Category: 4. Technology

  • Critical Sudo bugs expose major Linux distros to local Root exploits

    Critical Sudo bugs expose major Linux distros to local Root exploits

    Critical Sudo bugs expose major Linux distros to local Root exploits

    Pierluigi Paganini
    July 04, 2025

    Critical Sudo flaws let local users gain root access on Linux systems, the vulnerabilities affect major Linux distributions.

    Cybersecurity researchers disclosed two vulnerabilities in the Sudo command-line utility for Linux and Unix-like operating systems. Local attackers can exploit the vulnerabilities to escalate privileges to root on affected systems.

    Sudo (short for “superuser do”) is a command-line utility found in Unix and Linux systems. It lets a permitted user run commands with the security privileges of another user, most commonly the root user (the system’s most powerful administrative account).

    Below is the description of the two vulnerabilities:

    • CVE-2025-32462 (CVSS score: 2.8) – Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines.
    • CVE-2025-32463 (CVSS score: 9.3) – Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the –chroot option.

    The Stratascale Cyber Research Unit (CRU) team discovered both local privilege vulnerabilities.

    CVE-2025-32462 is a critical flaw in the Sudo utility, stemming from the --host option introduced in version 1.8.8 in 2013. Though originally meant only for listing rules (sudo -l), it also worked with other commands like sudoedit. In specific enterprise configurations using Host or Host_Alias directives, this oversight lets users run commands with elevated privileges by referencing remote host rules.

    “The Stratascale CRU team discovered that since the introduction of the host option in 2013, executing a sudo or sudoedit command with the host option referencing an unrelated remote host rule causes Sudo to treat the rule as valid for the local system. As a result, any command allowed by the remote host rule can be executed on the local machine.” reads the report published by Stratascale.”Even though the production server is explicitly denied for the lowpriv user, root access is achieved by specifying the host option for the development server.”

    The issue was addressed with a patch that limits the --host option to listing only.

    “Sudo’s -R (–chroot) option is intended to allow the user to run a command with a user-selected root directory if the sudoers file allows it. A change was made in sudo 1.9.14 to resolve paths via chroot() using the user-specified root adirectory while the sudoers file was still being evaluated. It is possible for an attacker to trick sudo into loading an arbitrary shared library by creating an /etc/nsswitch.conf file under the user-specified root directory.” reads the advisory published by Sudo project maintainers. “The change from sudo 1.9.14 has been reverted in sudo 1.9.17p1 and the chroot feature has been marked as deprecated. It will be removed entirely in a future sudo release. Because of the way sudo resolves commands, supporting a user-specified chroot directory is error-prone and this feature does not appear to be widely used.”

    On April 1st, 2025, Rich Mirch from Stratascale Cyber Research Unit (CRU) reported the vulnerability to Sudo maintainer Todd Miller. On June 23, 2025 a patch was sent to operating system distros list. Sudo advisory links confirmed.

    Follow me on Twitter: @securityaffairs and Facebook and Mastodon

    Pierluigi Paganini

    (SecurityAffairs – hacking, Sudo)




    Continue Reading

  • iOS 26: What’s Changed With the iPhone’s Home Screen

    iOS 26: What’s Changed With the iPhone’s Home Screen

    Apple’s new Liquid Glass design is noticeable on the Home Screen right when you unlock your iPhone, though the degree of change is customizable. We’ve rounded up everything that’s changed with the ‌iPhone‌’s main interface.

    Liquid Glass Design

    By default, app icons have a layered look with subtle depth, essentially appearing as multiple sheets of glass stacked on one another to create a glass-like translucent look.

    ios 26 home screenios 26 home screen
    Apple created Liquid Glass app icons for apps like Safari, Maps, Photos, the App Store, Mail and more. Third-party app icons are adopting the same aesthetic, and for apps with a simple design on a solid background, no update is needed. Icons like this already have a Liquid Glass look.

    The dock is transparent and blends into the background behind it, and the same goes for the search button. App folders have a frosted glass design that also changes tint based on your wallpaper. When you edit your ‌Home Screen‌, the buttons that you interact with are also transparent.

    Interface elements like the dock, folders, and the search button have a lighting effect that changes when you move your ‌iPhone‌, making them look like real glass.

