Error message

  • Notice: Undefined offset: 5 in user_node_load() (line 3604 of /home/ewg56ffgqu3p/public_html/modules/user/user.module).
  • Notice: Trying to get property of non-object in user_node_load() (line 3604 of /home/ewg56ffgqu3p/public_html/modules/user/user.module).
  • Notice: Undefined offset: 5 in user_node_load() (line 3605 of /home/ewg56ffgqu3p/public_html/modules/user/user.module).
  • Notice: Trying to get property of non-object in user_node_load() (line 3605 of /home/ewg56ffgqu3p/public_html/modules/user/user.module).
  • Notice: Undefined offset: 5 in user_node_load() (line 3606 of /home/ewg56ffgqu3p/public_html/modules/user/user.module).
  • Notice: Trying to get property of non-object in user_node_load() (line 3606 of /home/ewg56ffgqu3p/public_html/modules/user/user.module).

News

I'm Stoked That Google Made the Pixel 10 a $799 Value-Packed Feature Monster - Wednesday, August 20, 2025 - 12:00
The Pixel 10 takes a step closer to Google's budget phone line. It's part Pixel 10 Pro and part Pixel 9A and has three rear cameras, including a 5x telephoto lens.
Pixel 10 Pro Fold Is Tougher, Smarter and Totally Dust-Resistant - Wednesday, August 20, 2025 - 12:00
With an IP68 rating for dust and water resistance, Google's new foldable can boldly go where no foldable has (safely) gone before: the beach.
I Tested Google's Pixel 10 Pro XL in Paris, and I'm Impressed - Wednesday, August 20, 2025 - 12:00
Google hasn't radically transformed its new flagship Android phones, but some key updates will take on the iPhone 17.
I Took Hundreds of Photos With the Pixel 10 Pro XL in Paris. These Are My Favs - Wednesday, August 20, 2025 - 12:00
The camera hardware might not have changed much, but Google's new flagship can take great images.
Pixel Watch 4 First Look: Google Just Raised the Bar video - Wednesday, August 20, 2025 - 12:00
From satellite SOS to a Gemini-powered health coach, here's why the Pixel Watch 4 feels like the smartest upgrade yet.
Pixel 10 Phones Get an Added T-Mobile Perk: Expanded T-Satellite App Access - Wednesday, August 20, 2025 - 12:00
A few of Google's apps, such as Google Maps, will be able to connect to T-Satellite when you're off the grid.
Google’s Pixel 10 Lineup Is Here, and I’ve Found All the Cases Worth Buying Right Now - Wednesday, August 20, 2025 - 12:38
Ensure Pixel perfect protection with a sturdy case for your shiny new device.
A clever new Linux malware is breaking into systems - and then shutting the door behind it to avoid detection - Wednesday, August 20, 2025 - 10:28
  • Researchers spot cybercriminals abuse bug to access a cloud Linux server
  • The hackers then proceeded to patch the flaw, closing the doors behind them
  • There could be different reasons for fixing flaws

A hacker was recently spotted patching someone’s vulnerable cloud Linux instance - but they did not do it out of the goodness of their heart.

Security researchers Red Canary observed a threat actor abusing a maximum severity flaw, tracked as CVE-2023-46604, to break into a cloud Linux system.

The vulnerability is found in Apache ActiveMQ, and grants persistent access, among other things - but however, after breaking in, they patched the bug, essentially locking the doors behind them.

DripDropper

Red Canary argues that there are different reasons why a cybercriminal might fix a problem after exploiting it, including locking out other adversaries, or hiding their tracks.

The latter makes a lot of sense, especially knowing that cybercriminals often fight for control over different compromised endpoints.

Besides patching the flaw, the hackers did a number of things, including installing the Sliver implant, which granted them unrestricted access to the system.

They also modified the existing sshd configuration file to enable root login, and after that installed a previously unknown downloader that Red Canary named “DripDropper”.

The downloader itself is rather advanced, requiring a password to run, which hinders sandbox analysis.

It communicates with the threat actors via a Dropbox account that has hardcoded bearer tokens, and since Dropbox and similar platforms (Telegram, or Discord) are not malicious by nature, the traffic blends in and is harder to spot. Finally, DripDropper is most likely used to deploy two separate pieces of malware.

Red Canary says that vulnerable web servers are one of the most common initial access vectors to Linux systems.

“Given the prevalence of *NIX-based, or Unix-like systems in modern infrastructure, particularly in rapidly expanding cloud environments, ensuring they’re protected is essential,” the researchers said.

