Sunday, August 31, 2025

Today's NYT Connections Hints, Answers and Help for Sept. 1, #813

Here are some hints and the answers for the NYT Connections puzzle, No. 813, for Monday, Sept. 1.

from CNET https://ift.tt/mU8R3lL

Today's Wordle Hints, Answer and Help for Sept. 1, #1535

Here are hints and the answer for today's Wordle, No. 1,535, for Monday, Sept. 1.

from CNET https://ift.tt/e4aKDuE

Latest Tech News

  • Microsoft has revealed how it protects Azure with an Integrated HSM chip
  • Azure security stack includes Azure Boost, Hydra BMC and Caliptra 2.0
  • Cybercrime reportedly worth $10.2 trillion annually, making it the world’s third-largest economy in 2025

Microsoft has revealed more on the custom-built security chip it deploys across every Azure server, aiming to counter what it calls a cybercrime “pandemic” now costing $10 trillion annually.

The Azure Integrated HSM, which was first announced in late 2024, is the centerpiece of a wider security architecture the company outlined at the recent Hot Chips 2025 event.

A slide Microsoft showed there claims the global cost of cybercrime is currently $10.2 trillion - meaning it now ranks as the equivalent of the third-largest economy in the world.

Cybercrime is third largest GDP

(Image credit: Microsoft)

Azure security measures

The trillion-dollar estimate places cybercrime behind the United States and China, but ahead of Germany and Japan, and also far bigger than the entire AI market.

Microsoft said the scale of the threat requires both architectural and operational changes.

As ServeTheHome reports, the company listed a number of statistics at the event, including that Azure already spans more than 70 regions and 400 data centers, supported by 275,000 miles of fiber and 190 network points of presence, along with employing 34,000 engineers dedicated to security.

To take on the cybersecurity problem at a hardware level, Microsoft moved from a centralized hardware security module model to its own Azure Integrated HSM.

The custom ASIC is designed to meet FIPS 140-3 Level 3 requirements, providing tamper resistance and local key protection within servers.

By embedding the chip in each system, cryptographic functions no longer need to pass through a centralized cluster, reducing latency while enabling tasks such as AES, PKE and intrusion detection locally.

ServeTheHome noted building an in-house chip required trade-offs. Instead of scaling hardware security modules at a cluster level, Microsoft had to size them for individual servers.

The result, the company argued, was a balance between performance, efficiency and resilience.

The tech giant also presented its “Secure by Design” architecture at Hot Chips, part of its Secure Future Initiative.

This includes Azure Boost, which offloads control plane services to a dedicated controller and isolates them from customer workloads, and the Datacenter Secure Control Module, which integrates Hydra BMC, and enforces a silicon root of trust on management interfaces.

Confidential computing, backed by trusted execution environments, extends protection to workloads in multi-tenant environments.

Caliptra 2.0, developed in collaboration with AMD, Google and Nvidia, anchors security in silicon and now incorporates post-quantum cryptography through the Adams Bridge project.

Microsoft Secure by Design

(Image credit: Microsoft)

You might also like



from Latest from TechRadar US in News,opinion https://ift.tt/ut26Ffd

Saturday, August 30, 2025

Today's NYT Connections Hints, Answers and Help for Aug. 31, #812

Here are some hints and the answers for the NYT Connections puzzle for Aug. 31, #812.

from CNET https://ift.tt/FsZc9vQ

Today's Wordle Hints, Answer and Help for Aug. 31, #1534

Here are hints and the answer for today's Wordle for Aug. 31, No. 1,534.

from CNET https://ift.tt/UJv3Lrp

Latest Tech News

  • The iconic floppy disk is reborn as a storage case for today's terabyte-packing SD cards
  • From 1.44MB past to terabyte present, the new design bridges eras creatively
  • Fun artwork references glitch aesthetics and retro computing

Floppy disks are unquestionably a relic from the past, although they still keep resurfacing in unusual places - most recently, surfacing in the American prison service, and an enterprising YouTuber set out to build a floppy disk from scratch.

If you're of a certain age, you'll no doubt still remember the feeling of sliding a floppy disk into a computer, hearing that quiet click, and waiting as files loaded bit by bit. That memory will come rushing back with the Floppy Disk-Inspired SD Card Packaging, a design concept created by Indian industrial designer Ayushmaan Singh Jodha for SanDisk.

