Norton vs McAfee has been an antivirus war that has been waged for decades in the consumer, small business, and enterprise arena. Both became household words in the late nineties as Windows 95 and subsequent operating systems captured the popular imagination. Hackers quickly started throwing viruses and other threats at the PC world.
Vendors like Norton and McAfee emerged. Just about every PC owner installed one or the other. Over the years, I’ve had both installed on my PCs and laptops, and I’ve largely been satisfied with both.
Fast-forward a quarter of a century, and the landscape has shifted. Many more antivirus choices are available, and a host of other threats now have to be dealt with. Yet, AV remains a core element of the security landscape. Norton and McAfee’s longevity attests to their AV tools’ capability. But which is best?
Norton Antivirus Plus: Best for those who want good AV protection that comes with a password manager and cloud storage at a price that is hard to beat.
McAfee Total Protection: Best for those who need good AV protection, a VPN, identity monitoring, and a firewall at a decent price.
Norton Antivirus Plus vs. McAfee Total Protection: Comparison table
Norton Antivirus Plus
McAfee Total Protection
Our rating (out of 5)
4.8
4.75
Starting price
$30 per year for 5 devices
$40 per year for 5 devices
AV and malware protection
Excellent
Excellent
Scanning speed
Excellent
Very good
False positives
Very good
Excellent
Also included in the price
2 GB cloud backup, password manager.
VPN, web protection, identity monitoring, firewall.
Norton Antivirus Plus vs Norton Total Protection: Pricing
Winner: Norton AV Plus
Advertisement
Norton Antivirus Plus pricing
Norton AV Plus normally costs $85 per year for five devices. It is currently on offer for $30 per year if you pay for the entire year upfront. I took advantage of a seven-day free trial but had to search around on the website to find it. The company definitely preferred that I buy the service with a 60-day money-back guarantee rather than allowing me to sign up for a free trial.
If you want more than the basic consumer-level AV plan, I had the option to add 50 GB of extra cloud storage, a password manager, and more for $50 per year, or the Lifelock identity protection service, a VPN, and a host of other security features for $100 per year.
McAfee Total Protection pricing
McAfee Total Protection is priced at $120 per year, reduced to $40 on special offer. As it comes with the VPN, firewall, and identity monitoring already included, I found it challenging to conduct a full apples-to-apples comparison. The free trial I signed up for lasts 30 days. A 30-day money-back guarantee is also available.
Pricing gets complicated as there are so many versions to choose from. $50 per year gets you AI-powered AI, $90 adds in a million dollars of identity theft protection and bank/credit card monitoring. $200 provides everything mentioned but ups the ID protection to two million, and throws in $25,000 in ransomware protection and more safeguards for financial accounts.
Norton Antivirus Plus vs McAfee Total Protection: Feature comparison
AV and malware protection
Winner: Tie
I liked the fact that Norton Antivirus Plus covers a range of features including scam, antivirus, malware, ransomware, and hacking protection. Further protections are available as you grade up to the more expensive packages that include encryption, Wi-Fi security, ad blocking, dark web monitoring, and more. However, the basic protection features offered by AV Plus cover the primary bases.
I found that McAfee Total Protection covers a similar range and throws in a protection score and firewall. But then Norton AV Plus includes cloud backup and a password manager. There is little between them.
Advertisement
Scanning speed
Winner: Norton AV Plus
Norton Antivirus Plus and McAfee Total Protection have both been tested extensively on a variety of speed tests and against various benchmarks. Norton AV Plus wins on sheer scanning speed. Its full and quick scans for AV and malware sometimes take about half the time of those done in McAfee Total Protection. However, I rarely pay attention to the length of the scan as I typically do it in the background while I get on with other tasks.
That said, McAfee tends to consume fewer system resources for scanning than Norton. What you gain on the swings, you lose on the roundabouts. Overall, though, I give Norton Antivirus Plus the nod on scanning speed.
