Tag: new technology 2024

  • The best ergonomic mouse for 2025

    The best ergonomic mouse for 2025


    A mouse may seem like a small consideration for your workstation setup. But after you’ve addressed the crucial ergonomics — raising your monitor to eye-level, using the right keyboard and taking frequent breaks throughout your workdays — it’s a good idea to make sure the mouse you use is comfortable as well. People dealing with conditions like carpal tunnel and wrist pain may be interested in finding the best ergonomic mouse for them. Vertical and semi-vertical designs turn your palm towards your midline instead of downwards, creating a handshake position that may feel more natural. Others employ a trackball to minimize the work your shoulder has to do in a day. I tested out more than 20 highly regarded ergonomic mice to come up with recommendations for vertical, semi-vertical, trackball and more, along with advice about the merits of the different ergonomic designs.

    • What to look for in an ergonomic mouse

    • How we test ergonomic mice

    • Best ergonomic mouse for 2025

    • Other ergonomic mice we tested

    Like everything related to ergonomics, the mouse design that works best for you will depend on your body and what you need to do on a typical day. So the shapes, added features and how the mouse communicates with your computer will determine which you should get.

    When we’re talking about ergonomic mice for productivity purposes, it usually refers to mice that look distinctly different from the standard, typically with shapes that tilt your hand towards a more “handshake” position instead of facing your palm downward. A vertical ergonomic mouse has the most severe up-and-down angle, semi-vertical mice split the difference and trackball models stay put on your desk while your thumb controls the movement of the cursor. Gaming mice have an ergonomic category as well, but that simply refers to a mouse with curves designed to fit either the right or left hand. It differentiates those mice from ambidextrous models, which don’t conform to a particular hand.

    Each of three ergonomic mice shapes can help address different concerns. If you’re trying to avoid twisting your forearm, a vertical mouse could be what you need. Clicking a vertical mouse feels more like pinching your finger and thumb together, which could relieve certain other wrist issues as well.

    A semi-vertical mouse feels the most like a traditional computer mouse, with an angle closer to 50 or 60 degrees from your desk. Semi-vertical mouse clicks can feel easier too, since you’re pushing down instead of pinching. Some vertical and semi-vertical mice have an optional flange that supports the heel of your palm. Instead of pivoting on those bones to make your cursor move, your palm and wrist stay aligned and the entire arm controls the motion.

    A trackball mouse can also keep your wrist from bending, as it keeps your forearm planted. My personal struggle is with neck and shoulder tension, so trackballs and very lightweight vertical mice work best for me as their configuration lets me keep my forearm from moving. 

    As this guide focuses on productivity mice, gaming-specific stats like polling rates and IPS values don’t really come into play. (My colleague Jeff Dunn does a good job of explaining those metrics in his gaming mouse review guide.) What matters here are numbers like DPI, or dots per inch, which indicates how sensitive a mouse is. The higher the setting, the faster your cursor will move across the screen. Low DPI settings let you do precision work like pixel-by-pixel editing in Photoshop. All the mice here have at least two and as many as five settings, ranging from 400 to 3,200 DPI. Mice that make it easy to switch from high to low DPI might make sense if you do a lot of detailed work.

    Weight makes a difference in vertical and semi-vertical mice (but not trackballs, since they stay put). A lighter model will be easier to move around, which could put less strain on your wrist and arm. That said, a little weight can make your movements feel more precise. For reference, a featherweight gaming mouse might weigh 45 grams and a large vertical mouse with a flange attached might weigh 140 grams. The latter may feel a little heavy, but if it has smooth feet and is used with a decent mouse pad, it will feel lighter.

    It’s always nice to have easily clickable buttons, but that matters even more when body health is a concern. Pressing hard on a button tenses up my arm and shoulder like nobody’s business. Since it’s an action desk workers perform hundreds or thousands of times a day, it’s essential that it be effortless — nothing ruled out a mouse quicker in my tests than tough buttons.

    All mice have the basics: a right and left button and a scroll wheel. All mice in this guide also have a DPI selector button. Some have other functions such as a scroll wheel that can click with a press or handle horizontal scrolling by tilting the wheel to the right or left. Many also have back and forward buttons for browser windows, and sometimes those two are programmable to perform different functions in other apps.

    More complex mice have additional buttons to customize, typically using a mouse’s proprietary software. Depending on that software, you can set buttons to mute calls, copy and paste, undo and redo, switch tabs and more. Performing multiple functions without extraneous movement is a big plus in ergonomic design. Of course, there are a number of keyboards that let you program multiple functions into specific keys, which cuts down on superfluous movement even more, which you can read about in our ergonomic keyboard guide.

    All the mice here will work with Mac’s operating system as well as Microsoft Windows, and some work with Chrome, Linnux and even iPadOS (though I didn’t test those) as well. They connect in three ways: Wired, via Bluetooth or with a 2.4Ghz wireless dongle. More devices have incorporated USB-C interfaces, but most mice still use USB-A. So if you have a laptop that only sports USB-C ports (looking at you, MacBook), you’ll need an adapter to use a wired or dongle-enabled mouse. You can use a hub or docking station for this purpose, but in testing this guide, I ran into connectivity issues using a wireless USB receiver in a docking station, particularly when there wasn’t a direct and completely clear path between the mouse and receiver. Everything worked far more reliably with just a direct USB-C to A adapter.

    The difference between wireless and Bluetooth is twofold: a wireless dongle connection tends to be quicker to set up. You just plug in the accessory, turn on the mouse (potentially granting permission for the device) and you’re set. For Bluetooth, you need to open the settings menu, activate pairing mode on the mouse, search for the mouse and then click connect. There’s also a bit more latency when using Bluetooth versus a wireless mouse. It’s not something most people will notice doing workaday stuff, but if you plan on playing some Overwatch after hours and want to use the same mouse, you might want to go with the faster, 2.4Ghz route.

    After many hours of research and reading reviews, I gathered just over 20 mice with good claims to ergonomic design to test in my work setup. I mostly tried out mice geared towards a work-from-home or office setting, as opposed to gaming (we have a whole guide dedicated to that topic). I used each mouse for a few hours or a few days, noting how well they felt as well as how they performed. I mostly used a MacBook Pro M1 but verified Windows compatibility with an Asus ROG Strix laptop. For reference, my right hand measures 7.25 inches from the wrist crease to the tip of my middle finger, which is just under average for a man and large for a woman.

    Logitech mice have made many appearances in our guides over the years. In our guide to the best productivity mice, we name the Logitech MX Master 3S the best wireless mouse you can get. As I considered its merits as a mouse, it was indeed an impressive option — it connected flawlessly, has a useful sideways wheel as well as the traditional scroll feature and the thumb rest is a nice touch. But the ergonomics didn’t quite do it for me as it holds your hand in the standard, palm-down, claw-grip position.

    The Logi Lift Vertical is likely one of the more popular ergonomic mice out there. It’s fairly lightweight, has an attractive design with a nice feel to the exterior. The buttons are easy to click and nearly silent. It also connects quickly using either Bluetooth or a dongle. Unfortunately, it doesn’t glide across the mouse pad all that smoothly, and the pinch grip the design requires actually aggregated my wrist. The cursor movements are fairly precise, though I occasionally had trouble getting the cursor to land just where I wanted it. Also, it’s small; my hands are too large for the Lift. Logitech’s Logitech MX Vertical is essentially a larger version, but again, the skinnier shape was uncomfortable in my hands and it was tough to get the cursor to go where I wanted it to.

    The HP 920 ergonomic vertical also has a flange for resting your palm, but it makes the mouse overly heavy to move around. Without it, however, it’s an extremely comfortable mouse with a premium feel, rechargeable battery, and two programmable thumb buttons. Unfortunately, the cursor movement was frustratingly imprecise and didn’t go exactly where I pointed, forcing a number of corrections — and extraneous movement is what we’re trying to avoid in ergonomic setups.

    Apart from the rather loud clicks, I was impressed with the build and performance of the Turtle Beach Pure Air. It’s lightweight, moves smoothly, and has impressively accurate cursor movements. But despite being labeled an ergonomic mouse, it’s particularly light on the ergonomics. There’s a divot for your right thumb, so it can’t be called ambidextrous, but beyond that it’s a pretty standard (albeit quite nice) gaming mouse.

    The PERIMICE-719 from Perixx is a solid mouse with an exterior that feels nice to the touch. It has a comfortable, semi-vertical design, accurate cursor moves and a satisfyingly ratcheted scroll wheel. Plus, it offers reliable connectivity with a wireless dongle and only costs $22. Unfortunately, it was too small for my hand. Only folks with smaller glove sizes (or don’t mind adopting more of a fingertip grip) will be able to get the most out of this one.

    The Anker 2.4G mouse could make a decent budget pick for anyone who doesn’t mind using more of a pinch grip on their peripheral. It’s lightweight and has a precise scroll wheel along with back and forward browser buttons. It’s battery operated, but doesn’t come with batteries and only connects via the included USB radio dongle. I also found the buttons a little harder to press which ultimately eliminated it from the running.  

    This article originally appeared on Engadget at https://www.engadget.com/computing/accessories/best-ergonomic-mouse-120004931.html?src=rss


  • Best Internet Providers in Camden, New Jersey

    Best Internet Providers in Camden, New Jersey


    What is the best internet provider in Camden?

    Verizon Fios is CNET’s pick for the best internet service provider in Camden, New Jersey, as it offers fiber-optic coverage to most households in Camden. According to the latest data from the Federal Communications Commission, Verizon Fios serves 89% of Camden residents. Fios also has one of the fastest internet plans in the area, offering gigabit speeds across the city.

    Are you looking for speed? Comcast’s Xfinity takes the trophy for the fastest internet in the area. The cable internet provider offers multi-gigabit speeds of up to 2,100 megabits per second for $105 monthly. While that isn’t cheap, the cost per Mbps of its 2-gigabit plan is a very cheap 5 cents per Mbps.

    If you need more affordable plans, the cheapest internet in Camden is a four-way tie between Verizon Fios, Verizon 5G, Hughesnet and T-Mobile, starting at $50. However, you can bundle a mobile plan at Verizon and T-Mobile to get internet as low as $35. Watch out for a price increase after the promo period ends and additional equipment fees.

    Camden internet providers compared

    Provider Internet technology Monthly price range Speed range Monthly equipment costs Data cap Contract CNET review score
    Hughesnet
    Read full review
    Satellite $50-$95 ($75-$120 after 12 months) 50-100Mbps $15-$20 a month or $300-$450 one-time purchase 100-200GB 2-years 6
    Starlink
    Read full review
    Satellite $120; $140-$500 (Priority); $150-$5,000 (Mobile) 25-220Mbps $599 one-time purchase (or $2,500 for Priority) Unlimited; 40GB-5TB (Priority) None 6.5
    T-Mobile Home Internet
    Read full review
    Fixed wireless $50-$70 ($35-$55 for eligible Go5G Plus and Magenta Max mobile customers) 72-245Mbps None None None 7.4
    Verizon 5G Home Internet
    Read full review
    Fixed wireless $50-$70 ($35-$45 with qualifying Verizon 5G mobile plans) 50-1,000Mbps (varies by location) None None None 7.2
    Verizon Fios
    Read full review
    Fiber $50-$110 ($35-$95 with select 5G mobile plans) 300-2,300Mbps None None None 7.6
    Viasat
    Read full review
    Satellite $120 Up to 150Mbps $15 or $250 one-time purchase None None 6.1
    Xfinity
    Read full review
    Cable $55-$105 400-2,100Mbps $15-$25 included in some plans None 1-year 7

    Show more (2 items)

    Source: CNET analysis of provider data.

    What’s the cheapest internet plan in Camden?

    Provider Starting price Max download speed Monthly equipment fee
    Hughesnet
    Read full review
    $50 ($75 after 12 months) 50Mbps $15 a month or $300 one-time purchase
    Verizon Fios 300Mbps
    Read full review
    $50 ($35 with select 5G mobile plans) 300Mbps None
    Verizon 5G Home Internet
    Read full review
    $50 ($35 for eligible mobile customers) 300Mbps None
    T-Mobile Home Internet
    Read full review
    $50 ($35 with eligible mobile plans) 245Mbps None
    Xfinity Connect More
    Read full review
    $55 400Mbps $15 gateway rental (optional)

    Show more (0 item)

    Source: CNET analysis of provider data.

    gettyimages-1334918655.jpg

    The Benjamin Franklin Bridge spans the Delaware River from Philadelphia to Camden, New Jersey.

    Sean Pavone/Getty Images

    How to find internet deals and promotions in Camden

    The best internet deals and top promotions in Camden depend on what discounts are available during a given time. Most deals are short-lived, but we look frequently for the latest offers. 

