultra, which has two short wheeled legs it can deploy to surmount very modest obstacles. No, it won't climb stairs, but we saw it conquer small ledges a couple inches high. This advancement comes at the steep price of $1,699 when it starts shipping in mid-February (preorder it for $390 off). Dreame's Robot Vacuum Won't Be Climbing Stairs, but We Saw It Summit a Small Ledge at CES 2025. Read more: Home Tech Gadgets at CES 2025 Impressed More Than Last Year Katie Collins/CNET Delta Concierge Delta's AI-powered app aims to reduce travel woes. Delta has a new feature for its phone app, and yes, it's AI-powered. Coming this year, Delta Concierge will help out with the most annoying parts of travel, like reminding you about passport renewal and visa requirements, suggesting what to pack for your destination's weather and general tips on getting around while you roam. Like other new AI-powered features, you'll be able to ask questions through text or speech in natural language and have the app respond. Anything that makes travel less painful -- and for free -- is a big help these days. Delta Concierge Will Anticipate Your Every Travel Need Like an AI Trip Butler. Josh Goldman/CNET Lenovo Legion Go S New with added Steam! In addition to a prototype version of the update to its current Legion Go, the company's additions to its Go line of handheld gaming consoles include a couple of brand-new Go S models -- one of which is the first to run SteamOS natively, in addition to the Windows version. Yes, that's right: A Steam Deck alternative! Both models have identical hardware, and the Go S has a more traditional design compared with its somewhat overcomplicated sibling. It's pretty cool, but makes us wonder: where's our Xbox handheld, Microsoft? Lenovo Legion Go S Offers a Welcome, Less Complicated Design Than the Original. Zoltux Zoltux Instant Solar Kit "Balcony solar" 800-watt panels that can be installed in as little as five minutes. Zoltux's $1,199 Instant Solar Kit has a lot of promises and a few roadblocks, but it's still an intriguing Kickstarter product. It's an 800-watt solar panel you can hang anywhere, using an inverter to feed back into your home energy setup. You'll theoretically need an interconnection agreement and permission to operate from your local energy company, and there are concerns about just plugging one into any old 120-volt home outlet, but it's promising to get a plug-and-play solar panel to start harvesting your own energy without expensive installation -- assuming Zoltux works out the kinks. CES 2025: Could Zoltux's Instant Solar Kit Be the Answer to Hassle-Free Solar Power?. Watch this: See Lenovo's Gesture-Controlled, Rollable ThinkBook Laptop in Action 01:45 Lenovo Lenovo ThinkBook Plus Gen 6 Rollable A clever take on dual-screen laptops It's still only a concept, but Lenovo's new laptop extends the screen upward rather than folding it (or folding two screens together) like almost every dual-screen laptop we've seen. We've got no pricing or available for it yet -- it's a real product, not just a concept or prototype -- but being able to turn a laptop screen from 14 to 16.7 inches in a press of a button sounds like something I want. Wild Displays: Lenovo Shows Off Dual-Screen Yoga Book and Rollable ThinkBook. Read more: Check Out These Mind-Blowing Concept Products From CES 2025 James Martin/CNET Housing renters who want to mount their TV but are wary of drilling into their walls, your ship is about to come in. The Displace TV uses suction cups to stick to the wall and runs off batteries, meaning you can stick it pretty much anywhere in your home or office. It comes in varying sizes, starting with a $1,499 27-inch model and going up to a $4,999 55-inch TV, which will ship in spring 2025. I Suction-Cupped Displace TV's Wireless OLED to a Wall. I'll Never Be the Same. See at Displace Watch this: Displace TV's 55-Inch Television Hangs From a Wall Using Suction Cups 03:15 Read more: Nvidia Hands-Down Won AI at CES 2025, And Also The Show Itself. Here's Why That Matters Matt Elliott/CNET Nvidia GeForce RTX 50 series graphics cards Bigger on the inside? The new Nvidia cards just jumped more than a generation's worth in their power to render games and perform complex AI image generation, among a lot of other things. And they still fit into the box on your desk and cost about the same as before. The Wait Is Over: Nvidia's Next-Gen RTX 50-Series GPUs Are Here. Watch this: Everything Announced at Nvidia's CES Event in 12 Minutes 11:47 Celso Bulgatti/CNET Samsung stretchable screen concept Horror movies just gained a dimension You know that horror trope where something scary stretches the screen towards you and something awful enters the world? Samsung's turned the stretching screen of our nightmares into reality -- though it could be flowers as much as the undead pushing through. The screen bulges in the middle to produce a 3D effect; it's a little hard to see, according to editor Lisa Eadicicco, but it's there. Samsung's Wild Stretchable Display Concept Turns 2D Into 3D. Lisa Eadicicco/CNET Swippitt A fast way to fill up your phone's charge. And empty your wallet Swippitt's added a twist to the phone battery case: a box that swaps external batteries when you stick your phone in the slot. But it's not for everyone: At $450 for the hub and $120 for the Link case, the Sippitt is more expensive than aPlayStation 5and almost as pricey as an iPhone 16. I Watched a Printer-Size Gadget Add More Battery Life to a Phone in Seconds.
    0 Comments 0 Shares
  • WWW.CNET.COM
    Your Text Reactions Can Be More Expressive With This iOS 18 Feature
    Not a fan of the generic iOS message reactions, calledTapbacks? The six original Tapbacks were a heart, thumbs up or down, a "Haha," exclamation points or a question mark. Some people could beconfused or irritatedby these reactions, and some folks feel thethumbs-up emoji is passive-aggressive. ButiOS 18lets you be more expressive and communicative by allowing you to use any emoji or sticker on your iPhone to react to messages.Apple releasediOS 18in September, and the update brought loads of new features to your iPhone, like the ability tocustomize lock screensandschedule messages to send later. One exciting new feature in the update that will make your texts more fun is the ability to use all your emoji(and even your stickers) to react to messages.Read more:Everything You Need to Know About iOS 18Here's how you can use all your emoji and stickers to react to texts in Messages.How to use all emoji for Tapbacks1. Open Messages.2. Tap into the right chat.3. Long-press on a message. The dog emoji seems like a good choice here. Apple/CNETIn the Tapbacks bubble above the message, scroll to the right to show a handful of emoji to use. If you don't see the right emoji, or you want to use a sticker, tap the gray smiley to the far right of the menu to pull up your emoji keyboard. You can scroll through the emoji or use the search function to find the emoji you want to use.You can also tap the sticker icon -- the folded-over circle -- near the left side of the emoji keyboard to access your premade and custom-made stickers. That means you can react to someone's message with a sticker of your pet if you want to, and who doesn't want to see more pets? Enlist Apple Maps to Plan Your Next Vacation See all photos For more on iOS 18, here's what to know aboutiOS 18.2andiOS 18.1and ouriOS 18 cheat sheet. You can also check out what could come to your iPhone withiOS 18.3. Watch this: What to Expect From Apple in 2025 04:23
    0 Comments 0 Shares
CGShares https://cgshares.com