False positives
Winner: McAfee Total Protection
False positives are the bane of security systems. Sometimes, so many alerts are generated that it can be overwhelming. Particularly when some of these alerts are false, unnecessary work can be generated.
Over the last quarter of a century, I’ve seen both McAfee and Norton tools be guilty of providing an inordinate number of alerts, many of which were worthless. But times have changed. Both Norton Antivirus Plus and McAfee Total Protection do well when it comes to minimizing false positives, but McAfee generates fewer false alerts.
Advertisement
Additional features
Winner: Tie
Due to their differing configurations in terms of what is included in each package, it is difficult to do an apples-to-apples when comparing McAfee vs Norton on AV. There are many similarities, but each includes different elements on top of their basic AV/malware offering. Norton Antivirus Plus has a 2 GB cloud backup and a decent password manager. McAfee Total Protection has VPN, web protection, and identity monitoring.
Which is the best basic package? It depends. Those who lack a password manager and fancy-free cloud backup space will likely prefer Norton. Others who want a VPN and identity monitoring might be more likely to favor McAfee. But in each case, for a few dollars more, you can usually add in more of the additional security bells and whistles you desire.
Norton Antivirus Plus pros and cons
Pros of Norton Antivirus Plus
Less expensive than McAfee Total Protection.
Faster scans that cover a full range of potential AV and malware threats.
2 GB of cloud backup storage with an option to pay $10 more for 50 GB.
Password manager included.
Cons of Norton Antivirus Plus
Scanning consumes compute resources that sometimes impact the user experience.
False positives can occasionally be an issue.
McAfee Total Protection pros and cons
Pros of McAfee Total Protection
VPN included for free.
Wide range of security features, including AV, malware scanning, identity monitoring, and a firewall.
Relatively few false positives.
Cons of McAfee Total Protection
More expensive than Norton AV Plus
Slower at scanning than Norton.
Norton Antivirus Plus vs McAfee Total Protection on Reddit
Reddit users are all over the map when it comes to Norton vs McAfee. One user said: “I would choose Norton over McAfee but personally wouldn’t recommend either.” Another said, “For me McAfee [is best] because a long time ago I used to use Norton: every time I get viruses in my pc I have to reboot reinstall my drivers all over two time a year but since I started with McAfee almost 15 years ago and I don’t have that problem.”
Yet another voiced a contrary opinion, “Norton [is worst]. It just doesn’t detect. I went from Norton to McAfee (better).” More than a few discerning Reddit contributors were dismissive of both. Note, however, that Reddit is populated largely by power users and sophisticated IT users, so consumer-based tools are rarely going to be viewed positively.
Should your business use Norton Antivirus Plus or McAfee Total Protection?
Choose Norton Antivirus Plus if:
You want to pay as little as possible for a decent AV suite.
You don’t have a password manager or want to change out the one you have.
You lack a cloud backup service or want to replace the one you have.
Choose McAfee Total Protection if:
You want an AV tool that consumes relatively little in terms of system resources during scans.
You have a strong aversion to any kind of false positives.
You want identity monitoring and a firewall without having to pay more.
Frequently asked questions
Do I need both Norton and McAfee on my computer?
No. Choose one or the other. Both products cover a very similar range of features, and there is little to decide between them. Installing both means you are paying double unnecessarily. Further, one tool may interfere with another as they tend to want to become the default AV application and so attempt to cancel each other out.
Does McAfee have a VPN?
Yes. A VPN is included with McAfee Total Protection. This makes it an excellent choice for anyone looking for basic AV and malware protection and a VPN.
Does Norton remove all viruses?
No. Its virus and malware signatures are very thorough. Still, there is a small chance in Norton Antivirus Protection Plus that something might get through, particularly the latest threat if it is something unique that scanners have never run into. The same can be said about McAfee Total Protection.
Does McAfee block ads?
Yes. Ad blocking is included with McAfee Total Protection.
Advertisement
What additional tools are included with Norton Antivirus Plus?
Norton throws in a good password manager and cloud backup storage at no additional cost.