“This requires the development of specialized incident response strategies tailored to the complexities of both cloud architectures and Linux environments and ensuring defenders are equipped with effective, actionable guidance to safeguard these critical assets."

You might also like
Sony has just unveiled two new pieces of Inzone gaming audio gear and PS5 owners should take note - Wednesday, August 20, 2025 - 10:30
  • Sony has unveiled two new audio products ahead of Gamescom 2025
  • The Inzone H9 II is an overhauled version of an existing gaming headset
  • The Inzone E9 is a pair of FPS gaming earbuds

Just ahead of the start of Gamescom 2025, Sony revealed a suite of new products for its Inzone gaming accessory line. This includes two new bits of gaming audio gear: the Inzone H9 II gaming headset and the Inzone E9 gaming earbuds.

The Inzone H9 II is an overhauled version of the existing Inzone H9. It features the same driver unit as the superb Sony WH-1000XM6 headphones, which achieved four and a half stars thanks to its excellent audio performance in our recent review.

You also get full active noise cancellation and the ability to tweak the equalizer (EQ) settings through the compatible Sony Sound Connect up on PC and PS5.

The Inzone H9 II boasts a wide-band adjustable boom microphone complete with AI-optimized noise filtration technology to help cut out background interference. It's also fully detachable, unlike its predecessor.

The II comes in lighter, too, at just 260g, which is presumably a result of its slimmer-looking headband and more streamlined mic.

The Inzone H9 II is available to pre-order now in either white or black for $349.99 / £299.99 and will ship in September.

Image 1 of 2

The Inzone H9 II at Gamescom 2025. (Image credit: Future)Image 2 of 2

The Inzone E9 at Gamescom 2025. (Image credit: Future)

The Inzone E9 is a pair of in-ear gaming earbuds that comes with a USB-C audio box that can store your customized EQ settings.

They were developed in collaboration with the esports team Fnatic and are intended for "elite FPS play". They cost $149.99 / £129 in either white or black and are up for pre-order now with shipping in October.

You might also like...
What is Model Context Protocol and why does it matter to software engineers? - Wednesday, August 20, 2025 - 10:31

There’s a quiet but profound transformation underway in how businesses interact with backend systems. It’s not a flashy app or piece of consumer technology - it’s happening at the infrastructure level, where machine learning, automation, and natural language processing are beginning to rewrite how software is built, configured, and controlled.

At the heart of this shift is Machine Communication Protocol (MCP), a new approach being pioneered by fintech leaders like Stripe and Adyen. MCP allows large language models (LLMs) to interact directly with APIs - automating the translation of human intent into technical execution. It’s a change that could streamline how software engineering teams operate, empower business users, and reduce the friction between what people want and what systems deliver.

Although the idea sounds abstract, it’s already being tested in a very practical context: payments. The infrastructure behind every transaction is now where we’re seeing some of the earliest, most meaningful applications of MCP. In this sense, payments teams are acting as canaries in the coal mine for a much broader shift across the software engineering world.

What is MCP and why does it matter?

At its core, MCP is a way for LLMs - like ChatGPT - to interact with APIs on behalf of a user. Traditionally, if a business wanted to make a change to its backend system (say, issuing a payment link or modifying risk rules), someone - typically a developer - would have to write an API call, handle authentication, test responses, and integrate it into workflows.

With MCP, that integration layer is abstracted, and a user can issue a request in natural language - “Create a PayByLink for £100 in EUR” - and the LLM handles the translation, executes the API call, and returns the result. It can even ask follow-up questions to clarify intent. The entire interaction becomes conversational, not code based. Adyen recently demonstrated this in a proof-of-concept and Stripe launched a similar capability at its Sessions conference in May, positioning it as part of a longer-term bet on LLMs reshaping developer workflows.

For the user, it feels seamless. For the underlying system, it’s a major shift - automating the middle layer that once required deep technical fluency.

Why start with payments?

Payment systems are already heavily API-driven and deeply embedded in enterprise architecture. But despite their flexibility, they’ve historically been gated by technical teams. Every change - like adding ApplePay or updating parameters - requires someone in engineering to write code, test logic, and deploy updates.

That works, but it creates bottlenecks. In developer-centric environments like Stripe’s, MCP represents a way to streamline workflows. In enterprise-first setups like Adyen’s, it’s about empowering operations, product, and risk teams to make changes directly - without joining a development queue or waiting for a sprint cycle.

