Thursday, September 4, 2025

Latest Tech News

How to boost an already impressive wireless AirPlay speaker.

from Latest from TechRadar https://ift.tt/Q3XfnUg

Latest Tech News

Google Ironwood TPU scales to 9216 chips with record 1.77PB shared memory.

from Latest from TechRadar https://ift.tt/emfqIuB

Wednesday, September 3, 2025

Latest Tech News

007 First Light is channeling the best of the franchise and already has all the makings of a fantastic, cinematic globe-trotting secret agent adventure.

from Latest from TechRadar https://ift.tt/FrCSLqt

Latest Tech News

Automatic online storage arrives in Microsoft Word, improving reliability yet raising debate.

from Latest from TechRadar https://ift.tt/Op7yDEi

Tuesday, September 2, 2025

Labor Day Deal: I Put AirTags on Everything — and This $70 Four-Pack Could Be Gone Any Minute

I use AirTags for travel and tracking everything from my bike to my keys. If you want to stock up, you can get a four-pack for $70 during Amazon's Labor Day sale.

from CNET https://ift.tt/MfojnBF

Latest Tech News

With profits and revenue surging, is Cambricon becoming "China’s Nvidia", or an overvalued AI player that risks collapse?

from Latest from TechRadar https://ift.tt/vxAuLpl

Monday, September 1, 2025

Latest Tech News

Here are seven fantastic movies with great Rotten Tomatoes scores to stream on Paramount+ in September.

from Latest from TechRadar https://ift.tt/1ok2daN

Latest Tech News

Beelink launches budget-price EQi13 Pro mini PC with a choice of Intel processors, quiet 32dB cooling, dual Ethernet ports, and a durable full-metal chassis.

from Latest from TechRadar https://ift.tt/WNIknhu

Sunday, August 31, 2025

Today's NYT Connections Hints, Answers and Help for Sept. 1, #813

Here are some hints and the answers for the NYT Connections puzzle, No. 813, for Monday, Sept. 1.

from CNET https://ift.tt/mU8R3lL

Today's Wordle Hints, Answer and Help for Sept. 1, #1535

Here are hints and the answer for today's Wordle, No. 1,535, for Monday, Sept. 1.

from CNET https://ift.tt/e4aKDuE

Latest Tech News

  • Microsoft has revealed how it protects Azure with an Integrated HSM chip
  • Azure security stack includes Azure Boost, Hydra BMC and Caliptra 2.0
  • Cybercrime reportedly worth $10.2 trillion annually, making it the world’s third-largest economy in 2025

Microsoft has revealed more on the custom-built security chip it deploys across every Azure server, aiming to counter what it calls a cybercrime “pandemic” now costing $10 trillion annually.

The Azure Integrated HSM, which was first announced in late 2024, is the centerpiece of a wider security architecture the company outlined at the recent Hot Chips 2025 event.

A slide Microsoft showed there claims the global cost of cybercrime is currently $10.2 trillion - meaning it now ranks as the equivalent of the third-largest economy in the world.

Cybercrime is third largest GDP

(Image credit: Microsoft)

Azure security measures

The trillion-dollar estimate places cybercrime behind the United States and China, but ahead of Germany and Japan, and also far bigger than the entire AI market.

Microsoft said the scale of the threat requires both architectural and operational changes.

As ServeTheHome reports, the company listed a number of statistics at the event, including that Azure already spans more than 70 regions and 400 data centers, supported by 275,000 miles of fiber and 190 network points of presence, along with employing 34,000 engineers dedicated to security.

To take on the cybersecurity problem at a hardware level, Microsoft moved from a centralized hardware security module model to its own Azure Integrated HSM.

The custom ASIC is designed to meet FIPS 140-3 Level 3 requirements, providing tamper resistance and local key protection within servers.

By embedding the chip in each system, cryptographic functions no longer need to pass through a centralized cluster, reducing latency while enabling tasks such as AES, PKE and intrusion detection locally.

ServeTheHome noted building an in-house chip required trade-offs. Instead of scaling hardware security modules at a cluster level, Microsoft had to size them for individual servers.

The result, the company argued, was a balance between performance, efficiency and resilience.

The tech giant also presented its “Secure by Design” architecture at Hot Chips, part of its Secure Future Initiative.

This includes Azure Boost, which offloads control plane services to a dedicated controller and isolates them from customer workloads, and the Datacenter Secure Control Module, which integrates Hydra BMC, and enforces a silicon root of trust on management interfaces.

Confidential computing, backed by trusted execution environments, extends protection to workloads in multi-tenant environments.

Caliptra 2.0, developed in collaboration with AMD, Google and Nvidia, anchors security in silicon and now incorporates post-quantum cryptography through the Adams Bridge project.