Methodology
I downloaded both products and compared them. In addition, I referred to analyst reports, expert analysis, peer reviews, TechRepublic, and TechnologyAdvice reviews, speed tests, and independent lab findings on each product. This included comprehensively evaluating the features, cost, and real-world performance of each.
Conclusion: which is better, Norton Antivirus Plus or McAfee?
I downloaded both and found little to choose between them. Norton got a slightly higher rating, but not enough to influence a user to favor one product over another. Both will do the job. There are nuanced differences, and the choice ultimately comes down to a few minor differences between the products and how these fit in with user needs and preferences.
With laptop and smartphone makers like Samsung spreading generative AI across all aspects of their devices, OpenAI is trying the same with an agentic tool announced on Jan. 23. The tool, called Operator, runs on the same basic technology as ChatGPT but resides within a proprietary web browser. This enables it to autonomously perform actions such as ordering groceries or booking tours.
OpenAI suggested in a blog post Operator could “ope[n] up new engagement opportunities for businesses,” but did not elaborate.
What is OpenAI’s Operator?
Operator is an application that includes a web browser and the generative AI model GPT-4o. It’s the result of an OpenAI project to train GPT-4o’s vision capabilities on the graphical user interfaces found on typical web pages. Its ability to make multi-step plans and correct mistakes independelty if needed set it apart from other efforts to create agentic AI, OpenAI boasted. Operator’s Computer-Using Agent (CUA) model is trained specifically on the buttons, forms, and menus likely to be found on a web page.
Operator is in beta. OpenAI said feedback from early-stage users will be used to improve it.
Advertisement
ChatGPT Pro subscribers can sign up for Operator starting today.
OpenAI plans to provide Operator to Plus, Team, and Enterprise soon. The tech giant also intends to integrate its capabilities into ChatGPT generally. They’ll include the CUA in their API “soon,” according to the blog post.
How does Operator work?
The company says the CUA’s reasoning technique, which they call an “inner monologue,” helps the model understand intermediate steps and adapt to unexpected input. Under the hood, CUA takes screenshots of web pages and uses a virtual mouse and keyboard to navigate.
As with ChatGPT, users can add custom instructions that Operator will remember, such as the user’s preferred airline.
Advertisement
SEE: Threat actors can jailbreak generative AI to automatically create phishing emails and other malicious content.
Users can prompt Operator in natural language the same way they can prompt ChatGPT. Operator is trained to balk at logging in to sites, providing payment details, or passing CAPTCHAs, so it will hand control back to the user for those steps. Operator is programmed not to accept requests — such as making banking transactions — or to weigh in on high-stakes situations, such as deciding whether to hire an employee.
If the Operator encounters an interface it can’t predict how to interact with, it will hand the task back to the user. OpenAI collaborated directly with the following companies to make sure Operator can interact with their sites:
DoorDash.
Instacart.
OpenTable.
Priceline.
StubHub.
Thumbtack.
Uber.
OpenAI notes that the early iteration of Operator tends to struggle with “complex interfaces,” including creating slideshows or adding items to calendars.
Operator enters into a crowded generative AI landscape
Some of Operator’s functionality overlaps with competitor tools, such as Google Gemini or Apple Intelligence.
Advertisement
Operator invites comparison with Microsoft’s much-maligned Recall feature, which uses screenshots to navigate a PC. Operator also shares some capabilities with Google Lens on Chrome. However, its ability to navigate websites autonomously could be a point of differentiation. Agentic AI, in which generative AI models perform multi-step errands on the user’s account, is either the hot new thing in tech or a new way to package the still-limited products.
OpenAI has officially launched it’s first AI Agent: Operator
It’s works within a web browser to complete tasks for you, and is out now as a limited research preview
Operator can make a dinner reservation, fill out a form, and complete other web tasks
OpenAI is always looking for the next big thing to add to ChatGPT, and after months of rumors, including a report from earlier this week that teased a launch, the technology giant’s first AI Agent is here. Operator is designed to complete web tasks for you, all with a touch of a button.
