News
- Purple and green said to be in contention for the iPhone 17
- Apple still hasn't made a decision about which to include
- The phones are expected to be launched in September
For a while now, we've been hearing rumors about how thin the Samsung Galaxy Z Fold 7 is going to be – and a newly leaked hands-on video, supposedly showing a dummy unit for the foldable, gives us more evidence of the foldable's svelteness.
This video comes from TheSinza on YouTube (via 9to5Google), and the dummy unit is compared directly to Samsung's current foldables in terms of its thickness and dimensions, including the Galaxy Z Fold 6.
These dummy units often appear ahead of phone launches, and are based on schematics and information leaked from the supply chain. They don't actually work as phones, but they can be useful for accessory makers getting their wares ready for launch day.
Based on the new video, the Galaxy Z Fold 7 will be 4.5 mm thick when unfolded, so it's going to be significantly slimmer than it's predecessor (5.6 mm), while not quite taking the honor of being the thinnest foldable phone away from the Oppo Find N5 (4.21 mm).
Long-running rumorsRumors that the Samsung Galaxy Z Fold 7 would be super-slim have been swirling since last year, and while nothing is confirmed until this handset is official, it'd be a surprise if it didn't shed some millimeters compared to the 2024 model.
It was only yesterday that we saw freshly leaked renders of this foldable, which again showed off how thin the handset is going to be, front to back – and hinted that the camera bump might be rather large too.
Camera quality is always a concern when you've got a really thin phone, as is battery life. The rumor is that Samsung will introduce new and improved battery tech so that decent battery life can be maintained, even with less space to accommodate a battery.
We've had a leaked release date too: the Samsung Galaxy Z Fold 7 is apparently going to see the light of day on Wednesday, July 9. At the same event we should also see the Samsung Galaxy Z Flip 7 and at least one Samsung Galaxy Watch 8 model.
You might also likeI've been hoping for a long while that bad performing PC ports would become a thing of the past, but over the last few years, that hasn't panned out. The biggest examples of recent games are Rise of the Ronin (which I've covered previously), Star Wars Jedi: Survivor, and Monster Hunter Wilds, which all suffer from constant stuttering and rely on upscaling methods like DLSS for performance stability.
It's not just performance either; the lack of ultrawide compatibility in some games today is alarming, as there's no secret that ultrawide displays have become more mainstream than ever before.
Fortunately, Shift Up's Stellar Blade is one of the recent outliers, with fantastic performance and optimization, including ultrawide compatibility up to a 32:9 aspect ratio.
This also applies to cutscenes, as some titles that do have ultrawide introduce black bars during cutscenes – and yes, I know this is to prevent some strange glitches from happening where you're not supposed to see them. However, I want more titles to include the option to disable black bars (as some games do).
There are numerous popular games I've mentioned before that don't have ultrawide support whatsoever; I won't go into a full deep dive again, but Stellar Blade is another game coming from Sony's PlayStation 5 console that both runs well and adheres to multiple user configurations well – so this is another plea for other game developers to do better.
Stellar Blade is a dream for most desktop and handheld gaming PCs(Image credit: Sony / Shift Up)To give you an idea of how good performance is in Stellar Blade, I've been able to achieve over 60fps at 1080p on medium graphics settings on my Asus ROG Ally, sometimes even reaching low 80fps. Switching on AMD Frame Generation sees the frame rate shoot up to 112fps – and notably, it doesn't feel choppy or laggy, since frame generation tech works best when the base frame rate is up to a good standard (and 60fps is perfect for that).
With the Steam Deck, 60fps on lower settings is easily achieved, too, and this is perhaps one of the very few games that is Deck Verified, and lives up to it. It only gets better if you're using a device like the MSI Claw 8 AI+, which boasts more horsepower than its competitors.
On the side of desktop PCs, Stellar Blade easily runs at over 100fps consistently without the use of Nvidia's Frame Generation, on the highest graphics settings. It's possible thanks to an RTX 4080 Super and an AMD Ryzen 7 5700X3D, and it's a huge indication of just how powerful PC hardware can be when games are made to run optimally.
