Connect with us

Tech

5 Things You Need To Stop Doing If You Drive A Motorcycle

Published

on





Riding a motorcycle is one of the most freeing experiences you can have. Even if you have all the luxuries of being inside a car and even a chauffeur to drive you around in it, sitting astride a bike is just a different feeling. Modern motorcycles offer a ton of features that make for a more comfortable ride. However, doing so will always be a high-stakes game of focus, physics, and continuous learning. It doesn’t matter if you have the one of the safest and most beginner-friendly motorcycles ever built — you still need to take care while on the road.

After years on two wheels, I have realized that the most dangerous habits aren’t only the obviously reckless ones like performing stunts on highways or unnecessary speeding through traffic. For serious riders who really want to drive safely, you can’t overlook even minor issues; a small lapse in judgment can result in la life-altering injury on a bike. It’s not always about wearing a well-ranked bike helmet or sturdy, protective riding jacket; you can avoid major accidents by simply removing unnecessary risks from your ride.

Dangerous behavior can include things like wearing the wrong shoes, adopting bad driving habits, allowing yourself to get distracted, or blindly trusting what you see while on the road. It’s time to unlearn some of these bad behaviors. Here are five things that you need to stop doing if you drive a motorcycle.

Advertisement

Stop wearing loose shoelaces

It may sound like something your mom would tell you, but it’s a crucial point. You don’t want a loose shoelace getting tangled in your bike. It even happened to me very recently. As I went to put my left foot down to stabilize the bike, I realized I couldn’t move as my shoelaces had gotten themselves tangled around the gear lever. Thanks to my years of experience, I avoided a drop that would have otherwise led to some bruises and scratched fairings, but others might not be able to save themselves.

Loose laces can easily end up tangled at the same spot of your own bike, preventing you from shifting gears when you need to change speed. Things get especially dangerous when you have someone riding pillion, though; their loose laces can get into the most dangerous moving parts of a motorcycle like the rear wheel, drive, and sprockets. If their laces get stuck into any of these parts at speed, it doesn’t just snap the lace — it can pull their foot right into the machinery, resulting in something dreadful. 

Advertisement

For all these reasons, many state DMVs will highlight the issue. An example of this is how the Washington Department of Licensing explicitly advises keeping all your gear secure to avoid interference with controls, stating that “laces should be tucked in to prevent them from catching on parts of the bike.” To avoid such mishaps, you should be rigorous about the type of footwear you wear. The California DMV Motorcycle Handbook likewise warns against the dangers, clearly suggesting wearing sturdy, over-the-ankle or closed-toe shoes.

Advertisement

Stop changing speed or gears mid-corner

Riding a motorcycle on a mostly-straight highway or freeway is a totally different skill from riding over hills or through twisty mountain roads. I’ve been a rider for more than a decade, but when I took my bike to Ladakh in the mountainous region of northern India, I learned a lot of new things about riding. One of the most crucial new lessons was you need to stay calm when approaching a sweeping curve so as to avoid slamming on the brakes or grabbing the clutch and downshifting.

Downshifting or braking might feel like a smart move, but it is actually one of the quickest ways to crash. Motorcycles rely on a limited amount of traction. When you lean your bike into a curve (the most common way of turning for heavy bikes those loaded down with gear), your tires are already using almost all the traction available. Downshifting or braking spikes your power delivery, and the bike loses traction.

Experts also agree that gear shifting and braking should happen before you are ready to lean the bike. According to a driving manual published by the Kentucky State Police (via DrivingTests.org), it is recommended to change gears before entering a turn. The manual notes that if shifting is necessary, it should be smooth and there should be no sudden change in power delivery, as it can cause the vehicle to skid. TVS Motor, one of the biggest manufacturers of two-wheelers in India, also suggests that you should enter the curve in the smoothest way possible. In other words, its safer to finish gear shifts and braking before entering the corner.

Advertisement

Stop watching the speedometer or using a phone

Modern-day motorcycles are equipped with TFT or LCD screens that are compatible with Apple CarPlay and Android Auto, allowing users to view all of their phone’s content, sometimes use apps on the display, and view other metrics. Even bikes that don’t support these features can often be fitted with a smartphone mount to use for navigation or other purposes. But because of all this, it becomes quite tempting for riders to spend too long looking down at these screens.

