News
A new NYT Strands puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Sunday's puzzle instead then click here: NYT Strands hints and answers for Sunday, August 31 (game #546).
Strands is the NYT's latest word game after the likes of Wordle, Spelling Bee and Connections – and it's great fun. It can be difficult, though, so read on for my Strands hints.
Want more word-based fun? Then check out my NYT Connections today and Quordle today pages for hints and answers for those games, and Marc's Wordle today page for the original viral word game.
SPOILER WARNING: Information about NYT Strands today is below, so don't read on if you don't want to know the answers.
NYT Strands today (game #547) - hint #1 - today's themeWhat is the theme of today's NYT Strands?• Today's NYT Strands theme is… Be my guest
NYT Strands today (game #547) - hint #2 - clue wordsPlay any of these words to unlock the in-game hints system.
- COME
- SEEM
- MITRE
- STEER
- HIVE
- BRAVE
• Spangram has 11 letters
NYT Strands today (game #547) - hint #4 - spangram positionWhat are two sides of the board that today's spangram touches?First side: left, 5th row
Last side: right, 5th row
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
NYT Strands today (game #547) - the answers(Image credit: New York Times)The answers to today's Strands, game #547, are…
- GREET
- SERVE
- INVITE
- EMBRACE
- RECEIVE
- WELCOME
- SPANGRAM: HOSPITALITY
- My rating: Hard
- My score: Perfect
The theme automatically triggered thoughts of Angela Lansbury and company singing “Be our guest, be our guest/Put our service to the test” from Beauty and the Beast.
Although today’s Strands wasn’t about pressed napkins, or dancing teacups, it was in a similar area.
My first two words – GREET and SERVICE – were easy to find, but everything else was quite tricky, including the arching spangram HOSPITALITY. And despite it being my final word it still took me a while to put together RECEIVE.
Yesterday's NYT Strands answers (Sunday, August 31, game #546)- PAIL
- TUMBLING
- FETCH
- WATER
- AFTER
- CROWN
- BROKE
- SPANGRAM: JACK AND JILL
Strands is the NYT's not-so-new-any-more word game, following Wordle and Connections. It's now a fully fledged member of the NYT's games stable that has been running for a year and which can be played on the NYT Games site on desktop or mobile.
I've got a full guide to how to play NYT Strands, complete with tips for solving it, so check that out if you're struggling to beat it each day.
A new Quordle puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Sunday's puzzle instead then click here: Quordle hints and answers for Sunday, August 31 (game #1315).
Quordle was one of the original Wordle alternatives and is still going strong now more than 1,100 games later. It offers a genuine challenge, though, so read on if you need some Quordle hints today – or scroll down further for the answers.
Enjoy playing word games? You can also check out my NYT Connections today and NYT Strands today pages for hints and answers for those puzzles, while Marc's Wordle today column covers the original viral word game.
SPOILER WARNING: Information about Quordle today is below, so don't read on if you don't want to know the answers.
Quordle today (game #1316) - hint #1 - VowelsHow many different vowels are in Quordle today?• The number of different vowels in Quordle today is 4*.
* Note that by vowel we mean the five standard vowels (A, E, I, O, U), not Y (which is sometimes counted as a vowel too).
Quordle today (game #1316) - hint #2 - repeated lettersDo any of today's Quordle answers contain repeated letters?• The number of Quordle answers containing a repeated letter today is 0.
Quordle today (game #1316) - hint #3 - uncommon lettersDo the letters Q, Z, X or J appear in Quordle today?• No. None of Q, Z, X or J appear among today's Quordle answers.
Quordle today (game #1316) - hint #4 - starting letters (1)Do any of today's Quordle puzzles start with the same letter?• The number of today's Quordle answers starting with the same letter is 2.
If you just want to know the answers at this stage, simply scroll down. If you're not ready yet then here's one more clue to make things a lot easier:
Quordle today (game #1316) - hint #5 - starting letters (2)What letters do today's Quordle answers start with?• R
• B
• S
• S
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
Quordle today (game #1316) - the answers(Image credit: Merriam-Webster)The answers to today's Quordle, game #1316, are…
- RECAP
- BRIDE
- SMACK
- SPOIL
After crashing out yesterday I was delighted to just finish today's Quordle unscathed.
Three-letter-combinations were the key to my success, with I-D-E leading to BRIDE and O-I-L leading to SPOIL. My only lucky guess was for SMACK which, at that stage, could have been “scamp”.
