News

I've been testing vacuums for over a year, here's the cheap vac I'd recommend to my thrifty friends - Thursday, August 14, 2025 - 10:11

I've been reviewing vacuum cleaners at TechRadar for the past 18 months, during which time I've tested some of the very best vacuum cleaners money can buy, from vacuums that that can empty themselves, and vacuums that can tell you exactly what they're sucking up, to vacuums with lasers.

And while all of those vacuums are impressive, I'll concede that what most people want is a vacuum that does a good job of cleaning their floors, is comfortable to use, and – crucially – doesn't require them to take out a loan in order to purchase it.

Broadly speaking, you do get what you pay for with vacuum cleaners, so if you can I'd steer clear of the ultra-cheap end of the market. However, there are some real hidden gems in the budget bracket. Read on for a closer look at my favorite cheap vacuum cleaner – the one I recommend to my thrifty friends and family members – plus three great-value alternatives to consider if my top pick doesn't take your fancy.

This article focuses on US picks – click here for UK recommendations.

My #1 cheap vacuum cleaner in the US

(Image credit: Future)

The Shark Stratos Corded Stick vacuum is well designed, with suction powerful enough to clear vast amounts of dog hair from our tester's carpets. The supplied attachments are useful, and the modular design means this vacuum can be used in a number of configurations for different cleaning tasks.

At full price it's a relatively affordable $299.99, but deals crop up fairly regularly, and right now you can snap one up for a bargain $179.99 - and with that price cut, it's incredible value for money.

Various special features help elevate it well above what I'd expect for that budget-friendly price. The floorhead has LED lights to help illuminate dark corners, and is designed so that hair won't tangle around the brushroll. There's also an odor-neutralizer cartridge, which won over our tester by leaving his carpets smelling lovely and fresh.

A big reason why this vacuum is so cheap is because it's corded. In a world of mostly cordless vacuums, that can seem old-fashioned and inconvenient, but there are benefits to going corded that go beyond just price. The suction is almost always far superior to what you'd get on a cordless model, plus corded vacuums tend to last longer in general, so you're getting a better return on your investment. And, of course you'll never run out of juice, either. If having a cord is a deal-breaker, I've included three great cheap, cordless alternatives below.

Alternatives to consider...

Not sold on the Shark Corded? Here are three alternatives that also impressed me by punching well above their diminutive price tags.

Dreame R20

The Dreame R20 is my favorite cordless vacuum overall – and not just in the budget bracket. It's powerful, lightweight and maneuverable, with advanced extras like automatic suction adjustment and a special head for hard flooring. The runtimes are long, too.

Read our full Dreame R20 review

Shark Detect Pro Cordless

It's less powerful than the corded Stratos, but the Detect Pro is nimble and lightweight, with clever detection and automation features. You can also opt for a version with an auto-empty dock, although that costs a little more.

Read our full Shark Detect Pro cordless review

Dyson V8

It's not cheap in the wider market, coming in around $360 with current deals, but this is the cheapest Dyson vacuum. You're getting that premium build quality and meticulous engineering, plus it's lightweight and versatile.

Read our full Dyson V8 review

Native capture: why it’s non-negotiable for modern compliance teams - Thursday, August 14, 2025 - 10:12

Have you ever tried reading an iMessage thread exported into an email? It’s like viewing your Instagram feed through an A4 binder.

Welcome to the reality many compliance teams face today: digital conversations that look nothing like the originals, stripped of context and flattened into disorienting formats. That’s a problem, as regulatory reviews require not just the message, but the full story.

That story lives in native data. If you’re not capturing it, you’re already a step behind.

What is native data, and why should you care?

Native data means capturing communications exactly as they happened, in their original environment, with every bit of context intact. That includes:

  • Timestamps and delivery receipts
  • Message order and full threading
  • Reactions, emojis, and edits
  • Attachments, formatting, and metadata

It doesn’t matter whether the conversation happened over Slack, WhatsApp, SMS, iMessage, Teams, or somewhere else entirely. Suppose you're reviewing those messages out of order or in a restructured format (looking at you, exported email chains). In that case, you're missing more than just convenience - you're losing critical details that are essential for an accurate compliance review.

Native capture isn’t about bells and whistles - quite the opposite. It’s about authentically recreating the conversation that has taken place, ensuring accuracy, auditability, and trust.

The risk of non-native capture

When messages are exported, summarized, or reformatted, a lot gets lost in translation:

  • Threads break apart. You review individual communications without any indication of how they relate. This can completely shift the meaning associated with each message.
  • Reactions disappear. A thumbs-up to a risky comment? Gone.
  • Edits vanish. There’s no way to tell what was changed, or when.
  • Timestamps warp. Or worse, they’re missing altogether.
  • The message gets jammed into an email that appears to have been written by a robot.

This kind of context stripping isn’t just frustrating, it’s dangerous. Reviewers are forced into manual reconstruction mode, which slows down investigations, adds more scope for human error, and increases the risk of missing critical signs of misconduct. It also makes audits significantly harder to defend.

When firms struggle to explain key interactions to regulators - because the records were incomplete or misaligned with the original user experience - that’s more than just a gap. It’s a compliance liability.

Why native matters for investigations

When compliance teams investigate digital communications, they shouldn’t have to rebuild conversations manually from raw exports. That’s not oversight, it’s archaeology.

With native capture, the full conversation is laid out as it actually occurred. Messages are threaded. Metadata is intact. Reactions, edits, and attachments are all right where they belong.

This dramatically reduces the time spent hunting for context, and eliminates the need to second-guess what was meant. It also cuts down on false positives, enabling faster, clearer decision-making. When regulators come knocking, you can confidently hand over records that are complete, verifiable, and defensible.

What native capture enables

Native capture isn’t just a compliance checkbox - it’s a strategic enabler. When your team has access to fully native, context-rich communications, there is nothing to decipher. You gain real-time oversight rather than relying on after-the-fact deductions. Investigations become faster and smoother, with fewer bottlenecks slowing you down.