In both cases, MCP moves control closer to the people who understand the business problem - and speeds up the cycle from intent to execution.

Implications for software engineering

MCP doesn’t just matter to payments - it’s an early example of something much bigger. It signals how software engineers and infrastructure management may evolve over the next few years.

MCP doesn’t eliminate the need for technical expertise. But it does change the role. Software engineers may move from executing tasks to supervising them - designing secure, auditable systems that allow AI agents to operate safely and effectively.

In that sense, MCP isn’t just a new interface - it’s a new paradigm. One that requires engineers to think like systems architects and strategic enablers, rather than gatekeepers of functionality.

Still early, but moving fast

Adyen’s POC is limited, Stripe’s implementation is still evolving, and right now, most MCP use cases are simple: generating a payment link, updating a rule, querying a transaction status, but it won’t stay that way for long.

MCP-based workflows could soon handle more complex interactions - onboarding new markets, configuring multi-step authentication, deploying checkout experiments, or dynamically routing transactions - all through natural language.

That won’t stop with payments. MCP could apply to any API-rich system: cloud infrastructure, observability platforms, compliance tooling, data pipelines. The building blocks are already there. The real question is how quickly engineering teams adapt.

The next phase of engineering won’t be about who can write the cleanest Python. It will be about who can define intent clearly, interpret outcomes effectively, and manage AI-driven systems responsibly.

MCP is just the beginning. The businesses - and engineers - that understand what it unlocks will be the ones shaping what comes next.

We've featured the best business intelligence platform.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Untangling complex cybersecurity stacks in a supercharged risk environment - Wednesday, August 20, 2025 - 10:41

Cyber threats are increasing in both scale and sophistication, prompting businesses to significantly ramp up their investment in security. From firewalls to threat intelligence feeds, today’s enterprises have access to an expansive arsenal of digital defenses. Yet despite this unprecedented spending, breaches are still occurring, and systems are still underperforming. In fact, according to the Logicalis 2025 CIO report, 88% of organizations experienced cybersecurity incidents in the past 12 months, and 43% endured multiple breaches.

The same research found that over half of CIOs surveyed say their security patching systems have become too complex to manage effectively. What’s more, 50% acknowledge that they are not getting good value from their security tools because the features go unused. In other words, CIOs are spending more, but they are spending inefficiently, and in some cases, ineffectively.

The growing complexity of security systems could become one of the biggest vulnerabilities in enterprise IT.

The illusion of more

Over the past decade, the IT market has exploded with tools. The typical security stack has grown exponentially in response to emerging threats, new regulations and gaps that have been revealed when a breach elsewhere sets off alarm bells. While each solution is well-intended, its cumulative effect can be counterproductive.

Rather than strengthening security posture, the “more is better” approach has led to environments where vulnerabilities hide in plain sight. In fact, only 58% of CIOs feel confident in their ability to identify potential security gaps. This highlights a troubling disconnect between IT leaders’ awareness of cyber risk and their actual capacity to defend against it. The very tools designed to safeguard the business can end up creating blind spots. When security systems become too complex, they overwhelm teams, slow down decision-making, and give threats more time to cause damage.

Simple but effective

Simplifying cybersecurity doesn’t mean cutting corners or weakening defense areas, it's about assessing tools with intent in order to create a manageable system.

This can start with a foundational assessment: what are we trying to protect and why? What tools overlap? Where are the gaps? Which capabilities are going unused? Where is the complexity slowing the team down?

Organizations need a clear, continuously updated understanding of their digital assets, attack surfaces, and business priorities. Maintaining an accurate asset inventory is more than good cyber hygiene, it’s essential to prioritizing risk and responding quickly when incidents occur.

From this foundation, businesses can begin to:

  • Consolidate tools - Through the use of integrated platforms, businesses can protect multiple areas at once. They offer layered security for various elements of a business in a single unified framework, increasing visibility and reducing the operational load on already stretched IT teams
  • Outsource - Outsourcing functions such as monitoring and threat detection, and patching to security specialists frees up internal resources to focus on more strategic initiatives
  • Introducing automation - Manual processes can often be overwhelming, time-consuming and prone to error. Automation can slash task times and help with overall efficiency
  • Align security purchases with business outcomes - By ensuring spend is directly tied to business objectives, businesses can direct their investments to where matters the most

This urgency to simplify is further underscored by the tightening of global regulations such as the EU AI act. A growing wave of privacy and data protection laws is pushing businesses toward greater transparency and accountability. These regulations demand that organizations have their systems in order, as they may be required at any moment to produce records and demonstrate clear, auditable compliance.

