Connect with us
DAPA Banner
DAPA Coin
DAPA
COIN PAYMENT ASSET
PRIVACY · BLOCKDAG · HOMOMORPHIC ENCRYPTION · RUST
ElGamal Encrypted MINE DAPA
🚫 GENESIS SOLD OUT
DAPAPAY COMING

Tech

Kaspersky warns that passwords hashed with MD5 algorithm can be cracked in minutes using a GPU

Published

on


Just in time for World Password Day, Kaspersky is reminding everyone that outdated hashing algorithms such as MD5 remain among the worst choices for storing passwords. In a recent post, the security firm revisited a 2024 study examining the “crackability” of real-world passwords. The conclusion is not surprising: password cracking…
Read Entire Article
Source link

Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Tech

FlexiSpot C7 Morpher office chair review

Published

on

Why you can trust TechRadar


We spend hours testing every product or service we review, so you can be sure you’re buying the best. Find out more about how we test.

FlexiSpot continues to shine with great options across a wide range of pricing tiers, making it a bit difficult to pin down a higher-priced offering or a budget option.

The C7 Morpher leans towards the higher end of mid-tier – expect to pay around $800 / £800 when not on sale. It’s a nice enough ergonomic office chair, but it blends in a bit more than some of the best office chairs I’ve reviewed at this price, looking not too dissimilar from other ‘serious’ and ‘professional’ seats.

Advertisement

Source link

Continue Reading

Tech

Department Of War Sets Up UFO Website, But There Isn’t Much To See

Published

on





The Department of War has announced that it’s published “never-before-seen files” of unidentified anomalous phenomena (UAP) on a new government webpage, and plans to add material on a “rolling basis.” Some Pentagon UAP footage was declassified during President Donald Trump’s first term, but this new page appears to be the results of a February Truth Social post from Trump calling on the DOW and related agencies “to begin the process of identifying and releasing Government files related to alien and extraterrestrial life, unidentified aerial phenomena (UAP), and unidentified flying objects (UFOs).”

The webpage — war.gov/UFO — includes a carousel of images and files from the DOW, FBI, NASA and more, presented in a way that seems to intentionally lean into the conspiratorial nature of UFO fandom in general. You don’t have to spend long clicking through images and downloading PDFs to realize that there’s not much in the way of actual evidence of aliens, though. Whether or not the files are supposed to direct attention away from the other flailing projects of the second Trump administration — a disastrous war with Iran, for example — they’re much more interesting as an example of how a bureaucracy processes and catalogs unexplained phenomena than as a smoking gun that proves extraterrestrials have visited Earth.

Advertisement

Suspicion that the US government knows more about unidentified anomalous phenomena (the term that replaced unidentified aerial phenomena and UFOs) than it’s letting on has been around for decades, but confirmation of formal research into the subject wasn’t made official until the Advanced Aerospace Threat Identification Program (AATIP) was revealed in 2017. AATIP was formed in 2007 to study UAP and later disbanded in 2012, but its work has been carried on by other government groups and task forces, most recently the All-domain Anomaly Resolution Office, an organization currently working inside the DOW that contributed to this new release of files.

The videos of UAP shared during the first Trump administration were unexplained, but ruled by a government report to not be an alien spacecraft. It’s not clear new files released by the DOW will change anything, but they do make for an interesting curio at the very least.

Advertisement



Source link

Continue Reading

Tech

Apple has brought Trump-backed Intel on board for future chips

Published

on

Intel could soon be making Apple’s chips. Image credit: Intel

Apple has reportedly reached a preliminary agreement that will see Intel become a chipmaking partner, helping reduce the company’s reliance on TSMC for Mac chips and more.

Reports had earlier suggested that the two companies were discussing a deal that would help Apple diversify its supply chain. Now, the pair are closer than ever to manufacturing some of Apple’s chips in the United States.

According to a report Wall Street Journal on Friday, the two companies have been in discussions about the project for more than a year. Significant progress has been made in recent months, however.

Advertisement

It’s currently unclear which Apple devices Intel will produce chips for, however. A report from late 2025 suggested that Apple intended for Intel to produce M-series chips destined for the Mac and iPad lineups.

Trump steps in

The WSJ report notes that Apple’s decision to use Intel comes after President Trump personally advocated for the move. Trump has pushed for more U.S.-based manufacturing of Apple components, and the company has pledged to spend $400 million to make that happen.

The U.S. government previously signed a deal to effectively buy a $9 billion, 10% stake in Intel. Since then, it’s been keen for companies to use Intel wherever possible.

Apple joins Nvidia in giving Intel new business. Nvidia invested $5 billion in Intel in September 2025, with the latter building custom data center CPUs.

Advertisement

Apple currently relies heavily on TSMC to produce the chips for its iPhones, iPads, Macs, Apple Watches, and more. However, manufacturing capacity and Apple’s reliance on a single chipmaker has caused issues of late.

Apple was caught flat-footed by the popularity of the MacBook Neo. A recent boom in Mac mini and Mac Studio popularity has also seen both products become increasingly difficult to buy.

As demand for high-performance chips continues to grow, deals like the one Apple appears to be signing with Intel become increasingly important. As the AI boom requires more silicon than ever, having two companies producing your chips is surely better than one.