Daily Sequence today (game #1316) - the answers(Image credit: Merriam-Webster)The answers to today's Quordle Daily Sequence, game #1316, are…
- FLASH
- THEME
- DAIRY
- CONDO
- Quordle #1315, Sunday, 31 August: MORAL, ENTER, FOIST, TESTY
- Quordle #1314, Saturday, 30 August: RHINO, FLUNG, JUICY, DROVE
- Quordle #1313, Friday, 29 August: FLAIR, TAROT, FRAIL, PRUNE
- Quordle #1312, Thursday, 28 August: AFOOT, TANGO, LUMEN, NAVAL
- Quordle #1311, Wednesday, 27 August: TWEED, SCRAP, SHEIK, AWOKE
- Quordle #1310, Tuesday, 26 August: BEGET, WRATH, HEARD, INDEX
- Quordle #1309, Monday, 25 August: GEEKY, SHALT, CHIEF, JIFFY
- Quordle #1308, Sunday, 24 August: ROVER, GONER, ANTIC, OUTDO
- Quordle #1307, Saturday, 23 August: DEMON, GRATE, FLYER, SHEEP
- Quordle #1306, Friday, 22 August: TROOP, SCOPE, TORSO, BRINY
- Quordle #1305, Thursday, 21 August: QUEST, SPARK, WHITE, ACUTE
- Quordle #1304, Wednesday, 20 August: DOLLY, MERRY, BUGLE, WORST
- Quordle #1303, Tuesday, 19 August: KNAVE, SMART, CARRY, MAMMA
- Quordle #1302, Monday, 18 August: FIBER, TRADE, RAYON, TEASE
- Quordle #1301, Sunday, 17 August: FUNGI, AMITY, DRIER, CHECK
- Quordle #1300, Saturday, 16 August: OWING, QUAKE, SLIDE, ELITE
- Quordle #1299, Friday, 15 August: WHALE, PRISM, DRAKE, TEPEE
- Quordle #1298, Thursday, 14 August: LAPEL, IDIOM, RENEW, LIVER
- Quordle #1297, Wednesday, 13 August: CACTI, HOMER, EMAIL, ALBUM
- Quordle #1296, Tuesday, 12 August: SPOOL, TITLE, JAUNT, OVINE
A new NYT Connections puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Sunday's puzzle instead then click here: NYT Connections hints and answers for Sunday, August 31 (game #812).
Good morning! Let's play Connections, the NYT's clever word game that challenges you to group answers in various categories. It can be tough, so read on if you need Connections hints.
What should you do once you've finished? Why, play some more word games of course. I've also got daily Strands hints and answers and Quordle hints and answers articles if you need help for those too, while Marc's Wordle today page covers the original viral word game.
SPOILER WARNING: Information about NYT Connections today is below, so don't read on if you don't want to know the answers.
NYT Connections today (game #813) - today's words(Image credit: New York Times)Today's NYT Connections words are…
- PRESIDENT
- MOTHER
- BISHOP
- BIRD
- CLERGY MEMBER
- PREMIERE
- M.L.B. PLAYER
- POPE
- SAINT
- VALENTINE
- INTRODUCTION
- N.F.L. PLAYER
- LORDE
- LAUNCH
- BURNS
- SAINT PATRICK
- DEBUT
What are some clues for today's NYT Connections groups?
- YELLOW: When it begins
- GREEN: National day
- BLUE: Wordsmiths
- PURPLE: Linked by a word associated with red
Need more clues?
We're firmly in spoiler territory now, but read on if you want to know what the four theme answers are for today's NYT Connections puzzles…
NYT Connections today (game #813) - hint #2 - group answersWhat are the answers for today's NYT Connections groups?
- YELLOW: FIRST APPEARANCE
- GREEN: ONES CELEBRATED WITH HOLIDAYS
- BLUE: FAMOUS POETS
- PURPLE: WHAT "CARDINAL" MIGHT REFER TO
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
NYT Connections today (game #813) - the answers(Image credit: New York Times)The answers to today's Connections, game #813, are…
- YELLOW: FIRST APPEARANCE DEBUT, INTRODUCTION, LAUNCH, PREMIERE
- GREEN: ONES CELEBRATED WITH HOLIDAYS MOTHER, PRESIDENT, SAINT PATRICK, SAINT VALENTINE
- BLUE: FAMOUS POETS BISHOP, BURNS, LORDE, POPE
- PURPLE: WHAT "CARDINAL" MIGHT REFER TO BIRD, CLERGY MEMBER, M.L.B. PLAYER, N.F.L. PLAYER
- My rating: Hard
- My score: Fail
Congratulations to anyone who completed today’s Connections. A round for me which bordered on the impossible.
In part, my difficulty with today’s game fell down to two areas of ignorance – American sports and poetry. I’m sure I wasn’t the only person who thought we were looking for a connection to the New Zealand singer LORDE as opposed to the poet Audre Lorde. But this wasn’t too much of an issue, as I was unaware of BISHOP and POPE too.
After comfortably getting the yellow group I struggled to make headway and fell into the obvious trap of trying to put together a group connected by religion and then leadership.
I did manage to put together ONES CELEBRATED WITH HOLIDAYS, but with one mistake left and completely clueless I crashed out after letting a shuffle do the guessing for me.
Yesterday's NYT Connections answers (Sunday, August 31, game #812)- YELLOW: CRITICIZE HARSHLY BASH, BLAST, FLAME, ROAST
- GREEN: COMMON COMPONENTS OF BOARD GAMES BOARD, CARDS, DICE, PIECES
- BLUE: HETERONYMS AXES, BASS, COORDINATE, DOES
- PURPLE :___STICKS CHOP, DRUM, FIDDLE, FISH
NYT Connections is one of several increasingly popular word games made by the New York Times. It challenges you to find groups of four items that share something in common, and each group has a different difficulty level: green is easy, yellow a little harder, blue often quite tough and purple usually very difficult.
On the plus side, you don't technically need to solve the final one, as you'll be able to answer that one by a process of elimination. What's more, you can make up to four mistakes, which gives you a little bit of breathing room.
It's a little more involved than something like Wordle, however, and there are plenty of opportunities for the game to trip you up with tricks. For instance, watch out for homophones and other word games that could disguise the answers.