Essentially, Operator is a Computer Using Agent (CUA) that uses GPT-4o’s visual skills to browse and search the web. This means that it can understand the context of what to search for, and thanks to its multi-modality, it understands what it sees as it searches. It’s available now as a research preview for ChatGPT Pro subscribers in the United States.
Operator is described as “an agent that can use its own browser to perform tasks for you.” OpenAI released a demo showing Operator browsing the web as we (that is, we humans) do. You might ask Operator to book a dinner reservation for you, fill out an arduously long form, order groceries from a service, or even book a flight. It can use OpenTable to find and book a reservation at a restaurant, as shown in the demo. Operator will even walk you through its steps.
Operator is a ‘research preview,’ so know that it’s in its early days. OpenAI does impose some limitations. We haven’t had the chance to go hands-on yet, but it certainly looks impressive. This is OpenAI’s first entry into the world of AI agents, which will likely be the theme of the year in the realm of artificial intelligence.
OpenAI writes in a blog post announcing Operator that it “is one of our first agents, which are AIs capable of doing work for you independently—you give it a task and it will execute it.” This hints that not only are there other agents in the pipeline – Altman confirmed this during the live demo – but that they’re all based around the notion of doing things for you – a big step in the quest to make AI even more helpful, giving us some time back.
Operator is powered by the new Computer Using Agent (CUA) model, which pairs GPT4o’s vision skills with advanced reasoning. This all comes together to let Operator understand and use elements within a browser – the search bar, various buttons, and on-screen content.
Advertisement
OpenAI explains that “Operator can ‘see’ (through screenshots) and ‘interact’ (using all the actions a mouse and keyboard allow) with a browser,” allowing it to functionally use a browser to complete a task. That’s pretty neat, especially if it works at a high rate of success, and according to the blog post, it can self-correct.
Sign up for breaking news, reviews, opinion, top tech deals, and more.
However, as with most new AI tools and skills, it will likely take some time for this to become truly useful in the real world. That will also require OpenAI to open it up to more folks, though as an early research preview it’s still certainly an impressive demo.
For now, if you’re in the United States and subscribed to ChatGPT Pro, you can try it out on OpenAI’s website. OpenAI CEO Sam Altman teased that it would eventually arrive in other countries and be added to the ChatGPT Plus subscription. As we remember from some of the announcements from 12 Days of OpenAI, Europe will likely take a bit longer.
The wheels are already beginning to turn on Donald Trump’s plan to make the US into the “crypto capital of the planet” following his return to the White House.
In an executive order signed Thursday, Trump established a “working group on digital asset markets,” which will be responsible for weighing the possibility of the US forming a “strategic national digital asset stockpile,” among other things.
The order also requires the working group—which will comprise the leaders of various government branches, financial regulatory bodies, and the attorney general—to come up with an appropriate set of regulations and laws governing the use of crypto.
Advertisement
Earlier in the week, on Trump’s second day in office, the Securities and Exchange Commission (SEC) —the US regulatory body that brought a volley of lawsuits against crypto firms under the Joe Biden administration—established a “crypto task force.” Under new leadership following the departure of former chair Gary Gensler, who was widely demonized in the cryptosphere, the SEC will develop a “comprehensive and clear regulatory framework for crypto assets,” the agency stated.
Later the same day, Trump granted clemency to Ross Ulbricht, who was serving life in prison for crimes committed while running the infamous darknet marketplace Silk Road, one of the first websites to accept bitcoin as payment. After being arrested in 2013, Ulbricht became something of a martyr in crypto circles for his part in spreading the bitcoin gospel.
These initial gestures signal Trump’s willingness to follow through on earlier campaign promises: to pass various crypto-related legislation, reform the financial regulatory apparatus in the US, and knit crypto into the US national treasury. The effects will be extensive, crypto figures believe, reverberating far beyond US shores and creating the conditions for a new golden era for the industry.
“Our technology is very powerful and transformative. We need to land it in different societies,” says Joseph Lubin, cofounder of Ethereum and chief executive at software company Consensys. “And America is a standard-setter for the rest of the world.”