This distraction is often the cause of major accidents on the road. Looking down at the display or taking your eyes off the road, even for a fraction of a second, can result in a crash. While driving, your eyes are your primary tool. Not only should you stay vigilant about what’s happening in front of you, but you should also check your bike’s rear-view mirrors for possible dangers behind. You should be scanning the horizon for safely overtaking, avoiding potholes, or swiftly changing lanes, not flicking your eyes down to whatever’s on your phone screen.

Distracted riding is quite lethal, and even the best riding gear might not be able to save you from accident or injury. The NHTSA (National Highway Traffic Safety Administration) reports thousands of lives lost annually due to distraction, with more than 3,000 deaths in 2023 alone. Even manufacturers of smartphone mount holders like Mob Armor stress that paying too much attention to your phone can lead to catastrophic consequences while riding.

Advertisement

Stop blindly trusting brake lights

One of the biggest mistakes, often committed by beginners and experienced bikers alike, is believing that if the car in front isn’t showing red brake lights, it isn’t slowing down. If you rely solely on this signal, then you may end up kissing the trunk of someone’s car with a bang. This most commonly comes up with with manual transmission cars, which is very common where I’m from. A car with a manual transmission often uses engine braking to slow down, which doesn’t require a driver to step on the brake.

Brake lights only tell you that the driver is depressing the brake pedal. It doesn’t tell you if the driver is just coasting to a stop or downshifting. If you’re in the habit of following vehicles too closely, it’s all too easy for this to result in an accident. As per the Motorcycle Safety Foundation, a rider should remain highly engaged when on the road, doing your best to anticipate what’s coming down the road or to look for signs that the cars in front of you are slowing down. 

This is why you should always leave adequate space between your motorcycle and the vehicle in front. By leaving a visible gap between you and them, you will have sufficient time to react and bring your bike to a stop safely. A good cue to look for is whether the tires of the vehicle in front of you are exhibiting signs of slowing. You should also evaluate whether the gap between the two of you is shrinking faster than normal. Is this a lot of work? Sure. It’s also critical for your safety.

Advertisement

Stop riding behind the center of a car

Riding a motorcycle can make you feel like royalty. It’s only natural to feel like you’ve got the right to cruise right down the dead center of your lane. However, that’s often considered the most dangerous spot for a two-wheeled vehicle. Since cars have four wheels, drivers usually center their vehicles over hazards to protect their own tires. This means the center of the lane becomes the collection point for all the stuff that cars have avoided, such as potholes, broken vehicle parts, and even spilled or leaking vehicle fluids.

Riding in the middle puts your front tire at great risk of hitting any of these obstacles. The last thing you want is ending up wrecked because you hit a pothole or slipped on an oil slick that accumulated in the center. More importantly, driving directly behind a vehicle in this way might make it hard for that driver in front of you to see you in their side mirrors, leaving you in their blind spot. 

Advertisement

This is why your best bet is often to drive aligned with the left bumper of the car ahead of you. This places you squarely in view of the driver’s side mirror, making you harder to ignore. And second, it gives you a clearer view as you can more easily see past that vehicle, letting you avoid trouble down the road and minimizing your risk of an accident.



Advertisement

Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

Australian Grand Prix 2026 LIVE: TV Channels, Live Updates for F1 season opener

Published

on

Refresh

Please follow our community guidelines.” data-join-the-conversation-text=”Join the Conversation”>

You must confirm your public display name before commenting

Advertisement

Please logout and then login again, you will then be prompted to enter your display name.

Source link

Continue Reading

Tech

CBP Used Online Ad Data to Track Phone Locations

Published

on

The United States and Israel launched a war in Iran last week that has already killed more than 1,200 Iranians and spilled out across the Middle East. There are many unknowns about US president Donald Trump’s goals as the conflict enters its second week and the situation seems poised to trigger an energy crisis with reverberations around the world.

Iran is in a nationwide internet shutdown with only the country’s regime-built intranet available, plunging Iranians into digital darkness and making it difficult for humanitarian aid workers, journalists, and others to disseminate information both inside and outside the country. As strikes on Tehran began last weekend, an apparently hacked prayer app sent messages saying “surrender” and “help is on the way” to Iranians around the country.