    Light, Dark and Tinted Modes

    The Liquid Glass effect is apparent in both Light Mode and Dark Mode, with icons continuing to feature the same stacked glass look, just with a lighter or darker background.

    ios 26 home screen standardios 26 home screen standard
    Apple technically changed Light Mode to “Default Mode” in the customization settings where you can adjust color (long press on the display and tap on customize).

    There are new “Always” and “Auto” toggles for enabling permanent Light or Dark styles or adjusting them based on time, and the Small and Large buttons for changing icon size have been relocated to the upper right of the customization interface.

    Tinted mode looks different in iOS 26 than it did in iOS 18. Rather than icons featuring a black background with colored graphics, icons adopt the full color that you select with white graphics in Light Mode. In ‌Dark Mode‌, backgrounds are a much darker shade of the color you choose, but aren’t entirely black.

    ios 26 home screen icon tintios 26 home screen icon tint
    With Tinted icons, the layered glass look isn’t as obvious, but it’s still present.

    Clear Icons

    Apple added a “Clear” icon option in ‌iOS 26‌ that’s available alongside Default, Dark, and Tinted. As the name suggests, Clear has a dramatic Liquid Glass look with icons that are entirely transparent. The icons adopt the color of your wallpaper, with white text and designs.

    ios 26 home screen clear iconsios 26 home screen clear icons
    There are Light and Dark options for the Clear setting. Light looks like frosted glass, while Dark looks like tinted glass. If you want to go all-in on Liquid Glass and have your ‌iPhone‌ look notably different, Clear is the option to choose.

    Widgets

    Widgets have some of the same aesthetic as icons, but on the whole, they don’t look too much different from how they looked in ‌iOS 18‌ in the Default mode.

    ios 26 widgetsios 26 widgets
    With the Clear option turned on, widgets are transparent and have a more cohesive design that matches with your wallpaper.

    Wallpaper

    You can edit your wallpaper directly from the ‌Home Screen‌ in ‌iOS 26‌. Long press on the display and then tap on the new “Edit Wallpaper” option.

    ios 26 wallpaper home screenios 26 wallpaper home screen
    The wallpaper interface lets you change the image that you’re using on the ‌Home Screen‌, but it doesn’t affect the Lock Screen. If you have a photo set as a wallpaper, for example, you can change the color, select a gradient, or choose a photo, plus you can turn blurring for images off or on.

    Wallpaper takes a starring role in ‌iOS 26‌ because it affects the color of the dock, folders, and icons, depending on your settings.

    Control Center

    Control Center adopts Liquid Glass, so while the functionality is the same, the general look is different. Compared to the ‌iOS 18‌ Control Center, the ‌iOS 26‌ version has depth for the icons with the Liquid Glass shifting light effect.

    ios 26 control centerios 26 control center
    The icons are tinted to look like frosted glass, and some of the underlying buttons for adjusting Control Center have been tweaked with the updated look. Icons are a little larger, and some of the bar-shaped icons for volume, brightness, and other settings are rounder.

    Other Home Screen Elements

    The Dynamic Island, Notification Center, long press gestures, and App Library have not changed beyond aesthetics. App Library folders are translucent and the search bar is rounded, and for widgets, there is a glass look of varying intensity depending on your icon color choice.

    ios 26 home screen featuresios 26 home screen features
    App Library icons are also slightly larger, with less padding between them.

    Web Apps

    When you add a website to your ‌Home Screen‌ in ‌iOS 26‌, it always opens as a web app. Web apps were available on the ‌Home Screen‌ in ‌iOS 18‌, but web developers needed to configure them to operate as web apps.

    ios 26 web appsios 26 web apps
    If websites weren’t configured properly, they would open in Safari when added to the ‌Home Screen‌. Now a website will open as a dedicated web app, even if it hasn’t been explicitly set up to work that way.

    There is an Open as Web App option that can be toggled off when adding a website to a ‌Home Screen‌ if you prefer that websites open up in Safari.

    Read More

    We have a dedicated iOS 26 roundup that goes into detail on all of the new features that are available in the update.

    Continue Reading

  • In iOS 26 a new feature will stop spam texts and those from unknown senders from reaching you

    In iOS 26 a new feature will stop spam texts and those from unknown senders from reaching you

    Tired of receiving those spam texts asking you to pay for a toll you supposedly owe? Other spam texts can be just as annoying. How many messages have you received supposedly sent from the U.S. Postal Service about a package that couldn’t be delivered because there wasn’t enough postage paid? One of the hallmarks of a successful spam campaign is a message that forces you to react emotionally instead of logically.

