Connect with us

Tech

Sex toy firm hit by data breach – Tenga says hacker infiltrated systems, stole customer data

Published

on


  • Tenga cyberattack via phishing exposed customer names, emails, and order/service details
  • Attacker accessed inbox, exfiltrated data, and sent spam to employees and customers
  • Company reset credentials, enabled MFA, and urged customers to refresh passwords and stay vigilant

Japanese sex toys manufacturer Tenga has reportedly suffered a cyberattack and lost some of its customers’ data.

TechCrunch claims to have seen a data breach notification letter Tenga allegedly sent to its employees, stating how someone targeted a Tenga employee with phishing and managed to obtain access to their inbox.

Source link

Advertisement
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

Micron launches first PCIe 6.0 SSD aimed at AI data centers

Published

on


  • First PCIe 6.0 SSD reaches market availability for hyperscale AI environments
  • Micron 9650 targets AI inference with up to 28GBps sequential reads
  • Storage performance shifts toward accelerator-fed data pipelines in hyperscale data centers

Micron has declared its 9650 NVMe SSD has entered mass production, making it the first PCIe 6.0 SSD on the market, although the customer list is likely to be limited to hyperscalers and giant AI data center operators rather than everyday enterprise buyers.

The drive arrives as storage architecture adapts to support AI inference workloads that need faster and more predictable data access.

Source link

Advertisement
Continue Reading

Tech

Samsung shows off Galaxy S26 Ultra privacy display in new teaser video

Published

on


Rumors that Samsung’s next-gen Galaxy S26 Ultra could offer a built-in privacy screen protector have been circulating since last August.
Read Entire Article
Source link

Continue Reading

Tech

This Woman’s Auto Loan Story Is A Warning For Every Car Buyer

Published

on





Purchasing a new car, whether it’s brand new or new-to-you, may be daunting and overwhelming. It can feel like a high-pressure situation that requires making a lot of decisions in a short amount of time, often with a salesperson sitting in front of you, waiting for you to sign on the dotted line. You may know you love the car, but your mind is furiously turning over interest rates, monthly payments, insurance premiums, trim levels, warranties, gap insurance and more. The last thing you want is to drive away in your new vehicle feeling unhappy or cheated, but that’s just what happened to a Georgia woman.

Atlanta ABC affiliate WSB-TV Channel 2 reported on April Allen, who in October 2025 purchased an Infiniti SUV from a car dealership in Kennesaw, Georgia called Autonomous. She signed the paperwork and took her new vehicle home, only for it to break down and become undriveable only a few days later. When she reviewed her documentation, she found $4,315 in additional charges that she says she did not approve, including about $1,500 for gap insurance and about $2,800 for an extended warranty — safeguards that she says she does not actually have. Now, her car requires $9,000 in repairs that she cannot afford.

Allen says the dealership forged her signature in order to charge her for the warranty and extra insurance without actually providing those services. The dealership has admitted to no wrongdoing. Regardless of who’s right or wrong, the story can serve as a lesson for others on what they can do to protect themselves when buying a car at a dealership.

Advertisement

What to know before you go

Speaking with WSB-TV, April Allen expressed regret at not examining the car dealership’s online reviews more closely before she purchased her car, stating that if she had, she would “never have stepped foot on that lot.” Researching the car dealership is a good first step, but there are other things that you can do to ensure that you not only get a good deal, but that you understand all the terms of your purchase.

Before you even visit a dealership, you can research both the dealership and the vehicle you’re interested in purchasing. Information is power, and the better informed you are, the less likely you’ll be mis-led, intentionally or otherwise, by a salesperson. Once you know what you want, secure financing ahead of time. You can get pre-approved by your bank or other local financial institution. With an offer in hand, you’re better situated to understand the terms and conditions. If the dealership offers financing, closely examine the terms to ensure it actually is a better deal.