It's playable for free via the NYT Games site on desktop or mobile.
- Details of the OnePlus 15 have leaked
- We also have new renders of the design
- The phone could launch in November
We haven't heard too much about the successor to the OnePlus 13 so far, but a fresh batch of leaks gives us a good idea of what's on the inside and on the outside of the OnePlus 15 (the number 14 is being skipped, due to its associations with bad luck in China).
First up, the team at Android Headlines has pulled together some interesting information about OnePlus 15 benchmark scores that have appeared online. The scores indicate that the phone will be powered by the Qualcomm Snapdragon 8 Elite 2 chipset.
The scores themselves are actually pretty low, but at this stage in the phone's development, it's not worth paying much attention to them – they're unlikely to match the real world performance levels of the handset once it sees the light of day.
It also looks as though the OnePlus 15 is going to come with 16GB of RAM, or at least the option of 16GB of RAM, based on this benchmark listing. The OnePlus 13 is available with 12GB, 16GB, or 24GB of RAM, though that last option isn't available in many places.
Renders and colorsOnePlus 15 storage & color options, as per DCS- 12GB+256GB, 12GB+512GB, 16GB+256GB, 16GB+512GB, and 16GB+1TB- Black, Purple, and Titanium color options pic.twitter.com/Do9n9Uhaw9August 29, 2025
We've also seen some unofficial renders from tipster @Sudhanshu1414 (via Notebookcheck), though as always nothing is certain about these leaks – not until OnePlus actually gets around to launching the flagship phone.
There are three colors on show here, which are black, silver, and a dark purple. The outer camera module is a square, rather than a circle as it is on the OnePlus 13 – and it looks like there are three rear cameras here again, matching the current model.
Interestingly, an executive from OnePlus parent company Oppo has gone on record as saying that the design of the OnePlus 15 is one of his favorites in recent years, although there doesn't look anything too out of the ordinary.
The standard OnePlus 13 was launched in China at the start of November 2024, before becoming more widely available in January 2025, and it's likely that the successor is going to follow a similar sort of schedule but 12 months further on.
You might also like- UK startup Somni claims to have invented the world's first "battery-free streaming earbuds for sleep"
- The earbuds are small and wireless, made to be comfortable to use in any sleeping position
- According to SomniBuds, these sleep buds never need to be charged — but a few things remain unclear
A British startup claims to have found the perfect solution to many sleeping woes. Whether you struggle with insomnia or need a little white noise to fall asleep, these new earbuds could potentially help.
SomniBuds are flat and small streaming earbuds that are made to be used while sleeping. Thanks to their unusual shape, they're apparently optimized for every sleeping position. And although they're completely wireless, SomniBuds also claims that you'll never have to go out of your way to recharge them.
So are these sleep buds a strong new alternative to the likes of the Loop Dream, and how do they work? Here's everything we know so far.
What are SomniBuds, and how do they work?SomniBuds are streaming earbuds for sleeping, made by UK startup Somni. They're not the only sleeping earbuds or earplugs out there – alternatives, such as the Bose Sleepbuds II, have been around a while, alongside newer contenders like the aforementioned Loop Dream. However, Somni claims that its new buds have a few things that the competition doesn't offer.
The biggest standout feature is the fact that these earbuds don't have a battery. They're also wireless, which might make for a confusing combination. How can battery-free hardware be wireless and yet never need to be recharged?
(Image credit: Somni)Admittedly, the technical details are still pretty scarce here, but Somni claims that you won't need to use a charging case or a similar device. Instead, you'll place the SomniMat, which is a charging mat made specifically for these earbuds, under your pillow or your mattress. While you sleep, the earphones will wirelessly connect to the charging mat, enabling them to run all night long.
On paper, this sounds fantastic. However, it's unclear just how reliable the connection between the mat and the earbuds will be. Will this charging style work in every sleeping position? What if you roll over to the other side of the bed? Those are some of the things we're looking forward to exploring during some in-person listening, but the signs from our friends at Shortlist(who have been trying out a pair) are very promising.
SomniBuds are 3mm thin and have a flat, unobtrusive design that looks like it'd be comfortable to sleep in – well, at least as comfortable as sleeping with something in your ears can ever be. The startup claims that the earphones are a quarter of the size of traditional Bluetooth sleepbuds.
SomniBuds won't require an app to use and can be paired with any kind of audio, including Spotify, podcasts, movies, and white noise apps.
How can you try SomniBuds?So, how can you actually try these out? This is where more questions start cropping up. The earbuds are not yet available for sale, but we do know a few things about what's in store for them this year.
Somni promises that the SomniBuds will be available through Kickstarter in "late summer", so we can't have too long to wait now.
However, if you're really excited about these, you can pay $1 to get a 33% discount that you can use when they do come out. You just need to reserve a spot, although Somni says that only 300 early backers will be allowed to sign up.
(Image credit: Somni)The SomniBuds (presumably complete with the charging mat) will be priced at $229 / £224 (around AU$465) without the discount, and $199 / £149 (about AU$310) with the 33% off deal. Early backers will also receive a bonus pair of earbuds.
As with any Kickstarter or crowdfunded project, all of the usual caveats apply and it's important to be cautious. We have no guarantee that these earbuds will make it to market at all, and it's unclear when they'll be fully available for sale.
