Built in California, powered by Linux, the Liberty Phone says no to tech giants
With no Android or iOS, it’s the loneliest smartphone on the market today
It costs more, does less, and still claims to be the best smartphone for privacy
Despite rising political pressure to bring tech manufacturing back to the US, building a premium smartphone domestically remains a costly and technically difficult challenge.
The Liberty Phone by Purism, priced at $1,999, offers a rare example of how close a company can get to building an America-made device, but it comes with significant trade-offs in performance and practicality.
Unlike the widely promoted but questionable $499 Trump Phone, the Liberty Phone is at least verifiably assembled in the US, although it lacks flagship-level features.
Still not 100% "Made In USA!"
Todd Weaver, Purism’s founder, is upfront about the limitations, noting, “Someone who needs a wicked-strong camera is not our audience.”
Weaver estimates the Liberty Phone costs around $650 to produce, higher than the iPhone 16 Pro Max, which TechInsights says costs about $550 to build in China.
This discrepancy is driven largely by US labor costs, with savings made by using lower-spec components such as a basic camera and a low-resolution screen.
This may suit its core user base, including security geeks, older users, kids, and those who want to distance themselves from major tech brands, but it is nowhere near mainstream Android alternatives - for anyone expecting the best smartphone for business or multimedia tasks, the Liberty Phone is unlikely to compete.
Part of Purism’s appeal lies in its transparent and partially domestic supply chain - the motherboard is built at the company's California site, the chip is sourced from NXP’s Austin, Texas, facility, and the final assembly is local.
But some critical components, like the camera from South Korea and the display and battery from China, still depend on global sourcing.
“There are just some parts that don’t yet have a supply chain,” says Weaver. “We’re gonna keep incrementing there until we can get to that point.”
It runs PureOS, a Linux-based operating system that supports basic tasks like calling, texting, and web browsing, but without support for Android or iOS apps, it’s a hard sell for anyone needing a broad app ecosystem or high-end performance.
Nonetheless, Weaver believes a niche market exists and claims that about half of Purism’s customers are US government agencies.
Even though tariffs might someday narrow the cost gap, the continuity of this project is not certain.
“We don’t have factories here building application processors, high-end displays or most of the other things in your smartphone,” said Jeff Fieldhack of Counterpoint Research, showing his skepticism.
At the moment, the Liberty Phone is more of a philosophical gesture than a practical solution, and only Americans or those loyal to the US will give it a second look.
Asus ProArt P16 beats most laptops in its price and size class
You get RTX 5070 graphics and OLED visuals in a surprisingly slim 4-pound frame
Bundled AI apps like StoryCube and MuseTree boost productivity for visual creators and editors
Asus has introduced the ProArt P16 (H7606), a laptop which pairs AMD’s Ryzen AI 9 HX 370 processor with Nvidia’s GeForce RTX 5070 GPU, targeting content creators and professional users.
The new addition joins the wave of Copilot+ PCs built to support advanced local AI tasks and aims to rival some of the most premium creative laptops on the market.
At $2,499.99, the ProArt P16 also undercuts competitors like the Razer Blade 16, which retails for $2,799.99 but offers a similar target user experience.
Asus ProArt P16 bundles AI tools and software for creatives
The ProArt P16 features a 16-inch OLED display, a premium visual specification often reserved for machines priced higher.
It also supports up to 64GB of RAM, which is nearly unheard of in this segment, and up to 2TB of internal storage.
These specifications position it as a contender for the best laptop for graphic design, especially those working with high-resolution files and complex color spaces.
At just 0.59 inches thick and weighing 4.08 pounds, the Nano Black chassis keeps things portable despite the raw horsepower inside.
Asus bundles in additional creative features through its exclusive apps: StoryCube and MuseTree. The former is pitched as a digital asset management tool that utilizes AI to automatically categorize and generate clips from user content, while the latter turns graphical prompts into images while intelligently organizing creative inspiration.
At just 0.59 inches thick and weighing 4.08 pounds, the Nano Black chassis keeps things portable despite the raw horsepower inside.
This pairing of hardware and software seems designed to capture those looking for the best laptop for video editing without committing to a desktop setup.
Asus has also partnered with CapCut, giving new users an exclusive six-month membership that includes access to premium features and AI-driven editing tools.
In addition, the laptop comes with a three-month Adobe Creative Suite subscription, further appealing to professionals working across photography, video, and design workflows.
These bundled tools offer value for those searching for the best laptop for photo editing, as they come integrated into the buying experience.
That said, Asus will release a more powerful model featuring the Nvidia GeForce RTX 5090 in late 2025, which will likely push the price higher. This model will be available for purchase at the ASUS official store after launch.
You might also like
Take a look at our picks for the best WFH app around
Despite Texas lawmakers asking Musk to postpone proceedings until it had finalized and introduced new laws surrounding fully autonomous taxis, the controversial CEO has ploughed ahead anyway.
However, this is a far cry from the futuristic Cybercab scenario that Tesla showcased at its Hollywood-spec 'We, Robot' event in October of last year, where bespoke Cybercabs ferried folks around a film set and the company’s Optimus humanoid robots served drinks to party-goers, only for the world to find out they were actually tele-operated.
It is a similar story with Tesla's recent robotaxi endeavor, as the “fleet” of 10-20 Model Y vehicles (sporting some Robotaxi branding) are strictly limited to a small and relatively uncomplicated area of Austin, Texas.
They also only operate between 6am and 12am and have a remote operator in the passenger seat to manually verify riders' ID and take control should a problem arise.
The Verge reported that some of Tesla’s driverless vehicles are also followed by 'chase' vehicles, presumably packed with engineers ready to jump in should there be an issue that both the in-car and remote operators can’t handle.