Native capture also fosters alignment across teams. Whether Legal, Risk, or Marketing, everyone is working from the same trusted source of truth. This shared clarity builds confidence when facing regulators, internal stakeholders, or legal scrutiny.

Ultimately, native capture provides the clarity compliance leaders need to shift from reactive firefighting to proactive management, without burning out their teams.

What to ask your vendor

If you’re wondering whether your current system is truly native, here’s a quick litmus test:

  • What formats are you capturing in?
  • Can you view the conversation exactly as it looked to the sender and recipient?
  • Do you preserve full threading: message order, reactions, and edits?
  • Is metadata (like timestamps and user IDs) retained and searchable?
  • Can you use the captured data downstream for reports, escalations, audits?

Be wary if your system depends on exported spreadsheets or emails, or offers only “summary” logs instead of complete conversations. If threading and reactions aren’t visible, or if there’s no way to replay or faithfully reconstruct the original user experience, these are clear red flags.

If you’re encountering these issues, you’re not just wasting time. You’re risking your entire compliance defensibility.

Context is the new compliance currency

Today’s digital conversations move fast, flow across platforms, and rarely follow a script. Compliance can't afford to fall behind or work blindly. Native capture isn’t a luxury; it’s the new baseline. Without it, you’re not just making life harder for your team - you’re accepting risk you can’t afford.

Ask yourself: Are you capturing the full story thread, edits, reactions and all? Or just a flattened transcript that leaves too much unsaid? Because in compliance, as in conversation, it’s what’s between the lines that often matters most.

We've featured the best small business software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Blood Oxygen tracking is back on the Apple Watch in the US, but it's now a two-device experience - Thursday, August 14, 2025 - 10:13
  • Following an 18-month ban, Blood Oxygen tracking is coming back to the Apple Watch Series 9, Series 10, and Ultra 2
  • It's not an entirely on-device experience anymore, though
  • The Apple Watch still measures Blood Oxygen, but the iPhone will calculate and display the final result

It’s been a long 18 months, but Apple’s announced that Blood Oxygen tracking and monitoring are returning to the Apple Watch Series 9, Series 10, and Ultra 2 in the United States.

The feature was disabled and effectively banned on the Series 9 and Ultra 2 – then the Series 10, which launched later – after a ruling in January 2024 due to a patent dispute over the technology being used between Massimo and Apple. Now, thanks to iOS 18.6.1 and watchOS 11.6.1, which will roll out later today, the feature is returning in a ‘redesigned’ form.

In its new iteration, the Apple Watch Series 9, Series 10, and Ultra 2’s sensors can take a reading, then transmit the data to the connected iPhone, where it will be calculated and displayed in the Health app under ‘Respiratory’ readings.

So no, you won’t be able to take the reading, watch as it progresses, and then view the results right on your wrist, as you could before. Still, this does effectively return the tracking and monitoring functionality to the impacted Apple Watch models in the United States.

In a statement shared, Apple explains the changes as:

“Users with these models in the U.S. who currently do not have the Blood Oxygen feature will have access to the redesigned Blood Oxygen feature by updating their paired iPhone to iOS 18.6.1, and their Apple Watch to watchOS 11.6.1. Following this update, sensor data from the Blood Oxygen app on Apple Watch will be measured and calculated on the paired iPhone, and results can be viewed in the Respiratory section of the Health app. This update was enabled by a recent U.S. Customs ruling.”

The U.S. Customs ruling is key here, as this will return the feature to the Apple Watches sold when the ban began and was subsequently enforced. If you still have an older Apple Watch, or one sold prior to January 2024, the Blood Oxygen functionality remains unimpacted and won’t be changed. That also goes for any models sold outside of the United States, which have been unimpacted by this ruling.

Still, this does return the Blood Oxygen feature to the Apple Watch, even if it splits the experience between watch and phone. But this separation is likely key to having this allowed and approved by U.S. Customs.

(Image credit: Future / Lance Ulanoff)

For those who have purchased an Apple Watch Series 9, 10, or Ultra 2 in those many months, this is a return to form and rounding out of the health tracking features on Apple’s star wearable in the United States. Even in our Apple Watch Series 10 review, we noted that the Blood Oxygen tracking feature was missing in the US.

Apple has a pretty smart rollout here, and considering rumors of further pushes into health features that we might see with future generations of Apple Watch models, it might be helpful to have these readings going straight into the Health app. Either route, though, if you’ve been waiting for Blood Oxygen tracking to return, it’s back, but you’ll want to make sure your iPhone is nearby if you want to see the results.

While Apple has not shared an exact timing for the rollouts of iOS 18.6.1 and watchOS 11.6.1, it has promised to arrive today – August 14, 2025 – in the United States, and we’ll update this piece when we see it rolling out.

You might also like
Harnessing AI's potential on the mainframe - Thursday, August 14, 2025 - 10:17

Mainframes have always been the silent powerhouses of enterprise technology – quietly doing the heavy lifting behind the scenes. They’ve provided the backbone for some of the world’s most essential systems for decades. And today, they’re more relevant than ever. In fact, many of the most critical functions across industries still run on mainframes. Why? Because they deliver unmatched reliability, speed, and scale.

These systems can process millions of transactions in seconds, making them indispensable for organizations that demand consistency and speed. From database management to enterprise resource planning (ERP) and customer relationship management (CRM) systems, mainframes support the core processes that keep businesses running.

Their ability to handle massive data volumes with precision and minimal downtime makes them idea for industries like finance, travel and transportation, healthcare, and retail—where timing and accuracy are everything.

But the game is changing. Mainframes are no longer just transactional workhorses. With the integration of artificial intelligence (AI) and cloud technologies, they’re evolving into intelligent platforms—capable of not just running the business, but transforming it. AI is unlocking new value from mainframe environments, turning them into engines of insight, resilience, and innovation.

Stopping fraud before it happens

Mainframes are built for scale and security—two things that matter more than ever in today’s threat landscape. As digital fraud grows more sophisticated and regulatory pressure intensifies, businesses need systems that can keep up. Mainframes are meeting that challenge head-on.