With this approach, businesses can build a leaner security posture where threats are anticipated instead of constantly chased. By taking bold, proactive steps to streamline cybersecurity today, businesses will be far better equipped to handle the risks and seize the opportunities of the digital landscape now and in the future.

We've featured the best encryption software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Leaked Philips Hue hub can support over 150 bulbs, and turn them into motion sensors - Wednesday, August 20, 2025 - 10:55

If you’ve been looking to upgrade your smart home, it looks like Philips will have you covered with a brand new Philips Hue Bridge Pro that boasts some impressive (in cases almost needlessly so) capabilities.

Signify, the company behind the Philips Hue brand, accidentally leaked the existence of the new Bridge a few days ago alongside spoilers for new lights and a wired video doorbell, but yet another leak – this time via Lowe's – has clued us into what upgrades the Bridge Pro boasts beyond general promises of it being faster and able to support more devices.

Lowe's runs a program called Loop, which gives customers free samples of new and pre-release tech, and it looks like one such item is the Philips Hue Hue Bridge Pro. Several people have shared images and asked questions about the product on social media – with one tester being completely unsure what to do with the new Bridge Pro as they have no Philips Hue smart lights. 9to5Google reports that some people have even taken to Facebook Marketplace to sell their Bridge Pros.

These shenanigans have given us some key details. Firstly, the Bridge Pro can supposedly support 150+ lights – a huge increase from the current limit of 50. That might seem like overkill for smaller homes, but will pique the interest of anyone who's currently using multiple Bridges to cover their whole house.

The Philips Hue Bridge Pro also promises to offer full home control, so you could rely on this Matter-compatible hub to manage more than just Philips Hue technology.

(Image credit: Philips Hue)

The other, much more interesting addition is Hue MotionAware tech, which promises to turn your lightbulbs into motion sensors. Exactly how this works hasn’t been revealed, so it’s not clear which Hue smart bulbs will support this upgrade, but it seems rooms with three bulbs or more will be able to detect people walking past and react accordingly.

It's possible that it might use something like the ambient sensing technology that the Communication Standards Alliance showed off in a video earlier this year. Ambient sensing is a use case built by a company called Ivani to demonstrate what's possible using the Zigbee wireless protocol (which is used by Philips Hue devices).

Now that would be smart, and might give me a reason to fill my home with smart bulbs.

Even with these serious leaks we should take details with a pinch of slat – though if you ask us it certainly seems it’s a matter of when not if Philips will debut the Bridge Pro.

IFA looks to be a likely event that'll happen – given the Berlin tech show is due in only a couple of weeks and Philips has debuted tech there before – but we’ll have to wait and see.

You might also like
Major hack hit NY Business Council - over 47,000 people affected, here's how to stay safe - Wednesday, August 20, 2025 - 11:03
  • BCNYS suffered a cyberattack in February, and discovered it in August
  • Sensitive personal, payment, and healthcare information, was stolen
  • There's no evidence of in-the-wild abuse yet

The Business Council of New York State (BCNYS), an association representing businesses, chambers of commerce, and professional organizations across New York, has confirmed it suffered a cyberattack in which it lost sensitive information on tens of thousands of people.

The BCNYS filed a report with the Office of the Maine Attorney General, in which it confirmed the breach, and detailed the type of data that was stolen - in total, 47,329 individuals were potentially affected by the incident, when unidentified cybercriminals stole full names, Social Security numbers (SSN), dates of birth, state identification numbers, financial institution names, financial account and routing number information, payment card numbers, PINs, payment card expiration dates, taxpayer identification numbers, and electronic signature information.

It also included health data such as names of medical providers, information on medical diagnosis and conditions, prescription information, data regarding medical treatment and procedures, and healthcare insurance information.

How to stay safe

The incident apparently happened in late February 2025, but BCNYS did not notice it until early August, when it kicked off an investigation and notified relevant authorities.

So far, there is no evidence that the stolen files were used in identity theft, phishing, or other cybercrime - but of course, this doesn’t mean it’s not happening, or that it won’t happen.

Hackers can use stolen data to open bank accounts or credit lines, make unauthorized purchases, file false tax returns, and even access medical services or prescriptions under someone else’s name.