Advertisement

When it comes to add-ons like gap insurance and extended warranties, be wary. You may be able to secure gap insurance through your own auto insurance company or financial lender, so make a phone call before you visit the dealership. If you’re offered an extended warranty, read carefully and ask plenty of questions, because you can always purchase this after the sale so take your time. If the deal seems too good to be true, it probably is. Finally, bring a trusted friend or relative with you when you shop to help you stick to a pre-determined budget, and get everything in writing. If something feels off, walk away.



Advertisement

Source link

Continue Reading

Tech

Inside the App Where Queer Gooners Run Free

Published

on

One night not long ago, Jaxon Roman sat naked in front of his laptop wearing only a pup hood as he masturbated with single-minded zeal to the attention of eight other men watching onscreen.

It was a typical weekday for the 33-year-old Arlington, Virginia, program analyst. “When bros praise me and say they’re enjoying [me], I get to that edge point so fast,” Roman says. His favorite instances are “when they all come to what I’m doing.” Sometimes, when he’s feeling especially kinky, Roman, who is bisexual, likes to ask for permission before climaxing. When granted, he releases and his body, he says, shakes for 10 seconds. “Pure bliss,” he calls it.

At least a few times a month on Batemates, a social app for men who like to masturbate with other men, Roman will spend an hour online with his bros. Masturbating—or “bating” as it’s known online—has always helped him relieve stress and find his center.

He’s not the only one. Pitched as an “all-in-one platform designed to embrace bating as a lifestyle, together,” Batemates is the newest haven of queer pleasure. “It’s a community of like-minded people who are just trying to be porn for others, virtually, while watching others pleasure themselves,” Roman says. “Group play with hotties around the world. What’s not to like?”

Advertisement

Though Batemates technically launched in October 2024, it wasn’t until last year that it really started to catch on as a viable—and safe—alternative to other online bator platforms.

Nearly all of the bators WIRED spoke to said they were introduced to the lifestyle in 2020, during Covid, because, as one of them put it, “there was nothing else to do.” Gone were the days of the discreet sauna circle jerk. Instead, men flocked to private video channels on Skype and Zoom for digital jam sessions where they communally bated with other men from around the world via the portal of their laptop screens. During this period, virtual sessions got so popular that they would occasionally max out with more than 100 people in a single room.

Everything changed last year. Skype was shut down in May. Zoom sessions started getting reported more often. (“Sensitive content,” including porn, nudity, and “other content intended to cause sexual arousal” is prohibited according to the company’s acceptable use guidelines; Zoom did not respond to a request for comment.) Some queer bators have since decamped to Teams, Microsoft’s chat and video-conferencing app; others rely on chat forums like BateWorld—a Reddit-style platform for all things male masturbation that is arguably the most popular destination for bators—as well as Discord, Telegram, and Reddit to find bros to bond with.

Batemates emerged as an exciting replacement. “All the corporate tools were just banning us,” says Batemates founder Johan Guams. “As members of the LGBTQ+ community, we had no space. I was really upset about the hypocrisy of the situation, especially when this is something everybody does.”

Advertisement

Batemates wants to put an end to the corporate sanctimony around adult content. It’s an ethos the company has even woven into its branding. A recent ad posted on X makes clear: “Your friends. Your boss. Your coach. Your colleague. Everyone bates.”

Microsoft declined to comment, but according to both its digital safety policy and its terms of use, “any images, videos, audio, text, or links that depict or imply nudity, sexual acts, sexual arousal, or sexual violence” are prohibited on Teams.

Though Guams, who is 31 and from Paris, was also a regular in various Zoom bating sessions during the pandemic, he often left them wanting more. “I was like, OK, I masturbate on Zoom, but I don’t know who these people are. There’s no control. I can’t keep in touch with them. Sometimes you find crazy people. The experience just felt complicated.”

Source link

Advertisement
Continue Reading

Tech

Chrome rushes emergency patch for actively exploited zero-day bug

Published

on

Google has pushed an emergency update for Chrome to close a high-severity zero-day vulnerability that’s already being exploited in the wild. The flaw stems from a use-after-free bug in Chrome’s CSS font handling and can lead to crashes, rendering issues, or worse.