By running AI models directly on the mainframe—where the data lives and transactions happen—organizations can analyze patterns in real time. That means faster fraud detection, quicker triage, and smarter responses. No data movement. No latency. Just immediate action.

This same approach is streamlining other high-value processes, too. AI is accelerating loan modifications, automating credit decisions, and embedding intelligence into every customer interaction. It’s not just about stopping fraud—it’s about making smarter, faster decisions across the board.

Your AI-driven development partner

Mainframes are also evolving to meet the demands of modern development. As digital operations grow more complex and skilled talent becomes hard to find, AI is helping bridge the gap.

Mainframe applications, with their monolithic and deeply layered architectures, can be tough to navigate. They’ve been built over decades, often in legacy languages like COBOL, and that complexity makes them hard to understand, modify, or maintain—especially as experienced developers become harder to find.

That’s where AI steps in. By embedding AI directly into the mainframe development process, organizations can proactively identify service issues, streamline workflows, and allocate resources more effectively. AI doesn’t just assist—it accelerates.

It’s especially powerful when it comes to understanding and modernizing existing codebases. As the pool of developers fluent in older languages continues to shrink, AI can automate code restructuring, ensuring updates are made quickly, cleanly, and without introducing risk. It can also validate translated code—so when applications are migrated from one language to another, the new version performs exactly as it should, with no surprises and no logic gaps.

By automating these time-consuming, repetitive tasks, AI frees up developers to focus on what really matters: solving complex problems, driving innovation, and delivering value.

An operational strategy for the future

Even minor IT disruptions can lead to major consequences – downtime, lost revenue, and reputation damage. That’s why integrating AI into mainframe operations is a smart move.

AI enables IT teams to anticipate issues before they escalate. It helps identify patterns, predict failures, and take pre-emptive action. Ultimately, this leads to faster recover times, improved system reliability, and stronger business continuity.

Seeing the bigger picture

The future of mainframes lies in their ability to evolve—and AI is accelerating that evolution. By integrating AI technologies, organizations are transforming mainframes from transactional engines into strategic platforms.

This combination of trusted infrastructure and modern intelligence allows businesses to extract deeper, more actionable insights from the data they already generate. It’s a powerful shift that improves decision-making and enables smarter, faster strategies.

AI enhances performance, can strengthen security, and deliver real-time intelligence that helps organizations stay competitive and resilient. It’s not just about keeping systems running—it’s about using them to drive innovation, efficiency, and growth.

The opportunity is here. The time to act is now.

We've featured the best AI website builder.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

"VPNs are not kryptonite of age assurance" – Age verification experts explain why governments don’t need to ban VPNs - Thursday, August 14, 2025 - 10:22

Using a VPN service should not be an obstacle to effectively enforcing mandatory age verification checks, like those recently implemented in the UK.

This is the response coming from the Age Verification Providers Association (AVPA) to the surge in VPN demand across the UK since the new rules came into play. The surge has also raised the question of whether VPN tools would make the Online Safety Act implementation ineffective.

According to the AVPA, to remain compliant, digital services need to actively detect VPN usage and give users the option to either prove their age or their real location.

"No need to even consider banning VPNs"

"Some argue that because VPNs exist, any age assurance system will fail. This leads to the mistaken belief that age-restricted sites are exempt from compliance if users connect through a VPN. As we have argued before, this is not true," wrote the AVPA in a blog post.

The AVPA suggests that, once VPN traffic is detected, tech providers should look at behavioral clues to assess whether the user is a UK-based minor or an adult using the VPN for privacy. If they have reason to believe this may be a minor based in the UK, they should offer a choice to either verify their age or consent to one-time geolocation.

That said, the most reliable services for unblocking streaming platforms or censored content all implement obfuscation technologies to mask the fact that people are using these services.

All in all, however, "there are ways to detect and address circumvention, and there is no need to even consider banning VPNs outright," said AVPA experts.

Digital services using age assurance to remain compliant, can do so by detecting VPN use, assessing risk using behavioural clues, and giving flagged users the option to verify their age or prove their location.@peterkyle @FeryalClark @Ofcom https://t.co/ximdlDcj8R pic.twitter.com/lpBIMiVKVuAugust 10, 2025

The AVPA recommendations came after a debate kicked off in the UK over whether authorities could ban VPNs to ensure full compliance with the Online Safety Act.

UK Secretary of State for Science, Innovation and Technology, Peter Kyle, however, has insisted there are no such plans, despite the government looking "very closely" at how VPNs are being used.

This adds to what the Electronic Frontier Foundation (EFF) explained when discussing the privacy risks of US age verification laws.

As the EFF experts pointed out, your IP address isn't the only method online services use to track down your location. Providers may also use GPS tracking, web cookies, mobile ad IDs, tracking pixels, or device fingerprinting, making the use of VPNs way less effective.

What's behind UK VPN surge?

(Image credit: Getty Images)

A virtual private network (VPN) encrypts internet connections while spoofing the user's real IP address.

While both of these skills can help you boost your online privacy and security by minimizing the data traces you leave around the internet, IP-spoofing can also make you look as if you're browsing from a completely different country.

Proton VPN recorded an hourly increase of over 1,400% starting from midnight on the day mandatory age verification was enforced. AdGuard VPN also confirmed to TechRadar that sign-ups grew by 2.5 times in just a few days. Data from Top10VPN shows an ongoing surge in VPN demand of almost 2,000% since July 25, too.

Whether minors looking to evade age checks are behind these numbers or it's adults concerned for their privacy is impossible to know.

What's certain, however, is that the new rules have attracted a strong backlash so far amongst technologists, politicians, and everyday users alike, worried about the negative impact that age checks may have on their privacy, security, free speech, and access to information.

The UK regulator, Ofcom, is, nonetheless, strongly suggesting against VPN use to bypass age checks, arguing it will be illegal for platforms to encourage this – the BBC reported.

