Change USB Dock Restrictions on a Monday, Deploy Windows 11 version 25H2 in release date slots
In the ever-evolving world of technology, there's always something new to discuss. Here's a roundup of the latest developments:
Samsung's Tizen Store to Close in 2025
Samsung has announced that its Tizen Store will shut down on September 30, 2025. This means that smartwatches with Tizen will no longer be able to install apps after this date.
WhatsApp Security Vulnerability
A high-risk security vulnerability has been discovered in WhatsApp. Attackers can inject code without user intervention on certain iPhone, iPad, and macOS devices. The vulnerability can be exploited in conjunction with device operating system vulnerabilities to install spyware via a URL, without user confirmation. Worryingly, this vulnerability is currently being actively exploited.
European Tech on the Rise
European tech products like Wero and Mistral AI are becoming increasingly popular alternatives to US tech products. As consumers become more conscious of data privacy and security, European products are gaining favour for their commitment to these issues.
Vishing Threats
The hacker conference Def Con in Las Vegas recently hosted the Vishing Competition. Social engineering consultants demonstrated how Vishing attacks can succeed by phone on large companies, persuading employees to voluntarily provide secret information or access to the computer network.
Mobile Coverage Restoration
o2 Telefónica is working to restore mobile coverage in Bad Wildbad as soon as possible, with plans to install a mobile antenna.
Intel's SDC and Super Processor Cores
Intel has filed a patent for "Software-defined Supercores" (SDC) in several countries. The company plans to use SDC to create virtual "super processor cores" and is encouraging developers to integrate other interaction methods with LLMs (Language Model Large) into their applications.
BSI's Security Advice
The BSI is advising consumers to pay attention to what providers offer in terms of security measures. With increasing cyber threats, it's more important than ever to ensure that your devices and services are secure.
Chip Supply Restrictions
Intel, Samsung, and SK Hynix are no longer allowed to supply machines from the US to chip factories in China, with exemptions revoked. This could potentially impact the global supply chain of technology products.
Nikon and Hasselblad Pricing
Nikon's standard zoom is not as cheap as the new Hasselblad, making it a more expensive option for photographers.
Fraud and Online Services
Swedish band Sabaton discussed online fraud with fake band profiles in an interview with Missing Link. Meanwhile, a youth protection law is making small online services give up because the mandatory age verification is too complex.
Nintendo's Switch 2 Dock Limitations
Few third-party docks work with the Switch 2 because Nintendo has implemented a vendor-specific authentication system in the USB-C port. This system uses "Vendor Defined Messages" to verify if the connected dock is an authorized Nintendo product, thereby blocking most third-party devices from proper communication and charging at higher power levels.
Bcachefs and Linux Kernel
Bcachefs will remain in the Linux kernel but will not be further developed. This could potentially impact the performance and efficiency of Linux-based systems.
Online Fraud with Fake Band Profiles
Swedish band Sabaton discussed online fraud with fake band profiles in an interview with Missing Link. Meanwhile, a youth protection law is making small online services give up because the mandatory age verification is too complex.
Developers and LLMs
Developers can integrate other interaction methods with LLMs (Language Model Large) into their applications to provide real value to users, going beyond chat interfaces. This could potentially revolutionize the way we interact with technology.