Category: 4. Technology

  • I stored files inside of Minecraft, and here’s how it works

    I stored files inside of Minecraft, and here’s how it works

    Files are a funny thing; they’re essentially just a collection of data all inside of one container, and that data is organized into a single-dimensional array of bytes. Many modern operating systems will use a file extension to determine what the file is, and this, in turn, specifies rules of how the data is organized so that it can be interpreted in a meaningful way. However, when it comes to a “file” being a collection of data, it isn’t anything too special. You don’t need a file type on any file. You can save a JPG as a .zip file if you want, and if you force your photo editor to open it, chances are it will just… open anyway.

    With that knowledge in mind, data isn’t anything you can’t represent in other forms. We’ve already demonstrated how files can be saved inside Pokémon Emerald, and I decided to take it a step further. What if we could save files inside Minecraft instead? There’s an unlimited world; theoretically, you could save any file you wanted inside the game, just so long as you know how to interpret it afterward. That’s exactly what I did, and while it was painstaking, it’s also a great way to explain how data is saved and referenced.

    I’ll have a GitHub link at the bottom of this article, which you can take a look at to run this yourself!

    Setting the stage

    Understanding data storage

    First and foremost, I wanted to find a way to easily represent data in Minecraft in a way that was easily obtainable through legitimate means, and could also still represent a decent amount of data per block. Some of the more complex ideas I had involved stripping wooden logs and using their directions as well, while another idea I had used frames with items inside of them. However, I realized that there are 16 colors in the game, which is perfect. Not only is wool easy to get, but having 16 colors available means that we can store four bits of data inside each wool block, and it also means we get one whole byte every two blocks.

    At its core, a file is a sequence of bytes, and when it’s split, this sequence is divided into smaller, manageable segments. This division is done in such a way that each segment is an exact, contiguous subset of the original file’s byte sequence. The process is inherently lossless, meaning it does not alter the content of the bytes themselves. As long as these segments are reassembled in the correct order, the original file can be perfectly recreated. Armed with this knowledge, I created a mapping of hex digits and four-bit sequences to a wool color, which we can use to read and write data. For small files, it’s quite practical to actually build these structures yourself; as I’ll demonstrate later on, a 67-byte file uses 144 blocks of wool, where ten of those blocks are simply padding to ensure an even height and width. I also do not play Bedrock Edition, and this is aimed at the Java edition of Minecraft.

    Here’s the table I created with my mappings:

    Hex digit

    Binary

    Wool colour

    Block ID (Java)

    0000

    White

    minecraft:white_wool

    1

    0001

    Light Gray

    minecraft:light_gray_wool

    2

    0010

    Gray

    minecraft:gray_wool

    3

    0011

    Black

    minecraft:black_wool

    4

    0100

    Brown

    minecraft:brown_wool

    5

    0101

    Red

    minecraft:red_wool

    6

    0110

    Orange

    minecraft:orange_wool

    7

    0111

    Yellow

    minecraft:yellow_wool

    8

    1000

    Lime

    minecraft:lime_wool

    9

    1001

    Green

    minecraft:green_wool

    A

    1010

    Cyan

    minecraft:cyan_wool

    B

    1011

    Light Blue

    minecraft:light_blue_wool

    C

    1100

    Blue

    minecraft:blue_wool

    D

    1101

    Purple

    minecraft:purple_wool

    E

    1110

    Magenta

    minecraft:magenta_wool

    F

    1111

    Pink

    minecraft:pink_wool

    So, for example, if you wanted to write the sequence 1111 0000 1010 0001, it would be:

    • Pink wool
    • White wool
    • Cyan wool
    • Light Gray wool

    Thankfully, while there’s a lot of manual block placement involved for someone who is doing this by hand, it’s not too difficult overall to encode data this way. I built an encoder that will create an image you can reference to construct your data format as well.

    Encoding data

    Creating an mcfunction file

    Running our Minecraft File Encoder

    Encoding the data is fairly easy, and didn’t take up much time out of the admittedly far too long I spent on storing files in Minecraft in the first place. A hint as to what took far too much time can be seen in the image above, specifically at the number of decoders I tried to implement. We’ll get to that in a bit. However, you can see the encoder ran in the terminal at the bottom of the screen, an image was created, and an “mcfunction” file was generated. An “mcfunction” file is basically a script that can run all of the commands entered into it, so we can instantly place all of the blocks without needing to manually do it ourselves. The image is generated for reference so that you can manually place them, though, if you’d prefer.