Even before Trump’s push to bring manufacturing to the U.S., Apple was aware of its need to divest its supply chain. As far back as the COVID pandemic, Apple found it relied too heavily on Chinese plants.

Advertisement

Since then, Apple has moved more and more manufacturing to other countries, reducing its reliance on China. Both India and Vietnam have been beneficiaries to date, with the U.S. following suit.

Source link

Advertisement
Continue Reading

Tech

Why More Analysts Won’t Solve Your SOC’s Alert Problem

Published

on

AI Robots

By Rich Perkins, Principal Sales Engineer, Prophet Security

Your security spend has roughly doubled in six years. Your time-to-investigate and respond hasn’t moved. Your CFO is asking why the security headcount keeps growing while the metrics that matter to the business don’t.

The architecture under your SOC is the reason. Not your team. Not your tooling investment. Not your hiring funnel. The operating model your program inherited assumed human-driven alert triage at the volume the business was producing five years ago, and the business stopped producing alerts at that volume a long time ago.

This is a piece about why hiring more analysts won’t close the gap, what changes when you fix the model instead, and the specific limitations and questions that should shape any AI SOC evaluation. It includes a four-question diagnostic you can run on your own program in the time it takes to finish a coffee.

Advertisement

The math the industry doesn’t want to admit

Google Mandiant’s recent M-Trends reporting puts global median dwell time at 14 days. The same report found that in 2025 the “hand-off” window between initial access and subsequent transfer to secondary threat group collapsed to just 22 seconds, a 95% drop from the 8 hours from 2022. Crowdstrike’s 2026 Global Threat report uncovered similar trends, with the average breakout time falling to 29 minutes, from initial access to exfiltration. 

IBM’s most recent Cost of a Data Breach research puts the average time to identify and contain a breach in 2025 at 241 days, with an average cost of $4.88 million. That’s a drop of 16% from 2020, when the time to identify and contain a breach stood at 281 days. Those numbers have not improved at the pace security spending would suggest, despite that spending having roughly doubled in five years, nor have they kept up with the shorter “breakout” or “hand-off” window

This isn’t framed to scare defenders into chasing the next hype. It’s the operating reality. Money in, complexity in, but the curve from detection to investigation and containment barely moves.

SOC teams have already done the obvious efficiency moves. They tier severity. They auto-close known-benign alert classes. They suppress noisy detection rules. They tune. They route. That’s not the problem.

Advertisement

The problem is that even after all of that work, the volume that lands on humans for actual investigation still exceeds what humans can investigate at the depth required. We’ve written an entire ebook on how the SOC queue is the breach, which you can download here.

In the deployments I’ve worked across, the post-tiering volume that hits human triage typically lands in the 120 to 150 alerts per day range. At 20 minutes per investigation including documentation, that’s 40 to 50 analyst-hours daily. SOC teams of 5 to 10 analysts can cover the top of that range during business hours, leaving the rest of the queue for the next shift, the next day, or never.

That’s the gap that doesn’t close with more headcount. You can’t hire enough analysts to investigate 100% of post-tiering volume at the depth the work requires. You can hire your way to better coverage at the margins. You cannot hire your way to the model change.

Most breaches don’t trigger a high severity alert. Instead the first signs appear in a low severity alert that gets buried in a queue no human can clear.

Advertisement

This ebook from Prophet Security breaks down why the alert backlog is the actual attack surface, and what changes when AI investigates every alert.

Download the Ebook

A diagnostic you can run on your own SOC

Before going further, run these four questions on your program. Honestly. The answers map your SOC capacity blind spots more reliably than any vendor pitch will.

1. What percentage of alerts above your defined investigation threshold did your team actually investigate last quarter? If less than 90%, you have a coverage gap that’s hiding real risk. The gap exists because of how the work flows, not because anyone is dropping the ball. More headcount won’t close it.

2. How many detection rules has your team suppressed in the last 12 months without an engineering ticket to replace the coverage? Suppressing noisy rules is healthy tuning. Suppressing them without follow-up engineering to replace what they were watching is debt. Each undocumented suppression is an attack surface you’ve stopped watching, and the threats those rules were designed to catch don’t go away because you disabled them.

Advertisement

3. What was your senior analyst turnover last year, and how long did each replacement take to reach productive contribution? If turnover exceeds 15% or ramp exceeds 6 months, your bench is fragile. You’re one resignation away from operational impact. Tribal knowledge walking out the door is a single point of failure most programs don’t have a remediation plan for.

4. If alert volume doubled tomorrow, what’s the first thing your team would stop doing? The honest answer is the part of your program that’s already underwater. Whatever you’d cut first is what’s currently holding on by a thread. That’s where to focus the operating model conversation.

If three or more of these answers concern you, the productive conversation moves past hiring and into a different question: whether the architecture under your team can carry the program you actually want to run.

What changes when the model fixes

The teams making real progress aren’t the ones hiring more analysts. They’re the ones changing what work humans are required to do at all.

Advertisement

JB Poindexter & Co, an 8,500-employee diversified manufacturer, deployed Prophet AI in 2025. In the first 60 days, they ran 4,407 investigations through the platform with a mean time to investigate under 4 minutes.