If you're concerned about sharing your most sensitive data to access content on the web, I recommend downloading only reliable services to protect yourself. At the time of writing, NordVPN is TechRadar's top pick. While if you don't want to pay for a subscription, Proton VPN and Privado VPN are today's best free VPN apps you can get.

You might also like
This new malware really goes the extra mile when it comes to infecting your devices - Thursday, August 14, 2025 - 10:25
  • Cisco Talos finds a new malware framework called PS1Bot
  • The framework is distributed through malvertising and SEO poisoning
  • PS1Bot can serve as an infostealer, keylogger, screen grabber, and more

Security researchers Cisco Talos have discovered a brand new malware framework which they say really goes the extra mile to infect a device.

PS1Bot can log keystrokes, grab cryptocurrency data, and persist on the compromised endpoint, among other things, the company's report says.

Complementing PS1Bot is a malvertising campaign, as well as SEO poisoning, which tricks unsuspecting victims into downloading the malware. Cisco Talos did not say what the theme of these ill-intentioned ads and pages are using, who the usual victims are, or how successful the campaign is.

Flexible and dangerous

They did say that whoever downloads the ZIP file can expect a JavaScript payload that acts as a dropper and pulls a scriptlet from an external server.

That scriptlet writes a PowerShell script to a file on disk and runs it. In turn, the PowerShell script contacts the threat actor’s command-and-control (C2) server, grabbing additional commands that transform the malware into whatever is necessary at the moment.

There are many things the framework can be turned into. It can serve as a reconnaissance tool, sharing with the attackers details about antivirus programs running on the computer, as well as basic system information.

It can serve as a screen capture or keylogger tool, relaying screenshots and keystrokes to the C2. It can also work as a wallet grabber, stealing cryptocurrency wallet information. Finally, it can persist on the device via a PowerShell script that launches automatically upon restart.

"The information stealer module implementation leverages wordlists embedded into the stealer to enumerate files containing passwords and seed phrases that can be used to access cryptocurrency wallets, which the stealer also attempts to exfiltrate from infected systems," Cisco Talos said.

"The modular nature of the implementation of this malware provides flexibility and enables the rapid deployment of updates or new functionality as needed."

You might also like
When cloud growth outpaces control, waste follows - Thursday, August 14, 2025 - 10:27

Cloud has become deeply embedded in how modern organizations operate. While the benefits are clear, the economics are becoming harder to navigate.

As businesses scale usage, questions are mounting about whether rising spend is still delivering proportional value. Gartner’s May 2025 trends report predicts that by 2028, one in four organizations will report dissatisfaction with their cloud outcomes.

This discontent reflects a growing distance between infrastructure and accountability, and the growing need for cloud governance to mature, before inefficiencies become embedded.

Designing for visibility, not just reporting

In many organizations, cost is still treated as a reporting outcome rather than something to shape. Spend is reviewed after deployment, leaving optimization efforts limited to what can be adjusted post-implementation.

Flexera’s 2025 State of the Cloud Report shows that a significant majority of organizations lack detailed visibility into their cloud costs, with only 43% tracking cloud costs at a unit level. This limited visibility hinders most teams’ ability to attribute costs to specific products, services or functions.

Our global data also shows that 34% of enterprises are spending more than $1 million monthly on SaaS. As SaaS adoption grows, so does the importance of managing software licensing costs, which can substantially impact cloud expenditures. Consequently, organizations must look for ways to optimize software license costs as they mature their cloud governance practices.

Visibility needs to move earlier in the decision chain, shaping how environments are constructed rather than rationalizing them after the fact. A shift left approach brings cost considerations – like infrastructure and software licensing costs - earlier into the product lifecycle, so that organizations can make more informed decisions about their cloud usage. By attributing these costs to specific products or services, organizations can gain a clearer understanding of their overall cloud spend.

By embedding cost insight into the architecture stage, organizations are able to steer usage intentionally. They can optimize cloud spend and build cloud environments that reflect business priorities as well as contribute to more sustainable cloud practices, minimizing their environmental footprint.

Bringing cost ownership to where decisions are made

Access to data does not guarantee accountability. Many organizations have detailed cost reporting but continue to struggle with cloud waste.

The issue here shifts from one of visibility towards one of proximity. Our data shows 59% of organizations have a FinOps team that does some or all cloud cost optimization tasks, yet in many cases, these teams still sit at the edge of delivery. So, while they can surface issues, they are often too removed from daily operations to intervene effectively.

The most effective models integrate cost ownership into delivery itself. This means that engineering leads, platform teams and product owners have oversight to take action before inefficiencies take hold.

As a result, when these roles are supported with relevant reporting and shared financial metrics, cost awareness becomes a natural part of the decision-making process. This makes it easier to adjust workloads, retire underutilized services, and optimize environments in-flight, rather than in hindsight.

Organizations with mature FinOps practices are better positioned to manage their cloud costs and reduce waste year over year. This improvement reflects a delivery culture where cost is treated as a design consideration.

Using attribution to prioritize what matters

Many organizations can report how much is being spent and on which services. Far fewer can explain how that spend supports outcomes the business cares about.

87% of organizations view cost efficiency as the primary measure of cloud success, up from 65% last year. This signals a shift in mindset that cloud is no longer assumed to be efficient by default, it must justify its footprint in context.

When cloud spend is tied to individual products, services or customer experiences, the conversation becomes more focused. Governing costs like software licensing ensures that licensing agreements are optimized and aligned with business needs.

Attribution helps shift cloud conversations away from usage and toward value. Taking a holistic approach to cost management not only helps in reducing waste but also contributes to more sustainable cloud practices, ultimately delivering both financial and environmental value.

Early discipline pays off at scale

Control is easiest to build before complexity sets in. The longer organizations delay embedding structure into cloud governance, the harder it becomes to retrofit later. Inconsistent tagging, ambiguous ownership and manual reporting all take time to correct once they are entrenched.

As 33% of global organizations now spend more than 12 million dollars annually on public cloud, this highlights how new services, accounts and tools can be introduced faster than the governance processes required to manage them.