In the lead-up to the 2024 election, crypto organizations donated hundreds of millions of dollars to crypto-focused super political action committees, which spent the funds in support of crypto-friendly congressional candidates, many of them Republican.
On the campaign trail, Trump began to bill himself as the first “crypto president.” In July, in front of a rabid crowd of bitcoiners, Trump promised to turn the US into a crypto mining powerhouse and establish a national bitcoin stockpile if reelected. In the same speech, he pledged to fire Gensler, the SEC chair, prompting the most rapturous applause of the night.
Though Nintendo can technically claim it had the first big gaming news event of the year, at least Xbox’s Developer Direct actually showed off some games and let us know when we can play them. The showcase was anchored by deep dives into the biggest games coming down the green pipe like Doom: The Dark Ages and Compulsion Games’ South of Midnight, with a couple of surprises to fill out the nearly one-hour-long runtime. Here are the highlights from the show.
Xbox kicked off the Direct with the surprise reveal of Ninja Gaiden 4. The game is being codeveloped by Koei Tecmo’s Team Ninja and Bayonetta studio PlatinumGames. Ninja Gaiden 4 revives the series’ bloody, fast-paced combat and high-stakes (but often frustrating) platforming with a new face, the ninja Yakumo. Yakumo will use his unique fighting styles to defeat the Divine Dragon Order that’s turned Tokyo into a dystopian, crumbling mess. Gaiden’s former protagonist, Ryu Hayabusa, will also make an appearance as a playable character and Yakumo’s rival.
Ninja Gaiden 4 will launch in the fall of this year, but if you don’t want to wait for your bloody ninja action, you don’t have to. Xbox stealth dropped Ninja Gaiden 2 Black, a remake of Ninja Gaiden II, and it’s available right now on Xbox and Game Pass.
The developers at Compulsion Games went into detail about South of Midnight’s gameplay and story. You play as Hazel who must use her powers as a Weaver, fighting monsters and traversing the haunted landscape, to rescue her mother who gets swept away in a hurricane. With this, everything I’ve seen about South of Midnight makes it seem like it’ll be one of my games of the year. It’s got a Black protagonist, features characters and tropes that harken to Southern gothic folklore, and its stop-motion art style makes it immediately stand out. I cannot wait to get my hands on this game when it releases on April 8th.
Advertisement
Sandfall Interactive was founded in Montpellier, France, in 2020 with a team led by former Ubisoft developers. Clair Obscur: Expedition 33 is the studio’s first game — a turn-based RPG with a compelling narrative hook. The world has been ravaged by a being known as the Paintress. Every year, she writes down a number, and everyone older than that number disappears. Expeditions are sent out to stop the Paintress, and the game will follow Expedition 33 in their attempt to save humanity. In addition to an interesting Persona 5-style take on turn-based combat, Expedition 33 features some serious voice acting talent, starring Charlie Cox, Jennifer English, Ben Starr, and Andy Serkis. Can’t wait to hear them perform when Clair Obscur: Expedition 33 launches on April 24th.
To close out the Direct, Xbox gave us another look at Doom: The Dark Ages, the prequel to id Software’s 2016 Doom reboot and Doom Eternal. It will, of course, feature all the ripping and tearing a Doom enjoyer could want, along with an interesting focus on narrative — something the series isn’t really known for. But I suspect folks are far more interested in piloting a 30-story Doomguy-shaped mech suit when the game releases on May 15th.
JetBrains, the company behind coding tools like the IntelliJ IDE for Java and Kotlin (and, indeed, the Kotlin language itself), on Thursday launched Junie, a new AI coding agent. This agent, the company says, will be able to handle routine development tasks for when you want to create new applications — and understand the context of existing projects you may want to extend with new features.
Using the well-regarded SWEBench Verified benchmark of 500 common developer tasks, Junie is able to solve 53.6% of them on a single run. Not too long ago, that would have been the top score, but it’s worth noting that at this point, the top-performing models score more than 60%, with Weights & Biases “Programmer O1 crosscheck5” currently leading the pack with a score of 64.6%. JetBrains itself calls Junie’s score “promising.”