It takes the iconic 3.5-inch floppy and reimagines it as a different kind of storage device - as a case for today’s SD cards.

floppy disk concept

(Image credit: Ayushmaan Singh Jodha )

From megabytes to terabytes

Where a floppy once held 1.44MB, this design protects cards that now carry gigabytes or even terabytes.

The idea bridges eras of technology in a fun way, but with a serious practical purpose.

SD cards can easily get lost, slipping out of pockets during a shoot, hiding beneath clutter in a busy studio, or disappearing into the depths of a travel bag. I’ve lost a good number of them over the years.

The floppy case provides a larger, sturdier object to hold onto, making it easier to keep track of the tiny cards that store important work.

The packaging keeps the same square profile and iconic shutter, transforming an obsolete form into a fresh, modern tool.

The design showcases artwork that references early computer culture, glitchy error screens, and retro sci-fi themes. The idea is turn the cases into collectible pieces that creatives may want to keep on display, not tucked away in drawers.

The sliding shutter reveals the hidden compartment where the SD card is stored, adding a small sense of interaction to an otherwise simple task.

Is it truly practical? No, but it’s fun and something I’d love to own.

Via Yanko Design

You might also like



from Latest from TechRadar US in News,opinion https://ift.tt/9G8oI3P

Latest Tech News

  • 5G phones can be silently downgraded to insecure 4G, leaving the device exposed
  • The exploit works without setting up expensive and complex fake towers
  • Tested smartphones include flagship models from Samsung, Google, Huawei, and OnePlus

In late 2023, researchers uncovered a set of flaws in 5G modem firmware from major chipmakers, including MediaTek and Qualcomm, collectively named 5Ghoul.

A group of academics at the Singapore University of Technology and Design (SUTD) has now shown how 5G phones can be tricked into falling back to 4G networks through a method that avoids the need for a fake base station.

Instead, it targets a vulnerable stage of communication between phone and tower, where critical messages remain unencrypted.

How the toolkit works in practice

The SNI5GECT toolkit, short for “Sniffing 5G Inject,” makes use of the tiny time window at the start of a connection attempt.

It targets the pre-authentication phase, when the data passing between the tower and the phone remains unencrypted.

Because of this gap, attackers can intercept and inject messages without needing to know the phone’s private credentials.

During this stage, the system can capture identifiers sent from the tower and use them to read and modify messages.

With such access, the attacker can force a modem crash, map a device fingerprint, or trigger a switch from 5G to 4G.

Since 4G carries long-known flaws, the forced downgrade leaves the target open to older tracking or location attacks.

The tests revealed a success rate between 70% and 90% when attempted from around twenty meters away, suggesting the method works in realistic conditions.

The academics tested the framework on several smartphones, including popular models from Samsung, Google, Huawei, and OnePlus.

In these cases, the researchers were able to intercept both uplink and downlink traffic with notable accuracy.

Importantly, the method avoids the complexity of setting up a rogue base station, something that has long limited practical attacks on mobile networks.

The Global System for Mobile Communications Association (GSMA) has since confirmed the issue and assigned it the identifier CVD-2024-0096, marking it as a downgrade risk.

The claim from the team is that their toolkit is not meant for criminal use but for further research into wireless security.

They argue it could help with the development of packet-level detection and new forms of 5G protection.

Still, the ability to crash devices or silently downgrade them raises questions about the resilience of current networks.

While no clear reports exist of real-world abuse so far, the method is public and the software is open source, so the risk remains that skilled actors could adapt it.

Unfortunately, users have few direct options to block such low-level exploits, though broader digital hygiene may help limit downstream risks.

However, running updated antivirus software, securing credentials with a password manager, and enabling an authenticator app for accounts can reduce the impact of secondary attacks that might follow from a network downgrade.

Via The Hacker News

You might also like



from Latest from TechRadar US in News,opinion https://ift.tt/Nqp3lSf

Friday, August 29, 2025

You Can Lose That Weight (and Keep It Off) by Avoiding These 6 Habits

If your weight loss journey has stalled, these six habits could be to blame.

from CNET https://ift.tt/VxJWOiZ

Latest Tech News

  • SK Telecom suffered a data breach that was discovered in April 2025
  • It affected roughly 27 million people
  • The company was fined for it, and will need to make significant changes to its operations

SK Telecom (SKT), one of the biggest telecommunications services providers in South Korea, was fined almost $100 million for failing to protect user data.