So far, only a select number of invites have gone out to predominantly “pro-Tesla” influencers, according to The Verge, with the initial invite list of test pilots reading like a who’s-who of the Musk sycophant contingent – renowned Tesla stock hype-man Sawyer Merritt being among those names.
Just like the 'We, Robot' event, this initial launch phase feels very much like a massive PR stunt, with the company essentially inviting the “general public” (read Tesla content creators) along for a ride during the very early testing phase, rather than during the widespread deployment of a legitimate, paid-for service.
Why Waymo is way ahead
(Image credit: Waymo)
It’s impossible to talk about Tesla’s robotaxi service without mentioning its closest competitor Waymo, particularly when Musk reportedly said after this successful initial launch phase that there could up to a thousand robotaxis on the road in a few months.
As a reminder, Waymo currently has a fully operational fleet of 1,500 vehicles on the road in four major cities in the US, with the areas in which it operates constantly expanding inside those cities. Anyone can summon a driverless cab with a simple app interface and they won't see a human inside the vehicle.
By the end of 2026, it hopes to have added another 2,000 vehicles according to a blog post by the Alphabet-owned company released in May this year, as it continues to ready a fleet of Jaguar i-Pace cars for autonomous driving.
Waymo also announced that it will be the first major client of Hyundai’s mass-produced Ioniq 5 robotaxi, which will help it scale even faster.
To think Musk will be able to reach this stage a couple of months after what is basically an initial testing phase is pure fantasy, especially as he insists on using a camera-only Full Self-Driving system that lacks the radars, Lidar and myriad other sensors that its rivals say is mandatory for a reliable and safe service.
Scaling up is the true test
(Image credit: Hyundai)
Already, a number of videos have already surfaced on Reddit that appear to show Tesla Robotaxis behaving erratically, swerving at busy intersections and slamming on the brakes for parked police cars that aren’t even stopped in the road.
Granted, it’s impossible to verify the authenticity of a Reddit video, but there is a growing list of very public cases where Tesla’s Full Self-Driving system has been active during an accident.
The first few reviews of the experience seem largely positive, with most riders describing the drive as “smooth” or “human-like”, but these are still very early days.
Things will get far more complicated if and when Tesla legitimately has thousands of vehicles on the road, it removes the operator sat in the passenger seat, and it builds out its app so the general public can genuinely use it. I predict that being at least two years away.
Alongside Waymo, there are companies in China that are also racing ahead with active fully autonomous ride-hailing services. Baidu, WeRide and Pony.ai are already racking up hundreds and thousands of miles.
Just last year, Baidu reportedly sparked anxiety among taxi drivers, automotive brands and the working public after it launched a driverless service in Wuhan that offered rides of around six miles (much further than the reported four or so miles Tesla can currently travel) for around 50 cents.
It undercut journeys with a human driver at the wheel by around two bucks and naturally proved very popular, according to CNN, leading to panic that many jobs could soon to be at risk.
Once the legal framework is in place for the widespread rollout of autonomous vehicles, it wouldn't be too much of a stretch to think that the Chinese could swoop in and dominate the market... just like they have done with EVs.
Hackers are using invisible Unicode to trick Android into opening dangerous links from notifications
The link looks normal, but Android secretly opens something else without warning or consent
Even trusted apps like WhatsApp and Instagram are vulnerable to this hidden notification exploit
A security flaw in Android’s notification system could allows malicious actors to deceive users into opening unintended links or triggering hidden app actions, experts have warned.
Research from io-no claims the flaw lies in how Android parses certain Unicode characters within notifications.
This creates a mismatch between what users see and what the system processes when the "Open Link" suggestion appears.
What you see isn’t always what you get
The problem stems from the use of invisible or special Unicode characters embedded within URLs.
When included in a message, these characters can cause Android to interpret the visible text and the actual actionable link differently.
For instance, a notification might visibly display “amazon.com,” but the underlying code actually opens “zon.com,” with an inserted zero-width space character.
The notification displays as "ama[]zon.com," including the hidden character. However, the suggestion engine interprets that hidden character as a separator, which results in it launching an entirely different site.
In some cases, attackers can redirect users not just to websites but also to deep links that interact directly with apps.
The report showed how a seemingly harmless shortened URL led to a WhatsApp call.
To make attacks less detectable, malicious actors can use URL shorteners and embed links into trusted-looking text.
The flaw becomes particularly dangerous when combined with app links or “deep links” that can silently trigger behaviors such as initiating messages, calls, or opening internal app views without user intent.
Tests on devices including the Google Pixel 9 Pro XL, Samsung Galaxy S25, and older Android versions revealed that this misbehavior affects major apps like WhatsApp, Telegram, Instagram, Discord, and Slack.
Custom apps were also used to bypass character filtering and validate the attack across multiple scenarios.
Given the nature of this flaw, many standard defenses may fall short. Even the best antivirus solutions may miss these exploits, as they often don’t involve traditional malware downloads.
Instead, attackers manipulate UI behavior and exploit app link configurations. Therefore, there is a need for endpoint protection tools, which offer broader detection based on behavioral anomalies.
For users at risk of credential theft or app abuse, relying on identity theft protection services becomes critical to monitor unauthorized activity and secure exposed personal data.
Until a formal fix is implemented, Android users should remain cautious with notifications and links, especially those from unfamiliar sources or URL shorteners.
AI can now reconstruct speech through concrete using just a laptop’s unshielded microphone wiring
Laptop mic cables double as antennas, leaking audio through radio harmonics
MEMS microphones emit signals that betray private conversations without any system compromise or malware
A new form of eavesdropping uses artificial intelligence to recover speech from devices through walls.
A report by eeNews outline how it exploits a vulnerability in widely used MEMS (microelectromechanical systems) microphones, and the most affected devices are laptops, due in part to their internal wiring design.
Researchers from the University of Florida and Japan’s University of Electro-Communications demonstrated even through a 25 cm concrete barrier, attackers can accurately reconstruct speech using nothing more than an FM receiver, a copper antenna, and machine learning tools.