    To invoke our encoder, we run the following command, which requires the Pillow module installed:

    python3 encoder.py hello.txt --cols 12 --y -60

    This tells the encoder to only use 12 columns at a time (it defaults to 64), and to use a Y level of -60, as I’m testing this in a superflat world. This is what the above looks like in-game:

    Minecraft File Encoding

    I added the blocks around the edge for testing purposes when it came to decoding, so really, what you’ll end up with is just the matrix of wool blocks. Depending on what your “cols” value is, it could be a lot wider. We’re finished with encoding now, so it’s time to try and decode our file.

    Decoding files from Minecraft

    A failed attempt at OCR, though reading world files works fine

    Failed decode from a screenshot using OCR in Minecraft

    This is where I ran into massive issues, and the solution I settled on is, sadly, not the one I originally wanted. I planned to use image recognition to identify the blocks placed in a screenshot, and this is why I placed those different blocks around the edge to try and identify the edge of the wool matrix. It kind of worked once I used sklearn, but the perspective change and slightly differing lengths in blocks because of this, given their distance to the wool matrix, meant that it wasn’t consistent. It would decode some of it, sometimes, and then other times, not be able to decode it at all. I spent far too much time on various different approaches using an image, but I eventually ended up using Amulet, a Python library that can read directly from a world file.

    This worked perfectly, though it has a few downsides. It’s not as simple as just screenshotting what’s in front of you and converting it back to a file, and it requires a lot more manual reconstruction if you want to share a file with a friend via Minecraft using a server, for example. Essentially, you’d need to screenshot it, rebuild it locally in your own world, and then reconstruct it with the decoder. Obviously, nobody would actually like to do that, but I’d also wager nobody is really jumping with joy at the thought of sharing files via Minecraft, even if it were possible to screenshot the wool matrix to pull the file. I just wanted to do it “right”, in an accessible way, and with no requirements to access actual world files.

    As you can see below, though, pulling from the world file works perfectly, as you’d expect given the deterministic nature of being able to read individual blocks.

    minecraft-decoder-running

    There are a couple of limitations when it comes to reading world files; you’ll need to define the X and Y coordinates of the top left of the wool matrix, choose whether you move typically along the X and Z axis (as in, incrementing X and Z as you move across and down), and define the height and width of the matrix. It’s quite a manual process, but it does work. When you first run the program, you’ll be asked for these details:

    • Top left X
    • Top left Y
    • Top left Z
    • Dimension [overworld/nether/end] (default = overworld)
    • Width (cols)
    • height (rows)
    • col step dX dZ [1 0]
    • row step dX dZ [0 1]
    • Padding (trailing white-wool blocks to ignore, 0 for none)

    You also need to run it by defining the –world flag, so you run the script like this:

    python3 .decode_from_world.py --world '.New World' 

    If it comes across an unexpected block, it will raise an error, displaying what block it came across so that you can get a rough idea of what you need to tweak. As well, you’ll need to rename “decoded.bin” to match the expected file format. As previously mentioned, a file type is an external indicator to applications looking to interact with the file, and nothing more. The data stays the same no matter what the file type is. This is also why “containers”, when it comes to video formats, are so important, as they actually define a data structure, compression, and much more.

    Minecraft decoded.bin in hexeditor

    Once we run our decoder, we can see our output, calculated from mapping each wool block to a hex value and then writing that to a file called decoded.bin:

    Hi there, this is a test file to show encoding a file in Minecraft!

    While we know it decoded, so it worked, we can even see the hex values and compare them to our wool map. Our file starts off as “48 69 20 74” in hex, which corresponds to:

    • Brown wool
    • Lime wool
    • Orange wool
    • Green wool
    • Gray wool
    • White wool
    • Yellow wool
    • Brown wool

    Which matches the blocks that we placed in the game.

    Files can be represented by anything

    It’s all about knowing how to retrieve it

    As we’ve seen previously, files can be represented by anything. If you can define your own structure for reading those files, you can store anything in any format. A string of LEDs can represent 0s and 1s based on their state, or a water bottle could represent two bits of data based on whether it’s empty, a quarter full, half full, or completely full. So long as you know what it means, you can tell others too, and they can interpret the represented data the same way that you can.

    This project isn’t meant to be used in its current form. In fact, I’d go so far as to say that you should never use a game to send files to people, especially not in such a tedious manner. Instead, this serves to demonstrate how files can be uniquely stored. If you’re interested in checking out the code I wrote for this project, it’s available on GitHub.