    How many members of your household use the internet?

    Camden internet providers, such as T-Mobile and Xfinity, may offer lower introductory pricing or streaming add-ons for a limited time. Others, like Verizon Fios, run the same standard pricing year-round.  

    For a more extensive list of promos, check out our guide on the best internet deals. 

    Fastest internet plans in Camden

    Provider Starting price Max download speed Max upload speed Data cap Connection
    Xfinity Gigabit X2
    Read full review
    $105 2,100Mbps 300Mbps None Cable
    Xfinity Gigabit
    Read full review
    $85 1,100Mbps 300Mbps None Cable
    Verizon Fios 1 Gig
    Read full review
    $90 ($75 with select 5G mobile plans) 940Mbps 880Mbps None Fiber
    Verizon Fios 2 Gig
    Read full review
    $110 ($95 with select 5G mobile plans) 2,300Mbps 1,500Mbps None Fiber

    Show more (0 item)

    Source: CNET analysis of provider data.

    What’s a good internet speed?

    Most internet connection plans can now handle basic productivity and communication tasks. If you’re looking for an internet plan that can accommodate videoconferencing, streaming video or gaming, you’ll have a better experience with a more robust connection. Here’s an overview of the recommended minimum download speeds for various applications, according to the FCC. Note that these are only guidelines and that internet speed, service and performance vary by connection type, provider and address.

    For more information, refer to our guide on how much internet speed you really need.

    • 0 to 5Mbps allows you to tackle the basics: browsing the internet, sending and receiving email and streaming low-quality video.
    • 5 to 40Mbps gives you higher-quality video streaming and videoconferencing.
    • 40 to 100Mbps should give one user sufficient bandwidth to satisfy the demands of modern telecommuting, video streaming and online gaming. 
    • 100 to 500Mbps allows one to two users to simultaneously engage in high-bandwidth activities like videoconferencing, streaming and online gaming. 
    • 500 to 1,000Mbps allows three or more users to engage in high-bandwidth activities at the same time.

    How CNET chose the best internet providers in Camden

    Internet service providers are numerous and regional. Unlike the latest smartphone, laptop, router or kitchen tool, it’s impractical to personally test every ISP in a given city. What’s our approach? We start by researching the pricing, availability and speed information, drawing on our own historical ISP data, the provider sites and mapping information from the Federal Communications Commission at FCC.gov.

    It doesn’t end there: We go to the FCC’s website to check our data and ensure we consider every ISP that provides service in an area. We also input local addresses on provider websites to find specific options for residents. We look at sources, including the American Customer Satisfaction Index and J.D. Power, to evaluate how happy customers are with an ISP’s service. ISP plans and prices are subject to frequent changes; all information provided is accurate as of publication.

    Once we have this localized information, we ask three main questions:

    1. Does the provider offer access to reasonably fast internet speeds?
    2. Do customers get decent value for what they’re paying?
    3. Are customers happy with their service?

    While the answers to those questions are often layered and complex, the providers that come closest to “yes” on all three are the ones we recommend. When selecting the cheapest internet service, we look for the plans with the lowest monthly fee, although we also factor in things like price increases, equipment fees and contracts. Choosing the fastest internet service is relatively straightforward. We look at advertised upload and download speeds and consider real-world speed data from sources like Ookla and FCC reports. (Disclosure: Ookla is owned by the same parent company as CNET, Ziff Davis.)

    To explore our process in more depth, visit our how we test ISPs page.

    Internet providers in Camden FAQs

    What is the best internet service provider in Camden?

    Verizon Fios is the best internet provider in Camden. Verizon Fios offers fiber-optic coverage to 74% of households in Camden, according to the latest data from the FCC.

    Is fiber internet available in Camden?

    Yes, fiber internet is available to 81% of Camden households, according to the FCC data. Verizon Fios is the main fiber provider in the city.

    What is the cheapest internet provider in Camden?

    Camden residents don’t have access to internet plans under $50, so the cheapest plans in the area are provided by Verizon, T-Mobile and HughesNet. However, if you have an eligible mobile plan at Verizon or T-Mobile, you can get your monthly internet bill down to as little as $35 per month.

    Which internet provider in Camden offers the fastest plan?

    Verizon Fios offers a 2 gigabit speed tier that is similar in comparison to Xfinity’s top plans but has a faster upload speed than any of Xfinity’s tiers. Xfinity’s Gigabit X2 plan offers 2,100Mbps in download speeds and 300Mbps in upload.




  • 7 Best Mesh Routers (2025), Tested and Reviewed

    7 Best Mesh Routers (2025), Tested and Reviewed


    Mesh routers promise dependable Wi-Fi throughout your home, and most follow through, but finding the best mesh router for the job can be tricky. Instead of a single router to wash your home in Wi-Fi connectivity, a mesh system combines the main router with one or more nodes that appear as a unified Wi-Fi network. Your devices will automatically connect to the nearest option for the best speeds.

    Most of us are stuck with placing our router in a less-than-optimal spot, depending on where the internet connection comes into our home. You can extend Wi-Fi coverage by placing a second or third node where needed. Whether you want to fix dead zones, deliver a stronger signal into the back bedroom, or have great Wi-Fi in the backyard, a mesh system could be the answer. The Asus ZenWiFi XT8 is our top pick for most people, but I have many alternatives to suit different homes and internet connections.

    Before you dive into our lineup, it’s a good idea to consider whether a mesh system is right for you. Our guide on how to choose a router will help you answer that question and figure out what features you need. If you don’t want to switch to a new system, I also have advice on upgrading your existing Wi-Fi and, as always, ways to secure it and protect your home network.

    Updated April 2025: We’ve added some details to our top pick, changed our recommended Eero system, and added the Eero 7. We’ve also added the Asus ZenWifi BT8 mesh and an Avoid section with a few entries, including the Acer Predator Connect T7.

    Table of Contents

    Power up with unlimited access to WIRED. Get best-in-class reporting that’s too important to ignore for just $2.50 $1 per month for 1 year. Includes unlimited digital access and exclusive subscriber-only content. Subscribe Today.

    Things to Consider When Shopping for a Mesh System

    Here are a few points to keep in mind when you are buying a new mesh Wi-Fi system.

    Wi-Fi standards: Many devices support Wi-Fi 6E now. (Many of the best laptops and phones do, and it’s only growing more common.) Support for Wi-Fi 7 is also growing (the iPhone 16 range supports it). All the mesh routers I recommend as main picks support at least Wi-Fi 6, and they are backward compatible with older Wi-Fi standards. If you have a lot of new devices, consider Wi-Fi 6E or Wi-Fi 7. Our router shopping guide goes into more depth.

    Internet speeds: There are many ways to upgrade your Wi-Fi, but your internet speed is limited by your internet service provider (ISP). If the maximum speed of data coming to your modem is 100 Mbps, that’s the fastest possible connection that any router can provide.

    Bands: The top speed that router manufacturers claim on the box is all of the bands added together, which is disingenuous since you will only ever connect to one band at a time.

    Coverage: While it’s good to have an idea of a router’s coverage and speed, understand that your mileage may vary. The construction materials in your house, your neighbors’ proximity and Wi-Fi networks, the devices you have with wireless connectivity, and the position of routers and nodes in your home are just some of the factors that can impact the performance of your Wi-Fi.

    Backhaul: Backhaul channels are reserved for one mesh router or node to talk to another. It’s common for mesh routers to have a fast backhaul channel, enabling the main router to provide speeds as close to your full internet speed as possible to any node. This is also important for local network speed and may impact the performance of network-attached storage (NAS) systems, remote console play, and how quickly you can copy a file from one wireless device on your network to another.

    QoS: Quality of Service, allows you to prioritize specific activities and their related apps. You can use it to ensure gaming, streaming, or video calls take precedence, which can be very handy in any household with limited bandwidth.

    Ports: Ports and cables can help establish more stable connections. They may be essential if you have smart home hubs for lights and security cameras or network-attached storage that needs to plug into your main router. But they can also be useful on nodes to plug in streaming devices or game consoles and get the full benefit of any dedicated backhaul channel speeds your chosen system might offer.

    Mesh vs. router: Although mesh systems are tempting, many homes will be better served by a single, well-placed Wi-Fi router. Check out the Best Wi-Fi Routers for options. Some of the routers I tested in my two-floor 1,600-square-foot home performed just as well or better than mesh systems.

    Security: Most routers come with optional subscriptions for security, parental controls, and sometimes other extras like VPN service. You don’t need these subscriptions, but they can be handy and provide peace of mind. Just make sure you factor in the cost or opt for a system from a manufacturer like Asus, which offers them for free.

    Wait for sales: Mesh systems tend to be very expensive when first released and are often buggy. By waiting a few months, you can expect deep discounts (50 percent is not unusual) and firmware updates that ensure more stable performance. I am considering revising review scores based on initial pricing and performance for mesh systems that are now more affordable and stable, but I will always add a note to indicate when I have done this.

    To test these mesh systems, I use each one for at least a week (usually longer) in a busy family home of four with lots of video streaming, gaming, and video calls. I run speed tests (downloads and uploads). I transfer files on the network on multiple devices (including iPhones, Android phones, Windows PCs, and MacBooks) from different spots around my home, including files from devices connected to the main router to devices connected to nodes. I use NetSpot to survey signal strength throughout the house and create heat maps for comparison. I run the TamoSoft Throughput Test, and I turn the power and modem off and on to find out how each system recovers. I also test the mobile apps and web interfaces to see how easy it is to change settings, set up parental controls, and access security features.

    Best Mesh Router Overall

    The combination of speedy performance, impressive range, and lots of extra features earns the Asus ZenWiFi XT8 the top spot as the best mesh Wi-Fi system. (Even if it’s a bit of a mouthful.) I tested the two-pack, and the straightforward setup through the mobile app took minutes, though you have to keep the node close by during setup and then move it. This is a tri-band Wi-Fi 6 system with one 2.4-GHz band and two 5-GHz bands (one is reserved for wireless backhaul). Available in black or white, these units are fairly large, but they’re unobtrusive and look classy, with side vents to help dissipate heat. Each router offers three gigabit Ethernet ports, which is generous, as well as a 2.5 gigabit WAN port and a USB 3.1 port.

    At short, medium, or long range, the XT8 was consistently one of the fastest systems I tested, and speeds never dropped. The inclusion of AiProtection Pro, which adds anti-malware and parental controls powered by Trend Micro, is very welcome, especially since it doesn’t require a subscription, unlike most competitors. Just remember that using AiProtection means sharing your data with Trend Micro, so you might want to read its privacy policy. I like the parental controls, too. You can set up and reuse profiles, schedule bedtimes, filter by age group, and review activity. The Quality of Service (QoS) option lets you prioritize activities like working from home, gaming, or streaming, and you can limit bandwidth for specific devices.

    The mobile app has a wealth of options, and the web interface is even more in-depth. It’s easy to split bands or set up a guest network. I also found that the app recognized most devices correctly. (Sometimes it’s difficult to identify devices from the attributed hardware names in router apps.) There’s support for AiMesh, which means you can easily add other Asus routers to expand your Wi-Fi system. The dedicated backhaul channel—the way the router speaks to its nodes and vice versa—is extremely fast, ensuring you get the full speed of your internet connection even from that node you placed near the backyard.

    The major caveat with this mesh is that it can take some tinkering to get it working well for your home. If a failed firmware update is your idea of hell or you can’t face trial and error with settings, pick one of the systems below. My XT8 node initially refused to update its firmware, which took a couple of attempts to fix. I also had an issue with my Sonos speakers disappearing, which required a factory reset. Overall, using the XT8 has been a smooth experience. With a little patience and research, it’s easy for just about anyone to operate, but the depth of options will satisfy power users. You can find open source firmware if you want to go down the rabbit hole.

    I also tested the slightly upgraded version of this mesh, the Asus ZenWiFi XT9 ($285). It appears identical but offers a few upgrades beneath the hood. Firstly, the 5-GHz band you can connect to has a 160-MHz channel width (theoretically double the XT8’s bandwidth), the processor is slightly more powerful, and there’s support for link aggregation. On the downside, just like with the XT8, I had some teething troubles with the XT9 that required a firmware upgrade and some tweaks to the settings. It’s slightly better than the XT8, so if you see it at a similar price, I would go for the XT9 instead.


    Best Budget Mesh Router

    Note: The US government is reportedly mulling a TP-Link router ban after reports that vulnerabilities in the Chinese firm’s routers were exploited in high-profile attacks linked to the Chinese government. According to The Wall Street Journal, the US Commerce, Defense, and Justice departments are investigating TP-Link, though no evidence of any deliberate wrongdoing has yet emerged. TP-Link president Jeff Barney told WIRED the company is cooperating with the investigation, has a transparent supply chain with manufacturing in Vietnam, not China, and is now headquartered in California, having split from TP-Link Technologies, which focuses on mainland China. TP-Link is not the only brand targeted by malicious actors; Cisco and Netgear devices have also been infected in suspected Chinese state-sponsored attacks. I’ll monitor this situation as it develops before deciding whether I need to reconsider recommendations.