Read Entire Article
Source link

Continue Reading

Tech

Is AI signalling the end of ‘learning on the job’ for young people?

Published

on

Dr Vivek Soundararajan of the University of Bath discusses how learning and training is changing for future employees in the wake of AI advancement.

For a long time, the deal for a wide range of careers has been simple enough. Entry-level workers carried out routine tasks in return for mentorship, skill development and a clear path towards expertise.

The arrangement meant that employers had affordable labour, while employees received training and a clear career path. Both sides benefitted.

But now that bargain is breaking down. AI is automating the grunt work – the repetitive, boring but essential tasks that juniors used to do and learn from.

Advertisement

And the consequences are hitting both ends of the workforce. Young workers cannot get a foothold. Older workers are watching the talent pipeline run dry.

For example, one study suggests that between late 2022 and July 2025, entry-level employment in the US in AI-exposed fields like software development and customer service declined by roughly 20pc. Employment for older workers in the same sectors grew.

And that pattern makes sense. AI currently excels at administrative tasks – things like data entry or filing. But it struggles with nuance, judgement and plenty of other skills which are hard to codify.

So experience and the accumulation of those skills become a buffer against AI displacement. Yet if entry-level workers never get the chance to build that experience, the buffer never forms.

Advertisement

This matters for organisations too. Researchers using a huge amount of data about work in the US described the way that professional skills develop over time, by likening career paths to the structure of a tree.

General skills (communication, critical thinking, problem-solving) form the trunk, and then specialised skills branch out from there.

Their key finding was that wage premiums for specialised skills depend almost entirely on having those strong general foundational skills underneath. Communication and critical thinking capabilities are not optional extras – they are what make advanced skills valuable.

The researchers also found that workers who lack access to foundational skills can become trapped in career paths with limited upward mobility: what they call “skill entrapment”. This structure has become more pronounced over the past two decades, creating what the researchers described as “barriers to upward job mobility”.

Advertisement

But if AI is eliminating the entry-level positions where those foundations were built, who develops the next generation of experts? If AI can do the junior work better than the actual juniors, senior workers may stop delegating altogether.

Researchers call this a “training deficit. The junior never learns, and the pipeline breaks down.

Uneven disruption

But the disruption will not hit everyone equally. It has been claimed, for example, that women face nearly three times the risk of their jobs being replaced with AI compared to men.

This is because women are generally more likely to be in clerical and administrative roles, which are among the most exposed to AI-driven transformation. And if AI closes off traditional routes into skilled work, the effects are unlikely to be evenly distributed.

Advertisement

So what can be done? Well, just because the old pathway deal between junior and senior human workers is broken, does not mean that a new one cannot be built.

Young workers now need to learn what AI cannot replace in terms of knowledge, judgement and relationships. They need to seek (and be provided with) roles which involve human interaction, rather than just screen-based tasks. And if traditional entry-level jobs are disappearing, they need to look for structured programmes that still offer genuine skill development.

Older workers meanwhile, can learn a lot from younger workers about AI and technology. The idea of mentorship can be flipped, with juniors teaching about new tools, while seniors provide guidance and teaching on nuance and judgement.

And employers need to resist the urge to cut out junior staff. They should keep delegating to those staff – even when AI can do the job more quickly. Entry level roles can be redesigned rather than eliminated. For ultimately, if juniors are not getting trained, there will be no one to hand over to.

Advertisement

Protecting the pipeline of skilled and valuable employees is in everyone’s interest. Yes, some forms of expertise will matter less in the age of AI, which is disorienting for people who may have invested years in developing them.

But expertise is not necessarily about storing information. It is also about refined judgement being applied to complex situations. And that remains valuable.