    Related

    I used YouTube as unlimited storage by storing files as videos

    You can technically use YouTube as unlimited cloud storage, though we really don’t recommend it.

    Continue Reading

  • Best Prime Day fitness tracker deal: The Garmin Fenix 7 is 44% off at Amazon

    Best Prime Day fitness tracker deal: The Garmin Fenix 7 is 44% off at Amazon

    SAVE $400: The Garmin Fenix 7 fitness tracker is on sale at Amazon for $499.99, down from the list price of $899.99. That’s a 44% discount and a new record-low price at Amazon.


    We’re on the heels of an exciting Prime Day. This year we get four full days of shopping to find the best Apple deals, outdoor gear upgrades, and finally replacing those uncomfortable earbuds. If you have summer adventures planned or you’re looking to keep better tabs on your fitness metrics, there’s an especially great deal that’s already live on a fitness tracker.

    As of July 6, the Garmin Fenix 7 fitness tracker is just $499.99 at Amazon, marked down from the list price of $899.99. That’s a major 44% discount that takes $400 off the smartwatch. It’s also a new record-low price at Amazon by a long shot.

    Mashable Trend Report

    Summer is the perfect time to get into a new fitness routine. With better weather and longer daylight hours, it can be a great way to set a new schedule that involves a focus on health. Whether you’re taking longer walks around the neighborhood or heading into the mountains to set a new trail record, the Garmin Fenix 7 is packed with useful features.

    SEE ALSO:

    Apple Watch deals are heating up ahead of Prime Day — get the lowest-ever price on the Series 10

    For starters, who couldn’t use a built-in flashlight on their wrist? On the trail, this is incredibly useful for digging into your backpack to find that (probably melted) chocolate bar. At home, it’s a great way to avoid tripping on the dog during the midnight bathroom trip. The strobe function is gonna come in handy during winter runs at 5 p.m. when it’s completely dark out. But of course, the Garmin is packed with fitness tracking features, too.

    On your wrist, you’ll have access to heart rate date, pulse Ox levels, and sleep metrics. Each morning, the Garmin will give you a daily report that discusses training readiness for the day. Plus, the the Garmin Fenix 7 is capable of solar recharging. But you shouldn’t need that too often since the watch can get up to 22 days of battery on a single charge when in smartwatch mode.

    Since it’s down to a super low price at Amazon, it’s probably wise to jump on this Garmin Fenix 7 deal before Prime Day takes hold. There’s no telling when Amazon will decide to bump up the price while lowering others during the longest Prime Day sale ever.

    The best early Prime Day deals to shop this weekend

    Continue Reading

  • Week in review: Sudo local privilege escalation flaws fixed, Google patches actively exploited Chrome

    Week in review: Sudo local privilege escalation flaws fixed, Google patches actively exploited Chrome

    Here’s an overview of some of last week’s most interesting news, articles, interviews and videos:

    Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463)
    If you haven’t recently updated the Sudo utility on your Linux box(es), you should do so now, to patch two local privilege escalation vulnerabilities (CVE-2025-32462, CVE-2025-32463) that have been disclosed on Monday.

    Google patches actively exploited Chrome (CVE‑2025‑6554)
    Google has released a security update for Chrome to address a zero‑day vulnerability (CVE-2025-6554) that its Threat Analysis Group (TAG) discovered and reported last week.

    Europe’s AI strategy: Smart caution or missed opportunity?
    Europe is banking on AI to help solve its economic problems. Productivity is stalling, and tech adoption is slow. Global competitors, especially the U.S., are pulling ahead. A new report from Accenture says AI could help reverse that trend, but only if European companies move faster and invest more boldly.

    CitrixBleed 2 might be actively exploited (CVE-2025-5777)
    While Citrix has observed some instances where CVE-2025-6543 has been exploited on vulnerable NetScaler networking appliances, the company still says that they don’t have evidence of exploitation for CVE-2025-5349 or CVE-2025-5777, both of which have been patched earlier this month.

    Cybersecurity essentials for the future: From hype to what works
    Cybersecurity never stands still. One week it’s AI-powered attacks, the next it’s a new data breach, regulation, or budget cut. With all that noise, it’s easy to get distracted. But at the end of the day, the goal stays the same: protect the business.

    You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
    Popular AI chatbots powered by large language models (LLMs) often fail to provide accurate information on any topic, but researchers expect threat actors to ramp up their efforts to get them to spew out information that may benefit them, such as phishing URLs and fake download pages.