    One example would be a text claiming to be from your bank that says it is processing a withdrawal for a large amount of money. Right away, you worry that someone was able to infiltrate your bank account so you respond to the text by revealing personal information, and find that you’ve put yourself in even more financial jeopardy.

    The Apple Messages app is the recipient of a new feature in iOS 26 that will help you avoid becoming the victim of unwanted spam and scam texts. On iOS 26 (and right now with the iOS 26 Developer Beta), tap the blue button in the upper right corner of the Messages app and press the Manage Filtering option to open a new menu. When that menu opens you probably should toggle on “Screen Unknown Senders” and “Filter Spam.”

    Toggling on “Screen Unknown Senders” hides notifications about texts sent from a sender you don’t know and moves such messages to the Unknown Senders list. In a little bit, I will tell you how to access that list. The Filter Spam hides notifications related to texts considered to be spam and moves such messages to the Spam list.

    Even though you won’t see notifications about texts received from unknown senders and texts considered to be spam in your main conversations page, these texts can be accessed from individual Unknown Senders and Spam lists. To see those lists, open the Messages app and tap the blue button in the top right-corner. You will see a small menu pop up. To view messages from “Unknown Senders,” press on that listing. You will see all of the texts you received from unknown senders that were hidden by the system. Do the same for “Spam” to see a list of texts considered spam that were placed in the individual Spam list.

    Tapping the blue button in the upper-right corner will allow you to access four different and individual lists containing:

    • Messages
    • Unknown Senders
    • Spam
    • Recently Deleted messages

    Again, this is a feature that most of you will receive with the iOS 26 release in September. Those of us who have installed the iOS 26 Developer beta have this feature now.

    Grab Surfshark VPN now at more than 50% off and with 3 extra months for free!

    Secure your connection now at a bargain price!

    We may earn a commission if you make a purchase


    Check Out The Offer

    Continue Reading

  • The Growing Importance of Securing MCP Servers for AI Agents

    The Growing Importance of Securing MCP Servers for AI Agents



    As MCP servers become the backbone of multi-agent AI systems, their design and protection demand first-class architectural status.

    As AI agents grow more autonomous and influential in enterprise and operational environments, a new class of infrastructure has emerged as critical: Model Context Protocol (MCP) servers.

    MCP servers help support the use of real-time data, enhancing situational awareness. Unlike traditional inference-serving models, where a stateless prompt yields a one-time response, MCP-backed agents often operate autonomously and can take actions based on new information.

    As a result, many organizations are exploring MCP servers for the first time. And like any other new technology, there are implementation challenges and security issues that must be addressed.

    Implementation Challenges

    Implementing MCP servers presents several challenges, particularly in terms of scalability, data consistency, and model interoperability. MCP servers must deliver low-latency context access while handling rapidly evolving memory structures. Additionally, supporting multiple types of AI agents, which are often powered by different models or frameworks, requires standardized context schemas and adaptable APIs. Integration with external data sources and orchestrating context across multi-agent environments further complicates implementation, demanding careful design around performance, reliability, and modularity.

    With that said, here are some of the top implementation challenges to address in any MCP implementation.

    Real-Time Context Management at Scale: MCP servers must support low-latency access to large volumes of structured and unstructured data, often in a distributed setting. Organizations must decide how to prioritize retrieval performance over consistency and how to orchestrate updates without interrupting ongoing agent workflows.

    Cross-Agent and Cross-Domain Complexity: In environments where multiple agents collaborate, such as when a swarm of agents coordinates logistics in real-time, MCP servers must serve context that is both shared and scoped appropriately. Improper isolation could lead to “context bleeding,” where one agent inadvertently accesses or corrupts another’s memory or instructions.

    Integration with Heterogeneous AI Models: Many organizations deploy a mix of open-source, proprietary, and fine-tuned foundation models. Ensuring that MCP context formats are interoperable across diverse models requires standardized schemas, adaptable APIs, and often runtime translation layers.