    The Deco X20 is an affordable Wi-Fi 6 mesh that delivers decent coverage and performance, with optional parental controls and antivirus protection, making it ideal for an average family home. I tested the three-pack, and it was very easy to set ’em all up. The three routers are small and sport a cylinder design that blends in well. This is a dual-band system (2.4 GHz and 5 GHz). There are two gigabit Ethernet ports on each router.

    Coverage and speeds are OK, falling well short of the Asus XT8 but beating systems like the entry-level Eero 6. The app is straightforward, and it’s easy to set up a guest network. Originally released with the free HomeCare software, this has since changed to a HomeShield system, and TP-Link has updated its HomeShield and parental control subscriptions. You get basic network security (router scan, guest network, QoS) and parental controls (create profiles, pause internet, block, and filter) included for free, but everything else requires a subscription.

    HomeShield Security+ costs $5 a month or $36 a year and adds web and intrusion protection with notifications and reports. Total Security costs $70 a year and adds antivirus for devices, VPN service, and a password manager. Advanced Parental Controls costs $3 a month or $18 a year and adds time limits, downtime scheduling, rewards, app time limits, safe search, insights, and reports. While this granularity enables you to pick and choose what you need, it might be confusing for some, and I’m not keen on subscription creep. That said, most families will likely want the Security+ and Advanced Parental Controls, which will come in at $54 for the year ($1 cheaper than the HomeShield Pro it replaces).

    The Quality of Service feature lets you prioritize activities like gaming or streaming, or set priority devices. Importantly, you can split the 2.4-GHz and 5-GHz bands to show as two separate Wi-Fi networks. This is handy, as some smart home devices only operate on the former band. Similarly, there’s a mixed mode for WPA2 and WPA3 security. Some devices don’t work with the newer WPA3 standard, and some routers force you to choose one or the other, which can lead to issues. This mode ensures all your gadgets are on a compatible standard.

    The web interface is basic and doesn’t add much, so I preferred using the easy-to-use app. However, it’s a little slow to update, and settings are limited. It didn’t recognize many devices and listed obscure hardware manufacturer names, making it tough to know which devices to add to my kid’s profiles.

    It wasn’t the speediest performer, but this system is fast and dependable enough for the average home. If you have a connection that’s 500 Mbps or better, it might be worth upgrading to the Deco X55 or Deco X60.


    Best for Simplicity

    Amazon’s Eero mesh systems are some of the easiest to set up, offer fairly wide coverage, and deliver stable connectivity. The Eero Pro 6E (7/10, WIRED Recommends) is an elegant system, available as two or three identical routers. The Eeros blend in easily on a table or shelf, sport a USB-C port for power, and two Ethernet ports rated at 2.5 Gbps and 1 Gbps. This tri-band system supports Wi-Fi 6E, offering the 6-GHz band alongside 2.4- and 5-GHz, and is designed to be a hands-off, set-and-forget mesh system.

    The Eero Pro 6E was impressively fast in my tests; there were no drops, and it proved adept at sharing bandwidth. The mobile app is straightforward, giving you an overview of connected devices with the option to pause the internet and set up a guest network. I could also create profiles, group devices, set schedules, and fix bedtimes. Unfortunately, content filtering, other parental controls, advanced security, ad blocking, and activity insights require an Eero Plus subscription at $10 per month or $100 per year.

    Eero is an Amazon company, and its routers come with Alexa support. Enable the Eero skill, and you can pause the internet with a voice command through your Echo device, which is handy when your child won’t get off the computer to eat dinner. The Eero Pro 6E supports Matter and Thread and can pull double duty as a ZigBee smart-home hub in the same way Echo devices can, allowing you to directly connect some smart lighting, smart locks, and other ZigBee devices.

    Two other tricks make Eero systems attractive. An Echo (4th Gen), Echo Dot (4th or 5th Gen), or Echo Dot with clock (4th or 5th Gen) smart speaker can act as a Wi-Fi extender, offering an extra 1,000 square feet of coverage at speeds up to 100 Mbps for up to 10 devices. Eero also offers an Internet Backup option, so you can add multiple backup networks (Wi-Fi or hotspot) to keep you online if your main wired network goes down.

    Eero’s simplicity will appeal to anyone who hates digging into settings, but there’s a cost. You won’t find any Quality of Service features for prioritizing activities, and you can’t separate bands. One final con with basic Eero systems is comparatively slow transfer speeds, though this was not an issue for the Pro 6E and other higher-end systems I tested.

    A few Eero systems on the market are worth considering, offering a broadly similar experience. The first two are dual-band systems (2.4 GHz and 5 GHz). Although the basic Eero 6 ($200) was one of the slower systems I tested, particularly at longer distances, it’s likely enough for folks with internet connections up to 500 Mbps and modest needs. If you have a faster connection, up to 1 Gbps, and your home is smaller than 4,500 square feet, then the Eero 6+ ($300) might suit.

    If you want a Wi-Fi 7 system and have a small home or limited demand, consider the Eero 7 ($350). It’s another dual-band system, so you don’t get the faster 6-GHz band, but you get the other advantages of Wi-Fi 7, including MLO and enhanced security. The Eero 7 performed respectably in my tests, with solid 2.4- and 5-GHz band speeds, but range and throughput are limited, meaning it won’t be a good pick for everyone. It has a 2.5 Gbps port, but I’d pick something else if your connection is faster than 1 Gbps. The Eero 7 only did slightly better than the 6+ and was significantly outperformed by the Pro 6E. Considering that a three-pack of the Pro 6E frequently drops to $400, it’s a better buy.

    Anyone with larger properties or above-average demands (lots of devices and people simultaneously using the internet) might consider the Eero Pro 7 ($700)—I’ll be testing it next. Or the top-of-the-line Eero Max 7 ($1,360) (7/10, WIRED Review), which boasts four Ethernet ports, two rated at 10 Gbps and two at 2.5 Gbps, though it will be overkill for most people. If you want a stronger signal in your backyard this summer, you can also snag an Eero 7 Outdoor ($400) to pair with any of these systems, though I have not tested it yet.

    All Eero systems are compatible with each other, which makes it easy to expand your network. You can dig deeper into the differences in our Eero buying guide. But whichever model you choose, keep an eye out for frequent discounts.


  • The TechCrunch Cyber Glossary | TechCrunch

    The TechCrunch Cyber Glossary | TechCrunch


    The cybersecurity world is full of jargon and lingo. At TechCrunch, we have been writing about cybersecurity for years, and we frequently use technical terms and expressions to describe the nature of what is happening in the world. That’s why we have created this glossary, which includes some of the most common — and not so common — words and expressions that we use in our articles, and explanations of how, and why, we use them. 

    This is a developing compendium, and we will update it regularly. If you have any feedback or suggestions for this glossary, get in touch.


    An advanced persistent threat (APT) is often categorized as a hacker, or group of hackers, which gains and maintains unauthorized access to a targeted system. The main aim of an APT intruder is to remain undetected for long periods of time, often to conduct espionage and surveillance, to steal data, or sabotage critical systems.

    APTs are traditionally well-resourced hackers, including the funding to pay for their malicious campaigns, and access to hacking tools typically reserved by governments. As such, many of the long-running APT groups are associated with nation states, like China, Iran, North Korea, and Russia. In recent years, we’ve seen examples of non-nation state cybercriminal groups that are financially motivated (such as theft and money laundering) carrying out cyberattacks similar in terms of persistence and capabilities as some traditional government-backed APT groups.

    (See: Hacker)

    An adversary-in-the-middle (AitM) attack, traditionally known as a “man-in-the-middle” (MitM), is where someone intercepts network traffic at a particular point on the network in an attempt to eavesdrop or modify the data as it travels the internet. This is why encrypting data makes it more difficult for malicious actors to read or understand a person’s network traffic, which could contain personal information or secrets, like passwords. Adversary-in-the-middle attacks can be used legitimately by security researchers to help understand what data goes in and out of an app or web service, a process that can help identify security bugs and data exposures.

    The ability to run commands or malicious code on an affected system, often because of a security vulnerability in the system’s software. Arbitrary code execution can be achieved either remotely or with physical access to an affected system (such as someone’s device). In the cases where arbitrary code execution can be achieved over the internet, security researchers typically call this remote code execution. 

    Often, code execution is used as a way to plant a back door for maintaining long-term and persistent access to that system, or for running malware that can be used to access deeper parts of the system or other devices on the same network. 

    (See also: Remote code execution)

    Attribution is the process of finding out and identifying who is behind a cyberattack. There is an often repeated mantra, “attribution is hard,” which is to warn cybersecurity professionals and the wider public that definitively establishing who was behind a cyberattack is no simple task. While it is not impossible to attribute, the answer is also dependent on the level of confidence in the assessment.

    Threat intelligence companies such as CrowdStrike, Kaspersky, and Mandiant, among others, have for years attributed cyberattacks and data breaches to groups or “clusters” of hackers, often referencing groups by a specific codename, based on a pattern of certain tactics, techniques and procedures as seen in previous attacks. Some threat intelligence firms go as far as publicly linking certain groups of hackers to specific governments or their intelligence agencies when the evidence points to it. 

    Government agencies, however, have for years publicly accused other governments and countries of being behind cyberattacks, and have gone as far as identifying — and sometimes criminally charging — specific people working for those agencies.

    A backdoor is a subjective term, but broadly refers to creating the means to gain future access to a system, device, or physical area. Backdoors can be found in software or hardware, such as a mechanism to gain access to a system (or space) in case of accidental lock-out, or for remotely providing technical support over the internet. Backdoors can have legitimate and helpful use cases, but backdoors can also be undocumented, maliciously planted, or otherwise unknown to the user or owner, which can weaken the security of the product and make it more susceptible to hacking or compromise.

    TechCrunch has a deeper dive on encryption backdoors.

    Hackers historically have been categorized as either “black hat” or “white hat,” usually depending on the motivations of the hacking activity carried out. A “black hat” hacker may be someone who might break the law and hack for money or personal gain, such as a cybercriminal. “White hat” hackers generally hack within legal bounds, like as part of a penetration test sanctioned by the target company, or to collect bug bounties finding flaws in various software and disclosing them to the affected vendor. For those who hack with less clearcut motivations, they may be regarded as a “gray hat.” Famously, the hacking group the L0pht used the term gray hat in an interview with The New York Times Magazine in 1999. While still commonly used in modern security parlance, many have moved away from the “hat” terminology. 

    (Also see: Hacker, Hacktivist)

    Botnets are networks of hijacked internet-connected devices, such as webcams and home routers, that have been compromised by malware (or sometimes weak or default passwords) for the purposes of being used in cyberattacks. Botnets can be made up of hundreds or thousands of devices and are typically controlled by a command-and-control server that sends out commands to ensnared devices. Botnets can be used for a range of malicious reasons, like using the distributed network of devices to mask and shield the internet traffic of cybercriminals, deliver malware, or harness their collective bandwidth to maliciously crash websites and online services with huge amounts of junk internet traffic. 

    (See also: Command-and-control server; Distributed denial-of-service)

    A brute-force attack is a common and rudimentary method of hacking into accounts or systems by automatically trying different combinations and permutations of letters and words to guess passwords. A less sophisticated brute-force attack is one that uses a “dictionary,” meaning a list of known and common passwords, for example. A well designed system should prevent these types of attacks by limiting the number of login attempts inside a specific timeframe, a solution called rate-limiting. 

    A bug is essentially the cause of a software glitch, such as an error or a problem that causes the software to crash or behave in an unexpected way. In some cases, a bug can also be a security vulnerability. 

    The term “bug” originated in 1947, at a time when early computers were the size of rooms and made up of heavy mechanical and moving equipment. The first known incident of a bug found in a computer was when a moth disrupted the electronics of one of these room-sized computers.

    (See also: Vulnerability)

    Command-and-control servers (also known as C2 servers) are used by cybercriminals to remotely manage and control their fleets of compromised devices and launch cyberattacks, such as delivering malware over the internet and launching distributed denial-of-service attacks.

    (See also: Botnet; Distributed denial-of-service)

    This is a word that can have two meanings depending on the context. Traditionally, in the context of computer science and cybersecurity, crypto is short for “cryptography,” the mathematical field of coding and decoding messages and data using encryption.