So, why laptops?
(Image credit: eeNews)
The microphones in many laptops are connected via long, unshielded wires, effectively turning them into antennas, the researchers note.
“With an FM radio receiver and a copper antenna, you can eavesdrop on these microphones. That’s how easy this can be…It costs maybe a hundred dollars, or even less,” said Prof. Sara Rampazzi at the University of Florida.
The research revealed an accuracy of up to 94.2% in recognizing spoken digits, while OpenAI’s generative models achieved a transcription error rate as low as 6.5%.
The researchers examined several MEMS microphones, including the MP34DT01-M from STMicroelectronics, Knowles SPM0405 (now Synaptics), TDK InvenSense CS-41350 and T3902, and Vesper’s VM3000 (now part of Qualcomm).
These microphones emit electromagnetic signals that can leak acoustic data through radio harmonics.
According to STMicroelectronics, “this is an intrinsic behavior of Digital PDM MEMS microphones,” and the design used in laptops often lacks shielding, turning flat cables into ideal antennas.
To mitigate this risk, experts recommend relocating microphones within laptops to reduce cable length and shielding the wires. They also propose using spread spectrum clocking to reduce the intelligibility of emissions without affecting performance.
These fixes are relatively simple, but they are relevant for newer devices moving forward. What about pre-existing devices, then?
Regular users need to invest in the best antivirus or endpoint protection solutions, which offer some protection even though they are not explicitly listed to defend against this new threat.
These tools typically operate at the software level and may not detect passive attacks that don’t involve code execution or system compromise.
For individuals seeking the best identity theft protection, this research shows that even conversations assumed to be private may be within reach of sophisticated, low-cost surveillance.
Venice CPU doubles bandwidth with up to 256 Zen 6 cores
2027 AI rack expected to deliver 144 GPUs with Verano chips
AMD plans Verano and MI500 rollout with 36-rack infrastructure
At its recent Advancing AI event, AMD revealed some of the first technical details about its next-generation Zen 6-based processor, code-named "Venice.”
Built on a 2nm process and packing up to 256 Zen 6 cores - a 33% increase from the current generation EPYC 'Turin' processor - AMD is seeking to raise the bar for AI-optimized compute power.
It is expected to more than double memory bandwidth compared to current EPYC CPUs, hitting 1.6TB/s per socket. Venice also supports PCIe Gen6, offering faster communication between CPUs and GPUs.
Pushing the envelope
"Venice extends our leadership across every dimension that matters in the data center," said Lisa Su, AMD CEO. "More performance, better efficiency, and outstanding total cost of ownership."
"It delivers 70% more compute performance than our current generation leadership Turin CPUs," she added. "And to really keep feeding MI400 with data at full speed, at even at rack scale, we have doubled both the GPU and the memory bandwidth and optimized Venice to run at higher speeds. Now we just got Venice back in the labs and it is looking fantastic.”
While Venice headlines AMD's 2026 platform, Su also gave us a glimpse at what the chip giant is working on for 2027.
"We are already deep in the development of our 2027 rack that will push the envelope even further on performance, efficiency and scalability with our next generation Verano CPUs and Instinct MI500-series GPUs, so lots and lots of stuff to come from AMD," she revealed.
This new system builds on the "Helios" rack shown for 2026, which houses 72 MI400 GPUs across 18 racks. For 2027, AMD is planning an even more expansive setup with 36 racks.
Assuming a similar configuration, the next-gen AI rack could contain 144 GPUs. The Verano platform is expected to maintain the high bandwidth and performance efficiency established by Venice, likely with more memory and compute per rack.
AMD has not officially named its 2027 rack, but we hear it’s being informally referred to in industry circles as a larger-scale continuation of Helios.
Steeped in old-school horror tropes, Grammy-winning musician, rapper, producer and filmmaker Flying Lotus’ (V/H/S/99) new-to-streaming phantasmagoria, Ash, is primed and pumped to provide all the high-octane cosmic nightmare fuel you might ever want to tank up on.
With its first-person shooter video game pedigree and obvious homages to films like John Carpenter’s The Thing and Paul W.S. Anderson’s Event Horizon, with a sprinkling of H.P. Lovecraft’s Great Old Ones tossed in, Ash got a theatrical release on March 21, 2025 by XYZ Films and now it’s come to the horror-centric platform Shudder starting on Friday, June 20.
Director Flying Louts' Ash is currently streaming on Shudder.(Image credit: Shudder)
Trust me when I say that you’ve never seen such disturbing, imaginative imagery like this and it’s a must-watch revelation for any card-carrying horror hound or diehard sci-fi aficionado. You might even want to keep all the house lights on and huddle up with braver souls than your own.
The storyline employed is relatively simple and it’s a well-worn plot device in survival horror gaming and sci-fi territory where an astronaut awakens aboard a spaceship with little or no memory of what tragedy has occurred and a mysterious lethal antagonist lurking on the dark.
Aaron Paul (Breaking Bad, Need For Speed) and Eiza González (Baby Driver) star in this extraordinarily frightening project helmed by Flying Lotus from a clever screenplay penned by native Swiss actor Jonni Remmler. Ash carries with it the confident attitude and flair of raw ‘90s-era grindhouse science fiction horror movies such as indie director Richard Stanley's Hardware or Vincenzo Natali's chilling Cube. Match that with video game DNA from franchises like Doom, Dead Space, and Silent Hill and you’ve got an idea of what's in store.
Here’s the official synopsis: "On the mysterious planet of Ash, Riya (González) awakens to find her crew slaughtered. When a man named Brion (Paul) arrives to rescue her, an ordeal of psychological and physical terror ensues while Riya and Brion must decide if they can trust one another to survive."