    Security Challenges

    Giving AI agents the ability to access different data sources and act autonomously obviously introduces potential security problems. Unfortunately, malicious actors are keen to exploit these problems. Therefore, organizations need to be aware of common security issues and how to minimize their impact. To that end, some of the top issues to consider include:

    Target-Rich Environment for Attackers: MCP servers house sensitive intellectual property, strategic intent, and behavioral history. A breach could allow attackers to manipulate agent decisions subtly over time, such as altering financial strategies, operational workflows, or even cybersecurity responses. This makes MCPs a prime vector for cyber risk.

    Authentication and Authorization Complexity: With agents potentially spawning dynamically, authenticating identities and authorizing access to context becomes nontrivial. Fine-grained policies must distinguish between agents, tasks, users, and even temporal state, all while minimizing performance impact.

    Poisoning and Context Drift: Beyond direct breaches, attackers may attempt to poison MCPs by injecting subtly corrupted data, thereby altering an agent’s behavior in ways that are hard to detect. Defending against this requires a mix of provenance tracking, anomaly detection, and possibly cryptographic signing of trusted context updates.

    See also: MCP: Enabling the Next Phase of Enterprise AI

    Drilling Down into MCP Security Challenges

    A recent investigation by Backslash Security revealed a troubling pattern of vulnerabilities in MCP servers. The company’s analysis uncovered that hundreds of MCP instances were misconfigured, leaving them exposed to serious security risks. One of the most alarming findings, dubbed “NeighborJack,” showed that many MCP servers were bound to 0.0.0.0, meaning they were open to any device on the same local network. In environments like coworking spaces or shared office networks, this allowed potential attackers to silently connect to these servers without any authentication, hijacking agent behavior, or accessing sensitive context data.

    Compounding this issue, some servers were found to permit the execution of arbitrary operating system commands. Due to poor input sanitization and unsafe subprocess handling, attackers could run dangerous commands, such as deleting files, stealing credentials, or even installing malware. In the worst cases, servers combined both vulnerabilities, allowing a complete remote takeover without any credentials or security checks.

    Even more troubling is the potential for context poisoning, where manipulated data, such as phishing emails or malicious documents, could silently enter an agent’s context and influence its reasoning. The report’s findings underscore the urgent need to properly secure MCP servers by restricting access, validating input, and treating these systems as high-risk infrastructure.

    The Road Ahead for MCP

    Just as databases have become critical infrastructure for enterprise applications, MCPs are becoming foundational for intelligent automation. And with that rise comes the urgent need to treat them as a critical asset to protect, optimize, and audit.

    As MCP servers become the backbone of multi-agent AI systems, their design and protection demand first-class architectural status. Organizations must invest in secure memory architectures, implement zero-trust principles across agent interactions, and continuously monitor for anomalies in context.


    Continue Reading

  • Save 33% Off the New Travel-Friendly Baseus Enercore Wall Charger With Built-in USB Cable

    Save 33% Off the New Travel-Friendly Baseus Enercore Wall Charger With Built-in USB Cable

    Baseus recently released a new line of Enercore wall chargers that is designed to be the ultimate travel friendly accessory while delivering enough power output to quickly charge your portable electronics. Even better, you can take advantage of some early Amazon Prime Day discounts. Currently the 67W model is on sale for Amazon Prime members for just $36.99 after you apply an additional 5% off coupon code “GOHTHZJQ“. The most unique feature of this charger is the built-in retractable USB-C cable, which saves you from bringing along yet another travel accessory.

    Baseus Enercore Wall Chargers with Built-In Cable

    Amazon Prime Member Exclusive

    Baseus 67W USB C Charger with Retractable Cable

    The Baseus Enercore wall charger features a handy 32-inch USB Type-C cable that retracts neatly inside the unit when it isn’t being used. The plug sits in a recessed nook so that it won’t get snagged. The prong is also foldable to prevent premature breakage. There are two additional USB Type-C ports for charging multiple devices simultaneously.

    The 65W output model is more than enough to fast charge a Nintendo Switch (or Switch 2), Steam Deck, Asus ROG Ally, and Apple iPhone 16 at their maximum rate. Although the Legion Go and Rog Ally X can support up to 100W of charging, the wall adapter that comes with these gaming handhelds has a 65W max output, so this charger is just as competent.

    Looking for a power bank for extended battery life? Check out our favorite portable power banks.

    Should You Shop Now or Wait for Prime Day?