Meanwhile, GPS attacks like jamming—not to mention physical threats—are on the rise in the Strait of Hormuz, threatening shipping vessels. Security camera hacking has emerged as part of the playbook of war. And missile-intercept systems across the Middle East are under strain—and in some cases being destroyed in strikes.

Trump ousted Department of Homeland Security secretary Kristi Noem this week. Her tenure was marked by aggressive anti-immigration tactics and ICE and CBP’s killing of two US protesters. A highly sophisticated iPhone hacking tool kit that was likely originally built for the US government is in the hands of multiple other nations as well as scammers who have likely used the tools to infect tens of thousands of phones or more. Some US lawmakers are calling for an investigation into the threat of the decades-old side-channel hacking technique. And WIRED went inside how music streaming CEO Elie Habib built the open-source global threat map World Monitor in his spare time.

Advertisement

And there’s more. Each week, we round up the security and privacy news we didn’t cover in depth ourselves. Click the headlines to read the full stories. And stay safe out there.

United States Customs and Border Protection has, for the first time, admitted it purchased phone location data from the sprawling, surveillance-heavy online advertising industry. The agency’s acknowledgement was included in a document, called a Privacy Threshold Analysis, obtained by 404 Media through a Freedom of Information Act request. The document relates to a trial that CBP ran between 2019 and 2021.

The publication reports that CBP purchased data linked to real-time bidding processes. When you see ads online or in apps, they have often been shown to you after automated, instantaneous, auctions take place where advertisers bid to show you that specific ad. The murkiest parts of the advertising industry can collect data from your device, including your phone’s identifying details and location data; this is then repackaged and sold to companies and entities. The data has been called a “gold mine” for tracking people’s daily activities.

CBP did not respond to 404 Media’s request for comment on whether it is still buying the data; however, ICE has reportedly planned to purchase access to another system, called Webloc, that allows whole neighborhoods to be monitored for mobile phone movements.

Advertisement

The FBI was able to identify a protester in Atlanta after ultimately obtaining information from Swiss encrypted email service Proton Mail, court documents have revealed this week. A court document reviewed by 404 Media shows that payment information linked to a Proton email address was provided to US law enforcement by Swiss authorities after a request was made under an Mutual Legal Assistance Treaty (MLAT), which allows agencies to share data internationally.

Swiss officials made a request for the data under Swiss laws to Proton for payment information linked to the email address defendtheatlantaforest@protonmail.com, which was associated with protests in Atlanta. This information was then provided to US law enforcement officials under the international agreements, and they were able to identify an individual linked to the account.

Source link

Advertisement
Continue Reading

Tech

Fake Claude Code install guides push infostealers in InstallFix attacks

Published

on

Fake Claude Code install guides push infostealers in InstallFix attacks

Threat actors are employing a new variation of the ClickFix social engineering technique called InstallFix to convince users into running malicious commands under the pretext of installing legitimate command-line interface (CLI) tools.

The new trick exploits the common practice among developers these days of downloading and executing scripts through ‘curl-to-bash’ commands from online sources without closely inspecting the assets first.

Researchers at Push Security, a browser threat detection and response company, found that attackers use the new InstallFix technique with cloned pages for popular CLI tools that serve malicious install commands.

Since the current security model “boils down to ‘trust the domain’,” and more non-technical users are now working with tools previously reserved for developers, InstallFix may become a larger threat, the researchers say.

Advertisement

In a report today, Push Security highlights a cloned installation page for Claude Code, Anthropic’s CLI coding assistant, that features the same layout, branding, and documentation sidebar as the legitimate source.

The difference is in the installation instructions for macOS and Windows (PowerShell and Command Prompt), which deliver malware from an attacker-controlled endpoint.

Comparion between the legitimate (top) and malicious page (bottom)
Legitimate (top) and malicious page (bottom)
Source: Push Security

The researchers say that apart from the installation instructions, all links on the fake page redirect to the legitimate Anthropic site.

“So a victim that lands on the page and follows the fake instructions could continue normally without realizing anything had gone wrong,” Push Security notes in the report.