That’s 73 investigations per day at depth, against a Mandiant industry median dwell time measured in days. The deployment returned roughly 1,469 hours of analyst time to their team, equivalent to 6.3 analyst-years of investigation capacity at full annualization.

Their CISO, John Barrow, framed the outcome as “faster, more focused, and able to scale without adding immediate headcount.”

The operating model shift in that sentence is what matters. Not “we hired more people.” Not “we worked our existing people harder.” The work no longer required the same number of people.

Advertisement

SOC AI human

Cabinetworks ran 3,200 alerts through Prophet AI in 33 days. Six escalated to a human. The unexpected outcome was a 90% reduction in SIEM costs, primarily from no longer needing to ingest and store raw EDR and identity telemetry that had been pulled into the SIEM purely for analyst pivot queries.

When the AI handles those pivots directly against source systems, that ingest tier becomes optional. The line item that gets cut isn’t the obvious one, and most teams don’t model that secondary saving when they evaluate AI SOC tools. They should. For programs running enterprise SIEM contracts in the seven-figure range, the secondary savings often exceed the cost of the AI platform itself.

A second outcome worth noting: when the queue clears, teams stop having to ignore low and medium severity alerts. Most SOCs quietly stop investigating those classes under capacity pressure, even when their security leadership knows the coverage gap matters. A medium-severity alert isn’t risky because it’s medium.

It’s risky because that’s where real attackers hide while your team is buried in critical-severity noise. Bringing the medium and low tiers back into investigation scope is the coverage shift most teams want and very few can resource.

Advertisement

Every deployment requires two to four weeks of focused tuning before reaching steady state.

How CISOs are funding this

The piece a CISO is mentally writing while reading vendor content is the budget request. Where does this money come from?

Three patterns I’ve seen work, in order of CISO political difficulty.

Path one: Unapproved headcount budget. The cleanest funding path. The team has approved or pending headcount the program hasn’t filled, and the AI platform replaces the need to hire that role. Fully loaded cost for a Tier 2 analyst typically runs $180K to $300K depending on market and seniority, which sets the floor for what the AI platform needs to displace to make the math work.

Advertisement

The JB Poindexter pattern fits here. The “scaling without adding immediate headcount” framing is procurement language for “this is what we’re doing instead of approving the next hire.”

Path two: SIEM cost reduction. If your team is using the SIEM as an investigation pivot workspace (raw EDR telemetry, identity logs, network data), and the AI platform takes over those pivots, the SIEM ingest and storage tier becomes optional.

The Cabinetworks pattern. SIEM ingest savings depend heavily on volume but commonly run 30 to 60 percent of total SIEM spend when investigation telemetry is the main driver.

For programs running mid-six-figure or seven-figure SIEM contracts, this funding path can fully cover the AI platform with savings left over. Get your SIEM renewal cycle date before you start the evaluation, because the timing matters.

Advertisement

Path three: Tool displacement. The hardest political fight. Replacing an existing SOAR, an existing case management workflow, or an existing managed service. The savings vary too widely to generalize, but the displacement creates internal opposition from whoever owns the displaced tool. Plan for it as a 6-month change management project, not a procurement decision.

Most programs end up funding through a combination of paths one and two. Path three is a year-two conversation, not a year-one one.

Where humans still need to lead

I’m pro AI SOC. I work for one. So when I tell you where it isn’t the right tool, take it seriously. Three categories where I’d recommend keeping humans in the lead.

Insider threat investigations where the signal lives in human context, not logs. AI does fine on the DLP-shaped insider threat work where the signal is in telemetry: unusual file movement, exfil to personal cloud, after-hours pulls of sensitive repos. Where it struggles is the harder subset where the deciding signal isn’t in any log.

Advertisement

The PIP that started Monday. The conversation a manager had two weeks ago. The contractor whose contract ends Friday. AI doesn’t have that context. Your humans do.

The right design splits the work cleanly: AI handles the telemetry layer, your team handles the human-context layer. Asking one tool to do both is where these investigations break down.

Novel TTPs with no analog in training data. AI investigation is fundamentally pattern-matching over historical examples. By definition, that’s weakest on attacks that don’t look like anything you’ve seen. Your senior threat hunters earn their keep on the alerts that don’t match anything in the catalog. Don’t outsource that work.

Highly regulated environments where data residency rules dictate where alert telemetry can live. If your compliance posture won’t let metadata leave a specific cloud or country, most AI SOC platforms (Prophet AI included) require real architecture work to fit. Some can’t fit at all. Don’t let any vendor wave that concern away with a slide.

Advertisement

If you’re evaluating an AI SOC tool, ask the vendor exactly where their tool fails. If they don’t have an answer ready, that’s the answer.

Three questions buyers always ask

Three questions come up in almost every evaluation, and they deserve direct answers.

What happens when the AI gets it wrong? Prophet AI documents every step of every investigation. Every question asked, every query run, every piece of evidence pulled, the reasoning that led to the verdict. When a verdict is wrong, the chain of reasoning shows exactly where it went wrong, and your team can encode the correction back into Guidance so the same mistake doesn’t repeat.