    Crypto has more recently also become short for cryptocurrency, such as Bitcoin, Ethereum, and the myriad blockchain-based decentralized digital currencies that have sprung up in the last fifteen years. As cryptocurrencies have grown from a niche community to a whole industry, crypto is now also used to refer to that whole industry and community. 

    For years, the cryptography and cybersecurity community have wrestled with the adoption of this new meaning, going as far as making the phrases “crypto is not cryptocurrency” and “crypto means cryptography” into something that features on its own dedicated website and even T-shirts. 

    Languages change over time depending on how people use words. As such, TechCrunch accepts the reality where crypto has different meanings depending on context, and where the context isn’t clear, then we spell out cryptography, or cryptocurrency. 

    Cryptojacking is when a device’s computational power is used, with or without the owner’s permission, to generate cryptocurrency. Developers sometimes bundle code in apps and on websites, which then uses the device’s processors to complete complex mathematical calculations needed to create new cryptocurrency. The generated cryptocurrency is then deposited in virtual wallets owned by the developer. 

    Some malicious hackers use malware to deliberately compromise large numbers of unwitting computers to generate cryptocurrency on a large and distributed scale.

    The world wide web is the public content that flows across the pipes of the internet, much of what is online today is for anyone to access at any time. The “deep web,” however, is the content that is kept behind paywalls and member-only spaces, or any part of the web that is not readily accessible or browsable with a search engine. Then there is the “dark web,” which is the part of the internet that allows users to remain anonymous but requires certain software (such as the Tor Browser) to access, depending on the part of the dark web you’re trying to access.

    Anonymity benefits those who live and work in highly censored or surveilled countries, but it also can benefit criminals. There is nothing inherently criminal or nefarious about accessing the dark web; many popular websites also offer dark web versions so that users around the world can access their content. TechCrunch has a more detailed explainer on what the dark web is.

    When we talk about data breaches, we ultimately mean the improper removal of data from where it should have been. But the circumstances matter and can alter the terminology we use to describe a particular incident. 

    A data breach is when protected data was confirmed to have improperly left a system from where it was originally stored and usually confirmed when someone discovers the compromised data. More often than not, we’re referring to the exfiltration of data by a malicious cyberattacker or otherwise detected as a result of an inadvertent exposure. Depending on what is known about the incident, we may describe it in more specific terms where details are known.

    (See also: Data exposure; Data leak)

    A data exposure (a type of data breach) is when protected data is stored on a system that has no access controls, such as because of human error or a misconfiguration. This might include cases where a system or database is connected to the internet but without a password. Just because data was exposed doesn’t mean the data was actively discovered, but nevertheless could still be considered a data breach. 

    A data leak (a type of data breach) is where protected data is stored on a system in a way that it was allowed to escape, such as due to a previously unknown vulnerability in the system or by way of insider access (such as an employee). A data leak can mean that data could have been exfiltrated or otherwise collected, but there may not always be the technical means, such as logs, to know for sure.

    Deepfakes are AI-generated videos, audios, or pictures designed to look real, often with the goal of fooling people into thinking they are genuine. Deepfakes are developed with a specific type of machine learning known as deep learning, hence its name. Examples of deepfakes can range from relatively harmless, like a video of a celebrity saying something funny or outrageous, to more harmful efforts. In recent years, there have been documented cases of deepfaked political content designed to discredit politicians and influence voters, while other malicious deepfakes have relied on using recordings of executives designed to trick company employees into giving up sensitive information or sending money to scammers. Deepfakes are also contributing to the proliferation of nonconsensual sexual images.  

    Def Con is one of the most important hacking conferences in the world, held annually in Las Vegas, usually during August. Launched in 1993 as a party for some hacker friends, it has now become an annual gathering of almost 30,000 hackers and cybersecurity professionals, with dozens of talks, capture-the-flag hacking competitions, and themed “villages,” where attendees can learn how to hack internet-connected devices, voting systems, and even aircraft. Unlike other conferences like RSA or Black Hat, Def Con is decidedly not a business conference, and the focus is much more on hacker culture. There is a vendor area, but it usually includes nonprofits like the Electronic Frontier Foundation, The Calyx Institute, and the Tor Project, as well as relatively small cybersecurity companies.

    A distributed denial-of-service, or DDoS, is a kind of cyberattack that involves flooding targets on the internet with junk web traffic in order to overload and crash the servers and cause the service, such as a website, online store, or gaming platform to go down. 

    DDoS attacks are launched by botnets, which are made up of networks of hacked internet-connected devices (such as home routers and webcams) that can be remotely controlled by a malicious operator, usually from a command-and-control server. Botnets can be made up of hundreds or thousands of hijacked devices.

    While a DDoS is a form of cyberattack, these data-flooding attacks are not “hacks” in themselves, as they don’t involve the breach and exfiltration of data from their targets, but instead cause a “denial of service” event to the affected service.

    (See also: Botnet; Command-and-control server)

    Encryption is the way and means in which information, such as files, documents, and private messages, are scrambled to make the data unreadable to anyone other than to its intended owner or recipient. Encrypted data is typically scrambled using an encryption algorithm — essentially a set of mathematical formulas that determines how the data should be encrypted — along with a private key, such as a password, which can be used to unscramble (or “decrypt”) the protected data.

    Nearly all modern encryption algorithms in use today are open source, allowing anyone (including security professionals and cryptographers) to review and check the algorithm to make sure it’s free of faults or flaws. Some encryption algorithms are stronger than others, meaning data protected by some weaker algorithms can be decrypted by harnessing large amounts of computational power.

    Encryption is different from encoding, which simply converts data into a different and standardized format, usually for the benefit of allowing computers to read the data.

    (See also: End-to-end encryption)

    End-to-end encryption (or E2EE) is a security feature built into many messaging and file-sharing apps, and is widely considered one of the strongest ways of securing digital communications as they traverse the internet.

    E2EE scrambles the file or message on the sender’s device before it’s sent in a way that allows only the intended recipient to decrypt its contents, making it near-impossible for anyone — including a malicious hacker, or even the app maker — to snoop inside on someone’s private communications. In recent years, E2EE has become the default security standard for many messaging apps, including Apple’s iMessage, Facebook Messenger, Signal, and WhatsApp. 

    E2EE has also become the subject of governmental frustration in recent years, as encryption makes it impossible for tech companies or app providers to give over information that they themselves do not have access to.

    (See also: Encryption)

    Most modern systems are protected with multiple layers of security, including the ability to set user accounts with more restricted access to the underlying system’s configurations and settings. This prevents these users — or anyone with improper access to one of these user accounts — from tampering with the core underlying system. However, an “escalation of privileges” event can involve exploiting a bug or tricking the system into granting the user more access rights than they should have. 

    Malware can also take advantage of bugs or flaws caused by escalation of privileges by gaining deeper access to a device or a connected network, potentially allowing the malware to spread.

    When we talk about espionage, we’re generally referring to threat groups or hacking campaigns that are dedicated to spying, and are typically characterized by their stealth. Espionage-related hacks are usually aimed at gaining and maintaining stealthy persistent access to a target’s network to carry out passive surveillance, reconnaissance for future cyberattacks, or the long-term collection and exfiltration of data. Espionage operations are often carried out by governments and intelligence agencies, though not exclusively.

    An exploit is the way and means in which a vulnerability is abused or taken advantage of, usually in order to break into a system. 

    (See also: Bug; Vulnerability)

    In general terms, extortion is the act of obtaining something, usually money, through the use of force and intimidation. Cyber extortion is no different, as it typically refers to a category of cybercrime whereby attackers demand payment from victims by threatening to damage, disrupt, or expose their sensitive information. 

    Extortion is often used in ransomware attacks, where hackers typically exfiltrate company data before demanding a ransom payment from the hacked victim. But extortion has quickly become its own category of cybercrime, with many, often younger, financially motivated hackers, opting to carry out extortion-only attacks, which snub the use of encryption in favor of simple data theft.

    (Also see: Ransomware) 

    Forensic investigations involve analyzing data and information contained in a computer, server, or mobile device, looking for evidence of a hack, crime, or some sort of malfeasance. Sometimes, in order to access the data, corporate or law enforcement investigators rely on specialized devices and tools, like those made by Cellebrite and Grayshift, which are designed to unlock and break the security of computers and cellphones to access the data within.

    There is no one single definition of “hacker.” The term has its own rich history, culture, and meaning within the security community. Some incorrectly conflate hackers, or hacking, with wrongdoing. 

    By our definition and use, we broadly refer to a “hacker” as someone who is a “breaker of things,” usually by altering how something works to make it perform differently in order to meet their objectives. In practice, that can be something as simple as repairing a machine with non-official parts to make it function differently as intended, or work even better. 

    In the cybersecurity sense, a hacker is typically someone who breaks a system or breaks the security of a system. That could be anything from an internet-connected computer system to a simple door lock. But the person’s intentions and motivations (if known) matter in our reporting, and guides how we accurately describe the person, or their activity. 

    There are ethical and legal differences between a hacker who works as a security researcher, who is professionally tasked with breaking into a company’s systems with their permission to identify security weaknesses that can be fixed before a malicious individual has a chance to exploit them; and a malicious hacker who gains unauthorized access to a system and steals data without obtaining anyone’s permission.

    Because the term “hacker” is inherently neutral, we generally apply descriptors in our reporting to provide context about who we’re talking about. If we know that an individual works for a government and is contracted to maliciously steal data from a rival government, we’re likely to describe them as a nation-state or government hacker (or, if appropriate, an advanced persistent threat), for example. If a gang is known to use malware to steal funds from individuals’ bank accounts, we may describe them as financially motivated hackers, or if there is evidence of criminality or illegality (such as an indictment), we may describe them simply as cybercriminals.

    And, if we don’t know motivations or intentions, or a person describes themselves as such, we may simply refer to a subject neutrally as a “hacker,” where appropriate.

    (Also see: Advanced persistent threat; Hacktivist; Unauthorized)

    Sometimes, hacking and stealing data is only the first step. In some cases, hackers then leak the stolen data to journalists, or directly post the data online for anyone to see. The goal can be either to embarrass the hacking victim, or to expose alleged malfeasance. 

    The origins of modern hack-and-leak operations date back to the early- and mid-2000s, when groups like el8, pHC (“Phrack High Council”) and zf0 were targeting people in the cybersecurity industry who, according to these groups, had foregone the hacker ethos and had sold out. Later, there are the examples of hackers associated with Anonymous and leaking data from U.S. government contractor HBGary, and North Korean hackers leaking emails stolen from Sony as retribution for the Hollywood comedy, The Interview

    Some of the most recent and famous examples are the hack against the now-defunct government spyware pioneer Hacking Team in 2015, and the infamous Russian government-led hack-and-leak of Democratic National Committee emails ahead of the 2016 U.S. presidential elections. Iranian government hackers tried to emulate the 2016 playbook during the 2024 elections. 

    A particular kind of hacker who hacks for what they — and perhaps the public — perceive as a good cause, hence the portmanteau of the words “hacker” and “activist.” Hacktivism has been around for more than two decades, starting perhaps with groups like the Cult of the Dead Cow in the late 1990s. Since then, there have been several high profile examples of hacktivist hackers and groups, such as Anonymous, LulzSec, and Phineas Fisher. 

    (Also see: Hacker)

    Short for “information security,” an alternative term used to describe defensive cybersecurity focused on the protection of data and information. “Infosec” may be the preferred term for industry veterans, while the term “cybersecurity” has become widely accepted. In modern times, the two terms have become largely interchangeable. 

    Infostealers are malware capable of stealing information from a person’s computer or device. Infostealers are often bundled in pirated software, like Redline, which when installed will primarily seek out passwords and other credentials stored in the person’s browser or password manager, then surreptitiously upload the victim’s passwords to the attacker’s systems. This lets the attacker sign in using those stolen passwords. Some infostealers are also capable of stealing session tokens from a user’s browser, which allow the attacker to sign in to a person’s online account as if they were that user but without needing their password or multi-factor authentication code.

    (See also: Malware)

    Jailbreaking is used in several contexts to mean the use of exploits and other hacking techniques to circumvent the security of a device, or removing the restrictions a manufacturer puts on hardware or software. In the context of iPhones, for example, a jailbreak is a technique to remove Apple’s restrictions on installing apps outside of its “walled garden” or to gain the ability to conduct security research on Apple devices, which is normally highly restricted. In the context of AI, jailbreaking means figuring out a way to get a chatbot to give out information that it’s not supposed to. 

    The kernel, as its name suggests, is the core part of an operating system that connects and controls virtually all hardware and software. As such, the kernel has the highest level of privileges, meaning it has access to virtually any data on the device. That’s why, for example, apps such as antivirus and anti-cheat software run at the kernel level, as they require broad access to the device. Having kernel access allows these apps to monitor for malicious code.