Victims should place a fraud alert or credit freeze with the major credit bureaus, monitor bank and credit card statements daily, and sign up for identity theft protection or credit monitoring, since BCNYS does offer it, free of charge.

They should also change passwords and enable multifactor authentication on all accounts, notify their banks and insurers of potential fraud, and request an IRS Identity Protection PIN to block fake tax filings.

For the medical data, victims should review insurance Explanation of Benefits (EOB) statements and contact providers to flag any suspicious medical activity.

Via BleepingComputer

You might also like
The ROG Xbox Ally's official release date has been announced, but pricing is still a mystery - Wednesday, August 20, 2025 - 11:16
  • The ROG Xbox Ally and the ROG Xbox Ally X finally have their release date set for October 16, 2025
  • Previous leaks suggested the devices would release on October 16, with pre-orders opening on August 20
  • Pre-orders aren't live yet and pricing is unconfirmed, but should arrive in the coming weeks

It's been a long time coming, but the ROG Xbox Ally handhelds finally have a release date, after their initial announcement during the Xbox Showcase earlier in June.

The ROG Xbox Ally and ROG Xbox Ally X will both be available on October 16, 2025, launching in multiple regions, including the UK, Australia, and the US (the ROG Xbox Ally will launch in China early next year).

Pre-orders aren't live yet, and pricing is still unknown, despite recent leaks and rumors suggesting a price tag close to $1,000 for the ROG Xbox Ally X. Xbox says both of these details will be shared in the coming weeks, which could be an indication of pre-orders opening in September.

The leaks previously hinted at pre-orders going live on August 20. While this hasn't exactly panned out as suggested, it's the date that was expected for Xbox and Asus' announcement of a release date, and the rumor of an October 16 release date was spot on.

Taking cues from the Steam Deck

Xbox has also announced a 'Handheld Compatibility Program', which appears to follow in the footsteps of Valve's SteamOS and the Deck Verified system. This will help players identify which games are playable or compatible with their Xbox Ally device. It will also come alongside a feature called 'Windows Performance Fit' indicator, which will help 'reflect expected performance on their supported device'.

To ensure a console-like handheld experience, Xbox is using an Advanced Shader Delivery feature, built to preload any game shaders during downloads, to dive right into games once ready.

These features are expected to come alongside the 'full-screen experience' that is supposed to help streamline the handheld experience on Windows, without unnecessary background processes and more RAM for games.

You might also like...
Google Pixel 10 lineup – 5 key upgrades including Pixelsnap, Tensor G5, and Camera Coach - Wednesday, August 20, 2025 - 12:00

Google has officially unveiled its new Pixel lineup, with the Pixel 10, Pixel 10 Pro, Pixel 10 Pro XL, and Pixel 10 Pro Fold having debuted at Made by Google 2025.

We’ve spent time with all four new models, and for our early thoughts on each, check out our hands-on Google Pixel 10 review, hands-on Google Pixel 10 Pro/XL review, and hands-on Google Pixel 10 Pro Fold review.

If, however, you’re after a whistle-stop tour of Google’s latest hardware and software upgrades, we’ve detailed five key things to know about the Google Pixel 10 lineup below.

1. New Pixelsnap accessories

(Image credit: Google / Future)

Let’s kick off with Pixelsnap: a built-in, magnetic Qi2 wireless charging technology for the entire Pixel 10 line.

Much like Apple's MagSafe technology, Pixelsnap lets you snap wireless chargers, stands, grips, and other accessories to your chosen Pixel 10 model. The Pixel 10, Pixel 10 Pro, and Pixel 10 Pro Fold can charge at up to 15W using Pixelsnap, while the Pixel 10 Pro XL gets a higher 25W ceiling.

Google debuted its own suite of Pixelsnap accessories alongside the Pixel 10 line – including a magnetic charger, a magnetic stand, and a magnetic ring tool to set your phone upright – but the technology is also compatible with existing MagSafe accessories from Apple and third-party brands like Belkin.

@techradar

♬ original sound - TechRadar

Suffice to say, this is a big deal for Google and the future of Android phones. Until now, all Android users (except for HMD Skyline owners) have been forced to buy adhesive magnetic rings and bulky magnetic cases to magnetize their devices, but Pixelsnap builds a magnetic ring into the Pixel devices themselves.

Here’s hoping we see other Android phone makers launch similar magnetic charging systems soon (looking at you, Samsung).

2. New AI camera tricks @techradar

♬ original sound - TechRadar

Another new feature of the entire Pixel 10 line is Camera Coach, which uses AI to help you take better photos.