    Healthcare CISOs must secure more than what’s regulated
    In this Help Net Security interview, Henry Jiang, CISO at Ensora Health, discusses what it really takes to make DevSecOps work in healthcare.

    Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)
    Cisco has found a backdoor account in yet another of its software solutions: CVE-2025-20309, stemming from default credentials for the root account, could allow unauthenticated remote attackers to log into a vulnerable Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) platforms and use the acquired access to execute arbitrary commands with the highest privileges.

    How FinTechs are turning GRC into a strategic enabler
    In this Help Net Security interview, Alexander Clemm, Corp GRC Lead, Group CISO, and BCO at Riverty, shares how the GRC landscape for FinTechs has matured in response to tighter regulations and global growth.

    Qantas data breach could affect 6 million customers
    Qantas has suffered a cyber incident that has lead to a data breach.

    Federal Reserve System CISO on aligning cyber risk management with transparency, trust
    In this Help Net Security interview, Tammy Hornsby-Fink, CISO at Federal Reserve System, shares how the Fed approaches cyber risk with a scenario-based, intelligence-driven strategy.

    Microsoft introduces protection against email bombing
    By the end of July 2025, all Microsoft Defender for Office 365 customers should be protected from email bombing attacks by default, Microsoft has announced on Monday.

    Are we securing AI like the rest of the cloud?
    In this Help Net Security interview, Chris McGranahan, Director of Security Architecture & Engineering at Backblaze, discusses how AI is shaping both offensive and defensive cybersecurity tactics.

    How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
    This article shares initial findings from internal Bitdefender Labs research into Living off the Land (LOTL) techniques.

    How exposure-enriched SOC data can cut cyberattacks in half by 2028
    Security teams are responsible for defending an organization against looming cyber threats. Needless to say, they’re inundated with data from constantly expanding attack surfaces. But what are teams supposed to do with all? Addressing thousands of vulnerabilities is far from realistic.

    New hires, new targets: Why attackers love your onboarding process
    In this Help Net Security video, Ozan Ucar, CEO of Keepnet Labs, highlights a critical cybersecurity blind spot: the vulnerability of new hires during onboarding.

    NTLM relay attacks are back from the dead
    NTLM relay attacks are the easiest way for an attacker to compromise domain-joined hosts. While many security practitioners think NTLM relay is a solved problem, it is not – and, in fact, it may be getting worse.

    Why AI agents could be the next insider threat
    In this Help Net Security video, Arun Shrestha, CEO of BeyondID, explains how AI agents, now embedded in daily operations, are often over-permissioned, under-monitored, and invisible to identity governance systems.

    Users lack control as major AI platforms share personal info with third parties
    Some of the most popular generative AI and large language model (LLM) platforms, from companies like Meta, Google, and Microsoft, are collecting sensitive data and sharing it with unknown third parties, leaving users with limited transparency and virtually no control over how their information is stored, used, or shared, according to Incogni.

    Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
    While Africa hosts some of the fastest-growing digital economies globally, it also faces persistent challenges in cybersecurity preparedness.

    Third-party breaches double, creating ripple effects across industries
    Supply chain risks remain top-of-mind for the vast majority of CISOs and cybersecurity leaders, according to SecurityScorecard.

    How cybercriminals are weaponizing AI and what CISOs should do about it
    In a recent case tracked by Flashpoint, a finance worker at a global firm joined a video call that seemed normal. By the end of it, $25 million was gone.

    Secretless Broker: Open-source tool connects apps securely without passwords or keys
    Secretless Broker is an open-source connection broker that eliminates the need for client applications to manage secrets when accessing target services like databases, web services, SSH endpoints, or other TCP-based systems.

    RIFT: New open-source tool from Microsoft helps analyze Rust malware
    Microsoft’s Threat Intelligence Center has released a new tool called RIFT to help malware analysts identify malicious code hidden in Rust binaries.

    Cybersecurity jobs available right now: July 1, 2025
    We’ve scoured the market to bring you a selection of roles that span various skill levels within the cybersecurity field. Check out this weekly selection of cybersecurity jobs available right now.

    Scammers are trick­ing travelers into booking trips that don’t exist
    Not long ago, travelers worried about bad weather. Now, they’re worried the rental they booked doesn’t even exist.

    Cyberattacks are draining millions from the hospitality industry
    Every day, millions of travelers share sensitive information like passports, credit card numbers, and personal details with hotels, restaurants, and travel services. This puts pressure on the hospitality sector to keep that information safe and private.