    Malware is a broad umbrella term that describes malicious software. Malware can land in many forms and be used to exploit systems in different ways. As such, malware that is used for specific purposes can often be referred to as its own subcategory. For example, the type of malware used for conducting surveillance on people’s devices is also called “spyware,” while malware that encrypts files and demands money from its victims is called “ransomware.”

    (See also: Infostealers; Ransomware; Spyware)

    Metadata is information about something digital, rather than its contents. That can include details about the size of a file or document, who created it, and when, or in the case of digital photos, where the image was taken and information about the device that took the photo. Metadata may not identify the contents of a file, but it can be useful in determining where a document came from or who authored it. Metadata can also refer to information about an exchange, such as who made a call or sent a text message, but not the contents of the call or the message.

    Multi-factor authentication (MFA) is the common umbrella term for describing when a person must provide a second piece of information, aside from a username and password, to log into a system. MFA (or two-factor; also known as 2FA) can prevent malicious hackers from re-using a person’s stolen credentials by requiring a time-sensitive code sent to or generated from a registered device owned by the account holder, or the use of a physical token or key. 

    Operational security, or OPSEC for short, is the practice of keeping information secret in various situations. Practicing OPSEC means thinking about what information you are trying to protect, from whom, and how you’re going to protect it. OPSEC is less about what tools you are using, and more about how you are using them and for what purpose. 

    For example, government officials discussing plans to bomb foreign countries on Signal are practicing bad OPSEC because the app is not designed for that use-case, and runs on devices that are more vulnerable to hackers than highly restricted systems specifically designed for military communications. On the other hand, journalists using Signal to talk to sensitive sources is generally good OPSEC because it makes it harder for those communications to be intercepted by eavesdroppers.

    (See also: Threat model)

    Also known as “pen-testing,” this is the process where security researchers “stress-test” the security of a product, network, or system, usually by attempting to modify the way that the product typically operates. Software makers may ask for a pen-test on a product, or of their internal network, to ensure that they are free from serious or critical security vulnerabilities, though a pen-test does not guarantee that a product will be completely bug-free.

    Phishing is a type of cyberattack where hackers trick their targets into clicking or tapping on a malicious link, or opening a malicious attachment. The term derives from “fishing,” because hackers often use “lures” to convincingly trick their targets in these types of attacks. A phishing lure could be attachment coming from an email address that appears to be legitimate, or even an email spoofing the email address of a person that the target really knows. Sometimes, the lure could be something that might appear to be important to the target, like sending a forged document to a journalist that appears to show corruption, or a fake conference invite for human rights defenders. There is an often cited adage by the well-known cybersecurity influencer The Grugq, which encapsulates the value of phishing: “Give a man an 0day and he’ll have access for a day, teach a man to phish and he’ll have access for life.”

    (Also see: Social engineering)

    Ransomware is a type of malicious software (or malware) that prevents device owners from accessing its data, typically by encrypting the person’s files. Ransomware is usually deployed by cybercriminal gangs who demand a ransom payment — usually cryptocurrency — in return for providing the private key to decrypt the person’s data.

    In some cases, ransomware gangs will steal the victim’s data before encrypting it, allowing the criminals to extort the victim further by threatening to publish the files online. Paying a ransomware gang is no guarantee that the victim will get their stolen data back, or that the gang will delete the stolen data.

    One of the first-ever ransomware attacks was documented in 1989, in which malware was distributed via floppy disk (an early form of removable storage) to attendees of the World Health Organization’s AIDS conference. Since then, ransomware has evolved into a multibillion-dollar criminal industry as attackers refine their tactics and hone in on big-name corporate victims.

    (See also: Malware; Sanctions)

    Remote code execution refers to the ability to run commands or malicious code (such as malware) on a system from over a network, often the internet, without requiring any human interaction from the target. Remote code execution attacks can range in complexity but can be highly damaging when vulnerabilities are exploited.

    (See also: Arbitrary code execution)

    Cybersecurity-related sanctions work similarly to traditional sanctions in that they make it illegal for businesses or individuals to transact with a sanctioned entity. In the case of cyber sanctions, these entities are suspected of carrying out malicious cyber-enabled activities, such as ransomware attacks or the laundering of ransom payments made to hackers.

    The U.S. Treasury’s Office of Foreign Assets Control (OFAC) administers sanctions. The Treasury’s Cyber-Related Sanctions Program was established in 2015 as part of the Obama administration’s response to cyberattacks targeting U.S. government agencies and private sector U.S. entities.

    While a relatively new addition to the U.S. government’s bureaucratic armory against ransomware groups, sanctions are increasingly used to hamper and deter malicious state actors from conducting cyberattacks. Sanctions are often used against hackers who are out of reach of U.S. indictments or arrest warrants, such as ransomware crews based in Russia.

    A sandbox is a part of a system that is isolated from the rest. The goal is to create a protected environment where a hacker can compromise the sandbox, but without allowing further access to the rest of the system. For example, mobile applications usually run in their own sandboxes. If hackers compromise a browser, for example, they cannot immediately compromise the operating system or another app on the same device. 

    Security researchers also use sandboxes in both physical and virtual environments (such as a virtual machine) to analyze malicious code without risking compromising their own computers or networks.

    SIM swapping is a type of attack where hackers hijack and take control of a person’s phone number, often with the goal of then using the phone number to log into the target’s sensitive accounts, such as their email address, bank account, or cryptocurrency wallet. This attack exploits the way that online accounts sometimes rely on a phone number as a fallback in the event of losing a password.

    SIM swaps often rely on hackers using social engineering techniques to trick phone carrier employees (or bribing them) into handing over control of a person’s account, as well as hacking into carrier systems.

    Social engineering is the art of human deception, and encompasses several techniques a hacker can use to deceive their target into doing something they normally would not do. Phishing, for example, can be classified as a type of social engineering attack because hackers trick targets into clicking on a malicious link or opening a malicious attachment, or calling someone on the phone while pretending to be their employer’s IT department.

    Social engineering can also be used in the real world, for example, to convince building security employees to let someone who shouldn’t be allowed to enter the building. Some call it “human hacking” because social engineering attacks don’t necessarily have to involve technology. 

    (Also see: Phishing)

    A broad term, like malware, that covers a range of surveillance monitoring software. Spyware is typically used to refer to malware made by private companies, such as NSO Group’s Pegasus, Intellexa’s Predator, and Hacking Team’s Remote Control System, among others, which the companies sell to government agencies. In more generic terms, these types of malware are like remote access tools, which allows their operators — usually government agents — to spy and monitor their targets, giving them the ability to access a device’s camera and microphone or exfiltrate data. Spyware is also referred to as commercial or government spyware, or mercenary spyware.

    (See also: Stalkerware)

    Stalkerware is a kind of surveillance malware (and a form of spyware) that is usually sold to ordinary consumers under the guise of child or employee monitoring software but is often used for the purposes of spying on the phones of unwitting individuals, oftentimes spouses and domestic partners. The spyware grants access to the target’s messages, location, and more. Stalkerware typically requires physical access to a target’s device, which gives the attacker the ability to install it directly on the target’s device, often because the attacker knows the target’s passcode. 

    (See also: Spyware)

    What are you trying to protect? Who are you worried about that could go after you or your data? How could these attackers get to the data? The answers to these kinds of questions are what will lead you to create a threat model. In other words, threat modeling is a process that an organization or an individual has to go through to design software that is secure, and devise techniques to secure it. A threat model can be focused and specific depending on the situation. A human rights activist in an authoritarian country has a different set of adversaries, and data, to protect than a large corporation in a democratic country that is worried about ransomware, for example. 

    (See also: Operational security)

    When we describe “unauthorized” access, we’re referring to the accessing of a computer system by breaking any of its security features, such as a login prompt or a password, which would be considered illegal under the U.S. Computer Fraud and Abuse Act, or the CFAA. The Supreme Court in 2021 clarified the CFAA, finding that accessing a system lacking any means of authorization — for example, a database with no password — is not illegal, as you cannot break a security feature that isn’t there. 

    It’s worth noting that “unauthorized” is a broadly used term and often used by companies subjectively, and as such has been used to describe malicious hackers who steal someone’s password to break in through to incidents of insider access or abuse by employees. 

    A virtual private network, or VPN, is a networking technology that allows someone to “virtually” access a private network, such as their workplace or home, from anywhere else in the world. Many use a VPN provider to browse the web, thinking that this can help to avoid online surveillance.

    TechCrunch has a skeptics’ guide to VPNs that can help you decide if a VPN makes sense for you. If it does, we’ll show you how to set up your own private and encrypted VPN server that only you control. And if it doesn’t, we explore some of the privacy tools and other measures you can take to meaningfully improve your privacy online.

    A vulnerability (also referred to as a security flaw) is a type of bug that causes software to crash or behave in an unexpected way that affects the security of the system or its data. Sometimes, two or more vulnerabilities can be used in conjunction with each other — known as “vulnerability chaining” — to gain deeper access to a targeted system. 

    (See also: Bug; Exploit)

    Malicious attacks can sometimes be categorized and described by the amount of user interaction that malware, or a malicious hacker, needs in order to achieve successful compromise. One-click attacks refer to the target having to interact only once with the incoming lure, such as clicking on a malicious link or opening an attachment, to grant the intruder access. But zero-click attacks differ in that they can achieve compromise without the target having to click or tap anything. Zero-clicks are near-invisible to the target and are far more difficult to identify. As such, zero-click attacks are almost always delivered over the internet, and are often reserved for high-value targets for their stealthy capabilities, such as deploying spyware.

    (Also see: Spyware)

    A zero-day is a specific type of security vulnerability that has been publicly disclosed or exploited but the vendor who makes the affected hardware or software has not been given time (or “zero days”) to fix the problem. As such, there may be no immediate fix or mitigation to prevent an affected system from being compromised. This can be particularly problematic for internet-connected devices. 

    (See also: Vulnerability)

    First published on September 20, 2024.


  • Best deals under $100 on tech this week: huge savings on tablets, headphones, and home security

    Best deals under $100 on tech this week: huge savings on tablets, headphones, and home security


    In today’s world, $100 might not seem like much, but it can still buy you some handy tech to make your life easier. From budget-friendly tablets for streaming your favorite shows to good headphones for enjoying your favorite music, there are plenty of great options available.

    Plus, with the growing demand for tech that keeps you connected, now’s a great time to pick up a power bank or a charging station to keep your devices ready to go. And if you’ve been thinking about smart home gadgets, and investing in a home security system, now might be the time to jump on this bandwagon (before recession gets the better of your neighbor and they steal yet another of your Amazon packages).  

    Top 3 deals under a hundred bucks on tech this week

    Nothing Ear (a) earbuds with ChatGPT now $30 off at Amazon

    $30 off (28%)

    Nothing’s Ear (a) earbuds feature HNC (hybrid noise cancellation), an amazing 42.5 hours of playtime, ChatGPT integration, and a very stylish-looking design. The offers is for the black and white color options. These are a good pair of affordable earbuds and you better act fast as the deal is time limited.


    Buy at Amazon

    Anker MagSafe Wireless Charging Station now with a $36 discount

    $36 off (32%)

    The Anker MagGo 3-in-1 Wireless Charging Station is MagSafe compatible, making it the perfect home charging solution for Apple users with multiple devices. Thanks to its Qi2 certification, it also supports Android phones and smartwatches. With 15W of wireless charging power, it delivers fast and convenient charging for all your gadgets. Act fast — this deal won’t last long!


    Buy at Amazon

    Ring Doorbell with Ring Indoor Cam now $60 off at Amazon

    $60 off (43%)

    You can save big on this Ring home camera system deal by getting two devices instead of one. These are the Ring Doorbell and 2nd Gen Ring Indoor Cam. Both of these models offer a long-lasting built-in battery, FullHD ultra-wide video recording, and live view with two-way talk. The Ring Doorbell comes in Satin Nickel or Venetian Bronze color options.


    Buy at Amazon

    Best tablet deals under $100 this week

    The Amazon Fire HD 10 (2023) is now available at a discounted price on the Amazon store. This deal features the 3GB RAM and 32GB storage variant. If you find that 32GB isn’t enough for your needs, you can upgrade to the 64GB storage option for just $10 more, also at a fantastic discount. This tablet boasts a vibrant Full HD 10.1-inch display and an impressive battery life of up to 13 hours, making it an ideal choice for binge-watching your favorite shows or seamlessly browsing the web. The more compact 8-inch Fire HD tablet is currently seeing a nice discount as well.

    Amazon’s newest Fire HD 10 tablet now $40 off

    $40 off (30%)

    The Amazon Fire HD 10 (2023) is now seeing a drop in price on the brand’s store. The offer is for the 3GB of RAM 32GB of storage version. If that’s too small of a storage for you, for only $10 more you can get the 64GB of storage version at a similar discount. This device features a good Full HD 10.1-inch display and a battery that lasts up to 13 hours, making it perfect for watching videos or browsing the web.