But even with a lower score, JetBrains’ service may have an advantage because of its tight integration with the rest of the JetBrains IDE. The company notes that even as Junie helps developers get their work done, the human is always in control, even when delegating tasks to the agent.
“AI-generated code can be just as flawed as developer-written code,” the company writes in the announcement. “Ultimately, Junie will not just speed up development — it is poised to raise the bar for code quality, too. By combining the power of JetBrains IDEs with LLMs, Junie can generate code, run inspections, write tests, and verify they have passed. “
Advertisement
It may be a bit before you can try that out yourself, though. The service is only available through an early access program behind a waitlist. For now, it also only works on Linux and Mac, and in the IntelliJ IDEA Ultimate and PyCharm Professional IDEs, with WebStorm coming soon.
Phishing campaign mimics CAPTCHA to deliver hidden malware commands
PowerShell command hidden in verification leads to Lumma Stealer attack
Educating users on phishing tactics is key to preventing such attacks
CloudSek has uncovered a sophisticated method for distributing the Lumma Stealer malware which poses a serious threat to Windows users.
This technique relies on deceptive human verification pages that trick users into unwittingly executing harmful commands.
While the campaign primarily focuses on spreading the Lumma Stealer malware, its methodology could potentially be adapted to deliver a wide variety of other malicious software.
How the phishing campaign works
The campaign employs trusted platforms such as Amazon S3 and various Content Delivery Networks (CDNs) to host phishing sites, utilizing modular malware delivery where the initial executable downloads additional components or modules, thereby complicating detection and analysis efforts.
The infection chain in this phishing campaign begins with threat actors luring victims to phishing websites that mimic legitimate Google CAPTCHA verification pages. These pages are presented as a necessary identity verification step, tricking users into believing they are completing a standard security check.
Advertisement
The attack takes a more deceptive turn once the user clicks the “Verify” button. Behind the scenes, a hidden JavaScript function activates, copying a base64-encoded PowerShell command onto the user’s clipboard without their knowledge. The phishing page then instructs the user to perform an unusual series of steps, such as opening the Run dialog box (Win+R) and pasting the copied command. These instructions, once followed, cause the PowerShell command to be executed in a hidden window, which is invisible to the user, making detection by the victim almost impossible.
The hidden PowerShell command is the crux of the attack. It connects to a remote server to download additional content such as a text file (a.txt) containing instructions for retrieving and executing the Lumma Stealer malware. Once this malware is installed on the system, it establishes connections with attacker-controlled domains. This allows attackers to compromise the system, steal sensitive data, and potentially launch further malicious activities.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
To guard against this phishing campaign, both users and organizations must prioritize security awareness and implement proactive defences. A critical first step is user education.
Advertisement
The deceptive nature of these attacks – disguised as legitimate verification processes – shows the importance of informing users about the dangers of following suspicious prompts, especially when asked to copy and paste unknown commands. Users need to be trained to recognize phishing tactics and question unexpected CAPTCHA verifications or unfamiliar instructions that involve running system commands.
In addition to education, deploying robust endpoint protection is essential for defending against PowerShell-based attacks. Since attackers in this campaign rely heavily on PowerShell to execute malicious code, organizations should ensure that their security solutions are capable of detecting and blocking these activities. Advanced endpoint protection tools with behavioural analysis and real-time monitoring can detect unusual command executions, helping to prevent the malware from being downloaded and installed.
Organizations should also take a proactive approach by monitoring network traffic for suspicious activity. Security teams need to pay close attention to connections with newly registered or uncommon domains, which are often used by attackers to distribute malware or steal sensitive data.
Finally, keeping systems updated with the latest patches is a crucial defense mechanism. Regular updates ensure that known vulnerabilities are addressed, limiting the opportunity for attackers to exploit outdated software in their efforts to distribute malware like Lumma Stealer.