That’s a different audit trail than the three-sentence case notes most analysts write under queue pressure today, and it matters more than vendor content typically acknowledges.

Advertisement

Regulators are starting to ask about AI-driven security decisions. Boards are asking about defensible documentation of what the SOC investigated and why. Post-incident reviews are easier to run when the evidence chain is complete by default. The audit trail isn’t a feature. It’s how you keep your seat at the table when the auditor or the board comes asking.

What happens to detection engineering? This is the question senior practitioners ask first, and it’s the right question. You might worry that if AI handles investigation, your team loses the natural feedback loop where analysts catch and tune noisy detections. The honest answer: that work moves explicitly upstream.

Instead of relying on manual triage to spot noise, detecting engineering now use the AI’s comprehensive investigation data as a massive feedback loop, shifting the focus from suppressing alerts to equipping the AI with better context.. 

To make that upstream work happen, detection engineering shifts from an emergent activity squeezed between alerts to a scheduled discipline owned by the senior analysts whose triage time the AI has freed up. Teams that fail to operationalize that shift see detection quality drift over time. Teams that operationalize it well see detection quality improve, because the engineering happens with intention and dedicated focus.

Advertisement

What does the buying committee look like? AI SOC platforms touch security operations, but the procurement conversation often pulls in IT (for integrations and identity), compliance (for data handling and audit posture), legal (for the data processing agreement and AI-specific contractual terms), and procurement (for vendor risk review).

Plan for that early. Programs that try to push AI SOC through as a security-team decision often hit a six-week delay when compliance discovers the data flow questions in week four. Programs that bring compliance and legal in at the start of the evaluation typically close in half the time.

The vendor-risk question worth asking

One question vendor content almost never addresses directly, and CISOs care about it more than vendors realize: what happens to your program if the AI SOC vendor gets acquired, pivots, or fails? Three-year procurement cycles outlast a lot of vendor strategies.

Three things worth confirming with any AI SOC vendor before signing.

Advertisement

First, data portability: can you export your investigation history, Guidance configurations, and detection logic in a format that survives a vendor change?

Second, runbook independence: are the human-readable Guidance rules you encoded specific to this vendor, or do they document SOC logic your team could rebuild elsewhere?

Third, contractual continuity: what happens to service obligations, data handling, and support during an acquisition or wind-down event?

The third tends to separate the serious vendors from the rest. Most can answer the first two. Few have a clean answer to the third without significant pre-work, which is itself a signal worth noting during evaluation.

Advertisement

Closing thought

Prophet Security’s agentic AI SOC platform operationalizes expert analyst techniques at machine speed across all alert volumes, regardless of severity, to ensure a consistently clear triage queue and preemptively neutralize threats.

If your honest answers to the four diagnostic questions earlier in this piece concerned you, the next conversation isn’t whether AI SOC is the answer. It’s what your senior analysts would actually do with their Tuesday mornings if the triage queue weren’t running them.

That’s the operating model question. Whether you solve it with Prophet Security or someone else, the architecture is what needs to change. Hiring more analysts to triage at machine-generated volume is a strategy that worked in 2018. The math hasn’t worked since 2022. 

The teams that change the architecture will get a different conversation with their board next year. The teams that don’t will get the same one they had last year, with a slightly higher number on the spend line and the same number on the time-to-detect line.

Advertisement

Pick the conversation you want to be having.

If your SOC is dealing with alert overload or long investigation times, we’d be happy to show you what Prophet AI looks like in practice. Request a demo or reach out directly to learn more.


Rich Perkins is a Principal Sales Engineer at Prophet Security. Reach him at rich.perkins@prophetsecurity.ai or connect on LinkedIn.

Sponsored and written by Prophet Security.

Advertisement

Source link

Continue Reading

Tech

Prime Video Is Adding A TikTok-Like Feed

Published

on





The people have spoken, and their message is clear: Rotating a phone into landscape is just too dang hard. Amazon is the latest company to adopt a TikTok-like vertical short-form video, in the form of Prime Video’s new Clips feature.

The short-form video feed is a new addition to Prime Video’s mobile home page. After launching as a preview feature for NBA highlights, Clips now includes “moments from movies and series across the Prime Video experience.” In other words, it’s a recommendation carousel… but vertical! You know, like your phone. 

Advertisement

When you tap on a clip, your device will enter full-screen mode, where you can swipe through other vertical videos. From each one, you’ll find options to watch the full content it’s advertising, rent or buy it, save it to a watchlist, “like,” share, and more.

The feature is rolling out now for “select customers” in the US on iOS, Android, and Fire devices. Amazon says it will be available to everyone (on those same platforms) this summer. In the meantime, try not to get too down over having to rotate your phone to watch trailers.