This Gemini-based software tool can analyze a scene in the Pixel 10 viewfinder and offer suggestions on how to improve your shot. For instance, Camera Coach can tell you which shooting mode to use, how best to frame your subject, and suggest other useful pointers for getting the most out of your Pixel 10's cameras.

Alternatively, if you want to improve a photo you’ve already taken, the Pixel 10 introduces Edit with Ask Photos, which, as the name suggests, lets you ask Gemini for specific photo edits. You can request improvements to things like sharpness or lightning, or even ask Gemini to add AI-generated content straight to your image.

3. Real zoom for the Pixel 10

The Google Pixel 10 has three rear cameras (Image credit: Google)

Sticking with cameras, Google has finally added a dedicated telephoto camera to its base Pixel flagship.

The Pixel 10 gets a 10.8MP telephoto camera with 5x optical zoom and 20x digital zoom, which is the same telephoto camera as you’ll find on the Pixel 10 Pro Fold.

Thankfully, Google hasn’t ditched any of the other cameras to make room for this new lens on the Pixel 10, so you’ll still have wide and ultra-wide shooting options to choose from. The company has, however, dropped the resolution of the latter camera from 48MP to 12MP.

Of course, for the best Pixel cameras you’ll want to go for the Pixel 10 Pro or Pixel 10 Pro XL, which both sport a 48MP telephoto sensor and offer up to 100x digital zoom. That said, we’re glad to see Google finally equip its base model with a capable zoom camera this year.

4. Tensor G5 chipset

The Google Pixel 10 Pro in Moonstone (Image credit: Google)

Every Pixel 10 model is powered by the new Tensor G5 chipset, which Google says is the most significant upgrade to the Tensor platform since its debut five years ago.

Compared to the Tensor G4, the G5 boasts a 34% faster CPU and a 60% more powerful TPU – that's Google's custom Tensor Processing Unit, which handles machine learning workloads – so you can expect smoother performance, faster AI processing, and better battery efficiency from every Pixel 10 phone.

The Tensor G5 is also paired with the new Titan M2 security chip, which offers baked-in security features like automated call screening, malware protection, and even a built-in VPN.

While we’re not expecting the Tensor G5 to compete with the Snapdragon 8 Elite or Apple’s A18 Pro chipset in terms of raw power, it should deliver a clean – and crucially, secure – software experience.

5. IP68 rating for the Pixel 10 Pro Fold

(Image credit: Google)

At first glance, the Pixel 10 Pro Fold looks very similar to its predecessor, and while it is pretty much the same size and thickness, it benefits from a true world-first in the foldable category: an IP68 resistance rating.

An IP rating – IP standing for ingress protection – defines how well a device can prevent dust (first number) and water (second number) from entering its chassis. An IP68 rating means the Pixel 10 Pro Fold is resistant to both water and dust, which is a selling point that not even the Galaxy Z Fold 7 can boast.

@techradar

♬ original sound - TechRadar

For reference, the Pixel 9 Pro Fold shipped with an IPX8 rating, meaning it offered the same level of water protection but no dust protection whatsoever.

An IP68 rating means the Pixel 10 Pro Fold is now just as secure as the very best Android phones – and that's a big deal for not just Pixel Fold fans, but foldable fans more generally, as it suggests future foldables from other brands could benefit from the same level of protection.

Other durability upgrades for Google’s new foldable include a new gearless hinge, which Google says will stay strong for over 10 years.

So, there you have it: five key things you need to know about the Google Pixel 10 lineup. For a deeper dive into all four new products, check out our aforementioned hands-on reviews, and stay tuned for our full Pixel 10 reviews in the coming weeks.

Are you tempted by any of Google’s new Pixel products? Let us know in the comments.

You might also like
I tried Google’s Pixel Buds 2a, and these budget earbuds offer my favorite parts of the Pixel Buds Pro 2 in a cheaper package - Wednesday, August 20, 2025 - 12:00

Just days after Samsung made its Samsung made its Galaxy Buds 3 FE official, Google’s ushering in a new pair of similarly affordable, value-oriented earbuds, and I got to briefly try them. That’s right, the Pixel Buds 2a are officially official with a much more compact carrying case and in-ear design that resembles the more expensive Pixel Buds 2 Pro.