    New infosec products of the week: July 4, 2025
    Here’s a look at the most interesting products from the past week, featuring releases from DigitalOcean, Scamnetic, StealthCores, and Tracer AI.

    Continue Reading

  • Samsung finally fixing a 4-year-old mistake with the Galaxy S26 Ultra

    Samsung finally fixing a 4-year-old mistake with the Galaxy S26 Ultra

    It was recently revealed that the Galaxy S26 Ultra will retain 200MP primary, 50MP ultrawide, and 50MP telephoto (5x zoom) cameras from its predecessor. Now, information about the rest of its cameras has surfaced, and Samsung could fix its four-year-old mistake with the phone.

    Galaxy S26 Ultra could feature improved selfie and telephoto cameras

    Samsung hasn’t upgraded the 3x zoom telephoto camera since the Galaxy S21 Ultra, and a new leak claims that it is finally getting upgraded. Android Headlines claims that the Galaxy S26 Ultra will use a 12MP sensor for its telephoto camera with 3x optical zoom. It will be an upgrade over the 10MP camera used on Samsung’s existing flagships.

    The Galaxy S26 Ultra will reportedly feature an improved front-facing camera as well, but its specifications haven’t been revealed yet. Its primary 200MP camera is said to have a newer lens. It will use a new laser AF sensor for faster and more reliable focus.

    Thanks to its new chipset, the phone is said to feature the next-gen ProVisual Engine for enhanced images and videos. Samsung has reportedly decided to remove the controversial camera rings that appeared glued to the back.

    The report also claims that the Galaxy S26 Ultra will feature Qualcomm’s 3nm Snapdragon 8 Elite Gen 2 processor globally, and that there will be no Samsung Foundry-made 2nm version of the chip. It will use a 20% bigger vapour chamber system for better sustained performance and 16GB RAM as standard across 256GB, 512GB, and 1TB storage variants.

    galaxy s25 ultra s pen air command

    Samsung is said to have tested the new S Pen without a digitizer but found unsatisfactory results. So, the company will continue to use the same S Pen as the Galaxy S25 Ultra for its next flagship.

    The phone’s display is claimed to have even thinner bezels. The device is said to be thinner and have the same IP68 rating for dust and water resistance.

    Continue Reading

  • Defying physics: This rare crystal cools itself using pure magnetism

    Defying physics: This rare crystal cools itself using pure magnetism

    Natural crystals fascinate with their vibrant colors, their nearly flawless appearance and their manifold symmetrical forms. But researchers are interested in them for quite different reasons: among the countless minerals already known, they always discover some materials with unusual magnetic properties. One of these is atacamite, which exhibits magnetocaloric behavior at low temperatures – that is, the material’s temperature changes significantly when it is subjected to a magnetic field. A team headed by TU Braunschweig and the Helmholtz-Zentrum Dresden-Rossendorf (HZDR) has now investigated this rare property (DOI: 10.1103/PhysRevLett.134.216701). In the long term, the results could help to develop new materials for energy-efficient magnetic cooling.

    The emerald-green mineral atacamite, named for the place it was first found, the Atacama Desert in Chile, gets its characteristic coloring from the copper ions it contains. These ions also determine the material’s magnetic properties: they each have an unpaired electron whose spin gives the ion a magnetic moment – comparable to a tiny needle on a compass. “The distinct feature of atacamite is the arrangement of the copper ions,” explains Dr. Leonie Heinze of Jülich Centre for Neutron Science (JCNS). “They form long chains of small, linked triangles known as sawtooth chains.” This geometric structure has consequences: although the copper ions’ spins always want to align themselves antiparallel to one another, the triangular arrangement makes this geometrically impossible to achieve completely. “We refer to this as magnetic frustration,” continues Heinze. As result of this frustration, the spins in atacamite only arrange themselves at very low temperatures – under 9 Kelvin (−264°C) – in a static alternating structure.

    When the researchers examined atacamite under the extremely high magnetic fields at HZDR’s High Magnetic Field Laboratory (HLD), something surprising emerged: the material exhibited a noticeable cooling in the pulsed magnetic fields – and not just a slight one, but a drop to almost half of the original temperature. This unusually strong cooling effect particularly fascinated the researchers, as the behavior of magnetically frustrated materials in this context has scarcely been studied. However, magnetocaloric materials are considered a promising alternative to conventional cooling technologies, for example for energy-efficient cooling or the liquefaction of gases. This is because, instead of compressing and expanding a coolant – a process that takes place in every refrigerator – they can be used to change the temperature by applying a magnetic field in an environmentally friendly and potentially low-loss approach.