Advertisement



Source link

Continue Reading

Tech

The Nintendo Switch 2 is getting a $50 price hike in September

Published

on


In Canada, gamers will pay $679.99 for the Switch 2 and in Europe, it’s going up to €499.99. Nintendo’s home country of Japan isn’t excluded from the price hike – in fact, the situation is worse there as the original Switch, the Switch OLED, and the Switch Lite will also…
Read Entire Article
Source link

Continue Reading

Tech

iPhone 14 Won’t Turn On? 5 Fixes That Work (2026)

Published

on

If your iPhone 14 won’t turn on, the most likely cause is one of three things: the battery is completely drained, the device is frozen on a black screen due to a software glitch, or a charger or charging port issue is preventing it from powering up at all. As long as there is no physical drop damage or liquid exposure involved, you can almost certainly fix this yourself — no tools required.

These steps apply to iPhone 14, iPhone 14 Plus, iPhone 14 Pro, and iPhone 14 Pro Max. The hardware buttons and fix sequence are identical across all four models.

Quick Take: Start by charging for at least 30 minutes with a known-good cable before assuming something is wrong. If it still won’t respond, do a force restart — this fixes the majority of black screen and software freeze cases with no data loss. If neither works, move to Recovery Mode via a computer. Physical or liquid damage is the only scenario that requires a technician.

Before You Begin

Two things to check before touching any buttons. First, make sure you are not looking at a failed screen on a phone that is actually powered on — some iPhone 14 units show a completely black screen due to display failure while the phone itself is running normally. If you can hear a ring tone or vibration when someone calls, the phone is on and the screen is the issue, not the power. Second, if your iPhone was recently dropped in water or exposed to liquid, Apple’s official handling guidance is clear: do not attempt to charge or connect any accessory until the device is completely dry — wait at least 5 hours. Plugging in a wet iPhone can cause additional internal damage.

Advertisement

Step 1: Charge It for at Least 30 Minutes

iPhone 14 Lightning charging port and Apple USB-C cable

Use the cable that came with your iPhone, or an Apple-certified (MFi) cable and wall adapter — not a computer USB port, which often delivers inconsistent power. Plug it in and wait.

If the battery is deeply drained, the screen may stay completely black for the first 5–15 minutes. That is normal. After a few minutes, you should see either a red battery icon (very low charge) or the charging icon (battery outline with a lightning bolt). If you see the red icon, leave it charging for a full 30 minutes before attempting anything else. Do not interrupt the charge cycle by pressing buttons during this window.

If the screen shows nothing at all after 30 minutes — no charging icon, no response — move to Step 2.

Step 2: Force Restart Your iPhone 14

Animated demonstration of force restarting an iPhone 14

A force restart clears a software freeze or a stuck boot process without deleting any of your data. This is the most effective single fix for an iPhone 14 that shows a black screen or won’t respond. Apple’s official force restart instructions for all current iPhones are as follows:

  • Quickly press and release the Volume Up button.
  • Quickly press and release the Volume Down button.
  • Press and hold the Side button (the button on the right edge of the phone) until the Apple logo appears — then release.

The most common mistake here is releasing the Side button too early. When you press and hold it, you will first see a “slide to power off” prompt on screen. Do not release the button. Keep holding through the prompt. The screen will go black, and then the Apple logo will appear. This can take up to 20 seconds. Once the Apple logo shows, release the Side button and wait for the phone to finish booting.

If the first attempt does not work, try the sequence again two or three times before concluding it won’t work. The timing needs to be precise — the Volume Up and Volume Down presses need to be quick, not held.

Step 3: Inspect the Charger and Charging Port

If the phone responded to neither charging nor the force restart, the charger or port may be the problem. Check the cable for visible fraying or damage, and try a different wall adapter if you have one available.

Advertisement

For the charging port itself, shine a flashlight into it and look for compacted lint or debris — this is a surprisingly common cause of charging failure, especially in phones carried in pockets or bags. To clean it safely: use a dry soft-bristled toothbrush or a can of compressed air. iFixit’s port cleaning guide and Apple’s own guidance both specify the same caution: do not use metal tools, toothpicks, or pins inside the port. The pins inside the Lightning connector are fragile, and bending them means a port replacement. A few careful passes with a dry brush is all that is needed in most cases.

After cleaning, plug in again and wait 5 minutes before moving on.

Step 4: Use Recovery Mode to Fix a Software Problem

If the phone still won’t respond after charging and multiple force restart attempts, the next step is Recovery Mode — a built-in iOS diagnostic state that lets you reinstall iOS software from a computer without losing your data (if you choose “Update” rather than “Restore”). This is the correct escalation path for a device stuck in a boot loop, frozen on the Apple logo, or completely unresponsive after a software update.

You will need a Mac running macOS Catalina or later (uses Finder) or a Windows PC with the latest version of iTunes installed, plus a Lightning cable.

Advertisement
  1. Connect your iPhone to the computer with the Lightning cable and open Finder (Mac) or iTunes (Windows).
  2. Quickly press and release Volume Up.
  3. Quickly press and release Volume Down.
  4. Press and hold the Side button — but this time, keep holding past the Apple logo until you see the recovery mode screen (a cable icon pointing to a laptop). Then release.
  5. In Finder or iTunes, select your iPhone when it appears.
  6. Choose Update first. This reinstalls iOS without erasing your data. If Update fails or is not offered, you can then choose Restore — but be aware that Restore erases everything on the device. If you have a recent iCloud or iTunes backup, your data can be recovered afterward.

