The best rugged phones of 2025: Expert tested

The best rugged phones of 2025: Expert tested

The top mainstream smartphones, such as the iPhone, Pixel, and Galaxy, offer best-in-class displays, cameras, and performance. While phones now include extra protection with an IP69 rating alongside IP68-rated protection, they might not be the best bet for outdoor activities. If you drop one of these phones while hiking or camping, it can break despite the added protection of cases. That’s where rugged phones come in. The best rugged phones are meant to withstand rough elements. They…

Read More

I finally found a sleep device that put my nighttime doom scrolling to an end

I finally found a sleep device that put my nighttime doom scrolling to an end

ZDNET’s key takeaways The Hatch Restore 3 retails for $170 and comes in three neutral colors. It has a new design with bigger buttons and an upgraded app with more bedtime routines. The device is rather large, and you’ll have to pay for a monthly subscription to utilize the app’s whole experience. As a tech reporter, I’ve tested numerous products over the years, but one of my all-time favorites is the Hatch Restore sunrise alarm…

Read More

How The Right Application Server Can Protect Healthcare and Public Institutions from Cyber Attacks

How The Right Application Server Can Protect Healthcare and Public Institutions from Cyber Attacks

Cybersecurity in the public and healthcare sectors is a growing concern as cyberattacks become increasingly sophisticated and frequent. However, many existing vulnerabilities can be easily addressed to deliver more robust and resilient systems. Selecting a fully supported and patched application runtime eliminates possible vulnerabilities that can be exploited. This strengthens the security protections for healthcare and public infrastructures. Organizations can thus protect their businesses, patients and citizens while improving their reputation and cost-effectiveness. The engineering…

Read More

Threat Actors Target Public-Facing Apps for Initial Access

Threat Actors Target Public-Facing Apps for Initial Access

Threat actors are increasing their focus on exploiting public-facing applications to achieve initial access, according to Cisco Talos’ Incident Response Trends in Q4 2024 report. The exploitation of public-facing applications was the most common method of gaining initial access in Q4 2024, making up 40% of incidents. The researchers said this marked a “notable shift” in initial access techniques. Prior to this quarter, account compromise had been their most observed method of initial access for…

Read More

VMware offers fixes to severe vulnerabilities in VMware Aria

VMware offers fixes to severe vulnerabilities in VMware Aria

A similar bug (CVE-2025-22222), in the sense that it requires low privilege for exploitation, is affecting VMware Aria Operations, responsible for infrastructure monitoring, performance optimization, capacity planning, automation, and cost management, and has been assigned a CVSS 7.7/10 rating. “A malicious user with non-administrative privileges may exploit this vulnerability to retrieve credentials for an outbound plugin if a valid service credential ID is known,” Broadcom added in the advisory. The flaws reportedly impact VMware Aria…

Read More

Public DeepSeek AI database exposes API keys and other user data

Public DeepSeek AI database exposes API keys and other user data

PETER CATTERALL/Contributor/Getty Images Barely a week into its new-found fame, DeepSeek — and the story about its development — is evolving at breakneck speed. The Chinese AI startup made waves last week when it released the full version of R1, the company’s open-source reasoning model that can outperform OpenAI’s o1. On Monday, App Store downloads of DeepSeek’s AI assistant, which runs V3, a model DeepSeek released in December, topped ChatGPT, which had previously been the most downloaded…

Read More

I found a fast-charging power bank that works with iPhone and Android – and it's 32% off

I found a fast-charging power bank that works with iPhone and Android – and it's 32% off

ZDNET’s key takeaways The EcoFlow Rapid magnetic power bank normally retails for $70 on Amazon. The portable charger uses Qi2 technology to deliver 15W of wireless charging for Apple devices, with an integrated USB-C cable and a kickstand for convenience. While it can charge multiple devices at once, its 5,000mAh battery capacity is very limited, especially when compared to cheaper alternatives. As an iPhone user, I appreciate efforts to conserve battery life. I charge my…

Read More

Enhancing Private 5G Security in industrial deployments

Enhancing Private 5G Security in industrial deployments

As digitisation gathers pace, manufacturers, energy companies, and transportation businesses are among the sectors increasingly turning to private 5G to connect their operational technology (OT) environments.  With its ultra-low latency and reliable coverage, 5G enables more seamless and reliable connectivity than Wi-Fi. Additionally, 5G promises to accelerate IT-OT convergence and thereby help improve efficiency, enhance decision making, and drive new revenue streams.   Yet with this progress comes new opportunities for hackers. OT can be at…

Read More

Harnessing AI to Simplify Cloud Configuration Drift Detection

Harnessing AI to Simplify Cloud Configuration Drift Detection

Cloud environments are dynamic by nature; they frequently change and update configurations. Unless these changes are carefully tracked, they could lead to configuration drift, a situation in which the runtime state of a resource deviates from its intended baseline configuration. Configuration drift can have severe consequences, potentially introducing security vulnerabilities, degrading system performance, and violating compliance requirements.  Manual configuration drift management in large, multi-cloud environments is inefficient and prone to human error. AI helps to…

Read More

To Combat Cyberbullying and Online Fraud, We Must Do More to Protect Minors

To Combat Cyberbullying and Online Fraud, We Must Do More to Protect Minors

The last 20 years have fundamentally redefined how consumers behave online. The emergence of sites such as YouTube, Meta, and X has reshaped how we share and consume media. Online gaming platforms have exploded in popularity, and messaging applications like WhatsApp have made it easier to stay in touch. But there is a dark side to this evolution. While the digital landscape has transformed, little has been done to shield minors from the adverse effects…

Read More
1 161 162 163 164 165 3,802