The Conversation
By Dr Vivek Soundararajan

Dr Vivek Soundararajan is a professor of work and equality at the University of Bath. He conducts research on the governance of labour rights in supply chains, inequalities in and around organisations and the future of work. He leads a research initiative called Embed-Dignity and acts as a deputy director of the Centre for Business, Organisations and Society (CBOS) at the University of Bath.

Don’t miss out on the knowledge you need to succeed. Sign up for the Daily Brief, Silicon Republic’s digest of need-to-know sci-tech news.

Advertisement

Source link

Continue Reading

Tech

Most ransomware playbooks don’t address machine credentials. Attackers know it.

Published

on

The gap between ransomware threats and the defenses meant to stop them is getting worse, not better. Ivanti’s 2026 State of Cybersecurity Report found that the preparedness gap widened by an average of 10 points year over year across every threat category the firm tracks. Ransomware hit the widest spread: 63% of security professionals rate it a high or critical threat, but just 30% say they are “very prepared” to defend against it. That’s a 33-point gap, up from 29 points a year ago.

CyberArk’s 2025 Identity Security Landscape puts numbers to the problem: 82 machine identities for every human in organizations worldwide. Forty-two percent of those machine identities have privileged or sensitive access.

The most authoritative playbook framework has the same blind spot

Gartner’s ransomware preparation guidance, the April 2024 research note “How to Prepare for Ransomware Attacks” that enterprise security teams reference when building incident response procedures, specifically calls out the need to reset “impacted user/host credentials” during containment. The accompanying Ransomware Playbook Toolkit walks teams through four phases: containment, analysis, remediation, and recovery. The credential reset step instructs teams to ensure all affected user and device accounts are reset.

Service accounts are absent. So are API keys, tokens, and certificates. The most widely used playbook framework in enterprise security stops at human and device credentials. The organizations following it inherit that blind spot without realizing it.

Advertisement

The same research note identifies the problem without connecting it to the solution. Gartner warns that “poor identity and access management (IAM) practices” remain a primary starting point for ransomware attacks, and that previously compromised credentials are being used to gain access through initial access brokers and dark web data dumps. In the recovery section, the guidance is explicit: updating or removing compromised credentials is essential because, without that step, the attacker will regain entry. Machine identities are IAM. Compromised service accounts are credentials. But the playbook’s containment procedures address neither.

Gartner frames the urgency in terms few other sources match: “Ransomware is unlike any other security incident,” the research note states. “It puts affected organizations on a countdown timer. Any delay in the decision-making process introduces additional risk.” The same guidance emphasizes that recovery costs can amount to 10 times the ransom itself, and that ransomware is being deployed within one day of initial access in more than 50% of engagements. The clock is already running, but the containment procedures don’t match the urgency — not when the fastest-growing class of credentials goes unaddressed.

The readiness deficit runs deeper than any single survey

Ivanti’s report tracks the preparedness gap across every major threat category: ransomware, phishing, software vulnerabilities, API-related vulnerabilities, supply chain attacks, and even poor encryption. Every single one widened year over year.

“Although defenders are optimistic about the promise of AI in cybersecurity, Ivanti’s findings also show companies are falling further behind in terms of how well prepared they are to defend against a variety of threats,” said Daniel Spicer, Ivanti’s Chief Security Officer. “This is what I call the ‘Cybersecurity Readiness Deficit,’ a persistent, year-over-year widening imbalance in an organization’s ability to defend their data, people, and networks against the evolving threat landscape.”

Advertisement

CrowdStrike’s 2025 State of Ransomware Survey breaks down what that deficit looks like by industry. Among manufacturers who rated themselves “very well prepared,” just 12% recovered within 24 hours, and 40% suffered significant operational disruption. Public sector organizations fared worse: 12% recovery despite 60% confidence. Across all industries, only 38% of organizations that suffered a ransomware attack fixed the specific issue that allowed attackers in. The rest invested in general security improvements without closing the actual entry point.