The cast also includes Iko Uwais, Kate Elliott, Beulah Koale, and Flying Lotus, who wrote the insanely addictive original synthwave score that acts as a perfect complement to the visionary frights. This atmospheric music was written in off-grid fashion while FlyLo was in New Zealand using only a MIDI controller and his personal laptop computer and the results are astounding.
Punctuate with intense pools of saturated color, monstrous alien entities, and jump scares that might leave you breathless, this a truly something to savor and we’re thrilled to introduce this stellar work by Flying Lotus, one of our best and brightest hyphenate talents on the planet.
Ash has invaded the Shudder streaming platform starting June 20.(Image credit: Shudder)
There’s also a jaw-dropping unintentional homage to the Palmer Monster scene in Carpenter’s The Thing that ratchets up the blood and gore to ridiculous dimensions that you won’t want to miss.
Now streaming on Shudder, Ash is produced by XYZ Films' Nate Bolotin and GFC Films' Mathew Metcalf and executive produced by Nick Spicer, Maxime Cottray, Aram Tertzakian, Maile Daughtery, Flying Lotus, Neill Blomkamp, Dave Brown, and Adam Riback.
Philips Hue is unquestionably one of the best-known smart lighting brands, and for good reason; after all, it makes some of the best smart lights around. Its quality products and overall market presence have made it immensely popular, so it’s not all that surprising that its prices are at the premium end of the scale
While brands like Nanoleaf may be the first to come to mind for many when considering a Philips Hue alternative, I’m here to sing the praises of another low-cost manufacturer of smart lighting loveliness – Govee.
Founded in 2017, Govee offers a huge range of both fun and functional smart lighting products, and regularly releases exciting new products that leave me wanting to rearrange my lighting setup so that I can incorporate newer pieces without looking like my home belongs in Cyberpunk 2077 (not saying I wouldn’t enjoy that, mind you). Aside from all the pretty lights, Govee produces some other great smart home essentials, including sensors, air purifiers, and fans, too.
I could waffle on for hours about my favorite Govee features, but to save us all some time, I’ve summarised my top three reasons why Govee makes a perfect lower-cost alternative to Philips Hue.
1. There’s something for everyone
Whether you want to go big and bold with vivid and colorful displays or want practical lighting solutions that you can automate to suit your schedule, their impressive range of products means that Govee will likely have something that ticks your boxes.
(Image credit: Future)
One product that’s equal parts fun and functional is the highly rated Govee Table Lamp 2. This RGBICWW lamp boasts over 60 scene presets, a load of customizable settings, and is Matter compatible, too. I have two of these lamps at home, and I love how easily I can switch up the mood with this little light, moving from a brighter, cooler white light for working hours, to mood-brightening colorful scenes for the evening, before finishing the night on a warm-toned white.
Even the reasonably priced Govee RGBIC LED Strip Light has a satisfying amount of customizable features. These include brightness adjustment, AI scene creation, and color palettes that can be applied across the entire strip or fine-tuned segment by segment.
2. The companion app is reliable and user-friendly
It’s all well and good having a fancy bit of kit capable of impressive lighting effects, but if the companion app is overly complex, clunky, or lacks features, it’d quickly dull any sparkle. Fortunately, the Govee Home app isn’t guilty of any of these; instead, it provides a delightfully straightforward and engaging user experience. It’s simple to navigate between different features, and I really liked that I could streamline the layout by arranging the modes for easy access. Another customizable element I appreciated was the quick action button that sits at the top of the page, giving me easy access to a choice of functions, including color and effect sections, auto-play, and a timer, amongst others.
(Image credit: Future)
3. Their prices are more palatable than Philips Hue
I think I’ve made it clear already that there are savings to be made when opting for Govee over Philips Hue, but to demonstrate my point, I’m going to lay out a couple of examples of the cost difference between similar products from both brands.
Say you’re thinking of upgrading your ceiling lights, a two-pack of 800 lumen RGBWW smart bulbs from Govee costs around $24.99 / £18.99, whereas the same from Philips Hue could set you back around $89.99 / £84.99. The price difference is pretty vast straight off the bat, and the chasm widens further when you factor in an additional $59.99 / $49.99 for a Philips Hue Bridge, which you’ll need if you want to use the full suite of features, such as controlling your lights away from home, something which Govee offers for free via the Govee Home app.
So, if you’re keen to get started on your smart lighting setup, but have been put off by the cost of building a Philips Hue system, then Govee is well worth considering, not just because their products are more affordable, but because they’re feature-packed and efficient, too.
from Latest from TechRadar US in News,opinion https://ift.tt/SoMXfOT
Facebook will soon roll out passkeys for Facebook on mobile devices
Passkeys offer greater security and easier login than passwords
Passkeys for Messenger will also soon be available
Meta has introduced passkey support for Facebook on mobile devices which will significantly decrease the chance of someone hacking into your account.
Rather than using a clumsy and easily guessed password to log in, you can now use a fingerprint, face or PIN to verify that you are logging in to your account.
Better still, passkeys are often faster to use than passwords, meaning your whole Facebook experience should be even easier.
Facebook gets passkeys
Passkeys for Facebook on iOS and Android mobile devices “will soon be available”, Meta said, with passkeys for Messenger also due to be released in the “coming months.”
Passkeys are a much more resilient alternative to passwords and one-time-codes as they cannot be stolen and are much less susceptible to malicious sites looking to steal your login details, such as typo-squatting domains. They can also be a good alternative to using a password manager that requires constant back-and-forth between apps in order to enter your password.
Your passkey is stored locally on your device, meaning Meta doesn’t have access to it. One unfortunate downside of passkeys is that if you lose your mobile device that stores your passkey, it can be a bit of a hassle getting back into your account and setting up a new passkey.
Meta also announced passkeys will also be used to verify payments through Meta Pay, and will soon also be used to protect your encrypted message backups once Passkeys for Messenger arrive.