If your iPhone gets stuck in recovery mode during this process, perform another force restart (Step 2) with the cable still connected to exit it.

Step 5: Check for Physical or Liquid Damage

If none of the above steps produce any response, the problem is most likely hardware rather than software. Think back: has the phone been dropped from a significant height, submerged in water, exposed to rain, or left in a hot car? Even a short drop on a hard surface can dislodge internal components without leaving visible exterior damage.

Liquid damage is a particularly difficult scenario. The iPhone 14 has an IP68 water resistance rating, which means it can handle accidental splashes and brief submersion — but it is not waterproof, and even rated devices can suffer internal damage depending on the liquid, depth, and duration of exposure. If liquid damage is suspected, book a service appointment through Apple rather than attempting to charge, power, or dry the device with external heat. Unauthorized drying methods (rice bags, blow dryers, direct sunlight) can cause additional damage and may complicate a repair assessment.

Overheating is a separate issue: if the iPhone was left in direct sunlight or a hot vehicle, move it to a cool, shaded location and wait 30 minutes before attempting to power it on. Do not put it in a freezer — rapid temperature change creates condensation inside the device.

When These Steps Won’t Help

Software fixes — force restart, recovery mode — will not resolve hardware failures. If your phone has visible screen cracks, a damaged charging port that cannot be cleaned, swollen battery symptoms (a slightly bowed back panel), or confirmed water ingress, these require physical repair. Understanding your Apple warranty and repair options before you walk into an Apple Store or authorized service center will save time and set realistic expectations on cost.

Advertisement

If you are outside your Apple warranty period, an independent repair shop is a legitimate alternative for issues like port replacement or screen repair, though it will void any remaining warranty coverage.

Key Takeaways

  • A deeply drained battery may show no response for up to 15 minutes after plugging in — always charge for a full 30 minutes before assuming a bigger problem.
  • The force restart is the most effective single fix for iPhone 14 black screen and software freeze issues. The most common reason it fails is releasing the Side button when the “slide to power off” prompt appears — keep holding past it.
  • Recovery Mode (via Finder or iTunes) is the correct next step when force restart alone doesn’t work — try “Update” before “Restore” to avoid unnecessary data loss.
  • Liquid-exposed iPhones must not be charged for at least 5 hours — attempting to charge a wet device can cause permanent damage.
  • If none of the software steps produce any response, the issue is hardware, and a professional assessment from Apple or an authorized repair provider is the right call.

Frequently Asked Questions

Will a force restart delete my photos and apps?

No. A force restart is equivalent to pulling the battery on a device — it cuts power and forces a reboot. No data is written or erased during the process. Your photos, messages, and apps will be exactly as you left them when the phone boots back up.

My iPhone 14 shows only a red battery icon — is something wrong?

A red battery icon means the battery charge is critically low but the device is responding to power. Leave it charging for at least 30 minutes before pressing any buttons. Trying to force restart a phone in this state often fails simply because there is not enough charge to complete the boot sequence.

The force restart sequence is not working no matter how many times I try. What am I doing wrong?

The two most common errors are: (1) holding Volume Up or Volume Down instead of pressing and quickly releasing them, and (2) releasing the Side button when the “slide to power off” screen appears. The presses must be quick — less than a second each. Then hold the Side button continuously for up to 20 seconds, past the slider, until the screen goes black and the Apple logo appears. If timing is the issue, try performing the sequence slightly faster.

Can I use iCloud to fix an iPhone that won’t turn on?

Not directly. iCloud’s Erase iPhone feature (via iCloud.com or the Find My app) sends a remote erase command, but the device must be online to receive and execute it. A phone that is powered off or completely unresponsive cannot receive that command. The fix will queue and execute the next time the phone connects to the internet — but that doesn’t help you get it back on. Recovery Mode via a computer is the correct software-level fix for an unresponsive device.

Advertisement
My iPhone 14 got wet recently and now won’t turn on. What should I do?

Do not charge it. Apple’s handling guidelines specify waiting at least 5 hours after liquid exposure before connecting any cable or accessory. Do not use rice, a hair dryer, or direct heat — these can cause condensation or heat damage. Leave the phone in a dry, room-temperature environment and allow it to air dry naturally. If it still won’t power on after drying, contact Apple or an authorized service provider for a physical inspection.

What is the difference between Recovery Mode and DFU Mode?

Recovery Mode reinstalls iOS while keeping the bootloader intact — it is the right first choice because it has a lower chance of complications and can restore data from a backup. DFU (Device Firmware Update) Mode performs a deeper reinstall that replaces both the iOS software and the device firmware. DFU mode is a last resort before hardware repair — it erases everything and is harder to exit if something goes wrong. Try Recovery Mode first; move to DFU mode for iPhone only if Recovery Mode fails.

How long does Recovery Mode restoration take?

Typically 15–30 minutes for the “Update” option, depending on your internet speed (the firmware file is several gigabytes) and your computer’s processing speed. Do not disconnect the cable during the process — interrupting a restore can leave the device in a non-bootable state and require the process to be started over.