It’s important to note that scaling effectively doesn’t mean avoiding complexity, but there is a need to manage it consistently.

Also, governance does not have to stand in the way of innovation. It can enable it, by improving confidence in decision making, and reducing the uncertainty that often undermines momentum.

Cloud is a system of interdependent decisions, each with its own financial implications. The ability to explain, anticipate and adjust these decisions draws the line between cloud as a delivery of value, or cloud as a cost center. As FinOps matures, designing for cost from the beginning and shifting cost conversations left is key to building cloud environments that scale with control.

We've featured the best cloud storage.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-proc

Windows Entra IDs can be bypassed worryingly easily - here's what we know - Thursday, August 14, 2025 - 11:05
  • Experts warn FIDO is not supported on certain clients when accessing Entra ID
  • This triggers a fallback login mechanism that can be picked up
  • Mitigations should be put in place, researchers say

FIDO-based authenticator apps are considered one of the strongest practical defenses against phishing and credential theft, but judging by Proofpoint’s latest research, it is not without its weaknesses.

The company's researchers say they have found a way to force a target to abandon FIDO-based authentication for a weaker login method which can be picked up in transit.

That way, despite being protected by industry-standard defenses, victims can still end up losing access to key accounts.

Missing security features

The “weakness” in this scenario is that not all browsers support FIDO. Safari on Windows, for example, is not compatible with FIDO-based authentication in Microsoft Entra ID, and when a user with such a setup tries logging in, they are offered an alternative - an SMS-delivered one-time password, email, or an OAuth consent prompt.

All of these can then be picked up via an Adversary-in-the-Middle attack (AitM), relayed to the attackers, and used to log into the account.

"This seemingly insignificant gap in functionality can be leveraged by attackers," Proofpoint said in its report.

"A threat actor can adjust the AiTM to spoof an unsupported user agent, which is not recognized by a FIDO implementation. Subsequently, the user would be forced to authenticate through a less secure method. This behavior, observed on Microsoft platforms, is a missing security measure."

So far, Proofpoint says there is no evidence that this method is being abused in the wild, and speculates that threat actors still rather target accounts without multi-factor authentication (MFA) in the first place.

However, as more and more businesses deploy this anti-phishing technique, working around FIDO-based authentication might catch on.

To minimize the risk, businesses should turn off alternative authentication methods for key accounts, or at least turning on additional checks when an alternative is triggered.

Via BleepingComputer

You might also like
Microsoft exec's vision of Windows 12 and beyond could terrify some of you - Thursday, August 14, 2025 - 12:00
  • Another Microsoft executive has detailed their vision of a future Windows
  • Pavan Davuluri, VP of Windows and Devices, echoes the thoughts previously laid out by Microsoft's VP for OS Security, David Weston
  • The overall vision is for more AI, and an OS that watches what you're doing on-screen, tapping into the cloud, which may worry the privacy conscious

Another Microsoft executive has provided their vision of the future of Windows, specifically framed around AI and the cloud, and how this - and voice input - is going to be a big part of the operating system down the line.

Windows Central discovered a YouTube interview with Pavan Davuluri, VP of Windows and Devices at Microsoft. See the video clip below, and be warned, the technobabble is strong with this one. Davuluri says at one point: "Computing [will] become more ambient, more pervasive, continue to span form factors, and certainly become more multi-modal in the arc of time."

Okay, so let's boil this - and the rest of the interview - down a bit. Computing becoming more "multi-modal" refers to using inputs beyond the traditional mouse and keyboard, and the exec touches on voice commands as an important part of the equation. This echoes what Microsoft's VP for OS Security, David Weston, said earlier this month when explaining his vision of Windows in 2030.

Davuluri also says, "Fundamentally, the concept that your computer can actually look at your screen and is context aware is going to become an important modality for us going forward."

Again, that follows up on what Weston observed about the next-gen Windows PC being able "to see what we see, hear what we hear, and we can talk to it and ask it to do much more sophisticated things."

The key idea appears to be Windows watching what you're doing, using AI to determine context, and then applying that to your actions in the OS, and specifically making voice commands more useful due to that context.

Davuluri notes: "You'll be able to speak to your computer while you're writing, inking, or interacting with another person. You should be able to have a computer semantically understand your intent to interact with it."

The exec also talks about Windows becoming "increasingly agentic" (with the first AI agent recently having debuted in the Settings app in Windows 11, of course), and how the cloud will be needed to power these AI abilities. (Although some of the work will be on-device, he indicates, as we see with Copilot+ PCs already - hence the need for NPUs with these laptops.)

Davuluri observes: "Compute will become pervasive, as in Windows experiences are going to use a combination of capabilities that are local [processed on the device] and that are in the cloud. I think it's our responsibility to make sure they're seamless to our customers."

Which is a roundabout way of saying that the level of processing needed for some of these AI powers in next-gen Windows will need to tap the cloud to ensure performance remains responsive enough to feel 'seamless' rather than sluggish.

Analysis: A computing paradise - or Big Brother nightmare?

Microsoft has clearly got a hymn sheet somewhere, as its top-level executives appear to be singing the same tune regarding how Windows will evolve as we head into the next decade.

It's interesting to pick up on the mirrored points between these two interviews Microsoft has recently presented: more AI (surprise, surprise) that determines context by watching what you're doing on-screen, and also allows voice commands to be more effectively used based on that context - with the cloud at least partly powering all this.

Depending on what kind of person you are, this may sound like an exciting new way forward in terms of making it easier to do what you need to do within Windows, or a privacy nightmare.

The more paranoid-leaning Windows users out there are likely to be horrified at the suggestions made about the future of the OS here. An operating system that's watching what you do? The way they'll read this angle from Microsoft is that it's turning Windows into an AI-powered surveillance platform - you can guarantee that.

And it's obvious where such concerns come from when we're told the "computer can actually look at your screen" and take context from there, and leverage the cloud (read: Microsoft's private servers) to crunch the data on what you're doing with your PC.