(Image credit: Facebook)
To set up a passkey, head to the Settings menu on the Facebook app, and then click on Accounts Center → Password and security → Passkey. If passkeys are available, Facebook may even prompt you to set one up the next time you log in.
Check Point Research finds hundreds of malicious GitHub repositories
These impersonate different mods or cheats for Minecraft
The infostealers grab Minecraft data, as well as browser and crypto wallet information
Minecraft players are being actively targeted by a group of cybercriminals interested in their login credentials, authentication tokens, and crypto wallet information, experts have warned.
Cybersecurity researchers Check Point Research recently discovered the large-scale operation, run by a group called the Stargazers Ghost Network, a distribution-as-a-service (DaaS) operation active for a year now, distributing malware and infostealers on behalf of other cybercriminals.
In this campaign, the crooks abused the fact that Minecraft is one of the largest games in the world, with an active, thriving community of players and modders. Minecraft mods are player-built additions to the game and as per the researchers, there are more than a million modders out there.
Hundreds of repos
The attackers created malicious GitHub repositories, spoofing legitimate mods, and pretending to be cheats: Skyblock Extras, Polar Client, FunnyMap, Oringo, and Taunahi, are just some of the names making rounds.
CheckPoint says these have had thousands of views on Pastebin, suggesting that the campaign is rather successful.
To make matters worse, since these are custom-built to target Minecraft users, and since both the downloader and the malware are written in Java, they are currently going undetected by all antivirus engines.
"We have identified approximately 500 GitHub repositories, including those that are forked or copied, which were part of this operation aimed at Minecraft players," one of the researchers told BleepingComputer.
"We've also seen 700 stars produced by approximately 70 accounts." Stars are used to boost the legitimacy of the repositories, thus improving the chances of infection.
The attack is split into two phases. The first phase targets Minecraft account tokens, and user data from both the Minecraft launcher, and some third-party launchers. It also steals Discord and Telegram information.
The second stage deploys a more “traditional” infostealer called “44 Caliber”, which steals browser data, VPN information, crypto wallet data, and more.
Keyview 13" Touch is a mechanical keyboard with a built-in 13-inch touchscreen
It works with phones, tablets, laptops, desktops, and even game consoles
There’s no battery or touchpad unfortunately, so you'll need to provide power and a mouse
The Keyview 13" Touch, from Aura Displays, is a compact 82-key mechanical keyboard (83 keys for the UK version) with a fun, and useful twist - it has an integrated 13-inch touchscreen attached.
We’ve also encountered various DIY projects that produced laptops without displays, as well as notebook docking stations with built-in screens, but few of those have been as polished or feature-packed as this.
RGB lighting and custom shortcuts
The Keyview 13" Touch's screen folds from 0 to 90 degrees and delivers a 1920 x 720 matte IPS display. It supports full 10-point multitouch and has a wide 178° viewing angle, making it usable for video, docs, or just as a second screen.
The keyboard itself uses yellow mechanical switches and PBT keycaps. It’s fully customizable, with hot-swappable keys, RGB lighting, and support for custom shortcuts.
The device includes USB-C, HDMI, two USB 3.0 ports, an SD/TF slot, and an M2 SSD bay for internal storage expansion. It also supports 60W PD fast charging.
It’s compatible with macOS, Windows, Android, Linux, and ChromeOS. That means it works with laptops, desktops, full-featured USB-C phones like the Galaxy line, latest iPhones, tablets, and even game consoles.
The case is made from aluminum alloy, ABS, and PC plastic. It’s solid but weighs 2.12kg, which makes it more of a backpack item than something pocketable.
There’s also a built-in speaker, rated at 1W. That's nothing special, but it will be fine for notifications or quick audio tasks.
There are a couple of bigger drawbacks, though - there’s no battery for starters, so you’ll need to plug it in every time you want to use it. And there’s no touchpad either, so unless your device is touch-capable, you’ll want to bring a mouse too.
Still, for a certain type of user, especially those wanting to turn their phone into a capable workstation, it’s an unusual and potentially useful option. You can buy it direct from Aura now for $399.00, 20% off its usual MSRP of $499.
Security researchers claim Anubis ransomware is adding a file wiper
The wiper reduces all files to 0 KB, irreversibly destroying them
This could be an additional pressure point during negotiations
Anubis, a relatively new Ransomware-as-a-Service (RaaS) operation, added a new feature to its encryptor that irreversibly destroys all encrypted files on the compromised system.
Cybersecurity researchers Trend Micro has published a new in-depth report about the operation, revealing the group is currently working on adding new features to the encryptor, among which is the file-wiping ability.
“What further sets Anubis apart from other RaaS and lends an edge to its operations is its use of a file wiping feature, designed to sabotage recovery efforts even after encryption,” Trend Micro said. “This destructive tendency adds pressure on victims and raises the stakes of an already damaging attack.”
Pressuring the victims
When the threat actors activate the feature, the wiper erases the contents of the files and reduces their size to 0 KB. The filenames and the structure remain intact, which means it’s impossible to recover the files.
The best way to stay protected is, obviously, to tighten up on security and minimize the chances of getting a ransomware infection. However, out of an abundance of caution, businesses should have a separate, possibly air-gapped backup, that would allow them to restore the files safely.
Usually, ransomware actors would exfiltrate sensitive files from their target’s IT infrastructure, and then encrypt the systems.
They would then demand money, usually in bitcoin, in exchange for the decryption key that returns the victims access to their locked files. Since many companies deny paying the ransom, and instead keep an updated backup that can be restored in case of an attack, the hackers started stealing files and threatening to release them to the public.
Releasing sensitive files is, in many cases, more disruptive than encryption, since it can lead to class-action lawsuits, data watchdogs fines, loss of credibility among customers and partners, and loss of competitive edge after IP leaks.