    What is the origin of this strong magnetocaloric effect?

    Additional studies at various labs of the European Magnetic Field Laboratory (EMFL) provided more in-depth insights. “By using magnetic resonance spectroscopy, we were clearly able to demonstrate that the magnetic order of atacamite is destroyed when a magnetic field is applied,” explains Dr. Tommy Kotte, a scientist at HLD. “This is unusual as the magnetic fields in many magnetically frustrated materials usually counteract the frustration and even encourage ordered magnetic states.”

    The team found the explanation for the mineral’s unexpected behavior in complex numerical simulations of its magnetic structure: while the magnetic field aligns the copper ions’ magnetic moments on the tips of the sawtooth chains along the field and thus reduces the frustration as expected, it is precisely these magnetic moments that mediate a weak coupling to neighboring chains. When this is removed, a long-range magnetic order can no longer exist. This also provided the team with an explanation for the particularly strong magnetocaloric effect: it always occurs when a magnetic field influences the disorder – or more precisely, the magnetic entropy – of a system. In order to compensate for this rapid change in entropy, the material has to adjust its temperature accordingly. This is the very mechanism the researchers have now managed to demonstrate in atacamite.

    “Of course, we do not expect atacamite to be extensively mined in the future for use in new cooling systems,” says Dr. Tommy Kotte, “but the physical mechanism we have investigated is fundamentally new and the magnetocaloric effect we observed is surprisingly strong.” The team hopes their work will inspire further research, especially a targeted search for innovative magnetocaloric materials within the extensive class of magnetically frustrated systems.

    Continue Reading

  • Google Warns All Gmail Users To Upgrade Accounts—This Is Why

    Google Warns All Gmail Users To Upgrade Accounts—This Is Why

    It happens all the time. A familiar sign-in window pops up on your screen, asking for your account password to enable you open a document or access emails. It happens so often we no longer notice and simply go through the motions on autopilot. But Google warns this is dangerous and needs to stop before you lose your account.

    Most Gmail users “still rely on older sign-in methods like passwords and two-factor authentication (2FA),” Google warns, despite the FBI reporting that “online scams raked in a record $16.6 billion last year — up 33% in just one year — and are growing more sophisticated.” That means you’re less likely to spot an attack until it’s too late.

    ForbesSamsung’s Galaxy Upgrade Just Made Android More Like iPhone

    When I first covered Google’s alarming new stats, the company told me the warning to upgrade accounts is right, but needs to go further. This is about more than Gmail, it’s about all the accounts that can be accessed with a Google sign-in. But Gmail is the most prized, because your email account opens up access to so much more.

    And less than a month later we have a frightening new proof point as to exactly why accounts that are protected by passwords and even 2FA are at such risk. Okta warns threat actors are now “abusing v0 — a breakthrough GenAI tool created by Vercelopens to develop phishing sites that impersonate legitimate sign-in webpages.”

    That’s why Google says “we want to move beyond passwords altogether, while keeping sign-ins as easy as possible.” That means upgrading the security on your Google Account to add a passkey. This stops attackers accessing your account, because the passkey is linked to your own devices and can can’t be stolen or bypassed. Most Gmail users still don’t have passkeys — but all must add them as soon as possible.

    Okta says this “signals a new evolution in the weaponization of Generative AI by threat actors who have demonstrated an ability to generate a functional phishing site from simple text prompts.” If you’re willing to use your password, you’re at risk.

    And that’s the second part of this warning. Upgrading your account with a passkey only helps secure that account if you change your behavior as well. No more entering a password when prompted — only use your passkey. And if that’s not possible, make sure your account uses a different form of 2FA to SMS codes. An authenticator app is best.

    Okta warns ”today’s threat actors are actively experimenting with and weaponizing leading GenAI tools to streamline and enhance their phishing capabilities. The use of a platform like Vercel’s v0.dev allows emerging threat actors to rapidly produce high-quality, deceptive phishing pages, increasing the speed and scale of their operations.”

    Passkeys are phishing resistant. That’s why Microsoft is going even further than Google, actively pushing users to delete passwords altogether and removing them from its own Authenticator app, and will now limit that app to passkeys only.