Fifty-four percent of organizations said they would or probably would pay if hit by ransomware today, according to the 2026 report, despite FBI guidance against payment. That willingness to pay reflects a fundamental lack of containment alternatives, exactly the kind that machine identity procedures would provide.

Where machine identity playbooks fall short

Five containment steps define most ransomware response procedures today. Machine identities are missing from every one of them.

Credential resets weren’t designed for machines

Resetting every employee’s password after an incident is standard practice, but it doesn’t stop lateral movement through a compromised service account. Gartner’s own playbook template shows the blind spot clearly.

Advertisement

The Ransomware Playbook Sample’s containment sheet lists three credential reset steps: force logout of all affected user accounts via Active Directory, force password change on all affected user accounts via Active Directory, and reset the device account via Active Directory. Three steps, all Active Directory, zero non-human credentials. No service accounts, no API keys, no tokens, no certificates. Machine credentials need their own chain of command.

Nobody inventories machine identities before an incident

You can’t reset credentials that you don’t know exist. Service accounts, API keys, and tokens need ownership assignments mapped pre-incident. Discovering them mid-breach costs days.

Just 51% of organizations even have a cybersecurity exposure score, Ivanti’s report found, which means nearly half couldn’t tell the board their machine identity exposure if asked tomorrow. Only 27% rate their risk exposure assessment as “excellent,” despite 64% investing in exposure management. The gap between investment and execution is where machine identities disappear.

Network isolation doesn’t revoke trust chains

Pulling a machine off the network doesn’t revoke the API keys it issued to downstream systems. Containment that stops at the network perimeter assumes trust is bounded by topology. Machine identities don’t respect that boundary. They authenticate across it.

Advertisement

Gartner’s own research note warns that adversaries can spend days to months burrowing and gaining lateral movement within networks, harvesting credentials for persistence before deploying ransomware. During that burrowing phase, service accounts and API tokens are the credentials most easily harvested without triggering alerts. Seventy-six percent of organizations are concerned about stopping ransomware from spreading from an unmanaged host over SMB network shares, according to CrowdStrike. Security leaders need to map which systems trusted each machine identity so they can revoke access across the entire chain, not just the compromised endpoint.

Detection logic wasn’t built for machine behavior

Anomalous machine identity behavior doesn’t trigger alerts the way a compromised user account does. Unusual API call volumes, tokens used outside automation windows, and service accounts authenticating from new locations require detection rules that most SOCs haven’t written. CrowdStrike’s survey found 85% of security teams acknowledge traditional detection methods can’t keep pace with modern threats. Yet only 53% have implemented AI-powered threat detection. The detection logic that would catch machine identity abuse barely exists in most environments.

Stale service accounts remain the easiest entry point

Accounts that haven’t been rotated in years, some created by employees who left long ago, are the single weakest surface for machine-based attacks.

Gartner’s guidance calls for strong authentication for “privileged users, such as database and infrastructure administrators and service accounts,” but that recommendation sits in the prevention section, not in the containment playbook where teams need it during an active incident. Orphan account audits and rotation schedules belong in pre-incident preparation, not post-breach scrambles.

Advertisement

The economics make this urgent now

Agentic AI will multiply the problem. Eighty-seven percent of security professionals say integrating agentic AI is a priority, and 77% report comfort with allowing autonomous AI to act without human oversight, according to the Ivanti report. But just 55% use formal guardrails. Each autonomous agent creates new machine identities, identities that authenticate, make decisions, and act independently. If organizations can’t govern the machine identities they have today, they’re about to add an order of magnitude more.

Gartner estimates total recovery costs at 10 times the ransom itself. CrowdStrike puts the average ransomware downtime cost at $1.7 million per incident, with public sector organizations averaging $2.5 million. Paying doesn’t help. Ninety-three percent of organizations that paid had data stolen anyway, and 83% were attacked again. Nearly 40% could not fully restore data from backups after ransomware incidents. The ransomware economy has professionalized to the point where adversary groups now encrypt files remotely over SMB network shares from unmanaged systems, never transferring the ransomware binary to a managed endpoint.