In April 2025, the company discovered a malware breach that allowed threat actors to lurk within its systems for years. Some researchers even claim the attack started in August 2021.

The miscreants targeted SKT’s Home Subscriber Server (HSS) and other critical infrastructure, exposing sensitive subscriber data, including USIM authentication keys (KI), International Mobile Subscriber Identity (IMSI) numbers, IMEI device identifiers, phone numbers, email addresses, and possibly other personal data.

"Very weak condition"

Approximately 27 million people were affected by the breach.

Now, Reuters reports that the government-run Personal Information Protection Commission issued a statement, confirming the fine of about 134 billion won ($96.53 million) for “neglecting its duty to take safety measures” and for “delays in notifying the leak to customers”.

The statement also claims SKT’s systems were in a “very weak condition” which allowed threat actors to access the company’s intranet. There were no passwords, or other safety measures, defending the servers from outside influence, and operating systems were outdated and running without the latest security patches.

Besides being forced to pay the fine, the company will also have to “strengthen safety rules on information protection” and revamp its governance.

Responding to a Reuters inquiry, SK Telecom said it “felt a grave responsibility” and will make protecting customer information a “top priority”.

In response, it launched an “Information Security Innovation Plan”, that includes implementing zero-trust architecture, expanding encryption, forming a red team, elevating the CISO role to report directly to the CEO, and adding cybersecurity experts to the board.

Customers received free USIM card replacements, and were offered 50% off August subscription fees. Furthermore, whoever wanted to cancel their contract prematurely was allowed to do so without extra fees.

Via Reuters

You might also like



from Latest from TechRadar US in News,opinion https://ift.tt/bteAFWE

Thursday, August 28, 2025

I Tried Netflix's Zodiac Hub and Found a Fun New Show That Matched My Astrological Sign

Yes, I'm a Sagittarius with chaotic, action-oriented tastes. Netflix's astrologically based recommendations worked for me.

from CNET https://ift.tt/oemqifT

The Console Wars Are Officially Ending

Console game exclusivity is slowly waning. It's time to let go of the toxicity and play something fun.

from CNET https://ift.tt/uI2SHag

Latest Tech News

  • Nvidia Jetson Thor is framed as the robot brain for physical AI
  • Major robotics companies are already listed as early adopters worldwide
  • Nvidia Jetson Thor offers 2,070 FP4 teraflops within a 130-watt power envelope

Nvidia has released the Jetson AGX Thor developer kit, calling it the next step toward robotics systems which can function in real time.

The system, built on the Blackwell GPU line, is framed as a platform for “physical AI” and advanced robotic functions across manufacturing, logistics, healthcare, farming, retail, and transport.

Nvidia says it can deliver up to 7.5 times more AI compute and over three times the energy efficiency of its Jetson Orin line, which has been in wide use since 2022.

Offers supercomputer-level capacity

Nvidia went on to describe Jetson Thor as “the ultimate supercomputer to drive the age of physical AI and general robotics.”

“We’ve built Jetson Thor for the millions of developers working on robotic systems that interact with and increasingly shape the physical world,” said Jensen Huang, founder and CEO of Nvidia.

“With unmatched performance and energy efficiency, and the ability to run multiple generative AI models at the edge, Jetson Thor is the ultimate supercomputer to drive the age of physical AI and general robotics.”

With a quoted figure of 2,070 FP4 teraflops in a 130-watt envelope, it is positioned as powerful enough to run multiple generative models at once.

It supports vision-language-action models like Isaac GR00T N1.5, along with other LLM systems.

The device also integrates 128GB of memory, which is expected to make it capable of handling larger AI workflows at the edge.

Several robotics players are already listed as early adopters, including Agility Robotics, Amazon Robotics, Boston Dynamics, Caterpillar, Hexagon, and Medtronic.

Meta has also been named as an early partner, while companies such as John Deere, OpenAI, and Physical Intelligence are said to be testing the system.

“Nvidia Jetson Thor offers the computational horsepower and energy efficiency necessary to develop and scale the next generation of AI-powered robots that can operate safely and effectively in dynamic, real-world environments, transforming how we move and manage goods globally,” said Tye Brady, chief technologist at Amazon Robotics.