Google’s Pixel Buds 2a are priced at $129 / £129 / AU$239 and are up for preorder right now. However, just like the just-announced Pixel Watch 4 or Pixel 10 Pro Fold, and even the Pixel Buds 2 Pro in 2024, these earbuds won’t ship until October. Specifically, October 9, 2025, is the Pixel Buds 2a’s actual launch and when deliveries are expected to begin.

Even with a long time to wait, there is a lot to like here, especially factoring in the price you pay.

It starts with the overall design. The Pixel Buds 2a take up less space than the original Pixel Buds A earbuds and were easy to place in my ears.

(Image credit: Future/Jacob Krol)

I especially like that the twistable stabilizer has trickled down from the Pixel Buds 2 Pro and allows you to sort of lock these in your ear for when you'll be active, or to choose a slightly looser fit for gentler use. There is an ear-tip fit test you can conduct in the companion app for Android devices, and Google ships four ear tips in the box.

I wouldn’t sleep on the fun new Iris color option (shown above), either. It’s more of a light lilac in person, but I especially like the subtle pop of color it provides. Pixel Buds 2a are also coming in Hazel, which is a shade of black (shown below).

(Image credit: Future/Jacob Krol)

You’ll also find a “G” for Google engraved on each bud, and that same spot has a capacitive touch sensor for controls, such as pausing music or engaging Google Gemini, though you can also call upon the AI to help using the phrase, ‘Hey Google.’

Google’s also stepping up battery life here – Pixel Buds 2a should last for 10 hours on a full charge or for up to 27 hours with recharges in the case, though that's with active noise cancellation turned off. With it on, you're looking at seven hours from the buds and 20 hours from the case.

The carrying case is smaller and very palm-able, making the buds even more tempting to take every with you. The case recharges via a USB-C port and, like the Pixel Watch 4, now has a battery that can be replaced, making it more serviceable for long-term use.

Aiding in the improved battery life over the previous Google Pixel Buds A-Series is the Google Tensor A1 chip. It should make things a bit more efficient and speed up responsiveness, but it also powers another new feature – active noise cancellation.

(Image credit: Future/Jacob Krol)

Google promises that ANC on the Pixel Buds 2a is as good as the first-generation Pixel Buds Pro, and we’ll need to put that to the test. Without music playing, though, I was able to engage the ANC on the Buds 2a, and it brought a fairly packed hands-on space to a whisper.

It put me in the zone, to a degree, and with a track playing it should be even more effective, though Google didn't allow us to play music during this early look, which obviously means we'll be holding off from a full verdict until we can do our full review.

The Pixel Buds 2a will also feature a transparency mode for times when you want to let in environmental noise or someone chatting with you.

(Image credit: Future/Jacob Krol)

While I didn’t get to try audio playback on the Pixel Buds 2a, we do know that an 11mm dynamic driver powers the experience, and these affordable earbuds will boast an adjustable five-band equalizer via the app. For when you want to be immersed in sound, spatial audio is supported here as well, though it only works with certain Pixel devices (from Pixel 6 and later).

And if you misplace the case, you can see the location on a map, and if the earbuds are inside, you can ping it to have it play a sound. This way, the game of hide and seek will be done a little quicker.

On paper, the Pixel Buds 2a are shaping up to be a pretty compelling pair of earbuds, but even at $129 / £129 / AU$239, these are entering a pretty packed world of the best earbuds, with strong options at the same price and lower.

As we approach the official launch and arrival date of October 9, 2025, we'll put the Pixel Buds 2a through their paces and see just how good these new Google earbuds are. If you’re sold, though, the Google Pixel Buds 2a are up for pre-order now in either Iris or Hazel.

You might also like
Google Pixel Buds 2a are official, bringing noise cancellation and Gemini AI to your ears for a low price – and Pixel Buds Pro 2 get some great free upgrades too - Wednesday, August 20, 2025 - 12:00
  • Google Pixel 2a are the first A-series to get active noise cancellation
  • Spatial Audio, Gemini Live, and up to 27 hours playback
  • $129.99 / £129 / AU$239, pre-order now for October launch

Google has launched the Pixel Buds 2a, the new version of the most affordable Pixel earbuds, and it's given the Pixel Buds Pro 2 some useful free upgrades at the same time.

The new Pixel Buds 2a are the first A-series earbuds to get active noise cancellation, and they have Google's Silent Seal 1.5 to help block unwanted ambient audio. The ANC also has transparency mode – and we've given it a try in our early Pixel 2a hands-on.

In addition to ANC, the Buds 2a also have spatial audio, and the sound quality should be a step up from the previous Google Pixel Buds A thanks to the redesigned internal acoustics around the 11mm dynamic driver.