Don't get me wrong, I'm not saying there aren't other games that don't impress with good optimization, but rather, there are too many bad apples among triple-A titles. Those bad PC ports leave a sour taste behind for those who spend on high-end hardware, because as good as those systems may be, there's only so much they can do to brute force things.
It's also worth noting that handheld gaming PCs are becoming mainstream (or arguably already have), and while a portion of them utilize very powerful hardware, it's not the case with others like the Steam Deck. So, ports like Stellar Blade on PC are great for fans to see, and I'm hoping game developers and publishers can look at this as a template going forward.
You might also like- Gamers, I told you voting with your wallet matters – and Borderlands 4's price tag is a prime example
- Forget the Switch 2 – this dual-screen handheld gaming PC brings back the glory days of the Nintendo DS, but with all your Steam games
- I'm almost certain that Capcom is holding a major character surprise for Resident Evil Requiem – and if it's who I think it is, I'll be stoked for launch
- Venice CPU doubles bandwidth with up to 256 Zen 6 cores
- 2027 AI rack expected to deliver 144 GPUs with Verano chips
- AMD plans Verano and MI500 rollout with 36-rack infrastructure
At its recent Advancing AI event, AMD revealed some of the first technical details about its next-generation Zen 6-based processor, code-named "Venice.”
Built on a 2nm process and packing up to 256 Zen 6 cores - a 33% increase from the current generation EPYC 'Turin' processor - AMD is seeking to raise the bar for AI-optimized compute power.
It is expected to more than double memory bandwidth compared to current EPYC CPUs, hitting 1.6TB/s per socket. Venice also supports PCIe Gen6, offering faster communication between CPUs and GPUs.
Pushing the envelope"Venice extends our leadership across every dimension that matters in the data center," said Lisa Su, AMD CEO. "More performance, better efficiency, and outstanding total cost of ownership."
"It delivers 70% more compute performance than our current generation leadership Turin CPUs," she added. "And to really keep feeding MI400 with data at full speed, at even at rack scale, we have doubled both the GPU and the memory bandwidth and optimized Venice to run at higher speeds. Now we just got Venice back in the labs and it is looking fantastic.”
While Venice headlines AMD's 2026 platform, Su also gave us a glimpse at what the chip giant is working on for 2027.
"We are already deep in the development of our 2027 rack that will push the envelope even further on performance, efficiency and scalability with our next generation Verano CPUs and Instinct MI500-series GPUs, so lots and lots of stuff to come from AMD," she revealed.
This new system builds on the "Helios" rack shown for 2026, which houses 72 MI400 GPUs across 18 racks. For 2027, AMD is planning an even more expansive setup with 36 racks.
Assuming a similar configuration, the next-gen AI rack could contain 144 GPUs. The Verano platform is expected to maintain the high bandwidth and performance efficiency established by Venice, likely with more memory and compute per rack.
AMD has not officially named its 2027 rack, but we hear it’s being informally referred to in industry circles as a larger-scale continuation of Helios.
Via Tom's Hardware
You may also like- Cybercriminals are recycling expired Discord links to launch silent, devastating multi-stage malware attacks
- A fake Discord bot tricks users into running PowerShell commands disguised as CAPTCHA fixes
- Old community invite links now lead to malware servers stealing your data and digital assets
Cybercriminals are increasingly exploiting a lesser-known flaw in Discord’s invitation system to target unsuspecting users, particularly gamers, new research has claimed.
A report from researchers from Check Point found attackers manage to register previously valid invite links with custom vanity URLs.
The tactic involves hijacking once legitimate and trusted expired or deleted Discord invite links and redirecting them to malicious servers hosting multi-stage malware campaigns.
From trusted links to dangerous redirectsThese hijacked links, often embedded in old forum posts, community pages, or social media, are being used to silently funnel users to Discord servers operated by threat actors.
Once on these fake servers, users are greeted with what appears to be a standard verification process.