The attackers promote these pages through malvertising campaigns on Google Ads, causing malicious ads to appear in search results for queries such as “Claude Code install” and “Claude Code CLI.”

Advertisement

BleepingComputer could confirm that the malicious websites are still being promoted through Google-sponsored search results. When looking for the query “install claude code,” the first result was a Squarespace URL (claude-code-cmd.squarespace[.]com) pointing to a perfect clone of the official Claude Code documentation.

Sponsored Google search pushing fake Claude install sites
Sponsored Google search pushing fake Claude install sites
source: BleepingComputer

Amatera infections

Based on Push Security’s analysis, the payload delivered through these InstallFix attacks is the Amatera Stealer, a piece of malware designed to steal sensitive data (cryptocurrency wallets, credentials) from compromised systems.

The malicious InstallFix commands for macOS contain base64-encoded instructions for downloading and executing a binary from a domain controlled by the attacker. In one case, BleepingComputer found that the threat actor used the domain wriconsult[.]com, which is currently down.

For Windows users, the malicious command uses the legitimate utility ‘mshta.exe’ to retrieve the malware and triggers additional processes like ‘conhost.exe’ to support the execution of the final payload, Amatera information stealer.

Cloned Claude install guide with malicious commands
Cloned Claude install guide with malicious commands
source: BleepingComputer.com

Amatera is a fairly new malware family, believed to be based on the ACR Stealer, sold as a subscription service (MaaS) to cybercriminals.

The malware was recently observed distributed in separate ClickFix attacks that abused Windows App-V scripts for payload delivery. It can steal passwords, cookies, and session tokens stored in web browsers and collect system information while evading detection by security tools.

Advertisement

Push Security reports that the attacks are particularly evasive, also because the malicious sites are hosted on legitimate platforms such as Cloudflare Pages, Squarespace, and Tencent EdgeOne.

The researchers also published a video showing how the InstallFix attack works, from the search query to copying a malicious command.

In a campaign last week, threat actors used the InstallFix technique with fake OpenClaw installers hosted in GitHub repositories that were promoted by Bing’s AI-enhanced search results.

Advertisement

Users looking for Claude Code must ensure they get installation instructions from official websites, block or skip all promoted Google Search results, and bookmark software download portals for tools they need to re-download frequently.

The researchers provide indicators of compromise that include the domains for serving the cloned guides, for hosting the malicious payloads, and the InstallFix commands.

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

Source link

Advertisement
Continue Reading

Tech

TCL unveils 4K 240Hz OLED dual-mode monitor that's just 6.4mm thick

Published

on


The recently unveiled 32X3A is a 31.5-inch display that can switch between 4K at 240Hz and 480Hz at a lower resolution, likely 1080p, with a grayscale response time of 0.03 milliseconds. According to ITHome, the OLED display covers 99% of the sRGB and DCI-P3 color gamuts. Anti-glare and anti-reflective coating…
Read Entire Article
Source link

Continue Reading

Tech

Hackers abusing AI at every stage of cyberattacks

Published

on

Malicious AI

Microsoft says threat actors are increasingly using artificial intelligence in their operations to accelerate attacks, scale malicious activity, and lower technical barriers across all aspects of a cyberattack.

According to a new Microsoft Threat Intelligence report, attackers are using generative AI tools for a wide range of tasks, including reconnaissance, phishing, infrastructure development, malware creation, and post-compromise activity.

In many cases, AI is used to draft phishing emails, translate content, summarize stolen data, debug malware, and assist with scripting or infrastructure configuration.

“Microsoft Threat Intelligence has observed that most malicious use of AI today centers on using language models for producing text, code, or media. Threat actors use generative AI to draft phishing lures, translate content, summarize stolen data, generate or debug malware, and scaffold scripts or infrastructure,” warns Microsoft.

Advertisement

“For these uses, AI functions as a force multiplier that reduces technical friction and accelerates execution, while human operators retain control over objectives, targeting, and deployment decisions.”

Threat actor use of AI across the cyberattack lifecycle
Threat actor use of AI across the cyberattack lifecycle
Source: Microsoft

AI used to power cyberattacks

Microsoft has observed multiple threat groups incorporating AI into their cyberattacks, including North Korean actors tracked as Jasper Sleet (Storm-0287) and Coral Sleet (Storm-1877), who use the technology as part of remote IT worker schemes.

In these operations, AI tools help generate realistic identities, resumes, and communications to gain employment at Western companies and maintain access once hired.

Jasper Sleet leverages generative AI platforms to streamline the development of fraudulent digital personas. For example, Jasper Sleet actors have prompted AI platforms to generate culturally appropriate name lists and email address formats to match specific identity profiles. For example, threat actors might use the following types of prompts to leverage AI in this scenario:

Example prompt 1: “Create a list of 100 Greek names.”

Advertisement

Example prompt 2: “Create a list of email address formats using the name Jane Doe.“

Jasper Sleet also uses generative AI to review job postings for software development and IT-related roles on professional platforms, prompting the tools to extract and summarize required skills. These outputs are then used to tailor fake identities to specific roles.

❖ Microsoft Threat Intelligence

The report also describes how AI is being used to assist with malware development and infrastructure creation, with threat actors using AI coding tools to generate and refine malicious code, troubleshoot errors, or port malware components to different programming languages.

Advertisement

Some malware experiments show signs of AI-enabled malware that dynamically generate scripts or modify behavior at runtime.

Microsoft also observed Coral Sleet using AI to quickly generate fake company sites, provision infrastructure, and test and troubleshoot their deployments.

When AI safeguards attempt to prevent the use of AI in these tasks, Microsoft says threat actors are using jailbreaking techniques to trick LLMs into generating malicious code or content.

In addition to generative AI use, Microsoft researchers have begun to see threat actors experiment with agentic AI to perform tasks autonomously and adapt to results.

Advertisement

However, Microsoft says AI is currently used primarily for decision-making rather than for autonomous attacks.

Because many IT worker campaigns rely on the abuse of legitimate access, Microsoft advises organizations to treat these schemes and similar activity as insider risks.

Furthermore, as these AI-powered attacks mirror conventional cyberattacks, defenders should focus on detecting abnormal credential use, hardening identity systems against phishing, and securing AI systems that may become targets in future attacks.

Microsoft is not alone in seeing threat actors increasingly using artificial intelligence to power attacks and lower barriers to entry.

Advertisement

Google recently reported that threat actors are abusing Gemini AI across all stages of cyberattacks, mirroring what Amazon observed in this campaign.

Amazon and the Cyber and Ramen security blog also recently reported on a threat actor using multiple generative AI services as part of a campaign that breached more than 600 FortiGate firewalls.

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

Source link

Advertisement
Continue Reading

Tech

How The Chornobyl NPP Got Modernized In The 1990s

Published

on

During the 1990s the Chornobyl Nuclear Power Plant – formerly the Chernobyl NPP – continued operating with its remaining three RBMK reactors, but of course the 1970s-era automation with its very limited SKALA computer required some serious modernization. What was interesting here is that instead of just replacing this entire Soviet-era mainframe with a brand-new 1990s one, the engineers responsible opted to build a new system – called DIIS – around it. This is detailed in a recent video by the [Chornobyl Family] on YouTube.

This SKALA industrial control system was previously detailed in a video, covering this 24-bit mainframe computer and its many limitations. It wasn’t quite a real-time control system, but it basically did what it was designed to do. Since at the time it was not clear for how long these three RBMKs would be kept running, they didn’t want to go overboard with investments either.

Ultimately Unit 2 only was active until 1991 due to a turbine fire, Unit 1 until 1996 and Unit 3 was shutdown for the last time in 2000, so this a sensible decision. During those years, an auxiliary information-measurement system (DIIS) was the big upgrade, which got bridged into SKALA via a Ukrainian-made SM-1210 minicomputer, with the latter connected to an 80386 PC which itself was connected to an ARCnet hub.

Advertisement

Best part of this DIIS upgrade was that it made it possible to run modeling algorithms for the reactor core based on measurements, without having to send data all the way over to the central control office in Moscow. Now reactor parameters could be visualized in real-time, and adjustments made via the same PRIZMA program’s magnetic tapes of the SKALA system as before.