The Bluetooth version is 5.4, and the buds are powered by Google's Tensor A1 chip, enabling you to take advantage of Pixel-specific features such as Clear Calling, Find Hub, and easy multipoint connections for switching between devices.

And as you'd expect they work with Google's Gemini to control your audio and get answers to questions – in particular, the latest 'Live with Gemini' variation of the service for real-time responses.

Battery life is a decent seven hours with ANC on, rising to 20 hours of total playback via the charging case; turn off the ANC and you can expect 10 hours / 27 hours. The case is rated IPX4 for dust and water resistance and the buds are IP54. For the first time, the battery in the charging case is replaceable, which is a nice touch (though it tends to be the battery in the buds that needs replacing most).

The Pixel Buds 2a cost $129.99 / £129 / AU$239 and come in two colors: Hazel and Iris. You can pre-order them right away, but they're not due for release until October 9th, 2025.

Iris, meet Hazel; Hazel, meet Iris. (Image credit: Google)What's new in the Pixel Buds Pro 2

The Pixel Buds Pro 2 have been around for a while now, but Google is giving them a significant upgrade – and there's a new color option, Moonstone, to match the Google Pixel 10 phone range. All of the improvements other than the new color will be delivered to existing users via a free software update.

From September 2025, Pixel Buds Pro 2 will have Adaptive Audio, which is Google's take on adaptive noise cancelling, reducing distractions and the volume of sound around you without completely removing your situational awareness. That comes alongside Loud Noise Protection, an AirPods Pro 2-style feature that can quickly shut down unexpected loud noises.

September is also when the Pixel Buds Pro 2 get head gesture control so you can pick up calls and reply to texts hands-free, and when they'll get improved audio processing for using Gemini in noisier environments.

They'll also have Live with Gemini support, and will now provide useful notifications about your battery level of the earbuds' case, so you're never caught short.

You might also like
Hacker behind “Rapper Bot” DDoS-for-hire Botnet which carried out over 370,000 attacks arrested - Wednesday, August 20, 2025 - 12:06
  • A 22-year-old Ethan Foltz was recently arrested
  • He's being suspected of building, and renting, an enormous DDoS-for-hire botnet called Rapper Bot
  • Since the arrest, there were no reports of new Rapper Bot activity

A 22-year-old Alaskan man has been arrested under the suspicion of building, maintaining, and renting “one of the most sophisticated and powerful DDoS-for-hire botnets currently in existence” - the infamous “Rapper Bot”.

The US Department of Justice (DoJ) announced law enforcement agents raided the home of Ethan Foltz of Eugene, Oregon, who was apparently arrested, while Rapper Bot was seized and terminated.

The DoJ also claimed the raid a success, as “private sector partners have not reported any Rapper Bot attacks since”.

10 years in prison

Foltz is now suspected of developing and distributing a unique piece of malware that infected Digital Video Recorders (DVRS) and WiFi routers.

That malware allegedly granted him control over almost 100,000 devices, which he used to build a Distributed Denial of Service (DDoS) botnet.

Together with his alleged co-conspirators (who weren’t named in the announcement and were most likely not arrested), he sold access to that botnet, which various cybercriminals used to mount DDoS attacks against different entities, including government agencies, social media platforms, and US tech companies.

According to the criminal complaint, just between April 2025 and today, Rapper Bot was used in 370,000 attacks against 18,000 victims, located in 80 countries around the world.

US Attorney Michael J. Heyman for the District of Alaska described Rapper Bot as “one of the most powerful DDoS botnets to ever exist.” The attacks measured up to three terabits per second, and in some cases even exceeded six terabits per second.

The announcement also said that a single, 30-second DDoS attack could cost a business up to $10,000 in different costs, from lost revenue, disgruntled customers, to bandwidth usage costs, or the resources needed to respond to attacks.

Foltz is charged with one count of aiding and abetting computer intrusions, and if convicted, he could spend the next 10 years in prison.

You might also like
The 12 Best Eye Creams of 2025 - Wednesday, August 20, 2025 - 14:07
The skin around your eyes also needs moisturizer, but it needs to be a specialty cream for the skin in that area. These are the best ones, according to CNET experts.
Thank You, Jimmy Fallon, for Making the Google Pixel 10 Event Fun - Wednesday, August 20, 2025 - 14:15
Commentary: Move over, Pixel 10 -- this is Fallon's show now.

Pages