    ForbesMicrosoft Warns 400 Million Windows Users—Upgrade Your PC Now

    This is just the beginning of the new AI-fueled attacks that will fast become the norm. Attackers are playing with these new tools, and that’s changing the game. You need to ensure that all your key accounts are fully protected — it’s a change you should make today, not some time soon when you get around to it.

    “We build advanced, automatic protections directly into Google’s products,” the company says, “so security is something you don’t have to think about.” But if you’re still securing those products with a password — the digital equivalent of a flimsy $5 padlock, then you are playing into the hands of those attackers.

    It takes a few seconds and can be done directly from here.

    Add your passkey now.

    Continue Reading

  • Mafia: The Old Country Videos Dive Into Performance and Sicilian Sound Design

    Mafia: The Old Country Videos Dive Into Performance and Sicilian Sound Design

    Hangar 13 has released a couple more developer diaries in the lead up to Mafia: The Old Country. The most recent videos have focused on the performances in the game, as well as the sounds.

    In the video ‘Breaking Omertà: Capturing Performance’, the team talk about not only the performance capture software and technology they’re using, but also casting the roles in the game, and how they changed some of what they had initially invision for protaganist Enzo after casting Riccardo Frascari and what he’s brought to the role.

    And in the final developer diary, ‘Breaking Omertà: “The Sounds of Sicily,’ the team discuss the music, and how they captured the authentic sounds of the world and things in the game. This includes the guns and cars, which were captured authentically using real 1900s vehicles and weapons.

    In some of the previous developer diaries, Hangar 13 had talked about the technologies they’re using to bring Sicily to life in their game, and

    Mafia: The Old Country launches on August 8, 2025, for PlayStation 5, Xbox Series X|S, and PC via Steam, and is now available for pre-order and pre-purchase.

    Continue Reading

  • Nintendo Highlights Multiple Switch 2 And Switch Games Launching In July 2025

    Nintendo Highlights Multiple Switch 2 And Switch Games Launching In July 2025

    Image: Koei Tecmo

    We’re now past the halfway mark of the year and the Switch 2 has arrived with all sorts of games, but there’s no slowing down anytime soon – with even more games arriving in July.

    Nintendo has now spotlighted a handful of these games in its own round up – highlighting some of its blockbuster releases out this month, Tony Hawk’s return, and even some smaller-scale titles offering up all sorts of experiences.

    So, here are Nintendo’s Switch 2 (and Switch) highlights for this month:

    Patapon 1+2 Replay – 11th July 2025

    “Enjoy the original PATAPON games remastered with all-new features in PATAPON 1+2 REPLAY for Nintendo Switch. As the god of the cute and mysterious Patapons, take advantage of their unique characteristics as you use the rhythm of four Mystical Drums to lead them on a grand adventure!”

    Tony Hawk’s Pro Skater 3 + 4 – 11th July 2025

    “The legend returns with Tony Hawk’s™ Pro Skater™ 3 + 4 for Nintendo Switch and Nintendo Switch 2, revamped with new skaters, new parks, gnarlier tricks and a sicker soundtrack. Drop into cross-platform online multiplayer and relive the classic skateboarding fun!”

    Donkey Kong Bananza – 17th July 2025

    “The big guy is back for a ground-breaking adventure in Donkey Kong Bananza, only on Nintendo Switch 2! Help Donkey Kong make his way through the depths of the Underground World, destroying everything in his path as he chases down a mysterious group of baddies.”

    The Wandering Village – 17th July 2025

    “Mysterious plants are spreading all over the earth, emitting toxic spores in The Wandering Village for Nintendo Switch. Become the leader of a small group of survivors seeking shelter on the back of a giant, wandering creature and build a settlement to survive in this post-apocalyptic world.”

    Shadow Labyrinth – 18th July 2025

    “Experience a genre-twisting alternate take on the iconic PAC-MAN in the 2D action platformer Shadow Labyrinth for Nintendo Switch and Nintendo Switch 2. To survive, you’ll need to discover secrets, consume your enemies, and grow from prey to the apex predator as you embrace your true purpose.”

    Super Mario Party Jamboree – Nintendo Switch 2 Edition Jamboree TV – 24th July 2025

    “The party powers up with Super Mario Party Jamboree – Nintendo Switch 2 Edition + Jamboree TV! Use full body motion controls in selected modes, make some noise using the built-in microphone, put yourself in the game using CameraPlay, flip the script with new Mario Party rules and more.”