However, if you're struggling for shuteye and are looking for some earbuds that are designed specifically for sleep, they could be a new contender to watch out for –particularly if those charging-free claims hold up during real-world use.
You might also like- Sure, noise-cancelling headphones are great for work but they saved my sleep (and sanity) and several vacations too – here’s how
- The best earbuds for every budget, all TechRadar tested and recommended
- iOS 26 will soon give your AirPods a smart sleep trick – and Beats headphones could join the pajama party
- AI impersonation scams use voice cloning and deepfake video to convincingly mimic trusted people
- Cybercriminals target people and businesses through calls, video meetings, messages, and emails
- Experts say that independently verifying identities and using multi-factor authentication are key to protecting yourself
Imagine getting a frantic call from your best friend. Their voice is shaky as they tell you they’ve been in an accident and urgently need money. You recognize the voice instantly; after all, you’ve known them for years. But what if that voice isn’t actually real?
In 2025, scammers are increasingly using AI to clone voices, mimic faces, and impersonate people you trust the most.
The rise in this type of scam has been staggering. According to Moonlock, AI scams have surged by 148% this year, with criminals using advanced tools that make their deception near-impossible to detect.
So how can you stay safe from this growing sci-fi threat? Here's everything you need to know, including what cybersecurity experts are recommending.
What are AI impersonation scams?AI impersonation scams are a fast-growing form of fraud where criminals use artificial intelligence to mimic a person’s voice, face, or typing style with alarming accuracy.
These scams often rely on voice cloning, which is a technology that can recreate someone’s speech patterns with just a few seconds of recorded audio.
The samples aren’t hard to find; you can often spot them in voicemails, interviews, or social media videos. According to Montclair State University, even short clips from a podcast or online class can be enough to build a convincing AI impersonation of someone’s voice.
Some scams take this even further, using deepfake video to simulate live calls. For instance, Forbes reports that scammers have impersonated company executives in video meetings, convincing staff to authorize large wire transfers.
(Image credit: Getty Images / Tero Vesalainen)Experts say the rapid growth of AI impersonation scams in 2025 comes down to three factors: better technology, lower costs, and wider accessibility.
With these digital forgeries at their side, attackers assume the identity of someone you trust, such as a family member, a boss, or even a government official. They then request valuable, confidential information, or skip the extra step and ask for urgent payments.
These impersonated voices can be very convincing, and this makes them particularly nefarious. As the US Senate Judiciary Committee recently warned, even trained professionals can be tricked.
Who is affected by AI impersonation scams?AI impersonation scams can happen across phone calls, video calls, messaging apps, and emails, often catching victims off guard in the middle of their daily routines. Criminals use voice cloning to make so-called "vishing" calls, which are phone scams that sound like a trusted person.
The FBI recently warned about AI-generated calls pretending to be US politicians, including Senator Marco Rubio, to spread misinformation and solicit a public reaction.
On the corporate side of "vishing," cybercriminals have staged deepfake video meetings posing as company executives. In a 2024 case threat actors posed as the CFO of UK-based engineering company Arup, and tricked its employees into authorizing transfers totaling a whopping $25 million.
These attacks generally scrape pictures and videos from LinkedIn, corporate websites, and social media in order to craft a convincing impersonation.
AI impersonation is getting more sophisticated, too – and fast. The email provider Paubox found that nearly 48% of AI-generated phishing attempts, including voice and video clones, successfully sidestep detection by current email and call security systems.
How to stay safe from AI impersonation scamsExperts say that AI impersonation scams succeed because they create a false sense of urgency in their victims. Criminals exploit your instinct to trust familiar voices or faces.
The most important defense is to simply slow down; take your time to confirm their identity before you act. The Take9 initiative says that simply pausing for nine seconds can go a long way toward staying safe.
If you receive a suspicious call or video from someone you know, hang up and call them back on the number you already have. As cybersecurity analyst Ashwin Raghu told Business Insider, scammers count on people reacting in the moment, and calling back eliminates that urgency.
It’s also important to watch for subtle red flags. Deepfake videos can have a few tells, such as unnatural mouth movements, flickering backgrounds, or eye contact that feels a little 'off'. Similarly, AI-generated voices can have unusual pauses or inconsistent background noise, even if they sound convincing at first.
Adding extra layers of security can help, too. Multi-factor authentication (MFA) makes it harder for scammers to get into your accounts even if they successfully steal your credentials.
Cybersecurity expert Jacqueline Jayne told The Australian that your best bet is to pair direct verification with some form of MFA — particularly during periods of high scam activity, such as during tax season.
AI offers a ton of mind-boggling capabilities, but it also gives scammers powerful new ways to deceive. By staying vigilant, verifying suspicious requests, and talking openly about these threats, you can reduce the risk of being caught off guard — no matter how real the deepfake may seem.
You might also like- FADU secures SSD controller supply deals with two hyperscalers and expects to sign a third
- Meta seen as likely early adopter after appearing with FADU at FMS 2025 keynote
- Korean company outlines PCIe 6.0 roadmap with 512TB capacity and 28GB/s speeds
South Korea’s FADU has announced it has signed deals to supply its next-generation SSD controllers to two of the world’s largest cloud service operators.