Besides the file wiper, which is definitely a big threat, ransomware actors also sometimes engage in DDoS attacks, as well, to put pressure on both the front-end and the back-end of the business. In some instances, they would also call the victims on the phone in an attempt to get them to pay the ransom demand.
- Officially renewed in May
- Main cast expected to return
- No official trailer released yet
- Plot details remain under wraps
- Writing for season 2 has commenced
The Four Seasons season 2 is officially on the way, thanks to a swift renewal just days after the show premiered on Netflix.
Based on the 1981 film of the same name, season 1 followed six friends, made up of three married couples, as they vacationed together during each season of the year – four trips, four seasons.
Over eight episodes, the couples experienced the highs, lows and laughs of being long-term friends and long-term lovers. Until, during the final season of winter, tragedy struck the group and the devastation threatened to tear them apart. Fortunately, it seemed to bring them closer together. Although, how about that Ginny twist?
Season 2 will take what co-showrunners Tina Fey, Lang Fisher and Tracey Wigfield lovingly crafted in the first run and hurtle viewers through another rollercoaster of emotions on one of the best streaming services.
Here's what we know so far about The Four Seasons season 2 release date, predicted cast, plot and more.
The Four Seasons season 2: is there a release date?
When it comes to The Four Seasons season 2 release date, well, there isn't one just yet. But, the show was officially renewed on May 14, just under two weeks after season 1 premiered on Netflix.
In the announcement on Netflix's Instagram, the words "It's time for another trip" appear alongside clips from season 1 of the cast discussing going on vacation again with Anne suggesting "someplace warm".
The show's co-creators and co-showrunners Fey, Fisher and Wigfield told The Hollywood Reporter: "We are so grateful that audiences worldwide share our love of cozy sweaters, drinks by the ocean, and picking fights in a hot tub. See you on our next vacation together!"
No word yet on The Four Seasons season 2 filming though, so I'd predict that we won't see the return of the show until at least mid to late 2026.
The Four Seasons season 2: has a trailer been released?
With season 2 yet to commence filming, there's no official trailer to share(Image credit: Netflix)
There's no The Four Seasons season 2 trailer yet, which isn't all that surprising considering the cast and crew haven't started filming.
For season 1, a teaser dropped in mid-March with the official full trailer landing only a couple of weeks before the show launched on Netflix. So, I'll keep an eye out and update here in what I imagine will be 2026.
The Four Seasons season 2: predicted cast
The main cast all predicted to return(Image credit: Netflix)
I'm almost certain that for The Four Seasons season 2 cast, the main characters will all reprise their roles (bar one obvious emission):
Tina Fey as Kate
Will Forte as Jack
Colman Domingo as Danny
Marco Calvani as Claude
Kerri Kenney-Silver as Anne
Erika Henningsen as Ginny
Julia Lester as Lila
It's pretty much a given that the main cast listed above will return considering they're the core of the entire show. Especially considering Wigfield told TVLine if the show was renewed for season 2 (which, of course, it now has been): "It wouldn't be, like, an anthology. We would keep our group because I think that's what makes the show so great, this particular group."
What isn't a given is whether Steve Carell (Nick) would return at all, given his shocking demise in season 1, but there's always a chance of flashbacks. After all, there's a long history between the friends he left behind and there may well be story left to tell.
While Nick and Anne's daughter, Lila, starred in a number of episodes it's not clear whether she'd be returning, so we'll wait to confirm when we hear more.
The Four Seasons season 2: story synopsis and rumors
Ginny's pregnancy opens new doors for The Four Seasons season 2(Image credit: Netflix)
Full spoilers forThe Four Seasonsseason 1 to follow. Plus, potential spoilers for season 2.
The Four Seasons season 1 brought comedy and a breadth of emotion with the six friends vacationing together over the course of a year.
And over that year, a lot happened. Like Nick leaving his wife Anne for a much-younger girlfriend, Ginny. And then Nick suddenly dying in the second-to-last episode. Oh, and then Ginny telling the group that she is in fact pregnant with Nick's baby. Excuse us while we try and ground ourselves ready for season 2.
With so much to unpack, we imagine the friends will literally be packing and unpacking their bags ready for four more vacations across four more seasons of the year with Tudum telling viewers to "settle in for another winter, spring, summer and fall."
More seasons means more vacations(Image credit: Netflix)
And we'd predict that those vacation spots will be entirely new ones. Unless, of course, Ginny can lure them all back to the Eco Resort...
Other than where season 1 left viewers, there's not much known about the season 2 plot and that's probably because they only headed back into the writer's room in May.
Though Tina Fey told The Hollywood Reporter, when it comes to writing season 2: "The writers have been very generous a lot of what you saw in season one, a lot is obviously from the movie but a lot also came from all of our lives. Adding: "We are kind of starting from scratch."
To this, Fey's co-creator and co-showrunner Wigfield expanded: "We set up fun dynamics in the finale. Ginny is pregnant, and this friend group is kind of moving on in the wake of their friend's death. There is going to be really interesting stuff to play and already we're starting to talk about it and it's really exciting."
And when it comes to Claude's part in season 2, in conversation with Variety Marco Calvani expressed his hopes for what's next: "Well, it would be fun to see Danny and Claude's group of gay friends.
"But you know, the group will be dealing with a baby now. I have a feeling Claude will confront his desire for a family. It would also be cool to have some scenes with Ginny. We're a bit of the outsiders in the group."
Will there be more seasons of The Four Seasons?
Will the friends reunite for another season?(Image credit: Netflix)
As of right now, there's really no saying whetherThe Four Seasons will return for another series.
Since season 2 hasn't commenced filming yet. In fact, it's still in the writing stages. So, it seems unlikely that there will be any intel on whether season 3 is a possibility until a little while down the road.