Source link

Advertisement
Continue Reading

Tech

Rocket Lab Q1 2026 revenue grows 64% to record $200M as backlog hits $2.2B and stock surges 30%

Published

on

TL;DR

Rocket Lab’s Q1 revenue grew 64 per cent to a record 200 million dollars, its backlog reached 2.2 billion, and its stock hit a record high. The only thing that has not launched is Neutron, the rocket the valuation depends on.

 

Advertisement

Rocket Lab’s revenue grew 64 per cent, its stock hit a record high, and its backlog reached 2.2 billion dollars. The company sold more launches in the first quarter of 2026 than in the entire previous year. The only thing that has not launched yet is the rocket the market is pricing in.

First-quarter revenue was 200.3 million dollars, up from 122.6 million a year earlier, beating analyst estimates that had already been raised twice in the past three months. Space systems, the division that builds satellites and spacecraft components, generated 136.7 million dollars. The launch business contributed 63.7 million. Both exceeded expectations. The stock rose 30 per cent in after-hours trading to a record high, valuing the company at approximately 45 billion dollars.

The quarter

The financial results showed a company accelerating across every segment. Gross margin reached 38.2 per cent, up from the low thirties a year ago. The net loss narrowed to 45 million dollars from 60.6 million in the first quarter of 2025. Adjusted EBITDA loss was 11.8 million, a figure that suggests profitability is within reach if the revenue trajectory holds.

The 💜 of EU tech

Advertisement

The latest rumblings from the EU tech scene, a story from our wise ol’ founder Boris, and some questionable AI art. It’s free, every week, in your inbox. Sign up now!

Rocket Lab signed 31 new Electron and HASTE launch contracts in the quarter, plus five contracts for Neutron, its medium-lift rocket that has not yet flown. The company announced its largest launch deal in history, a bulk purchase of Neutron and Electron flights from an undisclosed customer whose identity and order size the company declined to reveal.

The same day, Rocket Lab disclosed a 30 million dollar contract from Anduril Industries for three HASTE hypersonic test flights from its Virginia launch complex. The HASTE vehicle, a suborbital variant of Electron, serves as a testbed for hypersonic technologies at speeds exceeding Mach 5. Anduril is funding the flights with its own capital, not government money, a distinction that signals private-sector demand for hypersonic testing infrastructure that previously existed only within government programmes.

The backlog

The 2.2 billion dollar backlog is the number that explains why investors added 10 billion dollars to the company’s market capitalisation in a single evening. A year ago, Rocket Lab’s backlog was approximately 1.1 billion. It has doubled in twelve months. The largest component is an 816 million dollar prime contract to build a missile defence constellation for the Space Development Agency, the satellite procurement arm of the Space Force.

Advertisement

Second-quarter guidance of 225 to 240 million dollars in revenue exceeded Wall Street’s estimate of 205 million by a margin wide enough to suggest that analysts had not fully accounted for the acceleration. CEO Peter Beck said the pipeline supports continued growth into the second half and beyond.

The company’s customer base spans government and commercial clients. It launches satellites for the National Reconnaissance Office, NASA, the Space Force, and allied militaries. It builds spacecraft components for constellations operated by companies including GlobalStar. It is developing the SDA’s Tranche 2 Transport Layer satellites. The breadth of the business is the argument for the valuation: Rocket Lab is not just a launch company, it is a vertically integrated space infrastructure provider.

The rocket

Neutron is the medium-lift launch vehicle on which Rocket Lab’s ambitions depend. It is designed to carry 13,000 kilograms to low Earth orbit in a reusable configuration and 15,000 kilograms expendable. It is intended to compete for the constellation deployment, national security, and deep space missions that are currently served almost exclusively by SpaceX’s Falcon 9.

The rocket has not flown. Beck said first-flight hardware integration is underway, Archimedes engine qualification is progressing, and the second stage and reusable fairing systems are advancing. The debut launch is targeted for later this year. Rocket Lab has said “later this year” about Neutron before. The original target was late 2024. It slipped to mid-2025, then to 2026. Each delay has been accompanied by plausible technical explanations and continued investor patience.

Advertisement

The patience is partly justified by Electron’s track record. Dawn Aerospace, the New Zealand spaceplane company, has demonstrated that small nations can produce credible launch vehicles, but Rocket Lab has gone further than any non-American, non-SpaceX company in building a commercially successful orbital launch business. Electron has completed more than 60 missions with a success rate exceeding 95 per cent. It is the most frequently launched orbital small rocket in the world. The question is whether the engineering discipline that made Electron reliable can scale to a vehicle ten times larger.

The market

SpaceX, which disclosed in its IPO filing that orbital data centres may not be viable, dominates the launch market with a cadence and cost structure that no competitor has matched. Falcon 9 launched more than 100 times in 2025. Rocket Lab launched 21 times. The gap is enormous. But the gap in market positioning is narrower than the gap in launch frequency suggests.

SpaceX’s backlog is dominated by its own Starlink constellation. Rocket Lab’s 2.2 billion dollar backlog is almost entirely third-party customers. The distinction matters because it means Rocket Lab’s revenue is diversified across dozens of government and commercial clients, while SpaceX’s launch revenue is heavily self-referential. For customers who want an alternative to SpaceX, or who need a launch provider that is not controlled by Elon Musk, Rocket Lab is increasingly the answer.