If this makes using next-gen Windows a breeze, and AI is constantly firing up the apps you need, or searches you want to make, before you get to them, or proactively suggesting files you might want next - or Windows options that could be changed for your benefit in given scenarios - will people even care about what's happening in the cloud? Frankly, the truth is, they probably won't if it makes their computing lives a lot easier.

You might also like
With only weeks left until Metal Gear Solid Delta's launch, Konami confirms that its multiplayer mode won't be crossplay - Thursday, August 14, 2025 - 12:03
  • Metal Gear Solid Delta: Snake Eater's multiplayer mode, Fox Hunt, won't support cross-play
  • Konami confirmed this in a social media post, saying cross-play won't be supported between PC and console
  • Fans have expressed disappointment and are urging the developer to delay the mode until crossplay gets added

Konami has confirmed that Metal Gear Solid Delta: Snake Eater's multiplayer mode, Fox Hunt, won't support cross-play between console and PC.

This announcement comes from the Japanese Metal Gear X / Twitter account, just weeks before the game's release, where the developer said that "cross-play between different platforms will not be supported" (machine translated).

This means players on PC via Steam, PlayStation 5, Xbox Series X, and Xbox Series S won't be able to play the multiplayer together.

Following Konami's statement, fans have been expressing disappointment online, with many asking the studio to delay Fox Hunt until crossplay is ready to be added.

"Delay FOX HUNT, Please. Crossplay is necessary for players to have fun with their friends on other platforms!" one user said under the post.

"Even if it needs a bigger delay do not launch the mode without crossplay it's 2025 crossplay is not a feature anymore it's something needed," another fan wrote.

【ご案内】『METAL GEAR SOLID Δ: SNAKE EATER』のオンライン対戦モード 「FOX HUNT」につきまして、異なるプラットフォーム間でのクロスプレイは非対応となります。対応機種PlayStation®5、Xbox Series X|S、Steam®#MGSDelta #MetalGearSolid #メタルギアソリッド pic.twitter.com/sGsv3CjyhWAugust 13, 2025

The reactions over on the Metal Gear subreddit are similar, though fans are hopeful the crossplay will be added to the mode in a later update.

"Crossplay should have become the norm by now," one Redditor said.

Fox Hunt was announced in June and is described as a "completely original online battle mode" that will play differently from 2008's Metal Gear Online.

The multiplayer is being directed by series veteran Yu Sahara and takes place in the same world as the main game. It will also feature hide-and-seek mechanics, mixed with stealth and survival elements.

Metal Gear Solid Delta: Snake Eater arrives on August 28 for PS5, Xbox Series X|S, and PC.

You might also like...
Why use Meta’s Ray-Bans and their single AI, when this new Vive pair will give you three? - Thursday, August 14, 2025 - 12:15
  • HTC has a new pair of smart glasses called the Vive Eagle
  • They boast many of the same features as their rivals
  • You can only get them in Taiwan right now

HTC has just announced a new Vive wearable, but it’s not another VR headset – instead it’s a pair of stylish AI glasses called Vive Eagle. And I’m feeling twinges of jealousy towards anyone that can get a pair.

That’s because these smart specs could put up a good fight against the Ray-Ban Meta smart glasses I’ve come to love (as well as the new Oakley HSTN specs that take the RayBans and make them a smidge better).

Hardware-wise, Vive goes beat for beat with the competition. It boasts a 12MP snapper as well as open-ear speakers, and a solid battery life of up to 36 hours of standby time and 4.5 hours of music playback while still boasting a sleek 49g design.

Where I think it truly shines however is its AI.

(Image credit: HTC)

That’s because while Vive’s own assistant can help you with tasks it can also team up with your choice of ChatGPT or Google Gemini rather than locking you to one service – like how Meta’s glasses are entirely dependent on Meta AI.

As we’ve come to expect from AI companions, Vive also makes clear that “all user data is stored locally” on its glasses meaning it isn’t used for model training. When using third-party AI services your data is also anonymised to provide improved privacy.

Rounding off the AI upgrades, Vive’s specs are better with languages. Meta’s AI currently lets its smart specs translate between English, French, Spanish, Italian and German, Meanwhile Vive’s assistant supports Arabic, Traditional Chinese, English, French, German, Greek, Italian, Japanese, Portuguese, Spanish, Korean, Thai, and Turkish.

And I can’t ignore the Eagle’s striking design. I’m boring enough to want to grab the translucent black pair, but the slightly see through berry red, blueish gray, and coffee brown all look beautiful and each perfectly highlight the specs’ blend of fashion and technology.

Though with a Wayfarer-like shape, these glasses perhaps don’t create enough of their own personality from a silhouette perspective.

(Image credit: HTC)

Unfortunately they won’t be easy to get your hands on.

Firstly, the Vive Eagle specs are currently exclusive to Taiwan. Specifically you can find them at 2020EYEhaus premium eyewear locations and designated Taiwan Mobile OP Experience Stores.

Secondly, they are pricier than some of their rivals, such as the Meta Ray-Bans and their new Oakleys collaboration.

Viva's glasses are currently up for pre-order, and when they launch on September 1 they’ll cost NT$15,600 (New Taiwan dollars).

That comes to about $520 / £385 / AU$795 – which is higher than the most expensive Meta Ray-Bans at $379 / £379 / AU$539, and the $499 / £499 / AU$789 Oakley smart glasses with PRIZM lenses (ignoring the UK where the Oakleys are over £100 more).

I’ll need to try the Vive Eagle glasses out before passing judgement, but there is seemingly a lot to love here, and as the AI glasses competition heats up – with Meta Connect promising next-gen specs, and Android XR due next year – Vive’s Eagle wearable is a welcome addition that I look forward to seeing more of.

You might also like
Proton VPN expands Linux capabilities with new split tunneling feature - Thursday, August 14, 2025 - 12:16
  • Proton VPN has expanded its split tunneling feature to the Linux app
  • Split tunneling allows users to selectively route their internet traffic
  • Proton plans to bring split tunneling to its macOS app next

Proton VPN has expanded its Linux capabilities with the addition of a new split tunneling feature, currently in beta.