    No Sleep For Kaname Date – From AI: THE SOMNIUM FILES – 25th July 2025

    Iris the internet idol finds herself on board a mysterious UFO in No Sleep For Kaname Date – From AI: THE SOMNIUM FILES for Nintendo Switch and Nintendo Switch 2. As Date, conduct investigations, solve puzzles, and Psync into the dreams of potential suspects to help Iris escape and unravel the mystery!

    Wild Hearts S – 25th July 2025

    “Giant, nature-infused beasts plague the once prosperous lands of Azuma in WILD HEARTS S for Nintendo Switch 2. As a hunter, fight back against their overwhelming might, joining forces with comrades and wielding deadly weapons and ancient technology to survive.”

    Tales of the Shire: A Lord of the Rings Game – 29th July 2025

    “Live the cosy life of a Hobbit amongst the serene landscapes of the Shire in Tales of the Shire: A The Lord of the Rings™ Game for Nintendo Switch. Decorate your own Hobbit Hole, tend to your garden, fish at the clear ponds, forage wild fruits and herbs, or trade with townsfolk as you settle down in this idyllic corner of Middle-earth!”


    If you want to find out what else is on the way to the Switch 2 and Switch this month (and for the remainder of 2025) check out some of our previous coverage on Nintendo Life:

    Continue Reading

  • Xbox Game Studios exec gives ‘AI prompts’ to laid-off Microsoft employees to handle emotional stress caused by job loss; deletes post after backlash – MSN

    1. Xbox Game Studios exec gives ‘AI prompts’ to laid-off Microsoft employees to handle emotional stress caused by job loss; deletes post after backlash  MSN
    2. Laid-off workers should use AI to manage their emotions, says Xbox exec  The Verge
    3. How AI can help you navigate layoffs, according to one executive producer at Xbox  Engadget
    4. Xbox Producer Offers Laid-Off Devs to Use AI For ‘Emotional Clarity & Confidence’  80 Level
    5. Xbox exec suffers bout of terminal LinkedIn brain, suggests folks laid off by Microsoft use AI to ‘reduce the emotional and cognitive load that comes with job loss’  PC Gamer

    Continue Reading

  • Switch Port Experts Share Thoughts About Switch 2’s “Raw” Performance

    Switch Port Experts Share Thoughts About Switch 2’s “Raw” Performance

    Image: Nintendo Life

    Even now that we’ve got our hands on the Switch 2, there are still developers sharing their thoughts about the power of the system and where it fits in. In the same interview with Wccftech, the Virtuos team was asked how the new Nintendo device holds up in terms of “raw console performance” and if it’s closer to an Xbox Series S or PlayStation 4.

    According to Eoin O’Grady, who is technical director at Black Shamrock (a Virtuos studio and subsidiary), it’s a bit of both, depending on what aspect of the hardware you’re looking at. The GPU in the Switch 2 apparently performs “slightly below” the Series S (but does come with some added technologies) and as for the CPU, the Switch 2 is supposedly “closer” to the PlayStation 4.

    Here’s O’Grady’s response in full, which also goes into how the experience might be for developers porting their current games to Nintendo’s new hardware:

    In terms of raw console performance, do you agree that the Switch 2 is closer to the Xbox Series S than it is to the PlayStation 4, making it easier for developers to port their current-gen games to the hardware?

    “GPU-wise, the Switch 2 performs slightly below the Series S; this difference is more noticeable in handheld mode. However, the Series S does not support technologies like DLSS, which the Switch 2 does. This makes the GPU capabilities of the two consoles comparable overall.

    “CPU-wise, there is a clearer distinction between the two consoles. The Switch 2 is closer to the PlayStation (PS) 4 in this respect, having a CPU just a bit more powerful than the PS4’s. Since most games tend to be more GPU-bound than CPU-bound when well optimized, the impact of this difference largely depends on the specific game and its target frame rate. Any game shipping at 60 FPS on the Series S should easily port to the Switch 2. Likewise, a 30 FPS Series S game that’s GPU-bound should also port well. Games with complex physics, animations, or other CPU-intensive elements might incur additional challenges in reaching 30 or 60 FPS or require extra optimization during porting.”

    This follows companies like Koei Tecmo suggesting Nintendo’s new hybrid system was closer to an Xbox Series S in terms of “raw computing power”. Other companies like Firaxis (Civilization VII) have also chimed in with their own development experiences. Nvidia (the creator of the Switch 2 chip) even labelled it a “technical marvel” and “unlike anything” it’s ever built before.

    Continue Reading