    Buy at Amazon

    Amazon’s newest Fire HD 8 now $35 less

    $35 off (35%)

    If you’re looking for a more compact or a less-expensive tablet, then the Amazon Fire HD 8 (2024) is a good option. This offer is for the 3GB of RAM 32GB of storage version in black. For $30 more you can get the 64GB of storage variant too.


    Buy at Amazon

    Best headphones and speaker deals under $100 this week

    Nothing’s Ear (a) earbuds are now available at a fantastic price! These earbuds feature cutting-edge hybrid noise cancellation (HNC) technology, an impressive 42.5 hours of playtime, and seamless ChatGPT integration for ultimate convenience. Choose from stylish black or white color options. With their sleek design and affordable price point, these earbuds are a must-have for any tech lover. Hurry, as this deal is time-limited! 

    Nothing Ear (a) earbuds with ChatGPT now $30 off at Amazon

    $30 off (27%)

    The Nothing Ear (a) earbuds offer Hybrid Noise Cancellation (HNC), an impressive 42.5 hours of playtime, ChatGPT integration, and a sleek, stylish design. This deal is available for both the black and white color options. With great performance at an affordable price, these earbuds are a fantastic choice — but act fast, as the offer is time-limited!


    Buy at Amazon

    Soundcore Liberty 4 now $30 off at Amazon

    $30 off (30%)

    The Soundcore Liberty 4 is another budget-friendly pair of earbuds with hybrid noise cancellation. They can last up to 50 hours of playback time and feature wireless charging. Also, they come in many trendy color versions, including Navy Blue, Pastel Pink, and Light Blue.


    Buy at Amazon

    The Soundcore Liberty 4 are also seeing a nice drop in price. These earbuds feature hybrid noise cancellation and deliver an immersive audio experience with an excellent 50 hours of playback time on a single charge. They also offer wireless charging for hassle-free use. With a variety of trendy colors to choose from, including Navy Blue, Pastel Pink, and Light Blue, you can easily find a pair that matches your style.

    Sony WH-CH720N headphones now with a $52 discount at Amazon

    $52 off (35%)

    A very sleek-looking pair of over ear headphones is seeing a major drop in price. This Sony WH-CH720N deal is for the White and Pink color options of the noise cancelling headphones. They offer Amazon Alexa integration, excellent audio output, and a long-lasting battery. Hurry up, as this is a limited time deal.


    Buy at Amazon

    JBL Flip 6 – one of the most popular speakers now $30 off

    $30 off (23%)

    The JBL Flip 6 portable bluetooth speaker has made a name for itself in the last couple of years as one of the best in its category when it comes to audio quality and strength, battery life, design and reliability. The Flip 6 is IPX7 waterproof and offers 12 hours of playtime. It also comes in many fashionable color options, like Camo, Teal, and Red. This is another deal that is time limited, so act fast!


    Buy at Amazon

    Sony’s sleek and stylish WH-CH720N over-ear headphones are now available at a significant discount! Choose from two White and Pink color options that combine classic looks with functionality. These noise-cancelling headphones come equipped with Amazon Alexa integration, delivering excellent audio output, along with a long-lasting battery.

    The JBL Flip 6 has established itself as a top contender in the portable Bluetooth speaker market, known for exceptional audio quality, durability, and reliability. With an impressive IPX7 waterproof rating, you can take the Flip 6 anywhere without worrying about spills or splashes. Enjoy up to 12 hours of playtime on a single charge, making it the perfect companion for any adventure. This speaker is available in a range of stylish color options, including Camo, Teal, and Red. Grab your JBL Flip 6 speaker before the deal is gone!

    Best power bank and charger deals under $100 this week

    You can now upgrade your charging game with the Anker MagGo 3-in-1 Wireless Charging Station at a lower-than-usual price. This accessory is designed to seamlessly integrate with all your Apple devices thanks to its Apple MagSafe compatibility. The MagGo is a versatile station certified with Qi2 technology, making it an excellent choice for Android phones and smartwatches as well. Experience rapid charging with 15W of wireless power, ensuring your devices stay topped off quickly and conveniently. 

    Another great deal for under $100 is the Baseus Blade 65W Power Bank, which is a stylish power bank that combines sleek design with functionality, featuring an LED battery percentage display. With an impressive 12,000mAh capacity, it can fully recharge your smartphone up to three times, making it an essential companion for on-the-go charging. Experience lightning-fast charging speeds of up to 65W, perfect for powering not only smartphones but also laptops. Equipped with two USB-C ports and two USB-A ports, you can charge multiple devices simultaneously with ease.

    Anker MagSafe Wireless Charging Station now with a $36 discount

    $36 off (32%)

    The Anker MagGo 3 in 1 Wireless Charging station is Apple MagSafe compatible, making it the home charging choice for consumers that own a plethora of Apple devices. With Qi2 wireless charging certification, it is also suitable for Android phones and smartwatches. With 15W of wireless charging power, it will top off the battery of your devices both quickly and conveniently. Grab it before the deal expires!


    Buy at Amazon

    Baseus Blade 65W 12,000mAh Power Bank now $30 less at Walmart

    $69
    79

    $99
    99

    $30 off (30%)

    Baseus’ Blade 65W power bank offers sleek design, an LED battery percentage display, and a 12,000mAh capacity, which is enough to top off a modern smartphone’s battery up to three times. With 65W of charging speed, it will charge your devices quickly, including laptops. It has two USB-C and two USB-A charging ports.


    Buy at Walmart

    Jackery Explorer 100 Plus now a whole $60 off on Amazon

    $60 off (40%)

    This compact and portable power station is more affordable than ever. Featuring a 31,000mAh obattery, the Jackery Explorer 100 Plus is the perfect camping companion or your hero in power outage situations. It features two 100W USB-C ports and a single 18W USB-A. It can top off your phone’s battery up to six times and your laptops up to two. You can spend $80 more and include a 40W solar panel to your purchase.


    Buy at Amazon

    The Jackery Explorer 100 Plus is now more affordable than ever! Get ready for your next adventure or unexpected power outage with its robust 31,000mAh battery capacity. This compact and portable power station is your ultimate camping companion or emergency backup. Equipped with two powerful 100W USB-C ports and an 18W USB-A port, the Explorer 100 Plus can recharge your smartphone up to six times and your laptop up to two times, ensuring you stay connected no matter where you are. Plus, for just $80 more, you can enhance your purchase with a 40W solar panel, making it the perfect eco-friendly charging solution. 

    Best home tech deals under $100 this week

    Google’s TV Streamer 4K is one of the top devices in its class and it now costs less than usual! Gain access to over 800 free TV channels and all the latest streaming apps, ensuring you never run out of content to enjoy. With stunning 4K HDR video output that supports Dolby Vision and Dolby Atmos, you’ll be treated to quality visuals and immersive sound. Please note that the HDMI 2.1 cable required for connecting to your TV is not included in the box, so you need to purchase it separately.

    Google TV Streamer 4K with Voice Search remote now $21 off

    $21 off (21%)

    Google’s TV Streamer 4K is one of the best in its category of devices. It can give you access to more than 800 free TV channels and all the current streaming apps. It offers 4K HDR video output with Dolby Vision and Dolby Atmos, which means it is capable of amazing video quality. Keep in mind that the HDMI 2.1 cable that is required to connect it to your TV isn’t included in the box.


    Buy at Amazon

    LEVOIT Air Purifier with HEPA filter now $10 less at Amazon

    $10 off (10%)

    The LEVOIT Air Purifier is perfect for people with allergies, including ones to pets. It can cover up to 1,095 of square feet thanks to its 56W high torque motor. It is a very compact device with an active carbon filter, touch controls, and plenty of working modes. This deal will expire soon, so you better hit the buy button now.


    Buy at Amazon

    The LEVOIT Air Purifier is an essential device for allergy sufferers, including pet owners. Capable of purifying spaces of up to an impressive 1,095 square feet, this clever gadget  features a robust 56W high-torque motor that gets the job done efficiently. Designed with a compact footprint, the LEVOIT Air Purifier is equipped with an active carbon filter, user-friendly touch controls, and multiple working modes to suit your living habits.

    Ring Doorbell with Ring Indoor Cam now $60 off at Amazon

    $60 off (43%)

    You can save big on this Ring home camera system deal by getting two devices instead of one. These are the Ring Doorbell and 2nd Gen Ring Indoor Cam. Both of these models offer a long-lasting built-in battery, FullHD ultra-wide video recording, and live view with two-way talk. The Ring Doorbell comes in Satin Nickel or Venetian Bronze color options.


    Buy at Amazon

    Add two more Ring Indoor cameras and save $30 more on Amazon

    $30 off (30%)

    If a single indoor camera isn’t enough for your home space, you can grab two more at $30 off at Amazon. Once again, we are talking about the 2nd Gen Ring Indoor Cam model. It can record videos in 1080p and has night vision, perfect for filming your cat’s night escapades. Meow.


    Buy at Amazon

    eufy Security SoloCam S220 now for half its price on Amazon

    $65 off (50%)

    What about filming outside your house? Amazon’s got you covered with this incredible eufy Security SoloCam S220 deal. With a built-in solar panel, you shouldn’t have to charge this outdoor camera ever. Offering 2K video recording and featuring IP67 water-resistance with Night Vision, the eufy Security SoloCam S220 will let you have a greater peace of mind than a guard dog.


    Buy at Amazon

    An amazing deal on home security features both the Ring Doorbell and the 2nd Gen Ring Indoor Cam! By purchasing this bundle on Amazon, you’ll enjoy incredible savings and quality surveillance for your property. Both Ring devices come equipped with a long-lasting built-in battery, Full HD ultra-wide video recording, and live view capabilities with two-way talk, making it easy to keep an eye on your home from anywhere. Plus, the Ring Doorbell is available in stylish Satin Nickel or Venetian Bronze color options to complement your home’s aesthetic. Add two more indoor cameras and save even more!Considering outdoor surveillance as well? You’re in luck! Amazon is currently offering an outstanding deal on the eufy Security SoloCam S220, designed to keep watch over your home effortlessly. Equipped with a built-in solar panel, you won’t have to worry about charging this outdoor camera ever again. Enjoy high-quality 2K video recording and rest easy knowing this device is built to last with IP67 water resistance and impressive Night Vision capabilities. With the eufy Security SoloCam S220, you’ll gain peace of mind greater than even the most dedicated guard dog can give you.


  • Transform your smart home with these HACS Home Assistant integrations

    Transform your smart home with these HACS Home Assistant integrations


    Home Assistant is a versatile platform for connecting all your Internet of Things (IoT) and general smart home hardware. Whether you have Philips Hue bulbs, Reolink cameras, or Nuki door locks, this platform allows you to control everything from a single interface. Then there’s the ability to configure automation, which can prove useful for setting values with various elements of your smart home depending on parameters detected elsewhere. For instance, should your camera detect movement, activate a nearby floodlight.

    The Home Assistant Community Store (HACS) takes this a step further by offering an easy way to manage and install various integrations through Home Assistant that would otherwise be unavailable or more difficult to configure. Here are some of our favorites you absolutely must try with your installation.

    Control everything within your home through automations

    Notification when New Devices-are discovered in Home Assistant

    Zigbee2MQTT, deCONZ, and ZHA are great for removing the need for a proprietary hub such as one from Philips, Xiaomi, or IKEA, but they have their downsides. Home Assistant is a powerful tool, but even it has limitations when it comes to more complex automation, something that proprietary hubs are great at handling. That’s where ControllerX comes in with AppDaemon, providing the behavior support that is usually removed when the proprietary hub is not in the mix. If you wish to drop your Philips Hub for a Zigbee adapter, this is the integration for you.

    With ControllerX, you can toggle any home device, be it a light, switch, or even a media player. You can also manually adjust the brightness and color of lighting, color loop management, toggle music playback, open and close covers, and more. It even uses an async loop to make call requests, allowing you to hold down a button for changes to be applied instead of a single action being performed. It’s more natural and acts like an actual remote.

    Related

    6 reasons HACS is the best custom add-on for Home Assistant that I always install first

    If you’re looking for Home Assistant custom add-ons, look no further than HACS.

    View and manage your Frigate footage channels within HA

    Frigate is one of the best solutions for managing security cameras and recording footage. It’s not directly supported by Home Assistant but is available through HACS with a few easy-to-follow steps. Once up and running, you can use Home Assistant to browse recorded footage with thumbnails, display cards on your dashboard, support multiple Frigate instances, and manage camera entities, making it the only tool you’ll need to keep your home secure.