Split tunneling for Linux is available to subscribers using the official Ubuntu and Fedora apps for Proton VPN, which is already one of the best VPN services available according to TechRadar's testing. Though not currently offered for the unofficial Flatpak version of the app, Debian 12 support is on the way.

The latest update brings Proton VPN’s Linux app in line with its Windows and Android apps in offering the feature. Mac users needn’t feel left out with split tunneling for macOS also on Proton VPN’s summer roadmap.

What is split tunneling and why does it matter?

(Image credit: Proton)

Split tunneling is a popular VPN feature, providing users with a greater degree of control and flexibility for managing their internet connections. When you connect to a Virtual Private Network (VPN) server, all of your internet traffic is encrypted and routed through a secure tunnel between your device and the VPN server.

Although it’s undoubtedly beneficial to have all of your data encrypted for the best possible security, split tunneling lets you balance privacy with performance. For example, if you want to browse securely but have the fastest speeds for gaming – even the best gaming VPN can slow things down at times – you can use Proton VPN’s split tunneling feature to have the gaming app bypass the VPN connection.

Likewise, you may have difficulties accessing local network devices, such as a printer, when connecting to a VPN. With split tunneling, you can access these devices through your local connection without disrupting your VPN connection and the protection it provides to the rest of your traffic.

The same goes if you need to access local websites like your online banking or government sites.

How to use split tunneling on Proton VPN for Linux

If you’re a Linux user with a premium Proton VPN subscription and want to take advantage of this new feature, you'll need to update to the latest Linux app version.

The beta feature is currently being rolled out gradually, but you can soon find it via the app’s settings page. Simply navigate to features and toggle on the split tunneling option.

(Image credit: Proton)

For the time being, it’s only possible to select apps to exclude from the VPN connection via the exclude mode. To do this, click “Add” and check the boxes of any apps whose traffic you’d prefer not to route via the VPN tunnel (see image above). Note that you’ll then need to reconnect to the VPN and restart any excluded apps that were opened before connecting to the VPN server.

An include mode, to enable VPN protection only for selected apps, is coming soon, as are IP-based rules for the exclude and include modes.

Proton VPN is one of the best Linux VPNs we’ve reviewed, but it’s not the only VPN with split tunneling for Linux. ExpressVPN has also been busy and released split tunneling for its Linux app in March 2025.

You might also like
Battlefield 6 Open Beta weekend 2 gets an official start time among new changes, including All-Out Warfare playlist adjustments – here's what to expect - Thursday, August 14, 2025 - 12:19
  • Dice has announced new changes for the Battlefield 6 Open Beta Weekend 2
  • Playlists will receive game mode rotation adjustments, including to the All-Out Warfare, and a Custom Search feature for maps and mode selection
  • The second Open Beta starts today and ends on August 17

After the massive success that was the Battlefield 6 Open Beta Weekend 1, Dice has revealed new changes it will be adding for Weekend 2.

The studio revealed the details in a new blog post, where it confirmed that it will be making playlist adjustments in Weekend 2 for more variety and choice, including to the All-Out Warfare playlist, which will include the Breakthrough, Conquest, and Rush game modes. You can check out the updated playlists below.

"Rotating through multiple modes within playlists helps us understand what our community enjoys as we shape the launch experience, and enables us to keep more fan-favorite modes available at the same time," it explained.

The second Open Beta will also add a new Custom Search feature to give players more control over map and mode selection.

"This feature allows you to choose your favorite combinations of maps and modes," the post said. "For example, if you want to play Conquest on Siege of Cairo, then matchmaking will prioritize putting you in a match with this combo, if available. Note that this is not a Server Browser (which is not being tested this week).

During Open Beta, Custom Search will be available for Open Weapon mode playlists as well, allowing players to mix and match maps and modes as they like.

In addition, Training Grounds will continue to offer the Firing Range and gameplay introductions for classes, Breakthrough, and Conquest, and players at career rank 14 and below will be able to access Initiation Mode, which includes AI Soldiers.

"This initiation experience is tailored for new players and will shift from Breakthrough to Conquest. Separately, there will be a non-playable introduction to Rush as well," the developer said.

Dice also confirmed that Open Beta Weekend 2 will kick off today, Thursday, August 14, at 8 AM UTC / 1 AM PT / 9 AM BST.

The full game launches on October 10, 2025, for PS5, Xbox Series X, Xbox Series S, and PC.

Open Beta Weekend 2 - Playlists Overview

Day 1 - Thursday, August 14:

  • Conquest
  • Rush
  • Attack & Defend (Breakthrough, Rush)
  • Close Quarters; Fast-paced playlist on smaller maps (Domination, King of the Hill)
  • Closed Weapons All-Out Warfare (Conquest, Breakthrough)

Day 2 - Friday, August 15:

  • Conquest
  • Squad Deathmatch
  • Close Quarters; Fast-paced playlist on smaller maps (Domination, King of the Hill, Squad Deathmatch)
  • All-Out Warfare; Epic battles across expansive maps (Conquest, Breakthrough, Rush)
  • Closed Weapons All-Out Warfare (Conquest, Breakthrough)

Day 3-4 - Saturday, August 16 - Sunday, August 17:

  • Conquest
  • Close Quarters; Fast-paced playlist on smaller maps (Domination, King of the Hill, Squad Deathmatch).
  • All-Out Warfare; Epic battles across expansive maps (Conquest, Breakthrough, Rush)
  • Closed Weapons All-Out Warfare (Conquest, Breakthrough)
You might also like...
AI-powered phishing attacks are on the rise and getting smarter - here's how to stay safe - Thursday, August 14, 2025 - 12:27
  • Kaspersky warns AI is used to craft convincing emails, generate deepfakes, and more
  • The number of clicks on phishing links grows quarter-on-quarter
  • Users warned to stay alert to be safe from attacks

Generative Artificial Intelligence (GenAI) is making phishing attacks smarter, harder to detect, and more widespread, new research from Kaspersky has warned.