    It’s a more complicated question then you might think. For now, I’d say this power bank deal is a good deal and similar to what we’ll see for 2025 Prime Day sales at Amazon, and worth snapping up while it’s still on sale.

    Eric Song is the IGN commerce manager in charge of finding the best gaming and tech deals every day. When Eric isn’t hunting for deals for other people at work, he’s hunting for deals for himself during his free time.

    Continue Reading

  • Gemini now sports Google Assistant’s signature colors in stable

    Gemini now sports Google Assistant’s signature colors in stable

    Google Assistant is preparing to go into retirement sometime later this year, and in addition to its duties, Gemini is also ready to assume the OG assistant’s uniform.

    Since its early Bard days, Gemini has maintained its blue and purple hue branding across different sections of the app. Hints about that consistent color scheme changing started emerging earlier this month, albeit in beta. Well, those hints are materializing now, with Gemini now donning Google/Google Assistant’s classic red, yellow, green, and blue color scheme.

    Related

    Google is working on a new Gemini logo with familiar colors

    Signature colors are taking over

    Normally tied to the Google app, the change went live for me with the latest Google Gemini version 1.0.776555963 build, which is available now on the Play Store. If the update hasn’t rolled out to you yet, sideloading the build from APKMirror should work just fine.

    Post-update, you should see a new Gemini logo in your app drawer. Well, to be precise, the logo retains its shape, but it four sides aren’t as sharp as before. More importantly, the filled color has changed to Google’s standard colors, as seen in the images below.

    More changes to come

    Old (left), new (right)

    The Gemini logo that appears next to the “Just a sec…” text when Gemini is forming a response retains its inner blue and purple hue, albeit with a new multi-colored outer glow that’s consistent with the overall refresh. The Gemini logo on the “Switch to Gemini” boarding screen also dons the new look.

    It’s worth noting that older leaks suggested that the change would also make its way to the app’s splash screen, though that hasn’t materialized in the current stable rollout. The same goes for the home-screen greeting, which was previously reported to transition from its familiar blue and purple hue to an all-blue scheme. Those changes will likely arrive in a future update, potentially closer to the disapperance of Google Assistant.

    What are your first impressions of this simple color tweak? Let us know in the comments below.

    Thanks: Moshe!

    Continue Reading

  • Supergiant’s latest Hades II patch is likely its last before launch

    Supergiant’s latest Hades II patch is likely its last before launch

    Despite it having upward of 61,000 reviews on Steam, Hades II isn’t actually out yet. The sequel to Supergiant Games’ hugely successful roguelite dungeon crawler has been in early access on PC for over a year, and even the early builds were extremely polished and content-rich for what is still a work-in-progress game. But we (and Switch owners) have been waiting patiently for that 1.0 release date, and it looks like it might be just around the corner, with Supergiant confirming that the latest Unseen Update is likely to be the final one ahead of the full launch.

    The third major early access arrived on June 17, and was focused primarily on combat tweaks, as well as adding a new Vow of Rivals that not only made Guardian encounters tougher, but forced players to switch up their strategies for each bout. The latest patch is mainly a host of minor adjustments to existing items and abilities, as well as some balancing on the aforementioned Vow of Rivals Encounters. No more new story content or areas are due to be added ahead of the v.10 launch, with Supergiant back in June that the game’s true ending is being held back for the full release. If you’re a console player or just wanted to hold out until the game is finished, it’s probably safe to start getting excited.

    That said, PlayStation and Xbox owners are going to have to wait a little longer, because while we still don’t know Hades II’s release date, we do know that the game is on PC and both the Switch and Switch 2 initially, mirroring the release roadmap of its predecessor. The developer has already assured fans that both Nintendo consoles can run the game at a smooth 60 fps, with the Switch 2 version benefiting from the console’s larger 1080p display in handheld mode.