The Korea Herald reports at a press conference in Seoul marking the company’s 10th anniversary, CEO Lee Ji-hyo revealed the news, saying, “We have been confirmed for mass production supply for two of the four global hyperscalers."
"We are also in talks with another hyperscaler, and we expect to finalize that deal by the end of this year," he added, "within two to three years, we are confident we will be supplying to all four major companies.”
Sierra controllerThe four hyperscalers in question are of course AWS, Google, Microsoft and Meta - and while FADU has not said which two of these are under contract, Meta is widely viewed as a strong candidate to be one of them after appearing alongside the company at the recent Future of Memory and Storage 2025 conference.
At that event, FADU unveiled its PCIe 6.0 controller, codenamed Sierra, which supports capacities up to 512TB and sequential speeds of 28GB/s.
The product delivers random read performance of 6.9 million IOPS while operating under 9W.
ChosunBiz reported at the time that Meta engineer Ross Stenfort shared the keynote stage with Lee as FADU introduced the controller and detailed new energy monitoring features developed with industry partners to reduce costs in large-scale data centers.
Lee took the opportunity during the keynote to also underline the company’s long-term vision.
“Since our establishment in 2015, FADU has dedicated the past 10 years to technology development, striving to create the fastest and most innovative SSD controllers in the world targeting the global market, and we have validated our technological prowess with global clients,” he said.
“We will lead the storage market with SSDs that offer greater capacity, faster performance, and higher efficiency as demanded by the AI era.”
FADU shipped its Gen5 controller in late 2024 and expects its Gen6 line to launch in 2026.
You might also like- These are the fastest SSDs you can buy right now
- And these are the largest HDDs and SSDs on the market at the moment
- AMD, Meta are working on revolutionary tech that could recycle petabytes worth of RAM
- Microsoft has revealed how it protects Azure with an Integrated HSM chip
- Azure security stack includes Azure Boost, Hydra BMC and Caliptra 2.0
- Cybercrime reportedly worth $10.2 trillion annually, making it the world’s third-largest economy in 2025
Microsoft has revealed more on the custom-built security chip it deploys across every Azure server, aiming to counter what it calls a cybercrime “pandemic” now costing $10 trillion annually.
The Azure Integrated HSM, which was first announced in late 2024, is the centerpiece of a wider security architecture the company outlined at the recent Hot Chips 2025 event.
A slide Microsoft showed there claims the global cost of cybercrime is currently $10.2 trillion - meaning it now ranks as the equivalent of the third-largest economy in the world.
(Image credit: Microsoft)Azure security measuresThe trillion-dollar estimate places cybercrime behind the United States and China, but ahead of Germany and Japan, and also far bigger than the entire AI market.
Microsoft said the scale of the threat requires both architectural and operational changes.
As ServeTheHome reports, the company listed a number of statistics at the event, including that Azure already spans more than 70 regions and 400 data centers, supported by 275,000 miles of fiber and 190 network points of presence, along with employing 34,000 engineers dedicated to security.
To take on the cybersecurity problem at a hardware level, Microsoft moved from a centralized hardware security module model to its own Azure Integrated HSM.
The custom ASIC is designed to meet FIPS 140-3 Level 3 requirements, providing tamper resistance and local key protection within servers.
By embedding the chip in each system, cryptographic functions no longer need to pass through a centralized cluster, reducing latency while enabling tasks such as AES, PKE and intrusion detection locally.
ServeTheHome noted building an in-house chip required trade-offs. Instead of scaling hardware security modules at a cluster level, Microsoft had to size them for individual servers.
The result, the company argued, was a balance between performance, efficiency and resilience.
The tech giant also presented its “Secure by Design” architecture at Hot Chips, part of its Secure Future Initiative.
This includes Azure Boost, which offloads control plane services to a dedicated controller and isolates them from customer workloads, and the Datacenter Secure Control Module, which integrates Hydra BMC, and enforces a silicon root of trust on management interfaces.
Confidential computing, backed by trusted execution environments, extends protection to workloads in multi-tenant environments.
Caliptra 2.0, developed in collaboration with AMD, Google and Nvidia, anchors security in silicon and now incorporates post-quantum cryptography through the Adams Bridge project.
(Image credit: Microsoft)You might also like- DocumentDB started as a Postgres add-on before evolving into a standalone project
- The Linux Foundation’s adoption signals a new era for open document databases
- MongoDB’s restrictive licensing decisions created openings for DocumentDB’s permissive approach
For years, open source databases have been described as either traditional relational systems or newer NoSQL alternatives.
The emergence of DocumentDB, first introduced by Microsoft and now adopted under the Linux Foundation, is blurring that divide.
By combining PostgreSQL with document-oriented storage through extensions, DocumentDB positions itself as both familiar to developers and disruptive to existing NoSQL players.
From PostgreSQL extensions to a full projectIts adoption under the permissive MIT license signals a push for wider community participation.
"It's great that Microsoft, AWS, and others are joining forces to work on DocumentDB, an open source implementation of a MongoDB-compatible API on top of PostgreSQL,” said Bruce Momjian, founding member of the PostgreSQL core development team.
"We built DocumentDB with a simple goal: give developers an open document database with the flexibility of NoSQL and the power, reliability, openness, and ecosystem of Postgres," said Kirill Gavrylyuk, vice president at Microsoft.
DocumentDB began in 2024 as a pair of PostgreSQL add-ons for handling BSON data models and document queries.