Advertisement
“This new tactic is particularly dangerous because it plays on users’ trust in widely recognized CAPTCHA verifications, which they encounter regularly online. By disguising malicious activity behind what seems like a routine security check, attackers can easily trick users into executing harmful commands on their systems. What’s more concerning is that this technique, currently distributing the Lumma Stealer, could be adapted to spread other types of malware, making it a highly versatile and evolving threat,” said Anshuman Das, Security Researcher at CloudSEK.
Pocketpair, the company behind last year’s viral game Palworld, has a new venture: publishing indie games. Its first project, scheduled for release later this year, will be an as-yet-unnamed horror game from Surgent Studios, the developer behind 2024’s Tales of Kenzera: Zau.
Palworld, jokingly referred to as “Pokémon with guns,” was a breakout success last year, drawing in more than 25 million players in its first few months. The company’s step into publishing comes at a turbulent time for video games, especially smaller studios; last year, Among Us developer Innersloth announced its own move into publishing to help push projects forward. Pocketpair’s Palworld success, it seems, is allowing them to do the same.
“As the games industry continues to grow, more and more games find themselves struggling to get funded or greenlit,” John Buckley, head of Pocketpair Publishing, said in a press release announcing the new division. “We think this is a real shame, because there are so many incredible creators and ideas out there that just need a little help to become incredible games.”
It’s no surprise, then, that Pocketpair would work with Surgent Studios, which has struggled to find funding following the release of Zau. The developer put its team on hiatus last year as it sought a partner for its next Kenzera game, currently known as Project Uso.
Advertisement
Surgent’s deal with Pocketpair is separate from Uso, founder Abubakar Salim tells WIRED. Unlike the Afrofuturism of Zau, it’ll be a horror title meant to introduce players to something new. “We’re taking a little detour from the Tales of Kenzera universe,” Salim says.
Salim adds that the horror genre “is a fascinating space that taps into primal emotions, immersing audiences in a reality that’s removed from their own yet strikes something deep and dark within us all.” Pocketpair and Surgent gave few details about the game in Thursday’s announcement, other than to describe it as “short and weird.”
“The world is so raw right now, and it feels natural to craft an experience that reflects and feeds off that intensity,” Salim says.
Pocketpair Publishing has not announced any other future projects. The company has been embroiled in legal drama since last year, when Nintendo filed a lawsuit in Tokyo claiming Palworld infringed on its copyright. Nintendo did not respond to a request for comment. When asked if the lawsuit was of any concern to Surgent, Salim says the studio isn’t worried. “We’re really excited to be working with their new publishing wing to bring this game to life,” he says.
Meta and YouTube aren’t the only platforms looking to benefit from TikTok potentially disappearing — Substack wants in on the action, too.
The company announced Thursday it’s launching a $20 million “creator accelerator fund,” promising content creators they won’t lose revenue by jumping ship to Substack. Creators in the program also get “strategic and business support” from Substack, and early access to new features.
“We established this fund because we’ve seen creators who specialize in video, audio, and text expand their audience, revenue, and influence on Substack, where the platform’s network effects amplify the quality and impact of the work they’re doing,” the company said in a blog post.
This pivot on Substack’s part has been in the works for a while — for months, the company has been marketing itself not as a newsletter delivery service but as a creator platform similar to Patreon.
Advertisement
“On Substack, [creators] can build their own home on the internet: one where creators, not platform executives or advertisers, own their work and their audience,” the blog post reads. The post also cites “bans, backlash, and policies that change with the political winds” as a reason creators can’t depend on traditional social media services.
That’s all fine (we at The Verge have been saying this for a while). But creators focusing on Substack are also subject to ebbs and flows depending on what the company is prioritizing: first, it was newsletters, then it was tweet-like micro blogs, followed by full-on websites and livestreaming. For some, Substack’s initial stated mission of giving more freedom to independent writers is fading. And TikTok creators looking to move to Substack will need to rebuild their following all over again — you obviously can’t export your TikTok followers.