The renewal for season 2 happened just days after season 1's release, so if we're to hear any thoughts on season 3, I imagine it won't be until at least 2026. What I do know is that I've never written the word season so many times in my life.
Whether you’re looking for fast speeds or affordable pricing, these are the most dependable internet providers in San Antonio, according to CNET's experts.
AI-generated documents are replacing traditional forgeries and bypassing verification faster than ever imagined
Synthetic identity fraud has surged 195% globally, with Europe and North America hardest hit
Most fraud now happens after onboarding, using tricks like credential stuffing and device spoofing
Synthetic identity document fraud is now spreading at an alarming pace globally, driven almost entirely by the misuse of generative AI, experts have warned.
New data from Sumsub has claimed the creation of fake documents using AI grew by 195% worldwide between Q1 2024 and Q1 2025.
The most dramatic spike was recorded in Europe, where synthetic ID fraud surged by 378%, followed by North America (311%) and the MENA region (258%).
Traditional forgery declines
This trend appears to be gaining ground on traditional document forgery, which has declined sharply in most regions, dropping by 82% in Africa and 50% in North America - with Europe the exception, where traditional forgeries increasing by 33%.
This shift suggests scammers are moving from conventional techniques to AI-generated identities, which can now be produced in seconds using largely unregulated tools.
The industries most affected by this trend include crypto, trading, transportation, fintech, and gambling, all sectors which often rely on rapid onboarding processes and may not yet have strong enough safeguards to detect synthetic documents before damage is done.
Compounding this vulnerability is the fact over three quarter (76%) of fraud now occurs after the onboarding stage, using methods such as device fingerprint spoofing, credential stuffing, and so-called “money muling.”
“The rise of AI-generated fraud is exposing critical flaws in traditional verification systems, and this data shows sophisticated fake documents are becoming a key tool in the fraudster’s arsenal,” said Pavel Goldman-Kalaydin, Head of AI/ML at Sumsub.
“We expect companies like OpenAI to strengthen safeguards controlling the use of its programs to generate passports, IDs, and other personal documents.”
Parallel to this trend is a dramatic rise in deepfake-related fraud, where North America saw a staggering 1,100% increase in such cases, with Europe following at 900%.
Nations like Hong Kong, Singapore, and Germany saw the highest individual surges, raising concerns about the future role of manipulated visual media in identity fraud schemes.
For individuals and organizations trying to protect themselves, relying solely on conventional KYC protocols may no longer be enough. Businesses are advised to use identity management software and multi-layered verification systems for stronger protection.
Consumers should also consider top-rated ID theft protection solutions, especially those that monitor for synthetic identity use. Using reputable people search tools can add an extra layer of safety when verifying unknown contacts or confirming someone’s legitimacy online.
Fake wallet apps ask for your 12-word phrase and quietly drain your crypto funds
CRIL found over 20 Play Store apps built solely to steal users’ crypto credentials
Malicious apps used WebView to fake real login pages from PancakeSwap and others
New research by Cyble Research and Intelligence Labs (CRIL) has uncovered a large-scale phishing campaign involving more than 20 Android applications listed on the Google Play Store.
These apps, which appeared to be legitimate cryptocurrency wallet tools, were created with a singular purpose: stealing users’ mnemonic phrases, the crucial 12-word keys that provide full access to crypto wallets.
Once compromised, victims risk losing their entire cryptocurrency holdings, with no possibility of recovery.
How the apps work and what makes them dangerous
Many of the malicious apps were built using the Median framework, which enables the rapid conversion of websites into Android applications.
Using this method, threat actors embedded phishing URLs directly into the app code or within privacy policy documents.
These links would then load deceptive login pages via a WebView, tricking users into entering their mnemonic phrases under the false belief they were interacting with trusted wallet services such as PancakeSwap, SushiSwap, Raydium, and Hyperliquid.
For example, a fraudulent PancakeSwap app used the URL hxxps://pancakefentfloyd[.]cz/api.php, which led to a phishing page mimicking the legitimate PancakeSwap interface.
Likewise, a fake Raydium app redirected users to hxxps://piwalletblog[.]blog to carry out a similar scam.
Despite variations in branding, these apps shared a common objective: extracting users’ private access keys.
CRIL's analysis revealed that the phishing infrastructure supporting these apps was extensive. The IP address 94.156.177[.]209, used to host these malicious pages, was linked to over 50 other phishing domains.
These domains imitate popular crypto platforms and are reused across multiple apps, indicating a centralized and well-resourced operation.
Some malicious apps were even published under developer accounts previously associated with legitimate software, such as gaming or streaming applications, further lowering user suspicion.
This tactic complicates detection, as even advanced mobile security tools may struggle to identify threats hidden behind familiar branding or developer profiles.
To protect against such attacks, CRIL advises users to download apps only from verified developers and avoid any that request sensitive information.
Using reputable Android antivirus or endpoint protection software, along with ensuring that Google Play Protect is enabled, adds an important, though not infallible, layer of defense.
Strong, unique passwords and multi-factor authentication should be standard practice, and biometric security features should be enabled when available.
Users should also avoid clicking on suspicious links received via SMS or email, and never enter sensitive information into mobile apps unless their legitimacy is certain.
Ultimately, no legitimate app should ever request a full mnemonic phrase through a login prompt. If that happens, it’s likely already too late.
Attackers use real Google URLs to sneak malware past antivirus and into your browser undetected
This malware only activates during checkout, making it a silent threat to online payments
The script opens a WebSocket connection for live control, completely invisible to the average user
A new browser-based malware campaign has surfaced, demonstrating how attackers are now exploiting trusted domains like Google.com to bypass traditional antivirus defenses.
A report from security researchers at c/side, this method is subtle, conditionally triggered, and difficult for both users and conventional security software to detect.
It appears to originate from a legitimate OAuth-related URL, but covertly executes a malicious payload with full access to the user's browser session.
