Skip to content

Change USB Dock Restrictions on a Monday, Deploy Windows 11 version 25H2 in release date slots

Nintendo Challenges Foreign Docking Stations

USB Dock Switching on Monday: Implementation of Windows 11 25H2 update in operation
USB Dock Switching on Monday: Implementation of Windows 11 25H2 update in operation

Change USB Dock Restrictions on a Monday, Deploy Windows 11 version 25H2 in release date slots

In the ever-evolving world of technology, there's always something new to discuss. Here's a roundup of the latest developments:

Samsung's Tizen Store to Close in 2025

Samsung has announced that its Tizen Store will shut down on September 30, 2025. This means that smartwatches with Tizen will no longer be able to install apps after this date.

WhatsApp Security Vulnerability

A high-risk security vulnerability has been discovered in WhatsApp. Attackers can inject code without user intervention on certain iPhone, iPad, and macOS devices. The vulnerability can be exploited in conjunction with device operating system vulnerabilities to install spyware via a URL, without user confirmation. Worryingly, this vulnerability is currently being actively exploited.

European Tech on the Rise

European tech products like Wero and Mistral AI are becoming increasingly popular alternatives to US tech products. As consumers become more conscious of data privacy and security, European products are gaining favour for their commitment to these issues.

Vishing Threats

The hacker conference Def Con in Las Vegas recently hosted the Vishing Competition. Social engineering consultants demonstrated how Vishing attacks can succeed by phone on large companies, persuading employees to voluntarily provide secret information or access to the computer network.

Mobile Coverage Restoration

o2 Telefónica is working to restore mobile coverage in Bad Wildbad as soon as possible, with plans to install a mobile antenna.

Intel's SDC and Super Processor Cores

Intel has filed a patent for "Software-defined Supercores" (SDC) in several countries. The company plans to use SDC to create virtual "super processor cores" and is encouraging developers to integrate other interaction methods with LLMs (Language Model Large) into their applications.

BSI's Security Advice

The BSI is advising consumers to pay attention to what providers offer in terms of security measures. With increasing cyber threats, it's more important than ever to ensure that your devices and services are secure.

Chip Supply Restrictions

Intel, Samsung, and SK Hynix are no longer allowed to supply machines from the US to chip factories in China, with exemptions revoked. This could potentially impact the global supply chain of technology products.

Nikon and Hasselblad Pricing

Nikon's standard zoom is not as cheap as the new Hasselblad, making it a more expensive option for photographers.

Fraud and Online Services

Swedish band Sabaton discussed online fraud with fake band profiles in an interview with Missing Link. Meanwhile, a youth protection law is making small online services give up because the mandatory age verification is too complex.

Nintendo's Switch 2 Dock Limitations

Few third-party docks work with the Switch 2 because Nintendo has implemented a vendor-specific authentication system in the USB-C port. This system uses "Vendor Defined Messages" to verify if the connected dock is an authorized Nintendo product, thereby blocking most third-party devices from proper communication and charging at higher power levels.

Bcachefs and Linux Kernel

Bcachefs will remain in the Linux kernel but will not be further developed. This could potentially impact the performance and efficiency of Linux-based systems.

Online Fraud with Fake Band Profiles

Swedish band Sabaton discussed online fraud with fake band profiles in an interview with Missing Link. Meanwhile, a youth protection law is making small online services give up because the mandatory age verification is too complex.

Developers and LLMs

Developers can integrate other interaction methods with LLMs (Language Model Large) into their applications to provide real value to users, going beyond chat interfaces. This could potentially revolutionize the way we interact with technology.

Read also: