Connect with us

Tech

Garmin and Peloton devices now properly sync in both directions, giving you a more accurate idea of your daily fitness

Published

on


  • Peloton activities can now be synced with the Garmin app
  • For months, you could only sync data the other way
  • That should give you a better understanding of your health and fitness

If you use both Garmin and Peloton devices during your fitness activities, we’ve got some good news: the two companies’ products now sync together in both directions. And this makes it far easier to log your workouts and keep track of your pursuits than before.

That means if you record a workout with one of the best Garmin watches, it’ll sync to the Peloton app. And if you log a session on a Peloton device, it’ll arrive in your Garmin app too. Whatever your equipment setup, the two systems should now communicate properly.

Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

Meta rolls out new features for scam protection

Published

on

Meta announced new features today aimed at cracking down on scams perpetrated via its platforms. First, Meta is launching AI tools for identifying impersonator of brands and celebrities, as well as for detecting deceptive links, which should help it to quickly take down frauds. Second, it is adding new alerts to caution against interacting with a potentially fraudulent account. Facebook will roll out alerts for suspicious friend requests, WhatsApp is getting warnings for device linking requests, and Messenger will also issue warnings if an account seems suspect.

Finally, Meta is also continuing to expand its processes for advertiser verification. The company said it aims to have verified advertisers account for 90 percent of its ads revenue by the end of the year, up from the current share of 70 percent. Last year, Meta estimated that marketing for scams and banned products could have been responsible for 10 percent of its 2024 revenue.

The social media company has been ramping up its actions against scams, particularly those known as celeb bait. Last month, it sued three entities from Brazil and China that were behind scams that leveraged images and deepfakes of popular people to promote dubious products and investment schemes. Meta said today that over the course of 2025, it removed 159 million scam ads as well as 10.9 million Facebook and Instagram accounts tied to criminal scam centers.

Source link

Advertisement
Continue Reading

Tech

Microsoft March 2026 Patch Tuesday fixes 2 zero-days, 79 flaws

Published

on

Tag

CVE ID

CVE Title

Severity


.NET

Advertisement
CVE-2026-26131

.NET Elevation of Privilege Vulnerability

Important


.NET

CVE-2026-26127

Advertisement
.NET Denial of Service Vulnerability

Important


Active Directory Domain Services

CVE-2026-25177

Active Directory Domain Services Elevation of Privilege Vulnerability

Advertisement
Important


ASP.NET Core

CVE-2026-26130

ASP.NET Core Denial of Service Vulnerability

Important


Azure Arc

Advertisement
CVE-2026-26141

Hybrid Worker Extension (Arc-enabled Windows VMs) Elevation of Privilege Vulnerability

Important


Azure Compute Gallery

CVE-2026-23651

Advertisement
Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability

Critical


Azure Compute Gallery

CVE-2026-26124

Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability

Advertisement
Critical


Azure Compute Gallery

CVE-2026-26122

Microsoft ACI Confidential Containers Information Disclosure Vulnerability

Critical


Azure Entra ID

Advertisement
CVE-2026-26148

Microsoft Azure AD SSH Login extension for Linux Elevation of Privilege Vulnerability

Important


Azure IoT Explorer

CVE-2026-26121

Advertisement
Azure IOT Explorer Spoofing Vulnerability

Important


Azure IoT Explorer

CVE-2026-23662

Azure IoT Explorer Information Disclosure Vulnerability

Advertisement
Important


Azure IoT Explorer

CVE-2026-23661

Azure IoT Explorer Information Disclosure Vulnerability

Important


Azure IoT Explorer

Advertisement
CVE-2026-23664

Azure IoT Explorer Information Disclosure Vulnerability

Important


Azure Linux Virtual Machines

CVE-2026-23665

Advertisement
Linux Azure Diagnostic extension (LAD) Elevation of Privilege Vulnerability

Important


Azure MCP Server

CVE-2026-26118

Azure MCP Server Tools Elevation of Privilege Vulnerability

Advertisement
Important


Azure Portal Windows Admin Center

CVE-2026-23660

Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability

Important


Azure Windows Virtual Machine Agent

Advertisement
CVE-2026-26117

Arc Enabled Servers – Azure Connected Machine Agent Elevation of Privilege Vulnerability

Important


Broadcast DVR

CVE-2026-23667

Advertisement
Broadcast DVR Elevation of Privilege Vulnerability

Important


Connected Devices Platform Service (Cdpsvc)

CVE-2026-24292

Windows Connected Devices Platform Service Elevation of Privilege Vulnerability

Advertisement
Important


GitHub Repo: zero-shot-scfoundation

CVE-2026-23654

GitHub: Zero Shot SCFoundation Remote Code Execution Vulnerability

Important


Mariner

Advertisement
CVE-2026-23235

f2fs: fix out-of-bounds access in sysfs attribute read/write

Important


Mariner

CVE-2026-23234

Advertisement
f2fs: fix to avoid UAF in f2fs_write_end_io()

Important


Mariner

CVE-2026-3713

pnggroup libpng pnm2png pnm2png.c do_pnm2png heap-based overflow

Advertisement
Moderate


Mariner

CVE-2026-23237

platform/x86: classmate-laptop: Add missing NULL pointer checks

Moderate


Mariner

Advertisement
CVE-2026-26017

CoreDNS ACL Bypass

Important


Mariner

CVE-2026-26018

Advertisement
CoreDNS Loop Detection Denial of Service Vulnerability

Important


Mariner

CVE-2026-2297

SourcelessFileLoader does not use io.open_code()

Advertisement
Moderate


Mariner

CVE-2026-0038

In multiple functions of mem_protect.c, there is a possible way to execute arbitrary code due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Important


Mariner

Advertisement
CVE-2026-27601

Underscore.js has unlimited recursion in _.flatten and _.isEqual, potential for DoS attack

Important


Mariner

CVE-2026-23236

Advertisement
fbdev: smscufx: properly copy ioctl memory to kernelspace

Moderate


Mariner

CVE-2026-23865

An integer overflow in the tt_var_load_item_variation_store function of the Freetype library in versions 2.13.2 and 2.13.3 may allow for an out of bounds read operation when parsing HVAR/VVAR/MVAR tables in OpenType variable fonts. This issue is fixed in version 2.14.2.

Advertisement
Moderate


Mariner

CVE-2025-71238

scsi: qla2xxx: Fix bsg_done() causing double free

Moderate


Mariner

Advertisement
CVE-2026-3338

PKCS7_verify Signature Validation Bypass in AWS-LC

Important


Mariner

CVE-2026-23231

Advertisement
netfilter: nf_tables: fix use-after-free in nf_tables_addchain()

Important


Mariner

CVE-2026-3381

Compress::Raw::Zlib versions through 2.219 for Perl use potentially insecure versions of zlib

Advertisement
Critical


Mariner

CVE-2026-0031

In multiple functions of mem_protect.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Important


Mariner

Advertisement
CVE-2026-23238

romfs: check sb_set_blocksize() return value

Moderate


Mariner

CVE-2026-3494

Advertisement
MariaDB Server Audit Plugin Comment Handling Bypass

Moderate


Mariner

CVE-2026-3336

PKCS7_verify Certificate Chain Validation Bypass in AWS-LC

Advertisement
Important


Mariner

CVE-2026-0032

In multiple functions of mem_protect.c, there is a possible out-of-bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Important


Microsoft Authenticator

Advertisement
CVE-2026-26123

Microsoft Authenticator Information Disclosure Vulnerability

Important


Microsoft Brokering File System

CVE-2026-25167

Advertisement
Microsoft Brokering File System Elevation of Privilege Vulnerability

Important


Microsoft Devices Pricing Program

CVE-2026-21536

Microsoft Devices Pricing Program Remote Code Execution Vulnerability

Advertisement
Critical


Microsoft Edge (Chromium-based)

CVE-2026-3544

Chromium: CVE-2026-3544 Heap buffer overflow in WebCodecs

Unknown


Microsoft Edge (Chromium-based)

Advertisement
CVE-2026-3540

Chromium: CVE-2026-3540 Inappropriate implementation in WebAudio

Unknown


Microsoft Edge (Chromium-based)

CVE-2026-3536

Advertisement
Chromium: CVE-2026-3536 Integer overflow in ANGLE

Unknown


Microsoft Edge (Chromium-based)

CVE-2026-3538

Chromium: CVE-2026-3538 Integer overflow in Skia

Advertisement
Unknown


Microsoft Edge (Chromium-based)

CVE-2026-3545

Chromium: CVE-2026-3545 Insufficient data validation in Navigation

Unknown


Microsoft Edge (Chromium-based)

Advertisement
CVE-2026-3541

Chromium: CVE-2026-3541 Inappropriate implementation in CSS

Unknown


Microsoft Edge (Chromium-based)

CVE-2026-3543

Advertisement
Chromium: CVE-2026-3543 Inappropriate implementation in V8

Unknown


Microsoft Edge (Chromium-based)

CVE-2026-3539

Chromium: CVE-2026-3539 Object lifecycle issue in DevTools

Advertisement
Unknown


Microsoft Edge (Chromium-based)

CVE-2026-3542

Chromium: CVE-2026-3542 Inappropriate implementation in WebAssembly

Unknown


Microsoft Graphics Component

Advertisement
CVE-2026-25169

Windows Graphics Component Denial of Service Vulnerability

Important


Microsoft Graphics Component

CVE-2026-25180

Advertisement
Windows Graphics Component Information Disclosure Vulnerability

Important


Microsoft Graphics Component

CVE-2026-25168

Windows Graphics Component Denial of Service Vulnerability

Advertisement
Important


Microsoft Graphics Component

CVE-2026-23668

Windows Graphics Component Elevation of Privilege Vulnerability

Important


Microsoft Office

Advertisement
CVE-2026-26110

Microsoft Office Remote Code Execution Vulnerability

Critical


Microsoft Office

CVE-2026-26113

Advertisement
Microsoft Office Remote Code Execution Vulnerability

Critical


Microsoft Office

CVE-2026-26134

Microsoft Office Elevation of Privilege Vulnerability

Advertisement
Important


Microsoft Office Excel

CVE-2026-26144

Microsoft Excel Information Disclosure Vulnerability

Critical


Microsoft Office Excel

Advertisement
CVE-2026-26109

Microsoft Excel Remote Code Execution Vulnerability

Important


Microsoft Office Excel

CVE-2026-26108

Advertisement
Microsoft Excel Remote Code Execution Vulnerability

Important


Microsoft Office Excel

CVE-2026-26107

Microsoft Excel Remote Code Execution Vulnerability

Advertisement
Important


Microsoft Office Excel

CVE-2026-26112

Microsoft Excel Remote Code Execution Vulnerability

Important


Microsoft Office SharePoint

Advertisement
CVE-2026-26105

Microsoft SharePoint Server Spoofing Vulnerability

Important


Microsoft Office SharePoint

CVE-2026-26114

Advertisement
Microsoft SharePoint Server Remote Code Execution Vulnerability

Important


Microsoft Office SharePoint

CVE-2026-26106

Microsoft SharePoint Server Remote Code Execution Vulnerability

Advertisement
Important


Microsoft Semantic Kernel Python SDK

CVE-2026-26030

GitHub: CVE-2026-26030 Microsoft Semantic Kernel InMemoryVectorStore filter functionality vulnerable

Important


Payment Orchestrator Service

Advertisement
CVE-2026-26125

Payment Orchestrator Service Elevation of Privilege Vulnerability

Critical


Push Message Routing Service

CVE-2026-24282

Advertisement
Push message Routing Service Elevation of Privilege Vulnerability

Important


Role: Windows Hyper-V

CVE-2026-25170

Windows Hyper-V Elevation of Privilege Vulnerability

Advertisement
Important


SQL Server

CVE-2026-21262

SQL Server Elevation of Privilege Vulnerability

Important


SQL Server

Advertisement
CVE-2026-26116

SQL Server Elevation of Privilege Vulnerability

Important


SQL Server

CVE-2026-26115

Advertisement
SQL Server Elevation of Privilege Vulnerability

Important


System Center Operations Manager

CVE-2026-20967

System Center Operations Manager (SCOM) Elevation of Privilege Vulnerability

Advertisement
Important


Windows Accessibility Infrastructure (ATBroker.exe)

CVE-2026-25186

Windows Accessibility Infrastructure (ATBroker.exe) Information Disclosure Vulnerability

Important


Windows Accessibility Infrastructure (ATBroker.exe)

Advertisement
CVE-2026-24291

Windows Accessibility Infrastructure (ATBroker.exe) Elevation of Privilege Vulnerability

Important


Windows Ancillary Function Driver for WinSock

CVE-2026-25179

Advertisement
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Important


Windows Ancillary Function Driver for WinSock

CVE-2026-24293

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Advertisement
Important


Windows Ancillary Function Driver for WinSock

CVE-2026-25176

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Important


Windows Ancillary Function Driver for WinSock

Advertisement
CVE-2026-25178

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Important


Windows App Installer

CVE-2026-23656

Advertisement
Windows App Installer Spoofing Vulnerability

Important


Windows Authentication Methods

CVE-2026-25171

Windows Authentication Elevation of Privilege Vulnerability

Advertisement
Important


Windows Bluetooth RFCOM Protocol Driver

CVE-2026-23671

Windows Bluetooth RFCOM Protocol Driver Elevation of Privilege Vulnerability

Important


Windows Device Association Service

Advertisement
CVE-2026-24296

Windows Device Association Service Elevation of Privilege Vulnerability

Important


Windows Device Association Service

CVE-2026-24295

Advertisement
Windows Device Association Service Elevation of Privilege Vulnerability

Important


Windows DWM Core Library

CVE-2026-25189

Windows DWM Core Library Elevation of Privilege Vulnerability

Advertisement
Important


Windows Extensible File Allocation

CVE-2026-25174

Windows Extensible File Allocation Table Elevation of Privilege Vulnerability

Important


Windows File Server

Advertisement
CVE-2026-24283

Multiple UNC Provider Kernel Driver Elevation of Privilege Vulnerability

Important


Windows GDI

CVE-2026-25190

Advertisement
GDI Remote Code Execution Vulnerability

Important


Windows GDI+

CVE-2026-25181

GDI+ Information Disclosure Vulnerability

Advertisement
Important


Windows Kerberos

CVE-2026-24297

Windows Kerberos Security Feature Bypass Vulnerability

Important


Windows Kernel

Advertisement
CVE-2026-26132

Windows Kernel Elevation of Privilege Vulnerability

Important


Windows Kernel

CVE-2026-24289

Advertisement
Windows Kernel Elevation of Privilege Vulnerability

Important


Windows Kernel

CVE-2026-24287

Windows Kernel Elevation of Privilege Vulnerability

Advertisement
Important


Windows MapUrlToZone

CVE-2026-23674

MapUrlToZone Security Feature Bypass Vulnerability

Important


Windows Mobile Broadband

Advertisement
CVE-2026-24288

Windows Mobile Broadband Driver Remote Code Execution Vulnerability

Important


Windows NTFS

CVE-2026-25175

Advertisement
Windows NTFS Elevation of Privilege Vulnerability

Important


Windows Performance Counters

CVE-2026-25165

Performance Counters for Windows Elevation of Privilege Vulnerability

Advertisement
Important


Windows Print Spooler Components

CVE-2026-23669

Windows Print Spooler Remote Code Execution Vulnerability

Important


Windows Projected File System

Advertisement
CVE-2026-24290

Windows Projected File System Elevation of Privilege Vulnerability

Important


Windows Resilient File System (ReFS)

CVE-2026-23673

Advertisement
Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability

Important


Windows Routing and Remote Access Service (RRAS)

CVE-2026-26111

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

Advertisement
Important


Windows Routing and Remote Access Service (RRAS)

CVE-2026-25173

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

Important


Windows Routing and Remote Access Service (RRAS)

Advertisement
CVE-2026-25172

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

Important


Windows Shell Link Processing

CVE-2026-25185

Advertisement
Windows Shell Link Processing Spoofing Vulnerability

Important


Windows SMB Server

CVE-2026-26128

Windows SMB Server Elevation of Privilege Vulnerability

Advertisement
Important


Windows SMB Server

CVE-2026-24294

Windows SMB Server Elevation of Privilege Vulnerability

Important


Windows System Image Manager

Advertisement
CVE-2026-25166

Windows System Image Manager Assessment and Deployment Kit (ADK) Remote Code Execution Vulnerability

Important


Windows Telephony Service

CVE-2026-25188

Advertisement
Windows Telephony Service Elevation of Privilege Vulnerability

Important


Windows Universal Disk Format File System Driver (UDFS)

CVE-2026-23672

Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege Vulnerability

Advertisement
Important


Windows Win32K

CVE-2026-24285

Win32k Elevation of Privilege Vulnerability

Important


Winlogon

Advertisement
CVE-2026-25187

Winlogon Elevation of Privilege Vulnerability

Important


Source link

Advertisement
Continue Reading

Tech

Tech worker confidence falls faster than any other industry, survey finds

Published

on


Glassdoor’s Employee Confidence Index surveys US workers to discover how many feel positive about their companies’ six-month outlooks.
Read Entire Article
Source link

Continue Reading

Tech

New ‘Zombie ZIP’ technique lets malware slip past security tools

Published

on

New 'Zombie ZIP' technique lets malware slip past security tools

A new technique dubbed “Zombie ZIP” helps conceal payloads in compressed files specially created to avoid detection from security solutions such as antivirus and endpoint detection and response (EDR) products.

Trying to extract the files with standard utilities like WinRAR or 7-Zip results in errors or corrupted data. The technique works by manipulating ZIP headers to trick parsing engines into treating compressed data as uncompressed.

Instead of flagging the archive as potentially dangerous, security tools trust the header and scan the file as if it were a copy of the original in a ZIP container.

The “Zombie ZIP” technique was devised by Bombadil Systems security researcher Chris Aziz, who found that it works against 50 of the 51 AV engines on VirusTotal.

Advertisement

“AV engines trust the ZIP Method field. When Method=0 (STORED), they scan the data as raw uncompressed bytes. But the data is actually DEFLATE compressed – so the scanner sees compressed noise and finds no signatures,” the researcher explains.

A threat actor can create a loader that ignores the header and treats the archive for what it is: data compressed using the standard Deflate algorithm used in modern ZIP files.

The researcher has published a proof-of-concept (PoC) on GitHub, sharing sample archives and additional details on how the method works.

To cause popular extraction tools (e.g., 7-Zip, unzip, WinRAR) to generate an error, the researcher says that the CRC value that ensures data integrity has to be set to the uncompressed payload’s checksum.

Advertisement

“However, a purpose-built loader that ignores the declared method and decompresses as DEFLATE recovers the payload perfectly,” Aziz says.

Yesterday, the CERT Coordination Center (CERT/CC) published a bulletin to warn about “Zombie ZIP” and raise awareness of the risks posed by malformed archive files.

While a malformed header may trick security solutions, the agency says that some extraction tools are still able to correctly decompress the ZIP archive.

The CVE-2026-0866 identifier has been assigned for the security issue, which the agency says is similar to a vulnerability disclosed more than two decades ago, CVE-2004-0935, affecting an early version of the ESET antivirus product.

Advertisement

CERT/CC proposes that security tool vendors must validate compression method fields against actual data, add mechanisms to detect inconsistencies in archive structure, and implement more aggressive archive inspection modes.

Users should treat archive files with caution, especially those from unknown contacts, and delete them immediately if their attempts to decompress them end with an “unsupported method” error.

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

Source link

Advertisement
Continue Reading

Tech

Viral platform for AI agents only Moltbook acquired by Meta

Published

on

Moltbook, the platform designed for AI agents only, has been snapped up by social media giant Meta for an undisclosed sum.

Moltbook has been drawing both affection and disquiet in equal measure since the human-free platform where AI agents can ‘talk’ to each other launched back in January. Now social media giant and Facebook owner Meta has decided to add it to its stable of AI purchases, having picked up Manus back in January for a cool $2bn. Financial details have not been disclosed for this latest deal.

The news comes just weeks after Open AI poached the man behind the technology used by Moltbook – OpenClaw.  OpenAI said at the time it was hiring OpenClaw founder Peter Steinberger to develop the “next generation of personal agents”. In a post on X announcing the addition, OpenAI CEO Sam Altman said that personal agents will fast become one of the company’s core offerings.

Advertisement

OpenClaw, formerly known as Clawd (a pun that drew legal letters from Anthropic) is an open source project that lets users create personal AI agents, and quickly went viral on launchin November last year. It was also called ‘MoltBot’ for a time, before Steinberger landed on its final name.

Then Moltbook launched in January, using OpenClaw technology. Moltbook is a Reddit-style social media network where only AI agents could post, and humans could “observe”. The results could be, as one might imagine, concurrently entertaining and disturbing.

The site quickly went viral with AI agents, including many from OpenClaw, creating a new religion called ‘Crustafarianism’, among other things. Moltbook founders Matt Schlicht and Ben Parr will now join Meta’s Superintelligence Labs (MSL), the unit run by former Scale AI CEO Alexandr Wang. Meta paid a whopping $14.3bn for Scale AI back in June 2025, as it vies to compete with the likes of OpenAI and Google in the battle for AI consumers.

The Meta acquisition was originally broken by Ina Fried at Axios, to whom Meta confirmed: “The Moltbook team joining MSL opens up new ways for AI agents to work for people and businesses.” Siliconrepublic.com has reached out to Meta for comment.

Advertisement

Don’t miss out on the knowledge you need to succeed. Sign up for the Daily Brief, Silicon Republic’s digest of need-to-know sci-tech news.

Source link

Advertisement
Continue Reading

Tech

Amazon wins a temporary injunction against Perplexity’s Comet browser

Published

on

Amazon has secured a temporary win in its fight with Perplexity over the use of AI shopping bots. Bloomberg reported that a San Francisco federal court has determined that Perplexity must stop using its Comet web browser’s AI agent to make purchases for users on Amazon’s marketplace. The AI company will have a week to appeal the decision, otherwise it has been ordered to stop accessing any password-protected areas of Amazon’s systems and destroy its copies of Amazon’s data while the two companies continue to argue their cases.

“Amazon has provided strong evidence that Perplexity, through its Comet browser, accesses with the Amazon user’s permission but without authorization by Amazon, the user’s password-protected account,” District Judge Maxine Chesney wrote in placing the temporary block.

“The preliminary injunction will prevent Perplexity’s unauthorized access to the Amazon store and is an important step in maintaining a trusted shopping experience for Amazon customers,” an Amazon spokesperson told Bloomberg.

Amazon sent a cease-and-desist letter to Perplexity over the AI company’s shopping bots in November. According to Amazon, use of the Comet agent to make purchases is a violation of its terms of service. “Perplexity will continue to fight for the right of internet users to choose whatever AI they want,” a representative from Perplexity said of this week’s decision.

Advertisement

Source link

Continue Reading

Tech

Save big on these Botslab dash cams during Spring Deal Days

Published

on

Dash cams have become one of the most sensible additions you can make to a car, and Botslab has spent the past few years building a range that punches well above its weight on resolution, sensors and software.

Spring Deal Days has brought three of the brand’s strongest models down to their lowest prices yet, covering everything from a compact dual-camera setup to a full four-channel system that watches every angle simultaneously.

BOTSLAB G300H Plus 4K Dual Dash Cam

The G300H Plus is the entry point here, but the STARVIS 2 sensor it runs on is anything but entry-level, delivering double the low-light sensitivity and colour accuracy of the standard STARVIS chip found in most cameras at this price. That means you’ll get better footage from wet nights and unlit roads from most cameras around the £80 mark.

Built-in GPS logs your speed, route, and location into every clip, the 5GHz Wi-Fi transfers footage to the Botslab app in seconds. There’s also voice commands, which let you snap a photo or start recording without lifting your hands from the wheel.

Advertisement

And now, thanks to the Spring Deal Days, you can pick the G300H up for just £89.98 – down from £119.99.

Advertisement

Save 25% on Botslab’s 4K Dual DashcamSave 25% on Botslab’s 4K Dual Dashcam

The BOTSLAB G300H Plus 4K Dual Dash Cam is now jst £89.98 during Amazon’s Spring Deal Days

View Deal

BOTSLAB 4K Front and 2K Rear Dual Dash Cam

This model steps things up by pairing a 4K front camera with a dedicated 2K rear unit, so you get sharp coverage of what is happening both in front and behind the car, with a six-layer F1.5 aperture lens that pulls in enough light to capture license plates clearly at 15 metres.

Advertisement

It’s also the only camera in this roundup with a full ADAS suite, adding lane departure warnings, forward collision alerts, close-following reminders, and a two-hour fatigue prompt that nudges you to pull over and rest.

The super capacitor design also means it handles extreme temperatures in both the winter and summer.

The camera is currently down to £89.98 in the sale, down from £129.99.

Save £50 on the BOTSLAB 4K Front and 2K Rear Dual Dash CamSave £50 on the BOTSLAB 4K Front and 2K Rear Dual Dash Cam

Save £50 on the BOTSLAB 4K Front and 2K Rear Dual Dash Cam

View Deal

Advertisement

Advertisement

BOTSLAB G980H 3K Four-Channel Dash Cam

The G980H is the most comprehensive of the three dash cams, running four 3k cameras simultaneously to cover 560 degrees.

Its Sentry parking mode goes further than most – triggering the moment someone edges close to the car rather than waiting for an impact. It also pre-records and stores eight seconds of footage before a G-sensor event fires, giving you the full picture of any incident rather than just the aftermath.

And with wa 128GB card included, you can get the camera up and running without any additional costs.

Advertisement

The G980H is available for £179.99, down from £219.99.

Botslab’s 4 channel Dash Cam is now under £200Botslab’s 4 channel Dash Cam is now under £200

Save 18% on a BOTSLAB G980H 3K Four-Channel Dash Cam during Amazon’s Spring Deal Days

View Deal

All three cameras are discounted until March 16, so you’ll need to be quick to pick one up in the sale.

Advertisement

Advertisement

Source link

Continue Reading

Tech

Record number of women founders raising funds, but deal size is down

Published

on

The report shows that women in Ireland, raising funds, have outshined their European peers.

TechIreland, the all-island portal that showcases start-ups and the Irish innovation landscape, has released the Female Founder Funding Review 2026, which tracks investment into women-founded startups throughout 2025. 

The report shows that last year, 82 Irish start-ups being led by women raised a total of €131m, which was recorded as the highest number of women-led start-ups funded in any given year. For comparison in 2025 there were 36 organisations that raised between €0.1m and €0.3m but only eight in 2024. 11 companies raised €18.7m. 

Despite this positive figure however, the average deal size was shown to have significantly declined. In 2024, the average raise was €3.9m, dropping to €2.3m in 2025, with the report suggesting that this is as a result of an increase in the volume of deals being made.  

Advertisement

The median figure also dropped to just €100k last year, compared to €1.5m in 2024, indicating that the divide between the smaller group of large rounds and the large number of very small rounds is widening. The report does say however, that even in this landscape Irish female founders are outshining their European peers in the raising of early-stage funding. 

“While the Dealroom startup ecosystems portal shows a decline in the number of early-stage rounds for women founded start-ups, the trend in Ireland represents a nearly two-fold increase in the number of rounds raised by women founded start-ups last year. Thanks to the heavy lifting by Enterprise Ireland through their focused support for women entrepreneurs.”

TechIreland’s research suggested that angel networks, for example HBAN and AwakenAngels, as well as early-stage accelerator programmes such as Fierce and NextWave, alongside flagship supports such as Enterprise Ireland’s PSSF and HPSU, play a critical role in building a strong platform for women founders.

The report also highlights a key sectoral influence. Funding into the life sciences and healthcare sectors made up almost 70pc of the total funds raised. This was mirrored in wider Europe where health remains a top sector among female founders. 

Advertisement

The enterprise software sector also performed well, growing from €10.7m raised by 10 start-ups in 2024, to €30.7m raised by 22 companies in 2025. Other sectors experiencing growth included the agri/food space, consumer and e-commerce, while cleantech and fintech continue to decline.  

Funding was also disproportionate regionally. Similar to previous years, companies in  Dublin dominated the overall figures. More than 90pc of all funding into start-ups established by women took place at Dublin locations. The report attributed this to the fact that ProVerum, which accounted for nearly half of all funding raised, is a company based in Dublin. 

Commenting on the findings of the report, the chair of TechIreland, Brian Caulfield said, “2025 was an interesting year for female founders from a fundraising perspective. On the face of it, the numbers held up pretty well. 

“While it’s encouraging to see so many female founded companies raising capital, it’s a concern that the market has bifurcated, a very small number of companies raising large rounds, and a very large number of companies raising very small rounds, largely led by Enterprise Ireland. The mid-market of seed and Series A raises is being hollowed out.”

Advertisement

Sarah Walker, who oversees startups and entrepreneurship at Enterprise Ireland said, “The headline TechIreland figure, 82 companies raising in 2025, is almost double last year and the highest level of activity since 2017 which is cause for celebration. 

“While the increased number of women led and co-founded companies raising is encouraging, TechIreland reports total funding levels of €131m in 2025, down from €145m in 2024, reflecting a challenging funding environment.”

Lorraine Curham, the founder of Fierce added, “For Ireland, the next challenge is what comes after that first cheque. In more mature ecosystems, founders are supported not just by programmes, but by strong networks, investor relationships and ecosystem layers that help companies move from early traction into follow-on capital and scale. Ireland has the pipeline. What it needs next is the infrastructure layer to scale it.”

Don’t miss out on the knowledge you need to succeed. Sign up for the Daily Brief, Silicon Republic’s digest of need-to-know sci-tech news.

Advertisement

Source link

Continue Reading

Tech

Calculator Case To Scratch-Built Pocket E-Reader

Published

on

E-readers are an awesome creation allowing you to display digital information in a way that requires little battery life. While there’s plenty of very impressive models to chose from on the commercial market, it’s also possible to build one yourself — which is exactly what [kaos-69] did in his Mimisbrunnur project, creating a truly unique e-reader from scratch.

While looking through old junk at home, [kaos-69] came across a case that held a calculator and pen at one point in the distant past. The pen was gone and the calculator no longer functioned but the case held promise. He removed the calculator and got some parts on order. For the e-paper display he went with a 5.83-inch unit that just fit inside the spring-loaded case. The Mimisbrunnur is powered by a 2000 mAh LiPo battery, with a micro SD card reader for storing what will be displayed. The brains come from an RP2040 microcontroller on an Adafruit Feather breakout board, which worked out great as it already takes care of battery management and the 24-pin interface for the e-paper display.

There are also eight buttons that live below the display for user interface, and even some LEDs to aid in reading in the dark. The depth of the case allowed all this to be connected with the use of a perfboard and some risers to set the screen forward, allowing the battery to live behind it. Using the Mimisbrunnur is pretty straightforward with the eight buttons sitting below icons on the screen giving you clear guidance on how to turn the page, add a bookmark, or browse the SD card for another file to open.

Advertisement

We’ve seen some impressive DIY e-readers over the years, such as the dual-screen Diptyx and the Open Book. But this project is an excellent reminder that a device doesn’t have to be complex to get the job done.

Source link

Advertisement
Continue Reading

Tech

New BeatBanker Android malware poses as Starlink app to hijack devices

Published

on

New BeatBanker Android malware poses as Starlink app to hijack devices

A new Android malware named BeatBanker can hijack devices and tricks users into installing it by posing as a Starlink app on websites masquerading as the official Google Play Store.

The malware combines banking trojan functions with Monero mining, and can steal credentials, as well as tamper with cryptocurrency transactions.

Kaspersky researchers discovered BeatBanker in campaigns targeting users in Brazil. They also found that the most recent version of the malware deploys the commodity Android remote access trojan called BTMOB RAT, instead of the banking module.

BTMOB RAT provides operators with full device control, keylogging, screen recording, camera access, GPS tracking, and credential-capture capabilities.

Advertisement

Persistence via MP3

BeatBanker is distributed as an APK file that uses native libraries to decrypt and load hidden DEX code directly into memory, for evasion.

Before launching, it performs environment checks to ensure it’s not being analyzed. If passed, it displays a fake Play Store update screen to trick the victims into granting it permissions to install additional payloads.

The fake update message
The fake update message
Source: Kaspersky

To avoid triggering any alarms, BeatBanker delays malicious operations for a period after its installation.

According to Kaspersky, the malware has an unusual method to maintain persistence, which consists of continuously playing a nearly inaudible 5-second recording of Chinese speech from an MP3 file named output8.mp3.

“The KeepAliveServiceMediaPlayback component ensures continuous operation by initiating uninterrupted playback via MediaPlayer,” Kaspersky explains in a report today.

Advertisement

“It keeps the service active in the foreground using a notification and loads a small, continuous audio file. This constant activity prevents the system from suspending or terminating the process due to inactivity.”

Stealthy cryptocurrency mining

BeatBanker uses a modified XMRig miner version 6.17.0, compiled for ARM devices, to mine Monero on Android devices. XMRig connects to attacker-controlled mining pools using encrypted TLS connections, and falls back to a proxy if the primary address fails.

Miner deployment process
Miner deployment process
Source: Kaspersky

The miner can be dynamically started or stopped based on device conditions, which the operators closely monitor to ensure optimal operation and maintain stealth.

Using Firebase Cloud Messaging (FCM), the malware continuously sends the command-and-control (C2) server information about the device’s battery level and temperature, charging status, usage activity, and whether it has overheated.

By stopping mining when the device is in use and by limiting its physical impact, the malware can remain hidden for a longer period, mining for cryptocurrency when conditions allow it.

Advertisement

While Kaspersky observed all BeatBanker infections in Brazil, the malware could expand to other countries if proven effective, so vigilance and good security practices are recommended.

Android users shouldn’t side-load APKs from outside the official Google Play store unless they trust the publisher/distributor, should review granted permissions for risky ones that aren’t relevant to the app’s functionality, and perform regular Play Protect scans.

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

Source link

Advertisement
Continue Reading

Trending

Copyright © 2025