Although the result was a bit of an odd mixture of 1970s Soviet mainframe design, 1980s-derived Ukrainian mainframe design and 1990s Intel computing power, it worked well enough to bring the ChNPP to the very doorstep of the 21st century with no issues worthy of note. Definitely a testament to the engineers who hacked this upgrade together and made it work so smoothly.

Advertisement

Source link

Continue Reading

Tech

Today’s NYT Wordle Hints, Answer and Help for March 8 #1723

Published

on

Looking for the most recent Wordle answer? Click here for today’s Wordle hints, as well as our daily answers and hints for The New York Times Mini Crossword, Connections, Connections: Sports Edition and Strands puzzles.


Today’s Wordle puzzle features some tricky elements, including a double letter, and some unusual letter choices. If you need a new starter word, check out our list of which letters show up the most in English words. If you need hints and the answer, read on.

Read more: New Study Reveals Wordle’s Top 10 Toughest Words of 2025

Advertisement

Today’s Wordle hints

Before we show you today’s Wordle answer, we’ll give you some hints. If you don’t want a spoiler, look away now.

Wordle hint No. 1: Repeats

Today’s Wordle answer has one repeated letter.

Wordle hint No. 2: Vowels

Today’s Wordle answer has one vowel and one sometimes vowel.

Wordle hint No. 3: First letter

Today’s Wordle answer begins with L.

Advertisement

Wordle hint No. 4: Last letter

Today’s Wordle answer ends with Y.

Wordle hint No. 5: Meaning

Today’s Wordle answer can refer to the room where hotel guests often go to check in.

TODAY’S WORDLE ANSWER

Today’s Wordle answer is LOBBY.

Yesterday’s Wordle answer

Advertisement

Yesterday’s Wordle answer, March 7, No. 1,722, was VOGUE.

Recent Wordle answers

March 3, No. 1,718: LINEN

March 4, No. 1,719: THEFT

March 5, No. 1,720: SHEEP

Advertisement

March 6, No. 1,721: GUNKY

Source link

Advertisement
Continue Reading

Tech

Meze Audio’s new Astru headphones have the golden touch

Published

on

Meze Audio has unveiled a new high-end pair of in-ear monitors aimed squarely at serious listeners.

Called the ASTRU, the new earphones promise flagship-level sound performance. However, they stick to a surprisingly simple design: just a single dynamic driver.

That approach is a bit unusual at this level. Many premium IEMs rely on multiple drivers to achieve greater detail and separation. However, Meze says the ASTRU is engineered to deliver similar layering and resolution using a single 10mm dynamic driver.

The secret lies in its unusual diaphragm design. The driver uses a multilayer composite structure with more than 80 ultra-thin layers of gold, applied through a 48-hour vacuum sputtering process.

Advertisement

Furthermore, that dome is bonded to a titanium layer and mounted on a PEEK base. This combination, Meze says, helps balance fast transient response with the warmth and physical punch dynamic drivers are known for. The result, at least on paper, should be a sound profile that’s detailed but still full-bodied.

Advertisement

The build quality is just as ambitious. Each ASTRU shell is CNC-machined from a single block of pure titanium, then finished with a multi-stage electroplating process to create a satin texture.

Meze Audio Astru in-earphonesMeze Audio Astru in-earphones
Image Credit (Meze Audio)

According to Meze, producing each matched pair takes up to seven days of precision processing. This is a sign the company is leaning heavily into its usual craftsmanship-focused design philosophy.

The earphones ship as a complete portable listening setup. In the box you’ll find a premium balanced cable with a 4.4mm termination, CNC-anodised aluminium hardware, and a 4.4mm-to-3.5mm adapter for broader device compatibility. Five ear tip sizes (XS to XL) are included. Additionally, there is a protective pouch and a soft PU leather carry envelope.

Advertisement

On the spec sheet, the ASTRU features a 10mm dynamic driver, a 5Hz–35kHz frequency range, 32-ohm impedance, and 111dB sensitivity. Total harmonic distortion is listed below 0.1% at 1kHz.

The ASTRU will make its public debut at CanJam New York on March 7. Afterwards, it will go on sale worldwide from March 20, 2026 via Meze’s website and selected retailers.

Advertisement

Pricing is set at £819 / $899 / €899, positioning the ASTRU firmly in the premium IEM space. Though it is still short of the four-figure prices many flagship earphones now command.