Security leaders who build machine identity inventory, detection rules, and containment procedures into their playbooks now won’t just close the gap that attackers are exploiting today — they’ll be positioned to govern the autonomous identities arriving next. The test is whether those additions survive the next tabletop exercise. If they don’t hold up there, they won’t hold up in a real incident.

Source link

Advertisement
Continue Reading

Tech

What to do if the Galaxy S26 Ultra is a dud? Well, you could simply opt for the Galaxy Z Fold 7 while it’s going cheap

Published

on

If rumors are true, the Galaxy S26 Ultra is almost certainly going to be released within the next few weeks. The device is likely to offer the lion’s share of new features from the brand, but it could also be a rather iterative upgrade. So, what to do if you want to go big for your next phone?

Well, the obvious option is the Galaxy Z Fold 7. Yes, it’s pricey, but the official Samsung Store has a fantastic deal on the device right now that might just make you consider joining team foldable.

Advertisement

Galaxy Z Fold 7 review, and it’s something that the Galaxy S25 Ultra notably doesn’t suffer from. If the S-Pen is important to you, then we expect Samsung to still support it on the Galaxy S26 Ultra.

Advertisement


Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course, you can also follow TechRadar on YouTube and TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

Advertisement

Source link

Continue Reading

Tech

OLED at 360Hz for $499.99 is the kind of monitor deal PC gamers wait for

Published

on

If you’ve been using a decent gaming monitor and wondering why people obsess over OLED, this is the type of discount that makes the upgrade feel justified. The Alienware AW2725DF is $499.99 for a limited time, down from $649.99 (23% off). What makes it interesting is the combo: QD-OLED, 2560×1440, 360Hz, and 0.03ms response. That mix is aimed at gamers who want both “wow” image quality and genuinely fast competitive performance, without having to pick one or the other.

What you’re getting

This is a 26.7-inch QD-OLED gaming monitor with a WQHD (2560×1440) resolution, a 360Hz refresh rate, and a claimed 0.03ms response time. The practical benefit of OLED is instant pixel response and true contrast, so dark scenes look actually dark, highlights pop, and motion stays clean.

It also supports AMD FreeSync Premium Pro, and you get the modern connection options you’d expect (HDMI, DisplayPort, USB). Ergonomics matter more than people admit, and this one includes height, tilt, swivel, and pivot adjustment, which is a big deal if you sit at a desk for long sessions.

Why it’s worth it

Here’s the different way to think about it: this monitor is trying to be two monitors at once.

Advertisement
  • For competitive games, 360Hz plus OLED’s response can make motion look incredibly crisp. Not everyone needs 360Hz, but if you play shooters or fast esports titles, you’ll notice the smoothness and reduced blur.
  • For everything else, QD-OLED is the “your games look expensive” upgrade. Colors feel richer, contrast is dramatic, and you get that depth that IPS panels struggle to match.

At $499.99, you’re also landing at a price that’s easier to rationalize for a centerpiece monitor. A lot of people keep their display through multiple PC upgrades, so it’s one of the few purchases that can make every game, every session, and even everyday desktop use feel better.

The bottom line

At $499.99, the Alienware AW2725DF is a compelling limited-time deal if you want a single monitor that covers both competitive speed and premium OLED visuals. If you mainly play slower games and do a lot of productivity work, you might prioritize resolution or screen size instead. But if your goal is “fast and gorgeous” at 1440p, this price drop is worth acting on.

Source link

Advertisement
Continue Reading

Tech

Micron's world-first PCIe Gen 6 SSD doubles data rates for AI data centers

Published

on


Micron has announced that the 9650 NVMe SSD has finally entered mass production, hailing the new drive as the first PCIe Gen6 storage product in the world. Like everything else these days, the high-end SSD is largely focused on accelerating AI workloads, and generating hefty returns thanks to Big Tech’s…
Read Entire Article
Source link

Continue Reading

Trending

Copyright © 2025