    While the Frigate interface will generally be the destination for all things security footage, it’s great to have as much available through your Home Assistant dashboard as possible, especially for fellow household members who may be less tech-savvy. I’ve spent countless hours fine-tuning my security cameras through Frigate, having left Synology’s Surveillance Station, and found this Home Assistant integration to be incredibly handy in protecting my home.

    Integrate all your security locks

    Home Assistant Keymaster

    Bought a fancy new Z-Wave-enabled door lock? You can integrate it with Home Assistant through Keymaster. With this integration active, you can control the locks through Home Assistant and even manage who can access the lock. Forgot to do something at home and need someone to turn the stove off? Quickly create a temporary PIN for a neighbor to access your home for an hour, and you’re sorted! It also works for those who need access to your home at specific times, such as a dog sitter or cleaner.

    Having messed around with Keymaster in getting a smart lock to work in a test environment, I’m retrofitting all my door locks with Nuki smart locks, and Keymaster will be essential in creating a seamless process for enabling access for everyone at home.

    Glance at some pretty usage graphs

    Home Assistant Sankey Chart Card

    Sankey Chart Card is seriously cool. It’s a simple integration in that a Lovelace card is used to display a Sankey chart. This can provide insight into energy and water consumption. Should you have a few smart devices connected through Home Assistant, you can have all the information on energy draw displayed on your Home Assistant dashboard. Add in a solar array and battery support, and you’ll have a gorgeous way to quickly glance at how your smart home is currently consuming energy, both from the grid and internal generation.

    If you’re struggling to get devices to read live power data from, give PowerCalc a try, which is further down on this list.

    Pretend you’re home while away

    Home Assistant Presence Simulation

    Having your smart home bulbs turn on and off at set intervals was previously viewed as a means to make those walking past your home believe it’s currently occupied, but it had its faults in that they could check to see if these same lights toggled on and off at the same times each day. Presence Simulation takes this to the next level by effectively simulating your presence within the building. It analyzes the state history of devices and attempts to apply the same states at similar times you had in the previous days.

    This can allow you to configure lights and other devices to run at seemingly random times as you’ll be moving through the house and interacting with connected hardware. Presence Simulation will then replicate this behavior, which would make your presence much more believable.

    Related

    A beginner’s guide to setting up Home Assistant

    Home Assistant is one of the best ways to tame your smart home, and it’s free and easy to set up.

    You’ll have the best-looking garden

    Home Assistant Smart Irrigation

    Want the best-looking garden on the block? You’ll need to water your plants and lawn regularly. Don’t have the time? Smart Irrigation can come to the rescue! This Home Assistant integration is smart too. It calculates the time to run your irrigation system to compensate for moisture loss by evapotranspiration. It will allow your setup to maintain adequate moisture levels for your garden, crops, and lawn, taking into account precipitation and heat. Smart Irrigation will adjust levels on the fly depending on the weather.

    It will even track forecasts for the coming days and total moisture lost or added across multiple zones. We’re planning to set up our crop patches in different parts of the garden, which will see Smart Irrigation come in handy.

    Estimate live power draw readings

    Home Assistant PowerCalc

    This is a great addition to most Home Assistant installations where you wish to track the consumption of connected hardware. With PowerCalc installed, you can estimate the power consumption of devices such as lights, fans, and smart speakers using predefined values. This is invaluable for adding hardware that lacks integrated power metering support. It’s pretty good too in that not only does it simply track usage based on inputted values, but also through smart algorithms.

    For instance, for our Philips Hue and other Zigbee bulbs, PowerCalc will take the base values and look at brightness, hue, saturation, and color temperature to work out more accurate consumption estimates. It won’t be as accurate as real-time data supplied from devices, but it’s better than having them omitted from your data reporting. I recommend Sankey Chart Card for looking at how your home is using energy.

    Harness the power of the sun … inside your home

    Home Assistant Adaptive Lighting

    Adaptive Lighting is a special integration available through HACS. It’s a component that intelligently adjusts the brightness and color of lights based on the position of the sun. Developed to help maintain a natural circadian rhythm, Adaptive Lighting can lead to improved sleep, mood, and well-being. It’s particularly useful should you work from home and require some changes to the lighting within your home office. Adaptive Lighting handles a gradual transition between cool at noon and warm at sunrise and sunset.

    There’s even a handy web app that demonstrates how Adaptive Lighting can transform your home through color and brightness at varying stages of each day

    Related

    5 cool things you can do with Home Assistant

    Home Assistant is the best way to control all your smart home devices, but it can be so much more if you use a little imagination.

    Browse for some HACS integrations

    The best way to find some cool HACS Home Assistant integrations is by checking out the repository for yourself. Everyone’s Home Assistant installation differs, and so do the requirements. You may not desire to control all your locks with Home Assistant, which makes Keymaster a pointless suggestion here. The same goes for security cameras and Frigate. That’s where the excellent HACS repository of integrations comes into play. Browse through it and install any you like the look of. The best part of Home Assistant (and HACS) is the versatility.


  • Apple Watch arrived on buyers’ wrists 10 years ago

    Apple Watch arrived on buyers’ wrists 10 years ago


    Years after rumors started, months after it was announced, and a week after preorders began, the Apple Watch became a reality for millions of users, starting on April 24, 2015.

    Unless you were seriously into Rolex, there’s a decent chance that you had stopped wearing a watch once your iPhone had become part of your life. It’s not true that everyone stopped, but a noticeable number did — and then it seemed as if they all came back in 2015.

    For years before then, the very idea of an “iWatch” was both mocked and longed for. After it was launched in 2015, after Apple Watch became a reality, it was still mocked a little, and it was still longed for a lot.

    But it was also bought. Today, according to statistics collated by Business of Apps, up to the end 2024, Apple has sold over 300 million of the Apple Watch.

    That has to be an approximation as Apple does not release figures, but then neither does Samsung. Based on similar approximations by Sammobile, though, it’s estimated that Samsung has sold over 100 million smartwatches.

    That’s a huge number, but it’s only a third of Apple’s sales. And Samsung began selling its smartwatches two years before Apple began.

    Developing the Apple Watch

    Apple’s now ex-chief designer Jony Ive has claimed that discussions about the Apple Watch didn’t start until early 2012, and specifically after the death of Steve Jobs the year before. The New York Times wants to differ, though, as it said in December 2011 that Apple had been working on a watch “over the last year.”

    “A person with knowledge of the company’s plans told me that a ‘very small group of Apple employees’ had been conceptualizing and even prototyping some wearable devices,” he wrote. “One idea being discussed is a curved-glass iPod that would wrap around the wrist; people could communicate with the device using Siri, the company’s artificial intelligence software.”

    A sketch of an open hand wearing a wristband labeled 'CONTINUUM' with an arrow pointing to the wristband marked 408.
    Hidden in an early 2010s patent was this Apple Watch design

    “The brain that brings all these things together is the smartphone, which after all is really the first wearable computer,” he continued. “Researchers note that the smartphone is almost never more than three feet away from its user.”

    In a disagreement between Ive and the New York Times over Ive’s own work, you have to side with the designer. Except there was an Apple patent application that mentioned “a wrist-watch device” — and that application was in December 2007.

    Patents always try to cover the greatest possible number of uses of the technology they describe, the better to help with any future legal cases. But even if it were only a passing thought in 2007, it was still a passing thought about an Apple Watch.

    Not only was it a thought for someone at Apple, there were AppleInsider forum members asking about a Watch. They were asking about it even earlier, in 2005, and for one clear reason.

    At that point, Apple had launched the iPod nano and it was so small that it could be worn as a watch. And people did it, people did convert their iPod nano devices into a watch.

    It’s a long road from an iPod that plays music, to a device that actually saves lives. But the demand was there and the idea was there.

    The clues kept coming

    That 2007 patent may or may not have been serious, by 2013 there was no doubt. While it could still have chosen not to go further — see the Apple Car and how that project was cancelled — Apple was very seriously researching a watch.

    Forget trying to cover all bases, another patent was for a “bi-stable spring with flexible display,” and its illustrative diagrams include ones with such a device worn on the wrist. Apple called it a bracelet, so perhaps it wasn’t then confident of getting everything into a watch-sized device, but it was trying.

    “With a touch screen user input a user can accomplish a number of different tasks including adjusting the order of a current playlist, and reviewing a list of recent phone calls,” said the patent. “A response to a current text message can even be managed given a simple virtual keyboard configuration across the face of the flexible display.”

    In retrospect, we can see just how serious Apple was, and not just because we now have Apple Watches. In that same year of 2013, former Adobe chief technology officer Kevin Lynch joined Apple as a — something.

    Even he didn’t know. Seriously.

    Lynch was hired before being told what he would be working on. And if that’s a sign of secrecy, this is a sign of the state of progress on the Apple Watch at that time — Lynch had to skip Apple’s usual induction program.

    Instead, he went straight to the Apple Watch studio. He wasn’t working on his own and he wasn’t working with a blank slate, but he also wasn’t working with any functioning Apple Watches. Or a functioning watchOS.

    Lynch joined Apple in March 2013. Then in September 2014, Tim Cook formally announced the Apple Watch.

    Announcing and launching the Apple Watch

    It’s a very long time since Apple has been able to reveal a device and say “available today.” That’s partly because of the sheer scale it has to work at now, and partly because so many of its devices have to go through the FCC approval process.

    Rather than wait for any possible leaks from that process, Apple steps out into the spotlight first. And on September 9, 2014, Apple unveiled the iPhone 6.

    And the iPhone 6 Plus. It unveiled Apple Pay. It shoved U2 into our iTunes libraries.

    “We’ve really gone through enough to call it day,” said Cook. “But we’re not quite finished yet. We have one more thing.”

    “We love to make great products that really enrich people’s lives,” he continued. “We love to integrate hardware, software, and services seamlessly. We love to make technology more personal, and allow our users to do things that they could never have imagined.”

    “We’ve been working incredibly hard for a long time on an entirely new product,” he said. “And we believe this product will redefine what people expect from its category.”

    I am so excited and I am so proud to share it with you this morning. It is the next chapter in Apple’s story,” he concluded in his low-key, downbeat kind of style.

    One wait ended, another began

    After years upon years of heightened speculation only really equalled since by the Apple Vision Pro, the Apple Watch was real — and nobody could buy one. Not for another 227 days until April 24, 2015.

    During that time, Cook even had to reassure us all that the Apple Watch really was launching. And if we believed him about the launch date, plenty of people did not buy a word of his hype about the device in general.

    AppleInsider was cautious about it, too, and in a way that now seems prescient — or at least practical.

    “We believe the Apple Watch has huge potential, and very real benefits right now,” we said at the time. “But if the decision is to buy a Watch now or wait until the next generation, and you’re not the typical early adopter, maybe you should wait. Or at the very least, buy the cheapest Sport model you can.”

    Renumbering the Apple Watch

    What arrived on people’s wrists starting April 24, 2015, was just called the Apple Watch. Or it was called ludicrously expensive, if you went for the gold-plated edtion.

    Fast forward a year to September 2016, and suddenly the Apple Watch had numbers. Lots of them.

    There was the brand-new Apple Watch Series 2, but also a revised version of the original, now called Apple Watch Series 1. The original original, the un-revised one, started to be known as the Series 0.

    After that, and to this day, there has been a new Apple Watch every year. It would be highly unusual if 2025 didn’t see an Apple Watch Series 11 in September.

    It would also be unusual if absolutely every year saw a major change, a truly major improvement in the Apple Watch. But such a change did happen with the Apple Watch Series 4 in 2018.

    “Every bone in my body tells me this is very significant,” Jony Ive said at the time. “I’m so zealous about the Watch because I see it as making a material difference to people’s quality of life and actually their ability to be alive.”

    By the time of the Apple Watch Series 4, Apple was seeing its role as very clearly one to do with health. Previously it might have been health, might have been fashion, and it might have been anything, but now Apple knew what it had.

    And it added an EKG to the Apple Watch Series 4. It has kept adding new health features ever since — or sometimes, it at least tried to.

    Smartwatch on wrist displaying blood oxygen level at 97%, with blue and pink watchband, alongside a silver chain bracelet.
    Apple Watch’s blood oxygen sensor

    One of those health features concerned using light to measure blood oxygen levels. And in 2020, that prompted medical device manufacturer Masimo to sue Apple over the Apple Watch Series 6.

    That case rumbled on until the subject was the Apple Watch Series 9, which was hit by an import ban in the US. Masimos versus Apple may never be sorted out, but in the meantime Apple has disabled that blood oxygen sensor — and Masimos’s CEO has stepped down.

    Beyond the Apple Watch

    Masimo’s legal challenge wasn’t only about the Apple Watch Series 9. It also covered the Apple Watch Ultra.

    The first version of that was launched in 2022, bringing with it a larger screen, greater waterproofing for divers — and an Action Button. That customizable physical button has since spread to the iPhone, but it began on the Apple Watch Ultra.

    While this larger model doesn’t get updated every year, or at least not significantly, nor does the other newer entrant to the range. Apple Watch SE was launched even earlier than the Apple Watch Ultra, coming out in 2020 — and without any blood oxygen feature to trip it up in lawsuits.

    A dark smartwatch displays a red compass and navigation interface with various symbols and numbers on its screen.
    Apple Watch Ultra looks cool. Or possibly evil.

    That was less from trying to avoid legal hassles, and more to offer a cheaper Apple Watch while not cannibalizing sales from the regular Apple Watch.

    Apple Watch Ultra is ostensibly aimed at rugged, outdoor sports people, and the Apple Watch SE is at least partly aimed at parents buying for their children. In practice, adults and coach-potatoes wear either, but Apple has at least spaced the models out at steadily higher price points.

    Ten years on

    Maybe because a watch is such a personal device, but it does still feel as if the Apple Watch is a new product — until you see an Apple Watch Series 0 again. Today that original Watch seems impossibly small, practically unusably so, and it is limited.

    The current Apple Watch Series 10 still needs you to have an iPhone. But where the iPhone was a crucial umbilical cord for the original Apple Watch, now it’s far more possible to leave your phone behind and rely on your wrist-watch.

    But that’s not a casual use of the word “rely,” either. It’s not rely on it in just the sense of being used to having it around.

    A smart watch with a black display showing the time is partially covered by a brown sweater sleeve on a wrist.
    Apple Watch SE 2

    Instead, Apple Watch is helping people watch their weight, and perhaps especially so since it is tightly-integrated into Apple Fitness+, which launched in 2020.

    And you need to read this. In 2021, AppleInsider‘s Mike Wuerthele wrote about the death of his daughter, and in a piece where you feel the howling anguish, he explains how this little Apple Watch device on his wrist helped him.

    It’s no Apple fan’s enthusing, given that this piece was the third in a series about him being essentially forced to wear one. It’s a man driven to Takotsubo cardiomyopathy by despair and grief, and alerted to it by his Apple Watch.

    I asked him about it while writing this. He and his doctors both concur that it saved his life.

    That’s not some Apple toy, not some nice but unnecessary iPhone upgrade. It’s a personal device making a difference in people’s lives.

    Whatever comes next with the Apple Watch Series 11 and beyond, it is going to continue to be this. It’s going to be health.

    “If you zoom out into the future, and you look back, and you ask the question, ‘What was Apple’s greatest contribution to mankind?’” said Tim Cook in 2019, “it will be about health.”


  • Boost Your Connection for Less With These Wi-Fi Mesh Network System Deals

    Boost Your Connection for Less With These Wi-Fi Mesh Network System Deals


    There are a lot of reasons to want a strong Wi-Fi connection — whether you’re working from home, an Esports champion-in-training, or your household has a lot of simultaneously connected devices. If you find that you aren’t getting as strong a connection on one side of your home versus the other, we have just the solution for your woes: a Wi-Fi mesh network system. PCMag has tested hundreds of mesh network systems, routers, and range extenders, running them through a rigorous battery of tests for signal strength, speed, ease of setup, and more.

    Which mesh Wi-Fi network system is best for you? Consider the following: how large is your home? The more satellites included in a system, the more square footage you have available to you. Do you have a lot of connected devices? The more devices you have, the more bandwidth—measured in Mbps—you’ll need. You can find a breakdown of which Wi-Fi mesh systems are best suited for your particular use case in our helpful primer and then you can see what’s on sale below:

    Amazon eero mesh WiFi system – router replacement for whole-home coverage (3-pack)

    Eero is one of our top Readers’ Choice brands for routers and modems for its ease of use and it had the second-highest rating for satisfaction with setup. This dual-band Eero Wi-Fi mesh system three-pack covers up to 4,500 square feet and supports speeds of up to 550 Mbps. It gives you access to the 2.4GHz and 5GHz bands, providing more bandwidth for those with several simultaneously connected devices so you can avoid slowdowns even during peak streaming and gaming hours. As stated previously, setup is a cinch via the Eero app, which also allows you to manage your network remotely should you need to make any tweaks on the fly. Save $44 right now and gain whole-home coverage for less.

    TP-Link Deco XE75 Pro AXE5400 Tri-Band WiFi 6E Mesh System (3-Pack)

    Get Our Best Stories!


    Newsletter Icon


    Unlock Deals on the Latest Tech Products

    Sign up Now for the Tech Deals Newsletter

    By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy.

    Thanks for signing up!

    Your subscription has been confirmed. Keep an eye on your inbox!

    This TP-Link Deco AXE5400 3-pack will blanket your whole home in Wi-Fi coverage and supports up to 200 devices. Setup is easy, thanks to the Deco App, and intelligent security features (like a home network scanner and parental controls) safeguard you and your family from online dangers. You can also upgrade to HomeShield Pro for more protection features. Even those with extensive home security systems with several connected devices should have enough bandwidth when using this tri-band trio, while AI-Driven mesh intelligently optimizes your connection.

    Recommended by Our Editors

    Google Nest WiFi 6 Pro Wi-Fi 6E Tri-Band Mesh System (3-Pack)

    With up to 6,600 square feet of coverage, the Google Nest Pro offers a strong, stable network connection to every room of your home. The single mesh router and two satellites are capable of handling a large number of simultaneously connected devices due to the greater bandwidth offered by the tri-band connectivity. Because this is a Google Device, the Google Nest Pro can easily be set up and added to your smart home network via the Google Home app, which can also be used to check speeds and manage your network right from your smartphone. Our expert reviewed the Google Nest Pro and praised the easy installation, Wi-Fi 6E support, and solid performance—all of which make this Wi-Fi mesh system an easy recommendation at $54 off retail.

    More Deals to Consider to Boost Connectivity


    *Deals are selected by our commerce team

    • Best Wi-Fi Mesh Network System Deals at Amazon

    • Best Wi-Fi Mesh Network System Deals at Best Buy

    • Best Wi-Fi Mesh Network System Deals Walmart

    FAQ

    What Is a Wi-Fi Mesh System?

    Mesh Wi-Fi systems (or mesh Wi-Fi routers) are designed to extend the range of your wireless coverage. These systems consist of several networking components: a main router, which connects directly to your modem, and a series of satellite modules, or nodes, placed throughout your house. They are all part of a single wireless network, and they share the same SSID and password. 

    Which Is Better: A Wireless Mesh Router or a Range Extender?

    Wi-Fi systems are very user-friendly. Thanks to a companion app, they are a snap to set up and manage. Mesh systems offer whole-house coverage, and they provide seamless room-to-room roaming over a single network. On that second point, wireless extenders, in contrast, tend to require you to reconnect from network to network as you move in and out of range of the base router or the extender. For more about the differences between these two technologies, check out our explainer, Wi-Fi Range Extender vs. Mesh Network: What’s the Difference.

    Do Wi-Fi Mesh Systems Support Wi-Fi 6?

    Most do, and it’s the minimum Wi-Fi version you should look for on a Wi-Fi mesh system. Wi-Fi 6 (also called 802.11ax) offers fast throughput speeds (up to 9.6Gbps), low network congestion, and excellent range performance. However, if your budget allows, you should consider springing for a Wi-Fi 6E or Wi-Fi 7 system. The cutting-edge Wi-Fi 7 standard promises even better performance than those that preceded it, and it’s backward-compatible, too.

    What Is the Best Wi-Fi Mesh System to Buy?

    That depends on your budget and individual connectivity needs. The Asus ZenWiFi BQ16 Pro is our current overall top pick for Wi-Fi mesh systems, while the TP-Link Deco BE63 is our pick for the best budget option. For even more details and options, check out our guide to the best Wi-Fi systems we’ve tested. 

    What Are the Best Deals on Wi-Fi Mesh Systems?

    Expect to spend around $200 on a budget Wi-Fi 6 system for use in a smaller house with few devices, around $500 for a mainstream mesh kit, and $750 and up for a high-end Wi-Fi 7 option. If you find a well-rated system that’s cheaper than these guidelines, jump on it!

    Do Wi-Fi Mesh Routers Go on Sale During Prime Day or Black Friday?

    Yes. Mesh systems are typically frequently discounted but often receive their deepest discounts during these sales events. Plus, Amazon owns Eero, one of the leading mesh systems manufacturers. So, you should expect exceptional deals on these award-winning systems during Amazon Prime Day.

    Are There Bundle Deals on Multiple-Node Systems?

    Yes. Mesh systems get cheaper on a per-node basis the more nodes you buy. However, you should first determine how many nodes your house actually needs rather than buying a three-piece system because it’s a better per-node deal than a two-piece one. A good rule of thumb is to match your home’s square footage with the manufacturer’s rating for a given system, then add a node if you have thick walls, live in a dense neighborhood, have lots of small rooms, or have other similar situations.

    About Tom Brant

    Deputy Managing Editor

    Tom Brant

    I’m the deputy managing editor of the hardware team at PCMag.com. Reading this during the day? Then you’ve caught me testing gear and editing reviews of laptops, desktop PCs, and tons of other personal tech. (Reading this at night? Then I’m probably dreaming about all those cool products.) I’ve covered the consumer tech world as an editor, reporter, and analyst since 2015.

    I’ve evaluated the performance, value, and features of hundreds of personal tech devices and services, from laptops to Wi-Fi hotspots and everything in between. I’ve also covered the launches of dozens of groundbreaking technologies, from hyperloop test tracks in the desert to the latest silicon from Apple and Intel.

    I’ve appeared on CBS News, in USA Today, and at many other outlets to offer analysis on breaking technology news.

    Before I joined the tech-journalism ranks, I wrote on topics as diverse as Borneo’s rain forests, Middle Eastern airlines, and Big Data’s role in presidential elections. A graduate of Middlebury College, I also have a master’s degree in journalism and French Studies from New York University.

    Read Tom’s full bio

    Read the latest from Tom Brant

    About Jade Chung-Lee

    Merchandising Associate

    Jade Chung-Lee

    When she isn’t perusing online stores for deals, Jade enjoys playing video games (mostly JRPGs and roguelikes), sorting board game components neatly into containers, and building Gundam models. Her love of electronics has persisted through her youth and has resulted in a collection of gaming peripherals including keyboards and controllers, scale figures, and art work. Jade lives in blissful harmony with her wife, cat, and two chinchillas—as well as a host of houseplants.

    Read Jade’s full bio

    Read the latest from Jade Chung-Lee




  • Feature,/features,,features, Coverage | Laptop Mag

    Feature,/features,,features, Coverage | Laptop Mag


    If you think AI is mostly memes and marketing fluff, you’re not alone. Intel’s Robert Hallock was equally skeptical at one point in time. Now, he’s betting that AI, the quiet kind, will be the key to Intel unlocking the kind of power, performance, and battery life truly befitting a next-generation laptop.

    In a conversation encompassing everything from ethical AI cocoa farming to the futility of the F1 key, and the rollercoaster ride that is the Gartner Hype Cycle, Hallock shines a light on Intel’s AI ambitions, unpacks the challenges ahead, and offers a counterpoint to the hunt for AI’s killer app… All 450 and counting of them.

    An interview with Intel’s Robert Hallock

    An interview with

    Intel Vice President and General Manager of Client AI and Technical Marketing Robert Hallock
    An interview with

    Robert Hallock

    Robert is a senior director of technical marketing at Intel for Core processors and technologies. Prior to joining Intel, Robert spent 12 years in Client and Graphics at AMD, most recently as the director of product and technology marketing for Ryzen processors. Robert has also been a PC hardware reviewer, journalist, and technical writer. He moonlights as a designer of high-performance aftermarket automotive components and is a lifelong PC enthusiast.

    What’s your role in AI?


  • Geekom Mini IT13 Review | IT Pro

    Geekom Mini IT13 Review | IT Pro


    Geekom is another Chinese OEM carving out a name for itself in the Mini PC market. Unlike the mini PC boxes we’ve looked at recently from relative newcomers Acemagic and Beelink which are both entry level devices built around Intel’s N150 processor the Geekom Mini IT13 2025 Edition, to give it its full title, runs on the altogether more potent Core i9-13900HK CPU.

    Naturally, that puts the new Geekom box into a different price category from its Twin Lake juniors. At the time of writing, Geekom is selling the 1TB model for £649 rather than the “usual” RRP of £849 and the 2TB model for £699 rather than, oddly, £799. It’s good to see a manufacturer not gouging the public for extra storage capacity. Certain famous computer makers with fruit logos could take note. Both models come with 32GB of RAM.