Advertisement

Source link

Continue Reading

Tech

God of War Sons of Sparta review: This series’ metroidvania prequel is serviceable, but shines like a red orb on PlayStation Portal

Published

on

Why you can trust TechRadar


We spend hours testing every product or service we review, so you can be sure you’re buying the best. Find out more about how we test.

If you’re a God of War fan, you’ve likely noticed Sony‘s iconic, deity-destroying action series has been dominating the spotlight as of late. Following an announcement that the franchise’s original trilogy is being remade, we got a first-look at Kratos and Atreus in Prime Video’s upcoming live-action TV series adaptation.

Review info

Platform reviewed: PS5 (on PS5 Pro and PlayStation Portal)
Available on: PS5
Release date: February 12, 2026

Advertisement

Source link

Continue Reading

Tech

Experience Incredible Noise Cancellation And Comfort With The Affordable Soundcore Q20i Headphones

Published

on

Soundcore by Anker Q20i Hybrid ANC Headphones
The Soundcore Q20i headphones, priced at $39.99 (was $70), give impressive performance at a reasonable price. This over-ear model from Anker’s Soundcore brand combines hybrid active noise cancellation, a long battery life, and configurable sound profiles into a product that constantly receives high praise for being one of the best value-for-money options available.



The main draw is hybrid noise cancellation, which uses four microphones, two in each cup and two on the outside, to reduce ambient noise by up to 90%. Low rumbles from engines or air conditioning are immediately muted, while background chatter is reduced to the point that talks with someone nearby feel far away. The transparency mode switch flips this around, allowing you to let outside sounds in when necessary, such as when you’re on a train or at a station and want to hear announcements, or just want to keep attentive when out for a walk. Users have reported that the device functions effectively in real-world circumstances such as flights, buses, and extremely crowded workspaces, yet if you’re in a really loud location, you may still experience some bleed through.

Sale


Soundcore by Anker Q20i Hybrid Active Noise Cancelling Headphones, Wireless Over-Ear Bluetooth, 40H Long…
  • Hybrid Active Noise Cancelling: 2 internal and 2 external mics work in tandem to detect external noise and effectively reduce up to 90% of it, no…
  • Immerse Yourself in Detailed Audio: The noise cancelling headphones have oversized 40mm dynamic drivers that produce detailed sound and thumping beats…
  • 40-Hour Long Battery Life and Fast Charging: With 40 hours of battery life with ANC on and 60 hours in normal mode, you can commute in peace with your…


People are blown away by the battery life; with noise cancellation switched on, you get a respectable 40 hours of playback, which increases to a stunning 60 hours if you turn it off. A 5-minute charge provides an additional 4 hours of playback, which is ideal for those occasions when you are trapped in a conference or forgot the charger in the meeting room. Bluetooth 5.0 handles all connections seamlessly, since you can link with two devices at once and it will cheerfully switch between them for you, which is quite useful when you need to transition from a laptop music to a phone call.

Advertisement

Soundcore by Anker Q20i Hybrid Active Noise Cancellation Headphones
The sound is produced by 40mm dynamic drivers, which benefit from BassUp technology while maintaining crisp details. If you connect the headphones to the provided 3.5mm connection, they will also play Hi-Res music, giving you a snappier high end and a more layered sound. Many listeners have described the profile as engaging and exciting, with deep bass that gets going without overwhelming the mids or voices. The Soundcore app takes things to the next level, with 22 pre-set EQ profiles and the option to tweak the settings to make it exactly right for you. If you need to relax or avoid interruptions, the white noise settings are a wonderful addition.

Soundcore by Anker Q20i Hybrid Active Noise Cancellation Headphones
The memory foam ear cushions are pleasant and snug, and the lightweight frame weighs only approximately 9oz, so you won’t experience sore ears even after wearing them for lengthy periods of time. The foldable form makes them ideal for putting in a bag or backpack for travel, and they still feel rather strong, despite the fact that the plastic construction isn’t exactly fancy. The built-in microphone handles calls well, picking up your voice above background noise and allowing you to hold a regular conversation.

Source link

Continue Reading

Trending

Copyright © 2025