    Continue Reading

  • The Alienware Aurora R16 RTX 5080 Gaming PC Drops to Under $2K for the First Time for 4th of July

    The Alienware Aurora R16 RTX 5080 Gaming PC Drops to Under $2K for the First Time for 4th of July

    Alienware’s Black Friday in July Sale has officially kicked off, and one of the best deals I’ve seen so far is this Alienware Aurora R16 RTX 5080 gaming PC for just $2,099.99 $1,999.99 shipped. This is $350 less than the previous best deal I’ve seen on the same configuration, and one of the best prices you can get for any prebuilt RTX 5080 gaming PC. The Alienware Aurora R16 is a well-engineered and compact gaming rig with 240mm AIO water cooling, sensible airflow design, and a generous 1,000W 80Plus Platinum rated power supply. In the current market, buying a prebuilt gaming PC is the only way to score an RTX 5080 GPU without paying an exorbitant markup. If you were to try to find a 5080 GPU for your do-it-yourself PC build, you’ll probably spend $1,400 for the graphics card alone.

    Update: Price has dropped yet again from $2,099.99 to $1,999.99. This is the first time I’ve seen an Alienware RTX 5080 gaming PC priced under $2K, so get it while you can.

    Alienware Aurora RTX 5080 Gaming PC From $1,999.99

    Hot Black Friday in July Deal

    Alienware Aurora R16 Intel Core Ultra 7 265F RTX 5080 Gaming PC (16GB/1TB)

    This system is equipped with an Intel Core Ultra 7 265F processor, GeForce RTX 5080 graphics card, 16GB of DDR5-5600MHz RAM, and a 1TB M.2 SSD. Note that this is a customizable configuration so you can upgrade the CPU and GPU or increase your memory or storage capacity. It’s pre-configured with a 240mm all-in-one liquid cooling solution.

    The Core Ultra 7 265F is part of Intel’s newest Arrow Lake-S lineup released earlier this year and boasts a max turbo frequency of 5.3GHz with 20 cores and a 36MB L2 cache. This is an excellent all-around CPU for gaming, multi-tasking, and general workstation performance. For gaming, you won’t see any improvement upgrading to a Core Ultra 9.

    The GeForce RTX 5080 GPU will run any game in 4K

    The RTX 5080 is the second best Blackwell graphics card, surpassed only by the $2,000 RTX 5090. It’s about 5%-10% faster than the previous generation RTX 4080 Super, which is discontinued and no longer available. In games that support the new DLSS 4 with multi-frame generation exclusive to Blackwell cards, the gap widens. This is an outstanding card for playing even the latest games at 4K resolution with high settings and ray tracing enabled.

    Check out more Alienware Black Friday in July deals

    Check out our Best Alienware Deals article with all of Dell’s currently ongoing deals on gaming laptops and desktop PCs. Not everyone is the DIY type. If you’re in the market for a prebuilt gaming PC, Dell is one of the best brands we’d recommend. Alienware desktops and laptops feature solid build quality, top-of-the-line gaming performance, excellent cooling (further improved on the newer models), aggressive styling, and pricing that is very competitive with other pre-built options. Best of all, there are plenty of sales that happen throughout the year, so it’s not difficult to grab one of these computers at considerably less than their retail price.

    Eric Song is the IGN commerce manager in charge of finding the best gaming and tech deals every day. When Eric isn’t hunting for deals for other people at work, he’s hunting for deals for himself during his free time.

    Continue Reading

  • Microsoft Warns 400 Million Windows Users—Upgrade Your PC Now

    Microsoft Warns 400 Million Windows Users—Upgrade Your PC Now

    This should have been a huge milestone for Microsoft, one years in the making. But instead it’s overshadowed by a critical new decision for 400 million of its users, the exact same number that seemed to ditch Windows in another surprising twist.

    Windows 11 has finally caught Windows 10’s market share after years of frustration. Data to the end of June, courtesy of Statcounter, shows the two neck and neck — with less than a percentage point between them. Given this data is not exact, that’s within any statistical margin of error. We can say the milestone has been reached.

    ForbesFBI Warning—Do Not Take These Calls On Your Smartphone

    At least for now. Microsoft’s decision to let all Windows 10 users stick with the older OS for another year, even if their PC can be upgraded seems a mistake. That u-turn on Microsoft’s part made absolute sense when it comes to those with older, ineligible PCs. But given the acceleration in recent upgrades, it seems the wrong time to reverse.

    Microsoft warns users eligible to upgrade that they should do so now, waiting is an unnecessary security risk. “New Windows 11 PCs have seen a reported 62% drop in security incidents,” it says, “and a 3x reported reduction in firmware attacks.”

    Microsoft tells waivering users that “Windows 11 is secure by design and by default, with layers of defense enabled on day one to enhance your protection without the need to first configure settings.” It is, the company says, “the most secure operating system we’ve ever built, and offers advanced security like TPM 2.0.”