A bot named “Safeguard” prompts visitors to click a “Verify” button, which initiates an OAuth2 process and redirects them to a phishing site.
The site employs a social engineering method called “ClickFix,” where users are tricked into copying and running a PowerShell command under the guise of fixing a broken CAPTCHA.
This action silently launches the malware installation chain, with the attackers using cloud services such as Pastebin, GitHub, and Bitbucket to deliver the payloads in multiple stages, allowing them to blend into normal network traffic.
Initial scripts download executables that retrieve further encrypted payloads, which include AsyncRAT, a tool that gives attackers remote control over infected systems, and a tailored variant of the Skuld Stealer designed to extract credentials and cryptocurrency wallet data.
Gamers have become a prime target, with campaigns even disguising malware as tools like The Sims 4 DLC unlockers - one archive named Sims4-Unlocker.zip was downloaded over 350 times, highlighting the campaign's reach.
Through clever evasion techniques such as delayed execution and command-line argument checks, the malware often bypasses detection from even the best antivirus software.
The threats extend beyond typical malware infections. The Skuld Stealer used in these attacks can extract crypto wallet seed phrases and passwords, effectively granting full control over victims’ digital assets.
Considering the focus on cryptocurrency theft and credential harvesting, individuals should reinforce their defenses with robust identity theft protection services.
These tools can monitor for unauthorized use of personal information, alert users to breaches, and assist in recovering compromised digital identities.
While some might assume that endpoint protection tools would shield them from these tactics, the multi-layered, modular structure of the attack often flies under the radar.
To stay safe, users must be wary of Discord invite links, especially those embedded in old content. Also, avoid running unexpected scripts or following suspicious verification steps.
You might also like- These are the best internet security suites available
- Take a look at our pick of the best best VPNs with antivirus you can use right now
- World's largest AI chip maker hit by crypto scam - Cerebras says token isn't real, so don't fall for it
- TSA warns public USB ports can be loaded with malware that silently steals your data without detection
- "Juice jacking" attacks can capture text messages, contact lists, and even keystrokes from your device
- Free Wi-Fi may cost nothing, but it could be the gateway to losing your identity
As millions of Americans prepare for summer vacation, the US Transportation Security Administration (TSA) has issued a timely cybersecurity alert warning travelers about criminal tactics designed to steal personal information.
The risk include tampered USB charging stations at airports and fake public Wi-Fi networks.
The former, know as “juice jacking,” sees cybercriminals install malware on public USB charging stations - once a user plugs in their phone, the compromised port can silently transmit malware or extract data from the device.
Public USB ports and free Wi-Fi risksThe warning comes amid heightened concerns about identity theft and digital surveillance as more people rely on connected devices while traveling.
Though some skeptics argue that widespread, confirmed cases are rare, the theoretical risk remains a concern for cybersecurity professionals.
When a USB port serves both data and power functions, an attacker could modify the circuit or insert a small data-sniffing implant inside the terminal, allowing them to harvest contact lists, text messages, and even keystrokes, depending on the vulnerability of the device.
To reduce exposure, the TSA recommends travelers use their own wall adapters or power banks, or simply avoid direct USB connections through untrusted sources.
Another tactic flagged by the TSA involves free public Wi-Fi networks.
These so-called "honeypot" networks appear legitimate, often named after the airport or airline, but are controlled by criminals.
Once connected, the attacker can perform a man-in-the-middle attack, intercepting all the data a traveler transmits, including credit card numbers, passwords, and business logins.
In more advanced cases, they might inject fake web pages that trick users into revealing credentials.
This attack can slip through the strongest passwords and cause identity theft, therefore, it is important for users to have their virtual private networks (VPNs) and ensure their devices are protected with the best identity theft protection software.
If you must use a public Wi-Fi, the TSA warns that you should never “enter any sensitive info while using unsecure WiFi.”
This advice aligns with broader recommendations often found in best antivirus and endpoint protection guides, which frequently emphasize physical device safety in addition to digital security tools.
You might also like