Within a year, the project expanded into a standalone database that still depends heavily on PostgreSQL’s reliability and ecosystem.
This dual identity, part relational engine and part document store, makes DocumentDB attractive for developers seeking a common interface.
Yet skeptics point out that layering document features onto PostgreSQL does not erase the structural limitations of relational systems.
The move to bring DocumentDB into the Linux Foundation has attracted support from Amazon Web Services, Google, and others.
Their endorsement signals a rare moment of alignment among major cloud vendors, particularly given the licensing disputes that fractured the database world in recent years.
"AWS is excited to contribute to the open source DocumentDB project, now stewarded by the Linux Foundation," said Adam Abrevaya, director, Amazon DocumentDB.
"It is great to see the DocumentDB project joining the Linux Foundation, which assures customers and the community have an openly governed, open source option available to them," said Sailesh Krishnamurthy, vice president of engineering, Google Cloud.
Still, critics recall that vendor neutrality has often been more symbolic than practical.
A project backed by hyperscalers can easily become shaped by their priorities, leaving smaller contributors to wonder how much influence community governance will genuinely hold.
The adoption of DocumentDB can also be seen as a response to MongoDB’s decision to embrace restrictive licensing models.
By offering a permissive alternative, the Linux Foundation hopes to push toward a more interoperable standard for document databases.
Industry veterans argue that such a standard is long overdue, but the timing is contentious.
However, MongoDB continues to dominate the market, and its defenders insist that bolting document capabilities onto PostgreSQL is no substitute for a native design.
"DocumentDB fills a critical gap in the document database ecosystem, attracting contributors, users, and champions. It provides an open standard for document-based applications," said Jim Zemlin, executive director of the Linux Foundation.
For developers working on Linux distros or configuring laptops for programming, DocumentDB may appear as another tool promising simplicity and openness.
Enterprises considering mobile workstations or SaaS integrations may also see appeal in a standardized, Postgres-based NoSQL option.
Yet the reality is less straightforward because success depends on technical merit and the community's resistance to tilting toward the largest vendors.
You might also like- Check out the best 3D modeling software for 3D printing and more
- We've rounded up the best portable monitors available now
- Adobe Firefly and Express are getting a Gemini AI boost, making ad campaigns flashier than ever
Looking to access BBC Sounds – the BBC's podcast, radio and music app – from outside the UK? If you're visiting the US, Canada, Australia or indeed anywhere else, you can use a VPN – NordVPN works best – to unblock BBC Sounds and listen as normal.
We'll go into detail below and explain why the BBC's recent announcement that it would block international access to the BBC Sounds app saddened (and angered) many listeners around the world.
Here's a full (and quick) guide to how to get BBC Sounds from abroad...
When did the international BBC Sounds block come into force?International access to BBC Sounds was shut down on Monday, July 21.
Can I still access BBC Sounds from abroad or on holiday?Yes. UK residents will be able to continue accessing the BBC Sounds app from abroad with a VPN. We recommend Nord, which comes with a 30-day trial and over 70% off when you use our deal below...
How to unblock BBC Sounds with a VPNIf you're outside the UK at the moment and blocked from using BBC Sounds, you can still access the app thanks to the wonders of a VPN (Virtual Private Network).
The software allows your devices to appear as if they're back in your home country regardless of where in the world you are. So ideal for listeners away for work or on vacation wanting a taste of home.
NordVPN is our favorite:
Editors ChoiceNordVPN – get the world's best VPN
We regularly review all the biggest and best VPN providers and NordVPN is our #1 choice. It unblocked every streaming service in testing and it's very straightforward to use. Speed, security and 24/7 support available if you need – it's got it all.
The best value plan is the two-year deal, which sets the price at $3.39 per month and includes an extra 3 months absolutely FREE. There's also an all-important 30-day no-quibble refund if you decide it's not for you.
- So, try NordVPN 100% risk-free for 30 daysVIEW DEAL ON
Is there a BBC Sounds alternative?Listeners based outside the UK can now access a limited selection of BBC audio programming via the BBC.com website and the BBC app (iOS / Android).
To put it mildly, however, they're nothing at all like BBC Sounds!
The only live services available through BBC.com and the BBC app are BBC Radio 4 and the BBC World Service English. They also host select podcasts, and news and history programming, such as Global News Podcast, You're Dead to Me and Infinite Monkey Cage.
Although you can listen via BBC.com and the BBC app without an account, you have to sign in on order to download, follow and save shows.
Can I listen to BBC 6 Music and other radio stations from outside the UK?All, however, is not yet lost. You can still listen to BBC Radio stations from outside the UK by visiting their individual websites directly, through a web browser (links listed below).
It's a crude workaround, but it works.
However, these websites don't support key BBC Sounds features, such as the option to set a radio station as your alarm or even the ability to view a station's schedule.
Furthermore, only select radio content will be made available on-demand through the websites.
Click for more BBC Radio stations▼
Local radio
Further BBC Sounds troubleshooting tipsIf you still can't access BBC Sounds, even with the aid of a VPN, there are a few more things you can try.
Make sure your BBC account is associated with a valid UK post code, such as W1A 1AA.
The BBC Sounds app (iOS / Android) won't appear in the Play Store or the App Store outside the UK, but you may be able to get around that by changing your phone's region in the settings menu.