    That’s the same hardware that separates PCs that can and can’t upgrade to Windows 11. “Security is at the heart of Windows 11,” after all, and so reducing pressure on users to upgrade by offering them a Windows 10 extension seems a backward step.

    Conversely, allowing those with older, ineligible PCs to maintain Windows 10 security updates makes sense, and it should allay the feared PC landfill catastrophe feared by some. Although, this temporary solution is still being criticized as a part measure.

    Of the 700 million Windows 10 users, it’s thought more than 400 million can upgrade, with at least 240 million PCs missing that security hardware hurdle. Those 400 million users should not be tempted into staying put and should upgrade now.

    ForbesSamsung’s Android Upgrade Just Made Galaxy More Like iPhone

    Notably, some reports suggested Microsoft may have actually lost 400 million Windows users in the last few years, which would make all this math wrong. But it turns out that was just an error in a company post that did say 1 billion instead of 1.4 billion users, but which now says “Windows powers over 1.4 billion monthly active devices.”

    Whether it’s October 2025 or October 2026, I suspect Microsoft will be delighted to consign its Windows 10 to Windows 11 upgrade program to the company history books. This has been a roller coaster and it is now resulting in inevitable compromises. The sooner the user base hunkers down on the latest version of the OS the better.

    Continue Reading

  • AI-designed material captures 90% of toxic iodine from nuclear waste

    AI-designed material captures 90% of toxic iodine from nuclear waste

    Scientists may have finally found a solution to tackle the problem of radioactive iodine, one of nuclear energy’s most stubborn threats, thanks to AI.

    A research team in South Korea has used artificial intelligence to discover a powerful new material that can trap radioactive iodine, specifically isotope I-129, one of the most persistent and dangerous byproducts of nuclear energy that poses serious environmental and health risks.

    With a half-life of 15.7 million years, I-129 is highly mobile in the environment and notoriously difficult to remove from contaminated water.

    Developed by researchers from Korea Advanced Institute of Science and Technology (KAIST) in collaboration with the Korea Research Institute of Chemical Technology (KRICT), the breakthrough material belongs to a class called Layered Double Hydroxides (LDHs).

    These compounds are known for their structural flexibility and ability to trap negatively charged particles like iodate (IO₃⁻), the form radioactive iodine most often takes in aqueous environments.

    AI narrows down the options

    Instead of testing thousands of LDH combinations manually, which would be difficult to search through conventional trial-and-error experiments, the team turned to machine learning to identify optimal iodate adsorbents.

    Starting with experimental data from 24 binary and 96 ternary compositions, they trained a model to predict the most promising candidates from a vast pool of metal combinations.

    The team focused on the fact that LDHs, like high-entropy materials, can incorporate a wide range of metal compositions and possess structures favorable for anion adsorption.

    The AI model guided the researchers to a quinary compound made of copper, chromium, iron, and aluminum, named dubbed Cu₃(CrFeAl).

    This material showed over 90 percent efficiency in removing iodate from water, outperforming traditional silver-based absorbents, which often fail to trap iodate effectively.

    Small sample, big leap

    Remarkably, the team only needed to test about 16 percent of all possible material combinations to find the optimal one, demonstrating the power of AI in reducing both time and cost in nuclear environmental research.

    “This study shows the potential of using artificial intelligence to efficiently identify radioactive decontamination materials from a vast pool of new material candidates,” said KAIST professor Ho Jin Ryu.

    “It is expected to accelerate research for developing new materials for nuclear environmental cleanup.”

    The research team has filed a domestic patent application for the developed powder technology and is currently proceeding with an international patent application. They are also working to improve the material’s stability under real-world conditions.

    The team is now looking for academic and industrial partnerships to develop iodine-absorbing powders and water filters that can be used in contaminated nuclear sites to trap radioactive iodine.

    The study was led by Professor Ho Jin Ryu from the Department of Nuclear and Quantum Engineering at KAIST, in collaboration with Dr. Juhwan Noh of the Digital Chemistry Research Center at KRICT.

    Dr. Sujeong Lee, a graduate of KAIST’s Department of Materials Science and Engineering, and Dr. Noh were listed as co-first authors on the paper.

    Continue Reading