The race to put data centres, communications networks, and surveillance constellations in orbit is driving demand for launch capacity that exceeds what any single provider can supply. NATO is backing space and AI startups, the Space Development Agency is building a proliferated constellation architecture that requires hundreds of satellites, and commercial operators are scaling their own networks. The launch market is not zero-sum. There is more demand than there are rockets to serve it.

Advertisement

The bet

Peter Beck drew Rocket Lab’s logo on a napkin on a flight back to New Zealand in 2006. He had skipped university, taken an apprenticeship at a tools manufacturer, built a steam-powered rocket bicycle, and decided he was going to start a launch company. Twenty years later, the company he founded has a 45 billion dollar market capitalisation, a 2.2 billion dollar backlog, and contracts with the most sensitive national security programmes in the United States.

European defence technology alliances are forming between AI companies and military contractors, but Rocket Lab has built something rarer: a non-American company that the American defence establishment trusts with its most classified satellite programmes. The SDA constellation contract, the NRO missions, and the Anduril hypersonic flights all require security clearances and operational trust that take years to establish.

The stock’s 30 per cent surge reflects a market that believes the backlog will convert to revenue, the Neutron delays will end, and the defence and commercial pipelines will sustain growth rates above 50 per cent. Beck has delivered on every commitment except the one that matters most. Neutron’s first flight will determine whether Rocket Lab is a successful small-launch company with a large valuation or a full-spectrum space company that justifies one. The backlog says the customers are ready. The question is whether the rocket is.

Advertisement

Source link

Continue Reading

Tech

Today’s NYT Mini Crossword Answers for May 9

Published

on

Looking for the most recent Mini Crossword answer? Click here for today’s Mini Crossword hints, as well as our daily answers and hints for The New York Times Wordle, Strands, Connections and Connections: Sports Edition puzzles.


Need some help with today’s Mini Crossword? It’s a big one, and a fun, interactive one — finish it, and a little red car races around the grid. See the letters it’s driving on? They spell out CIRCLING, which is exactly what the car is doing. Read on for all the answers. And if you could use some hints and guidance for daily solving, check out our Mini Crossword tips.

If you’re looking for today’s Wordle, Connections, Connections: Sports Edition and Strands answers, you can visit CNET’s NYT puzzle hints page.

Advertisement

Read more: Tips and Tricks for Solving The New York Times Mini Crossword

Let’s get to those Mini Crossword clues and answers.

completed-nyt-mini-crossword-puzzle-for-may-9-2026.png

The completed NYT Mini Crossword puzzle for May 9, 2026.

Advertisement

NYT/Screenshot by CNET

Mini across clues and answers

1A clue: The “S” of H.S.: Abbr.
Answer: SCH

4A clue: King with a golden touch
Answer: MIDAS

6A clue: New Delhi or New York
Answer: BIGCITY

Advertisement

8A clue: Raggedy ___ doll
Answer: ANN

9A clue: Landmark Supreme Court case overturned by Dobbs
Answer: ROE

10A clue: Segment of a train
Answer: RAILCAR

12A clue: Pig’s nose
Answer: SNOUT

Advertisement

13A clue: Place for an intuitive feeling
Answer: GUT

Mini down clues and answers

1D clue: Author’s event
Answer: SIGNING

2D clue: Public health agcy.
Answer: CDC

3D clue: Barbershop offering
Answer: HAIRCUT

Advertisement

4D clue: ___ Tirith, capital of Gondor in the “Lord of the Rings” books
Answer: MINAS

5D clue: Short-tailed weasel
Answer: STOAT

6D clue: Place to order drinks
Answer: BAR

7D clue: “___ out!” (umpire’s shout)
Answer: YER

Advertisement

11D clue: Guitarist Reed
Answer: LOU

Source link

Advertisement
Continue Reading

Tech

Reverse-engineering The 1998 Ultima Online Demo Server

Published

on

In any MMORPG, the average user will generally only encounter the client side of the system. This makes building a compatible open source version of the proprietary server into a bit of a chore. Of course, sometimes you get a bit of a break, such as with the – still active – MMORPG Ultima Online, when the disc for the 1998 The Second Age expansion contained a stand-alone demo. This also meant a (stripped-down) server which has been gratefully reverse-engineered by the community, with [draxinar] now claiming to have made the most complete server based on this demo server.

To make things extra challenging, the originally written in C++ server binary was reverse-engineered into C99 code, meaning that the use of classes and associated vtables had to be left intact, just without the critter comforts provided by C++.

The total process took about a decade with occasional progress, with the current server binary being mostly identical to a 1998-era Ultima Online server. Some features that were stubbed out or disabled in the demo server had to be re-enabled or reimplemented, including the user account system.

Features that were left out of the final release like the ecology system were also enabled in so far as they were implemented. Although there is probably still a lot more work to be done on the code, [draxinar] reckons that this is a good point for the community to get involved to do some testing and provide feedback. There are also some missing server-related resource files that may still be saved somewhere.

Advertisement

Thanks to [adistuder] for the tip.

Source link

Advertisement
Continue Reading

Trending

Copyright © 2025