The BBC, like most broadcasters and networks, is engaged in a neverending cat-and-mouse battle with VPN providers.
Although we've ranked the best iPlayer VPNs, something we've worked out through thorough testing, if one of them works today there's no guarantee the same will be true tomorrow, in which case you can raise the issue with your VPN provider's customer support team, and ask them to recommend the best server to connect to.
Why did BBC Sounds get blocked? What's the full story?So what would compel the corporation to cut one of its most popular and beloved exports? The decision was taken without a consultation, and BBC management has rebuffed calls for an explanation to be provided.
For weeks following the announcement, Andrea Catherwood, the presenter of the BBC Radio 4 podcast Feedback, endeavoured to get a BBC spokesperson onto her show in order to justify the move, without success.
The move has been met with widespread anger and sadness, but above all disbelief. BBC Sounds doesn't just provide a connection to home for Brits living abroad, it's an invaluable purveyor of culture, education and entertainment, which has served as a key platform for musicians, artists and performers, some of whom owe their entire careers to radio.
BBC Sounds' demise has also caused a political storm in Ireland, where listeners north of the border retain full access to the app.
The memorandum of understanding agreed by the UK and Irish governments in 2010 stressed the importance of public service broadcasting on both sides of the border, for "promoting cultural diversity, in providing educational programming, in objectively informing public opinion, in guaranteeing pluralism."
The subject at the time was Irish-language channel TG4, with the MoU advocating its availability in Northern Ireland as well as the Republic of Ireland. However, listeners in the Republic of Ireland have now had their access to BBC Sounds blocked.
We test and review VPN services in the context of legal recreational uses. For example:1. Accessing a service from another country (subject to the terms and conditions of that service).2. Protecting your online security and strengthening your online privacy when abroad.We do not support or condone the illegal or malicious use of VPN services. Consuming pirated content that is paid-for is neither endorsed nor approved by Future Publishing.
Encryption has been on a long journey, transcending centuries, from leather scrolls to quantum-resistant algorithms. But if we look at security requirements for businesses 25 years ago, the world was very different then. I sold encryption software back in 2000 when no one apart from the Government knew they needed it. It was free for home or personal use, so trying to sell encryption in a world where users borrowed it free of charge was tough.
One of the most notable examples at the time was OpenSSL, an open-source project that provided free encryption tools for securing internet communication. Another popular tool was PGP (Pretty Good Privacy), which had both free and commercial versions. The free version was widely used by privacy advocates, journalists, and tech-savvy users to encrypt emails and files.
However, eventually, public-key cryptography and tools like PGP started to gain traction for secure email and online communication. It was a pivotal moment as encryption moved from being a nice-to-have to becoming essential for privacy and trust online.
Unlocking Encrypted Data Without Compromising SecurityFully Homomorphic Encryption (FHE) has also been in the mix for about 15 years. But it has been labelled as too complicated, requiring too much processing, too much disk space, being too slow and more.
But we’ve seen a breakthrough in FHE whereby customers are using it not just to encrypt data, but to query, decrypt and use it. They can also search data faster when it's encrypted than when it's not!
Without going into lengthy explanations as to how the integers (the raw material that makes encryption possible) and cryptographic algorithms work, in simple terms, it’s only the user who has access to and can understand and read the data. Where anyone else is concerned, the data is just garbage.
Why is this so important? If we look at how encryption tools work today, we create data, which we then encrypt. Every time we search, every time we move, we decrypt – because that’s the only way to make the data work for us. Once we have decrypted it, we must re-encrypt it to ensure it is safe. Therefore, we have multiple touch points where data, which we tell users is encrypted, isn’t encrypted.
This might be okay for data-at-rest, but once you migrate data from A to B, in many cases, we send the encryption keys with it. This is the equivalent of sending the keys to the castle with the castle. Also, the moment the user wants to do anything with that data (which is arguably when it is most useful) then all that safeguarding is gone.
Therefore, for us to be able to allow customers to use data whilst it still has a safety net around it and ensure data remains confidential is a huge leap forward. Most importantly, we don't have encryption keys travelling with the data; the keys are generated at the point of login.
Is Bootstrapping FHE The Answer?Many in the industry advocate bootstrapping FHE as a workaround. This is a clever trick that allows encrypted data to be refreshed so it can be used in computations without becoming too noisy to decrypt. But it’s important to recognize both its promise and its challenges.
Done properly, bootstrapping has significant potential if implemented efficiently. It could unlock powerful capabilities in computation, especially in domains where data sensitivity is paramount.
However, bootstrapping remains computationally intensive. Even with optimized schemes, it can take seconds per operation, which means it cannot be used for real-time applications. Bootstrapping implementations are highly complex.
That said, dismissing bootstrapping outright may be premature. As research and engineering efforts continue - including our own - there’s reason to believe that more efficient, scalable implementations are within reach.
We live in a data-driven world, and FHE is going to be the key to enabling access to data and the use of technology like AI tools. However, I recently read an article in which Elon Musk discussed the fact that we’re running out of real-world data to train AI models.
This idea (often called the “peak data” theory) suggests that the internet no longer offers enough fresh, high-quality data to improve large AI models meaningfully.
In other words, we will hit a point where data is not going to develop in a way that is useful to organizations because of all the rules we put around it, some of which are self-imposed, others which are required by regulators.