Malware hidden in plain sight
The attack begins with a script embedded in a compromised Magento-based ecommerce site which references a seemingly harmless Google OAuth logout URL: https://ift.tt/axqznMW.
However, this URL includes a manipulated callback parameter, which decodes and runs an obfuscated JavaScript payload using eval(atob(...)).
The use of Google’s domain is central to the deception - because the script loads from a trusted source, most content security policies (CSPs) and DNS filters allow it through without question.
This script only activates under specific conditions. If the browser appears automated or the URL includes the word “checkout,” it silently opens a WebSocket connection to a malicious server. This means it can tailor malicious behavior to user actions.
Any payload sent through this channel is base64-encoded, decoded, and executed dynamically using JavaScript’s Function constructor.
The attacker can remotely run code in the browser in real time with this setup.
One of the primary factors influencing this attack's efficacy is its ability to evade many of the best antivirus programs currently on the market.
The script's logic is heavily obfuscated and only activates under certain conditions, making it unlikely to be detected by even the best Android antivirus apps and static malware scanners.
They will not inspect, flag, or block JavaScript payloads delivered through seemingly legitimate OAuth flows.
DNS-based filters or firewall rules also offer limited protection, since the initial request is to Google’s legitimate domain.
In the enterprise environment, even some of the best endpoint protection tools may struggle to detect this activity if they rely heavily on domain reputation or fail to inspect dynamic script execution within browsers.
While advanced users and cybersecurity teams may use content inspection proxies or behavioral analysis tools to identify anomalies like these, average users are still vulnerable.
Limiting third-party scripts, separating browser sessions used for financial transactions, and remaining vigilant about unexpected site behaviors could all help reduce risk in the short term.
Cortical Labs offers cloud access to neuron-powered computing for just $300 a week
CL1 fuses human brain cells and silicon and can run real code
System enables real-time neural processing for research in AI and neuroscience
Cortical Labs, an Australian startup we've covered previously, has launched what it describes as the world’s first commercially available biological computer capable of running code.
The CL1 device combines lab-grown human neurons with silicon hardware and is designed for neuroscience, biotech, and artificial intelligence research.
Customers can purchase a CL1 unit outright for $35,000 or access it remotely through a weekly rental priced at $300, with the platform already available via Cortical Labs’ wetware-as-a-service.
A new way to study brain function
Each CL1 contains about 800,000 neurons grown from reprogrammed adult cells. These neurons are kept alive by an integrated life-support system that delivers nutrients and controls the environment.
The neurons communicate and adapt using sub-millisecond electrical signals, which the company says allows the CL1 to process inputs and generate outputs almost instantly, offering a new way to study brain function.
“The CL1 does this in real time using simple code abstracted through multiple interacting layers of firmware and hardware,” Brett Kagan, Chief Scientific Officer at Cortical Labs told IEEE Spectrum. “Sub-millisecond loops read information, act on it, and write new information into the cell culture.”
The CL1 builds on DishBrain, a proof-of-concept where neurons learned to play Pong in a simulated environment.
The new model increases input channels, improves signal latency, and includes hardware enhancements that make it more suitable for research and potential commercial applications. It has already been used to restore learning function in neural cultures modeling epilepsy.
The device consumes less power than conventional AI hardware and supports use cases including drug development, AI testing, and disease modeling. It requires buyers to obtain ethical approval for new cell lines and to operate within a lab environment.
Karl Friston, a theoretical neuroscientist, called the CL1 a “remarkable achievement” and noted that it provides researchers with a practical platform to test theories about learning, behavior, and brain function using real neurons.
Is Weber still the king of the grill? We put a slew of top full-sized, tabletop and portable grills to the test to find the best propane and natural gas grills for summer 2025.
The Fiio M21 hi-res audio player costs £279 / $329 (about AU$583)
Quad-DAC configuration and two-stage amplification
Desktop mode for optimized output for hi-fi systems
The arrival of a new affordable audio player from FiiO is guaranteed to get our attention: when we reviewed the JM21 portable music player we were blown away by its sound and its value for money. And now there's a new player that's more powerful without being much more expensive.
Where the JM21 is a dual-DAC device, the new FiiO M21 is a quad-DAC player. And double the DACs doesn't mean double the price: where the JM21 launched at $199 / £179, the M21 is $329 / £279.
FiiO M21 portable audio player: key specifications and features
(Image credit: FiiO)
The M21 is a sleek-looking thing with a big 4.7-inch IPS touchscreen on the front, a glass back, and an octa-core Snapdragon 680 inside it. The device runs Android 13 and comes with 4GB of RAM, 64GB of internal storage with 52GB of that available for use, and you can add up to 2TB via microSD. Bluetooth is 5.0 (SBC, AAC, aptX, aptX HD, LDAC and LHDC).
The DACs are four Cirrus Logic CS4319s arranged to minimize crosstalk and noise. The two-stage amplification provides voltage first and current second, which Fiio says creates a clean and dynamic sonic profile.
A key new feature is M21, a first for Fiio's entry-level Androids. It enables you to connect to a USB-C supply and bypass the battery, delivering up to 21Vpp peak voltage and 950mW per channel into 32 ohms. Desktop mode also enables you to use the M21 as a hi-res streamer for a wider hi-fi system.
Battery life in portable mode is 15 hours over the 3.5mm output and 11.5 hours with the balanced 4.4mm output. And there's an optional retro case that looks like a cassette tape – it's the larger metal-colored box the M21 is sitting on in the main photo at the top.
There's no doubt that this is going to sound fantastic – and I suspect it'll probably cope better with higher volumes than the JM21, which gets a bit shouty when you crank things up too high. And at £279 / $329 the M21 still undercuts many rival hi-res audio devices – not least Fiio's own M23, another player we love.
Between that and the fake-cassette cas,e I think FiiO's come up with a winning formula here. The player is available now.