Its findings claim in the second quarter 2025, its products detected and blocked more than 142 million clicks on phishing links, representing a 3.3% increase over the first quarter.

While it can mean that there were more phishing attacks over the summer, it can also mean that the volume remained the same - but the actual attacks grew more convincing.

Generating deepfakes

“AI has elevated phishing into a highly personalized threat. Large language models enable attackers to craft convincing emails, messages and websites that mimic legitimate sources, eliminating grammatical errors that once exposed scams,” the researchers said.

“AI-driven bots on social media and messaging apps impersonate real users, engaging victims in prolonged conversations to build trust. These bots often fuel romantic or investment scams, luring victims into fake opportunities with AI-generated audio messages or deepfake videos.”

The researchers also said that GenAI isn’t just being used to eliminate spelling and grammar errors - arguably the biggest red flags in phishing emails.

It is also used to create realistic audio and video deepfake impersonations of trusted individuals, including colleagues, celebrities, and bank officials.

These deepfakes are then used to promote fake giveaways, or steal sensitive information such as multi-factor authentication (MFA) codes, passwords, and similar.

“AI-powered tools analyze public data from social media or corporate websites to launch targeted attacks, such as HR-themed emails or fake calls referencing personal details,” Kaspersky added.

How to stay safe

As the risk of phishing grows, staying vigilant online remains the best way to be safe.

Users should always be skeptical of unsolicited incoming messages, especially those that demand urgent action or threaten with a disaster.

These are, and will continue to be, the biggest red flag in phishing attacks.

You might also like
South Park season 27 episode 3 disappoints Paramount+ subscribers again with another delay – here’s when you can watch it and why we’ve been left waiting - Thursday, August 14, 2025 - 12:28

Comedy Central did not air South Park season 27 episode 3 on its expected release date (August 13), with the series now thought to continue next week instead. This also means it now won’t be available on Paramount+ either. However, unlike the season’s previous delay, the episode 3 delay was scheduled in advance. Instead, the network declared the day to be “South Park day,” running a marathon of fan-favorite episodes followed by the sitcom’s pilot episode ‘Cartman Gets an Anal Probe’ in the typical 10pm ET timeslot.

Episode 2 was delayed after the show’s controversial premiere, which featured the likes of a deepfaked Donald Trump with no clothes on and ICE (Immigration and Customs Enforcement) agents shooting puppies and driving around ominously in large groups. Screenshots from the show were quickly used on both the White House and US Secretary of Homeland Security Kristi Noem’s social accounts in order to try and recruit more people to join ICE.

The Department of Homeland Security (NHS) additionally told Newsweek: “We want to thank South Park for drawing attention to ICE law enforcement recruitment. We are calling on patriotic Americans to help us remove murderers, gang members, pedophiles, and other violent criminals from our country.”

It’s for this reason that I can’t help but think the delay of South Park season 27 episode 3 has something more attached to it. It’s certainly a conveniently timed break in the schedule, but given that season 27 has only been on for three episodes yet has suffered two delays already. Surely things aren’t operating smoothly behind the scenes? We always know what we get into with the hit TV show, but that might no longer be to everybody’s tastes.

Has South Park season 27 hit a political snag after its season 3 delay? I wouldn’t be surprised

Kristi Noem's parody in South Park season 27. (Image credit: Paramount)

I don’t need to spell out that the political and cultural landscape has remarkably changed in the last few years, and that’s possibly to South Park’s detriment. While real-world political and cultural affairs are offering a smorgasbord of inspiration, it also comes with a more critical lens. We’ve already had the comments from the NHS, above, with Kristi Noem also weighing in on her portrayal as well. Before her secret post-credits scene was revealed, she responded during an interview on the Glenn Beck Program podcast, slamming her character’s appearance: “It’s so lazy to just constantly make fun of women for how they look. If they wanted to criticize my job, go ahead and do that. But clearly they can’t – they just pick something petty like that.”

White House spokesperson Taylor Rogers also told Variety about the events of episode 1: "Just like the creators of South Park, the Left has no authentic or original content, which is why their popularity continues to hit record lows. This show hasn't been relevant for over 20 years and is hanging on by a thread with uninspired ideas in a desperate attempt for attention."

This won’t be the last round of comments from political figures about what’s happening on the show, and I wouldn’t be surprised if we see public conversations between the two sides on a weekly basis. I also wouldn’t be surprised if there’s resistance to what’s being shown behind the scenes, given nobody exactly comes across particularly well if they’re being featured on South Park. We’ve seen critics of the current US Government coming under fire or having their shows canceled (The Late Show with Stephen Colbert’s cancellation is a great example of this), so discussions about what should and shouldn’t be parodied could be holding up episode releases.

Of course, this is all speculation. We’ve got no idea what the rest of South Park season 27’s 10-episode run has in store for us, and I really hope Paramount and the show’s creators can hold firm to delivering the creative vision they want to. I can’t deny that I’m worried about episodes 4-10, but I’m also holding out hope. After all, South Park wouldn’t be South Park if it wasn’t near the knuckle and beyond, right?

You might also like
Apple Pumps Out iOS 18.6.1, Redesigning Blood Oxygen Feature on Some Devices - Thursday, August 14, 2025 - 13:41
The company initially mentioned the update in a post online Thursday.
Apple's New Low-Cost iPad Could Come With the A18 Chip and Apple Intelligence, Report Says - Thursday, August 14, 2025 - 13:55
A more powerful processor will mean more AI features.
Best Wireless Earbuds of 2025 - Thursday, August 14, 2025 - 14:09
I've reviewed hundreds of wireless earbuds for CNET, and these are my current top picks at a variety of prices.
Starlink Users Will Now Have to Pay $5 to Pause Service - Thursday, August 14, 2025 - 15:01
“Pay as you go” now means paying when you stop, too.
Gerard Butler's Movies Tend to Fly Under the Radar in Theaters, but They're Living It Up in Netflix's Top 10 - Thursday, August 14, 2025 - 15:15
The actor currently stars in six movies available on the platform, two of which are in the US's top 10.

Pages