Microsoft Secure by Design

(Image credit: Microsoft)

You might also like



from Latest from TechRadar US in News,opinion https://ift.tt/ut26Ffd

Saturday, August 30, 2025

Today's NYT Connections Hints, Answers and Help for Aug. 31, #812

Here are some hints and the answers for the NYT Connections puzzle for Aug. 31, #812.

from CNET https://ift.tt/FsZc9vQ

Today's Wordle Hints, Answer and Help for Aug. 31, #1534

Here are hints and the answer for today's Wordle for Aug. 31, No. 1,534.

from CNET https://ift.tt/UJv3Lrp

Latest Tech News

  • The iconic floppy disk is reborn as a storage case for today's terabyte-packing SD cards
  • From 1.44MB past to terabyte present, the new design bridges eras creatively
  • Fun artwork references glitch aesthetics and retro computing

Floppy disks are unquestionably a relic from the past, although they still keep resurfacing in unusual places - most recently, surfacing in the American prison service, and an enterprising YouTuber set out to build a floppy disk from scratch.

If you're of a certain age, you'll no doubt still remember the feeling of sliding a floppy disk into a computer, hearing that quiet click, and waiting as files loaded bit by bit. That memory will come rushing back with the Floppy Disk-Inspired SD Card Packaging, a design concept created by Indian industrial designer Ayushmaan Singh Jodha for SanDisk.

It takes the iconic 3.5-inch floppy and reimagines it as a different kind of storage device - as a case for today’s SD cards.

floppy disk concept

(Image credit: Ayushmaan Singh Jodha )

From megabytes to terabytes

Where a floppy once held 1.44MB, this design protects cards that now carry gigabytes or even terabytes.

The idea bridges eras of technology in a fun way, but with a serious practical purpose.

SD cards can easily get lost, slipping out of pockets during a shoot, hiding beneath clutter in a busy studio, or disappearing into the depths of a travel bag. I’ve lost a good number of them over the years.

The floppy case provides a larger, sturdier object to hold onto, making it easier to keep track of the tiny cards that store important work.

The packaging keeps the same square profile and iconic shutter, transforming an obsolete form into a fresh, modern tool.

The design showcases artwork that references early computer culture, glitchy error screens, and retro sci-fi themes. The idea is turn the cases into collectible pieces that creatives may want to keep on display, not tucked away in drawers.

The sliding shutter reveals the hidden compartment where the SD card is stored, adding a small sense of interaction to an otherwise simple task.

Is it truly practical? No, but it’s fun and something I’d love to own.

Via Yanko Design

You might also like



from Latest from TechRadar US in News,opinion https://ift.tt/9G8oI3P

Latest Tech News

  • 5G phones can be silently downgraded to insecure 4G, leaving the device exposed
  • The exploit works without setting up expensive and complex fake towers
  • Tested smartphones include flagship models from Samsung, Google, Huawei, and OnePlus

In late 2023, researchers uncovered a set of flaws in 5G modem firmware from major chipmakers, including MediaTek and Qualcomm, collectively named 5Ghoul.

A group of academics at the Singapore University of Technology and Design (SUTD) has now shown how 5G phones can be tricked into falling back to 4G networks through a method that avoids the need for a fake base station.

Instead, it targets a vulnerable stage of communication between phone and tower, where critical messages remain unencrypted.

How the toolkit works in practice

The SNI5GECT toolkit, short for “Sniffing 5G Inject,” makes use of the tiny time window at the start of a connection attempt.

It targets the pre-authentication phase, when the data passing between the tower and the phone remains unencrypted.

Because of this gap, attackers can intercept and inject messages without needing to know the phone’s private credentials.

During this stage, the system can capture identifiers sent from the tower and use them to read and modify messages.

With such access, the attacker can force a modem crash, map a device fingerprint, or trigger a switch from 5G to 4G.

Since 4G carries long-known flaws, the forced downgrade leaves the target open to older tracking or location attacks.

The tests revealed a success rate between 70% and 90% when attempted from around twenty meters away, suggesting the method works in realistic conditions.

The academics tested the framework on several smartphones, including popular models from Samsung, Google, Huawei, and OnePlus.

In these cases, the researchers were able to intercept both uplink and downlink traffic with notable accuracy.

Importantly, the method avoids the complexity of setting up a rogue base station, something that has long limited practical attacks on mobile networks.

The Global System for Mobile Communications Association (GSMA) has since confirmed the issue and assigned it the identifier CVD-2024-0096, marking it as a downgrade risk.

The claim from the team is that their toolkit is not meant for criminal use but for further research into wireless security.

They argue it could help with the development of packet-level detection and new forms of 5G protection.

Still, the ability to crash devices or silently downgrade them raises questions about the resilience of current networks.

While no clear reports exist of real-world abuse so far, the method is public and the software is open source, so the risk remains that skilled actors could adapt it.

Unfortunately, users have few direct options to block such low-level exploits, though broader digital hygiene may help limit downstream risks.

However, running updated antivirus software, securing credentials with a password manager, and enabling an authenticator app for accounts can reduce the impact of secondary attacks that might follow from a network downgrade.

Via The Hacker News

You might also like



from Latest from TechRadar US in News,opinion https://ift.tt/Nqp3lSf

Latest Tech News

DDR5 memory sticks with a triple-fan cooler on top are going to leave your wallet quaking in fear. from Latest from TechRadar https://ift....