Nvidia notes more than two million developers already use its robotics stack, with over 7,000 customers having deployed Jetson Orin hardware in edge AI projects.

Jetson Thor runs on the Nvidia Jetson software platform, which is designed to support multiple AI tools at once.

The package integrates with Nvidia Isaac for simulation, Metropolis for vision AI, and Holoscan for real-time sensor processing.

This arrangement is intended to allow one system-on-module to support many AI writer models and workflows, rather than requiring several separate chips.

The developer kit is available now at $3,499 and the production systems, including carrier boards, will be distributed worldwide through its partners.

You might also like



from Latest from TechRadar US in News,opinion https://ift.tt/Z5jDASw

Wednesday, August 27, 2025

I Went to the Dollar Store for Cheap Tech, and the Results Were Surprising

Dollar Tree, Dollar General, Five Below and Daiso all sell tech, but is any of it worth the money? I decided to check it out and see.

from CNET https://ift.tt/5xEKWwd

Best Desks of 2025: I've Spent Nearly 4,000 Hours Testing Desks. These Are the Ones You Want

We tested many kinds of desks to find the best for various needs.

from CNET https://ift.tt/DpYPHB1

Latest Tech News

  • Nvidia’s H20 chip became collateral in a heated geopolitical clash
  • Nvidia’s revenue stream risks serious disruption with the Chinese market tightening
  • Chinese tech giants hesitate to abandon Nvidia hardware for weaker alternatives

China’s recent decision to tighten restrictions on Nvidia’s H20 chip sales has drawn attention not only because of the technology involved, but also because of the circumstances which triggered it.

Reports indicate comments made by U. Commerce Secretary Howard Lutnick in mid-July 2025 were viewed as both “insulting” and brash by China's government.

In a televised interview, Lutnick stated Washington’s strategy was to ensure Chinese developers became “addicted” to the American technology stack.

Rising tensions after controversial remarks

“We don’t sell them our best stuff, not our second-best stuff, not even our third-best,” Lutnick had told CNBC.

“You want to sell the Chinese enough that their developers get addicted to the American technology stack, that’s the thinking,” he added.

The Chinese considered this remark unnecessarily arrogant, and it is now engineering a move that presents sustained sales headwinds for Nvidia, a company that has long viewed the country as a major market.

The H20 chip, developed specifically for China after export controls restricted access to more advanced models, had become a key product for local AI firms.

Nvidia CEO Jensen Huang visited Beijing recently, and stressed the firm’s commitment to staying competitive in the region.

Still, with China accounting for at least 15% of Nvidia’s total revenue, any disruption to H20 orders represents a serious challenge.

Washington and Beijing had previously struck a framework agreement earlier in 2025 allowing H20 sales to resume in China while Beijing restored some rare earth exports.

That deal was interpreted as a step toward stabilizing relations. Yet by late July 2025, Chinese regulators such as the Cyberspace Administration of China and the Ministry of Industry and Technology began advising firms to halt new H20 orders.

This guidance, framed as a response to Lutnick’s remarks, highlights the fragility of recent progress.

Alongside the restrictions, Beijing has promoted the use of domestic chips, including those from Huawei.

However, doubts remain about their effectiveness, and DeepSeek had to delay the launch of its new R2 model after difficulties training with Huawei Ascend processors.

Chinese tech giants like Alibaba, Baidu, and ByteDance have also been reluctant to fully switch, citing stronger performance from Nvidia hardware compared with local alternatives.

The episode illustrates how political statements can rapidly alter corporate fortunes, especially when national security and technology leadership are at stake.

While Nvidia has disputed claims of security risks tied to its products, Beijing’s regulators appear determined to limit reliance on US-made chips.

Whether Chinese firms can scale up to fill the gap remains uncertain, but what is clear is that Lutnick’s words have accelerated a process of decoupling that may unfold far quicker than industry analysts initially expected.

Via Financial Times

You might also like



from Latest from TechRadar US in News,opinion https://ift.tt/Uu2Efxs

Latest Tech News

A patch was released to fix the bugs and users were forced to update their PIN codes. from Latest from TechRadar https://ift.tt/WpfjTPR