The $20 million fund isn’t the first time Substack has offered a pool of money meant to entice creators. Under a program called Substack Pro, the company poached top media talent from traditional newsrooms with higher pay, health insurance, and other perks. That program ended in 2022, with Substack cofounder Hamish McKenzie saying the deals weren’t employment arrangements but “seed funding deals to remove the financial risk for a writer in starting their own business.” In other words, welcome to Substack. Now that you’re here, you’re on your own — which is more or less the deal other platforms offer.
Anthropic says Citations allows its AI models to provide detailed references to “the exact sentences and passages” from docs they use to generate responses. As of Thursday afternoon, Citations is available in both Anthropic’s API and Google’s Vertex AI platform.
As Anthropic explains in a blog post with Citations, devs can add source files to have models automatically cite claims that they inferred from those files. Citations is particularly useful in document summarization, Q&A, and customer support applications, Anthropic says, where the feature can nudge models to insert source citations.
Citations isn’t available for all of Anthropic’s models — only Claude 3.5 Sonnet and Claude 3.5 Haiku. Also, the feature isn’t free. Anthropic notes that Citations may incur charges depending on the length and number of the source documents.
Advertisement
Based on Anthropic’s standard API pricing, which Citations uses, a roughly-100-page source doc would cost around $0.30 with Claude 3.5 Sonnet, or $0.08 with Claude 3.5 Haiku. That may well be worth it for devs looking to cut down on hallucinations and other AI-induced errors.
Sextortion scams evolve with personalized tactics and heightened intimidation.
Threat actors exploit invoicing platforms to bypass email security filters.
Robust email filters and training help counter sextortion threats effectively.
Sextortion scams are becoming more complex and personal as the scams now frequently target individuals across different sectors with greater precision creating a sense of immediate threat.
Cofense Phish Defense Center (PDC) recently observed a notable evolution in sextortion scams, which unlike earlier versions, which relied primarily on generic scare tactics, now use more sophisticated strategies, often bypassing traditional security measures.
The campaigns now personalize emails, including personal details such as the target’s home address or phone number directly in the email body, in order to capture the recipient’s attention and adds a layer of credibility to the scam.
Exploitation of fear through technical jargon
These emails generally originate from random Gmail accounts, which are harder to trace, rather than the typical impersonated addresses seen in earlier scams.
In addition to personal information, scammers have escalated their approach by including images of the target’s supposed home, workplace, neighbourhood or street in attached PDF files.
Advertisement
The email addresses the recipient by name and provides a specific location, followed by threats of a physical visit if the target fails to comply. This blend of personal details and digital intimidation is a shift from the simpler sextortion scams that used to rely solely on the fear of compromised online privacy.
The scam emails claim that the target’s device has been infected with spyware, often citing “Pegasus” as the malware responsible for the supposed breach. Threat actors use technical jargon to manipulate recipients with the hope that they have a limited understanding of cybersecurity. The emails claim that the attacker has been monitoring the victim for an extended period, gathering sensitive information, and even recording videos of them.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
In some cases, the scammer adopts a casual tone lacing the message with slang or compliments to make it seem as if they have been closely observing the target’s life. The message typically concludes with two choices: ignore the email and face public humiliation or pay a ransom in cryptocurrency to ensure the alleged compromising material is never released.
Advertisement
A recurring part of these scams is the demand for payment in Bitcoin or other cryptocurrencies. Scammers often provide a Bitcoin wallet address, sometimes alongside a QR code to facilitate the payment process.
Another notable shift in sextortion campaigns is the use of invoicing services to deliver phishing emails. These services allow threat actors to send emails that bypass certain security protocols by disguising the sender’s information. Since these invoicing platforms handle the email’s delivery, their legitimate headers and content often allow the message to avoid detection.
To combat these evolving scams, individuals and organizations must stay informed and vigilant. Educating users about the nature of sextortion scams and the tactics employed by attackers can reduce the likelihood of falling victim.
You must be logged in to post a comment Login