Many Cast Caution AsideMany regulations are vague, which means organizations will interpret these in a way that enables them to reduce risk by taking a more cautious approach. Other companies throw caution to the wind. We're seeing that play out in real-time.
Take Meta as an example. The company has faced multiple fines recently. The most notable in 2025 is a €200 million penalty from the European Commission under the Digital Markets Act (DMA). The fine was issued because Meta’s “pay-or-consent” model, where users had to either pay for ad-free access or consent to data tracking, was found to violate users’ rights to genuine choice.
Regulators argued that this setup pressured users into giving up their data, undermining the DMA’s goal of fair digital competition.
Improving LivesI would argue that we must make data more usable, particularly where data helps make the world a better place. Clinical trials, for example, have faced challenges due to disparate data, which hampers progress. If a trial is quite niche, the organization needs to be able to get a decent data set to perform tests and analyze the results in a meaningful way.
We are helping organizations keep the data in the jurisdiction it is supposed to be in and still collaborate without moving the data around and without plain text data ever flying across the internet. This means we can make people's lives better; we can stop people dying of illnesses we could prevent because we understand more.
Of course, we want to be able to use data in a way that still respects privacy. This is where we see FHE being an enabler. We can have AI using data that is encrypted to make better decisions without affecting the underlying owner of the data from a user level. It's a brave new world – but an exciting one.
We list the best data recovery software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
In today’s work-anywhere culture, people are more connected than ever. As work becomes more mobile and meetings more virtual, one form of cyber threat is quietly becoming more common: audio surveillance.
Cybersecurity now extends far beyond protecting email accounts and stored files. In a hybrid working environment, where conversations happen over video conferencing, voice messages and shared screens, it’s not only your data that is at risk. The conversation itself can become a target.
And here is the reality, according to Forbes, an overwhelming 95% of all cybersecurity breaches are caused by human error. This includes everything from sharing sensitive information without proper safeguards to joining calls over unsecured networks.
It doesn’t always take a sophisticated hack to cause real damage. Sometimes, the risk comes from the tools we trust, the places we connect from or the assumptions we make about who’s listening.
The illusion of safetyImagine opening your laptop at a coffee shop, putting on your headset and jumping into a client meeting. The connection seems strong, the audio is crystal clear and everything feels just right. But what if someone else is eavesdropping?
In hybrid work, we often step outside the secure walls of the office and into environments we can’t control. That flexibility is a defining feature of modern productivity, but it also opens the doors to silent risks. An unsecured café Wi-Fi network, for instance, can make it remarkably easy for malicious actors to intercept audio streams or access shared content without detection.
Every call, screen share and calendar invite can include sensitive materials, such as financial data, customer details, upcoming campaigns, or internal strategy. A breach of confidential information could result in serious consequences, including regulatory penalties, disciplinary action, financial and reputational liability, or even job loss.
Recent research published in ScienceDirect highlights just how vulnerable virtual collaboration can be. A comprehensive review of video conferencing platforms revealed persistent security flaws, including weak encryption protocols and insufficient access controls, that leave meetings open to unauthorized access and potential surveillance.
For hybrid professionals working from hotels, shared spaces or home networks, this means even the most routine call could be silently compromised if the right safeguards aren’t in place.
More than just a callIn hybrid work, our headsets, webcams and conferencing tools have become the new endpoints of trust. But here’s the uncomfortable truth; a headset isn’t just a device, it’s a data hub that carries voice, client queries, business sensitive information and, in many cases, biometric data like tone, speech patterns and emotional cues.
The risks aren’t just external either. With the rise of AI, even internal tools are learning from the voices of everyone in a company. If not built securely, they could share that information with more than just your team. We live in a world where what we say can be stored, analyzed and even weaponized.
That’s why companies are rethinking how they protect their people, not just their files. Security isn’t just about firewalls anymore, and IT teams need to consider about everything from what a headset hears to how your video bar streams to the cloud.
The quietest threats are the loudest warningsIt’s easy to spot a phishing email or a suspicious link. But the more subtle threats, like unsecured pairing between a headset and a laptop, or a public connection masking malicious intent, are the ones that slip through the cracks.
Imagine walking into a crowded room and announcing your company’s quarterly results out loud. You’d never do it. But working unprotected in a public space can be equally as revealing.
As reported by Comparitech, cybercrime is projected to cost the global economy $10.5 trillion USD annually by 2025. Businesses need to think beyond whether they will be targeted or not, it’s an inevitability.
Raising the StandardBusiness leaders need to adopt the ethos that the only individuals who should be on a call are the ones who’ve been invited. That’s why all devices need to have an emphasis on security.
This includes encrypting conversations, implementing secure device pairing and building-in automated defenses against man-in-the-middle attacks. And implementation alone isn’t enough, IT teams need to stress-test solutions with in-house and contracted ethical hackers. This ensures customer trust is built into the very fabric of the tools we use.
Hybrid work is here to stay, and that’s a good thing. It gives workers freedom, flexibility and balance. But with that freedom comes a new kind of responsibility: to protect the digital spaces businesses occupy, the voices employees share and the people they connect with.
The next time you plug in your headset, ask yourself “who else might be listening?”. The biggest risks don’t always come with red warning signs; sometimes, they arrive quietly, just like a spy among us.
We list the best business phone systems.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro